-
A public key is used to encrypt private/sensitive information while the private key is used to decrypt information. A public key is a unique hexadecimal number that is asymmetrically generated from a private key. Ones private key acts as their confidential identity however the public key is communal information.
-
Encryption and digital signatures
1.Public key is for encryption of important/sensitive information while the private key is to decrypt the information that was sent.
- The 2 use cases are for Encryption and Digital Signatures.
- Describe the concept of public and private key with your own words.
- Privatekey is generated by a random number, with this private key a public key can be generated on a mathematical way.
- What 2 use-cases can public key cryptography be used for?
- Encryption and Digital signature are two use cases used.
-
Private key is a personal key and should be kept safe. Public key is visible to the public.
-
Digital signature and encryption.
- Describe the concept of public and private key with your own words.
The private key is a way to encrypt information and keep it secret so that once communicating with another person through www (i.e. within an app, social media, β¦) no other spectator/person can get access to the information. The private key is a generated a large random formula which is kept secret by the person who generated it. In order to submit this encrypted information to another person/the desired recipient in a way no third party can get this information, a public key will be generated from the private key. The public key is the encrypted message the desired other person only receives (no third person can read it). This is also a way ensure identification and integrity.
- What 2 use-cases can public key cryptography be used for?
-
To generate a digital signature or
-
to generate a bitcoin wallet address.
-
A private key is generated by a computer and it is a random sequence of numbers and letters. This key needs to stay hidden and the only part that gets shared is the public key that is generated from the private key.
-
One of the uses of public-key cryptography would be sending instant messages to each other where only two parties can read the messages if they have their private key secure.
The second use would be for establishing identity on the blockchain network, by creating a public key from the private key and the bitcoin address from the public key.
In biology, you have the central dogma of genetics, where you go from DNA to RNA to Protein. Up until recently, we thought that this process cannot be reversed. HIV virus can actually go from RNA back to DNA using a special enzyme. I guess in crypto we also have a central dogma: Private Key β> Public Key β> Public address, but here you truly cannot go reverse. You cannot get the private key from having a public key or public BTC/ETH address
-
A private key is a random number generated after you first set-up a wallet. You then use that public key to create a unique public key that is available to everyone in the network. When you send bitcoin, you sign with your private key. The nodes can the verify you transaction by mathematically comparing the signature with the public key. This tells the nodes that your transaction is valid.
-
Encryption sending encrypted messages to people. The message is just giberish until the private key is used. Digital signature is explained above.
-
Private key is a random number generated by computer that has to be kept secret, this random number can derive another random number from it called Public Key which can be publicly shared.
-
Encryption and digital signature.
The wallet address is just a hash of the public key. PK cryptography can also be used for encryption.
I guess they reverse engineered the formula
-
The public key is, as its name implies, public and open to anyone in the system. The public key is used to encrypt data. The private key however is private . It is stored on userβs device and is used to decrypt data
-
The cases are encryption and digital signatures. The signature verifies who sent the message while the private key protects the public key by creating the bitcoin address.
- Describe the concept of public and private key with your own words.
Public key is used for encrypting data by sender , using public key private key is generated by sender that is unique. Private key is used to decrypt the message send by sender to specific user. - What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures
- The public key is created as a unique signature for your wallet. The public key is generated from this but can be seen by all on the network.
- Sending money or a message.
-
Public and private keys used in cryptography are used to encrypt and decrypt information. If a decrypted message is sent to a public key only the private key of the recipient can decrypt it. This is because a public key is mathematically derived from the private key so they are mathematically related.
-
The two use cases for public-key cryptography are encryption and digital signatures.
- Describe the concept of public and private key with your own words.
A private key is a randomly generated number that can create a public key which is shared with others to complete transactions within the network. The private key decrypts encrypted public keys.
- What 2 use-cases can public key cryptography be used for?
Encryption & digital signatures.
- Secret key is a random number generated by our computer, and the public key is a derivative of the secret key using hash function.
- Encryption and digital signature.
#1 The public key everyone can see and is used openly, Private key is to keep you identity and the transaction secure and allows access to monies in your wallet.
#2 Identification and integrity
A public key is derived from the private key. It is openly shared with the public, however a private key which originates as a random number generated by a computer is only available to the person using it and is not publicly shared.
The 2 uses cases a public key can be used for are:
Encryption, and digital signage to verify identity
I think both these examples would technically use digital signatures. The other use case would be encryption
- The concept of public key is that is in encrypted and has digital integrity but is open to been
expectators on a open public network. And private key is not able to be seen by anyone but
the owner. - The 2 us-case scenerio is when you want to use or send digital signature or use it for cryptocurrency.