Homework on Public and Private Keys - Questions

*by using someone’s PUBLIC key (not private)

  1. Privates keys are generated from random values that after been hashed generate a Public Key. This public key can be shared in unsecured networks and it’s used to encrypt messages that can only be decrypted with the corresponding private key.

  2. Public key encryption can be used to encrypt messages sent between two parties through an insecure channel and can be used to publicly identify a transaction sender through digital signatures.

  1. Public key: An address that can securely be shared with the public to receive ‘data’ and encrypt;
    While the Private key is private and used for decryption and signs ‘data’ you’ve sent.

  2. 1st use case : Encryption.
    2nd use case: Digital Signature.

1 Like

1] Public Key Infrastructure (PKI) enables the integration of various services that are related to cryptography. PKI is to provides confidentiality, integrity, access control, authentication, and most non-repudiation.

2] Banking & Finance - to sign direct debit mandate
IT - SNMP traps sending data logging to a network management system

1 Like

Thanks now I understand it better.

  1. Describe the concept of public and private key with your own words.

The private key is used to create a public key that can encrypt data. The holder of the private key can both encrypt and decrypt data.

  1. What 2 use-cases can public key cryptography be used for?

It can be used for encryption and digital signatures.

1 Like
  1. A private key is a ‘string’ made out of a high min-entropy field with a certain quantity of digits. It gives the private key its uniqueness. The public key is the result of the specific hash fonction that won’t allow reversed encryption or de-encryption and that is the one result possible for a specific private key.

  2. The two use cases of public key encryption are digital signatures and encryption-decryption of data to be streamed within an insecure network.

1 Like

Public keys are derived from private keys using Elliptic curve cryptography. Not just by hashing.

https://medium.com/coinmonks/private-and-public-key-cryptography-explained-simply-4c374d371736

3 Likes
  1. Public key cryptography generates a random number known as the private key, from this, is generated a public key. This pair of keys has two use cases

a) For encryption, to send a message to someone without anyone expect the receiver knowing what it says, you use your private key to encrypt the message and only the private key of the receiver can decrypt the message.
b) For digital signature (mostly use in bitcoin) when you need to verify that the sender is legit. You use your private key to sign a transaction and with your private key you are able to verify that this signature is from the right private key.

1 Like

Answers

  1. A private key is a personal code that represents its owner in a particular way. For example, I can generate randomly a private key and use its to decrypt information encrypt with my public key. Public key is derived mathematically from my private key in an easy way. The reverse operation is infeasible.

  2. Public key cryptography can be used for encryption and digital signatures. When you want to encrypt a message you can use the public key of the recipient, who decrypts its with the personal private key. Instead, digital signatures is used to be sure that a certain sender produce a certain information. This second application is common used in crypto space to send and receive money.

1 Like
  1. You have a private key that is a random number generated from a wallet, this can be used to create a public key that you can share with anyone you want. If you want to receive a message from a friend without anyone else except you being able to read it, then you share your public key with your friend and ask him to encrypt it. So now the only person who can read the message is you. It is super important to always keep the private key private!
  2. Encrypting and signing. You can either encrypt a message using a public key in order for the person with the private key is the only person who can decrypt the message. Or you can sign a message/transaction with the public key that the other person knows that you are the sender.
1 Like
  1. Describe the concept of public and private key with your own words.
  • A PRIVATE Key is a random number generated by a computer (or wallet etc) that in turn is hashed to get your PUBLIC Key. You can give out your PUBLIC key in order to receive data etc. A PRIVATE Key can never be discovered by PUBLIC Key.
    A PRIVATE Key can be used to sign a message / data just link a digital signature.
  1. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures.
  1. Private key is your own secret identity which you keep private. It allows you to unencrypt messages/transactions and to sign them.
    Public key is a key generated by your private key that everyone can see and they use to encrypt data that only you can decrypt.
  2. Encryption and Digital Signature
1 Like
  1. Describe the concept of public and private key with your own words.
    It is similar to your username and password. You can give out your username to the public, but it is the password that is private to you.
  2. What 2 use-cases can public key cryptography be used for?

The first use case is when you want to send an encrypted message you use your private key. The recipient uses your public key to open the encrypted message.
The second use case is using a digital signature as in sending and receiving bitcoin. In order to send bitcoin the sender uses his private key and the receiver uses the senders public key to receive the bitcoin.

1 Like

1.Private key is generated by my computer and is for me only ( If I lose it I’m screwed)
Public key derives from privat key and is for the world to see

  1. encryption and digital signatures
1 Like
  1. Public key is generated by the private key which is a random number generated by your computer then this random number is used to generate a public key which can be used to send and receive transactions.
  2. It can be used for digital signatures and encryption.
1 Like
  1. Public and private keys allow the communication between two entities through a public network. Basically encrypting the string ‘string’ with 2 keys lets say my private is 11 and public is 1 (just for explaination) and my friend’s keys are private: 22 public: 2 the message I will send will be string^11^2 and my friend will decrypt this by using his private key which will decrypt the ^2 and he will use my public key of 1 to decrypt the message.

  2. Secure communication, Secure signing something with my private key and anybody decrypting it using my public key to ensure I was the one who signed it.

1 Like
  • Describe the concept of public and private key with your own words.
    the private key is only for me
    the public key is generated by my public key and is used for all others

  • What 2 use-cases can public key cryptography be used for?
    for encrypting data
    to prove their identity

1 Like
  1. to encript a message or transactin you need to have the receivers public key . to be able to read that message the receiver has to unlock it with his private key, which is mathematicly linked to the public key.
    this way it’s possible to securly send and receive messages as long as the private key stays private.

  2. public key cryptography can be used to encript messages. only the private key can unlock that message, so safety is one. privacy is another. Uncle sam or anyone else can’t uncript your message unless they can get acces to your private key.
    you can also verify who is sending the message by adding a “digital fingerprint”

1 Like
  1. Private keys are radomnly generated numbers unique to an individual. They are used (via hash functions?) to generate public keys. Public keys are shared on an open network for other members to encrypt messages intended for the holder of the private key.

  2. Message encryption and digital signatures.

1 Like