Homework on Public and Private Keys - Questions

Public and private keys are used to send and receive encrypted data. The public key is created by a private key and allows encrypted data to be sent over non secure domains. The only way to decrypt the data from a public key is to have the corresponding private key. without the private key it is virtually mpossible to decrypt the data from a public key.

The sending and receiving of encrypted private data and identifying parties via virtual signature are the 2 use cases for public/private signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a large randomly generated number, which is secret and only you have. Public key is generated from private key and it is used in public. If someone knows your public key, that person won’t be able to find your private key. These keys are used in data encryption and digital signatures.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption
    Digital signatures

1 Like

The public key is a key you share with others so they can send you encrypted messages.
The private key is needed to decipher the encrypted messages. The private key generates the public key, but it is not possible to get to the private key from the public key.

They can be used for cryptocurrency payments and for digital signatures.

1 Like

In both cases you would use digital signatures (you sigh a tx). PK cryptography can also be used for encryption. :slight_smile:

1.)Describe the concept of public and private key with your own words
-Private key is a long series of randomly generated numbers that can encrypt or sign messages. A public key is generated from the private key and can be visible on the network to anyone.
2.)What 2 use-cases can public key cryptography be used for?
-Sending encrypted messages and digital signatures.

1 Like
  1. The concept of public and private key makes it possible for two or more parties to communicate with each other in a private manor on a public domain. The information sent between all parties is encrypted using their keys and no one other than them can decrypt and read the information. Intruders must get their hands on theirs private keys in order to be able to decrypt and read the information. Therefore it is very important to keep your private keys safe at all times, especially in the crypto space.

  2. Encryption and Digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.

A public key is derived from a private key. The public key can be shared with anyone and they can encrypt their message with your public key which you can then unlock with your private key. This relationship between private and public keys allows for safe and secure communications and transactions.

  1. What 2 use-cases can public key cryptography be used for?

Digital Signatures and Encryption

1 Like
  1. Private key is a random generated number that is unic . the public key is a number witch is generated from the private key.

  2. It can be used to send a encrypted messege from 1 person to another. it can also be used to verify that you are you.

1 Like

1. Describe the concept of public and private key with your own words.

A private key is a random number generated by a mathematical formula, that is only visible to its owner.

A public key is a number that is derived or generated from a private key that is visible to all members of an open network.

Public and private keys can be used to encrypt and authenticate transactions on an open network.

They are both generated by your computer.

Your private key is secret, and your public key as the name infers is visible and open to the public.

2. What 2 use-cases can public key cryptography be used for?

  1. Encryption - Public key is used to encrypt, and private key is used to decrypt.

  2. Digital signatures- private key is used to create a digital signature. The recipient of a message can then verify your identity by reconciling the digital signature with your public key to confirm that both were indeed initiated by the former(private key).

1 Like
  1. The public key is used to encrypt a message and the private key decrypts it. The private key can be created by generating a truly random number.
  2. The 2 use cases are encryption and digital signatures. Digital signatures verify who sent the message. Encryption makes the message unreadable for anyone that don’t know the private key.
1 Like
  1. Describe the concept of the public and private key with your own words.

Information is entered into the computer and the computer generates a set of random numbers and this number is known as the private key. The user then generates a set of numbers from that private key and this is the user’s public key. The public key is visible on the internet to use by anyone who wants to send any information to that user. The private key is used to open the public key, but the public key cannot open the private key.

  1. What two use-cases can public key cryptography be used for?

The public key can be used as encryption in order to keep information sent to a second party private, or as a digital signature to verify who sent a particular message.

1 Like
  1. Unique 1 to 1 relationship key pair generated with a hash function, one for sharing with a public, and one for keeping privately in secret.

  2. We use private key to encrypt the information to share with others so anyone can use the public key to decrypt the message and identify the sender. When message is encrypted with public key only the person who holds the private key can decrypt the message.

1 Like

You only mentioned encryption. PK cryptography can also be used for digital signatures which is heavily used in digital currencies. :slight_smile:

  1. Public key is a generated number from the private key, which is a ramdom number generated by your computer. Anyone can see your public key and encryp a message with it, but just the owner of the unique private key can decrypt it.
  2. Send encrypted messages to the owner of the private key and public signatures.
1 Like

1: The Private key is generated by the computer and then derives a public key for use between others. This is why you never want to share your private key with anyone else.

2: The two use cases for public key cryptography are 1 encryption, 2 Digital signatures. The digital signatures are used mostly in bitcoin.

1 Like

1. Describe the concept of public and private key with your own words.
The private key is the base for all other keys, it is used to create the public key and to decrypt from the public key. The public key can be used to verify a message is sent from a private key but cannot decrypt the private key.

2. What 2 use-cases can public key cryptography be used for?
1,Encryption, you can encrypt a message from a public key.
2,Digital Signatures, you can verify who sent the message by using the public key.

1 Like
  1. Public keys can be viewed by all and private keys are not shared with the public. Private keys consists of a randomly generated large number sent via a public key (encrypted) to a recipient. This can only be sent one way. The private key decrypts the message.
  2. The two public key cryptography use cases are: encryption and digital signatures.
1 Like
  1. A private key is a random number which should be kept secret. A public key is generated by the private key (as a one way function), is available to everyone, and is used to encrypt a message which can only be deciphered using the private key. Also, a digital signature can be added to a message using the private key. This signature can be verified using the public key.
  2. Encryption and digital signature.
1 Like
  1. Describe the concept of public and private key with your own words.
    The concept of public and private keys is used to ensure secure communication over insecure channel. It requires the following components:
  • Private key - random (very large) number, which must be kept secret
  • Public key - another number derived from the private key. This number is shared with the public. There are different methods of generating the public key from the private one. The first and original implementations (Diffie-Hellman-Merkle) use the mathematical properties of the mod (modulo) operator. In present days Elliptic Curves is another approach (very beautiful one actually, check it out).
  • Algorithm for encryption - I will have to research those further
  1. What 2 use-cases can public key cryptography be used for?
    The two use-cases that public key cryptography is used for are:
  • “Message encryption”
  • “Digital signature”
1 Like

it creates a more secure connection between a sender and a receiver between to parties on a public platform

sending a message or sending money

1 Like