Homework on Public and Private Keys - Questions

  • Describe the concept of public and private key with your own words.
    • The public key is derived from the private key
    • The public key is open to anyone in the system.
    • Anyone can use a public key to write a message; however, only a private key can decrypt and read that message
    • The private key is private, only stored on user’s device, should not be shared, and is used to decrypt data.
  1. What 2 use-cases can public key cryptography be used for?
  • Encryption
  • Digital Signature
1 Like
  1. Describe the concept of public and private key with your own words.
    The concept of Public & Private Keys is that of an encryption process by which one, the public key, is reliant on the other, the private key, for decrypting messages or transactions.
  2. What 2 use-cases can public key cryptography be used for?
    The 2 user cases are (10 Encryption and (20 Digital Signatures. The later is used in cryptocurrency by way of having a private key addended to a transfer which is then verified by the recipient using the reciprocal public key to verify the sender’s identity
1 Like
  1. The public key is where I can receive data and every activity can pe tracked by the public. The private key is what you use to unlock and utilise the public key.
  2. Receive cryptocurrency and track transactions
1 Like
  1. Describe the concept of public and private key with your own words .

A "public key” is created using a randomly generated “private key”. These 2 numbers are therefore mathematically linked, and can be described as public and private key “pairs”.

  1. What 2 use-cases can public key cryptography be used for?

  2. Encryption - Allows us to send messages through open/public networks.

Where an unsecured communication channel is used, there are spectators who can view messages being sent between parties. Messages are encrypted by senders using the receivers public key. The only way these messages can then be decrypted is using the receivers private key. Since private keys are kept secretly, the receiver will be the only person who can decrypt the message.

  1. Digital Signatures - Used to verify the integrity of a message, digitally.

In cryptocurrencies, another important use of public and private key pairs is in digital signatures. A sender will use their private key to sign the message they are sending. The receiver will then be able to verify the authenticity of the message by confirming that the signature corresponds with the public key of sender.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private keys are generated using random numbers. It equates to a person’s signature and needs to be kept safe.
    Public keys, in turn, are generated based on private key, but are shared in the public domain. Public keys are used to verify the identity of the person who sent the message/ transaction, by matching the public key to that person’s private key.
  2. What 2 use-cases can public key cryptography be used for?
    a. Encryption - rendering messages in open network unreadable, except to the person who’s public key it is (that obviously also holds the private key)
    b. Digital signatures - using private key to transaction
1 Like

Q1.Describe the concept of public and private key with your own words?
A1. A private key is a random Number that only belongs to you with that you can verify transactions or unencrypt messages. With the private key you generate a public key, that public key can be shared with others, you can encrypt messages and sign transactions.
Q2.What 2 use-cases can public key cryptography be used for?
A2. Encryption or Digital signatur

1 Like
  1. Describe the concept of public and private key with your own words.

A public key is derived from your private key that allows others to send you information that only you can decrypt. And the only way you can decrypt that data sent through your public key is by using your private key.

  1. What 2 use-cases can public key cryptography be used for?

Digital signatures and encrypting data.

1 Like
  1. Public keys are available to everyone and also allow others to interact with you. They are also mathematically created from the Private Key. The Private key is used to decrypt all information sent to the public key.

  2. Sending messages and sending money.

1 Like
  1. Private keys are used to only be generated once so no identicals kept safe forever and only you know it and public keys are for everyone to see.
  2. Cryptocurrency and public-key signatures of digital documents kept somewhere on the blockchain or other encrypted messages
1 Like
  1. Private key only you know and Public Key is generated and shared. Also Private is your unique fingerprint/signature and Public is sent to others in messages/transactions.

  2. A) Encryption B) Digital Signatures

1 Like

Homework – Public & Private Key Cryptography
Describe the concept of public and private key with your own words.

The concept addresses issues of keeping my identity safe and maintaining my data integrity.
The private key is kept secret and is generated using a random number.
The public key is derived from the private key with no possibility of an inverse function.
Either the private or public key can be used to encrypt data, with the other key being used to decrypt it; hence, enabling 2 way secure communications between private individual(s) and the public (whatever it is).
This is succinct P=D(kprivE(kpub.P)) P=D(kpub.E(kpriv.P)
What 2 use-cases can public key cryptography be used for?
The encryption of data content to ensure that it is private, keeps its integrity and remains securely locked away. Also, used to implement crypto wallets and as input to compute a bitcoin address.
For digital signatures to sign messages, mail, documents etc as a guarantee of authenticity (my identity assurance).

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is derived from private key. Public key is used as a way to receive information that is then decrypted by the private key.

  2. What 2 use-cases can public key cryptography be used for?
    To prove that a message was sent by a certain person or to receive information that will be unlocked and read by the private key.

1 Like
  1. The public key is publicly available. It is for anyone who wants to send you an encrypted message. The private key is so that you are the only one who can read the message. The public key is based on the private key, but the private key cannot be derived from the public key

    1. Coded messages 2 Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a randomly assembled combination of numbers/letters that cannot be hacked. The public key is generated off of the private key based off of a one-way encryption program. Verification of all transactions and digital signatures is based off of a valid private key.

  1. What 2 use-cases can public key cryptography be used for?

  2. Encryption

  3. Digital signatures (most used use case in Bitcoin example)

1 Like
  1. Describe the concept of public and private key with your own words.

Public key and private key is a way to transfer data through an open network without the data’s contents being observed by the network unless one has access to the private key that corresponds to the public key that was used to encrypt the data. So Alice can send Bob her public key, Bob can then encrypt a message he wants to send Alice using this public key, and the only way to decrypt the message is by using the private key that hopefully only Alice has access to.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures

2 Likes
  1. Describe the concept of public and private key with your own words.
    Public and private keys are random numbers that are generated by your computer, and are used for encrypting and decrypting information.

  2. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a unique random number that can be used to generate a public key - when combined, a private and public key created a bitcoin wallet - the private for sending and the public for receiving

  2. What 2 use-cases can public key cryptography be used for?
    encrypting and signature verification

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is randomly generated alphanumerical code that is unique to you. It should not be seen by anyone. A public key is then generated from your private key which anyone can see and use to send you information. The pair of these two keys is unique to you and allows for encryption and digital signatures to be possible on the blockchain.

  2. What 2 use-cases can public key cryptography be used for?
    People use the public key address to send you things like encrypted messages.
    Also a digital signature can be generated from your private key so that when you send things on the blockchain (like money) it can be verified by a signature, unique to your private key, and that the receiver can verify by comparing to your public key.
    It can also be used to generate a bitcoin address, so others can send you bitcoin.

1 Like
  1. Describe the concept of public and private key with your own words.
    • The private key is the master secret used in cryptography to generate a public key that will have the hability to encrypt messages that will only be decryptable by the private key. They are in an unidirectional mathematic relationship that makes the sharing of the public key not endangering the security of the private key.
  2. What 2 use-cases can public key cryptography be used for?
    • Encrypt a message only decryptable by the private key
    • Digital signature to ensure the identity and the integrity of a message
1 Like

1.The privat key is built of random numbers and with it he generates the public key. The privat key is the
singature and the public key verifys it. its only working in a one way direction.

  1. its used for crytocurrency and sending messages like emails.
1 Like