-
Describe the concept of public and private key with your own words: private and Public keys sound a lot like DNA, on one hand you have your body, skin, blood and bones (Public) and the Private Key is your DNA, some one could see you, mention you or even try to steal your ID but if it comes down to a DNA test, that is unique (Bare with me)
-
What 2 use-cases can public key cryptography be used for? Encryption and Digital Signature
Q1 Describe the concept of public and private key with your own words
Public an private key encryption allows users to send sensitive data securely over a public network. For example if I wanted to send my friend a message over a public network where there are many spectators, I wouldnât want just anyone to be able to view or interpret my message, especially if its contents were sensitive. A solution to this problem is to use public and private key encryption. Basically for me to successfully send a message privately my computer generates what is known as a private key. This private key is just a very large number. From my private key a mathematical formula can be used to generate a public key which is linked to my private key. My public and private key are linked.
I can then share my public key over this network so anyone can view it. If someone wants to send me a message all they have I do is to encrypt their message with my public key. Then when I receive the message, since my public and private key are linked I can use my private key to decrypt the message. The only way to decrypt this message is in fact with my private key. No other private key can be used to decrypt it. Thus the whole system is very secure. However if I were to loose my private key I would not be ever able to decrypt the message and it would be lost forever
Q2 What 2 use-cases can public key cryptography be used for?
As I mentioned above One main use case of public and private key cryptography is for encryption so that secure data can be sent privately and securely over a public network where there might be a lot of spectators. However a more important use of public and private key cryptography in the world of cryptocurrencies is the use of digital signatures.
Digital signatures play an incredibly important role in the integrity of a blockchain. For example if I was to make a transaction (eg. Buying something with bitcoin) There needs to be a way to prove that that transaction belongs to me or to prove that I actually did purchase something with bitcoin. Since transactions on the blockhain are encrypted using hash functions. How would one tell that I actually did make the transaction, especially of the details are encrypted to secure my sensitive data. This is where digital signatures come in. Going back to the example of public/private ke encryption. So I generate a private key from it create a public key that is shared online. If I were to send y friend a message using his public key, I use a technique to sign this message with my private key. That way when the recipient decrypts my message he is able to verify that it actually came from me by comparing my messag with my public key (which ia available to anyone online). Remember there is a link between anyoneâs public and private key, thus it is this linked nature that allows my friend to verify that I actually sent him the message
1. Describe the concept of public and private key with your own words.
A private key is a random number generated by a computer. Through a formula a public key will be derived from the private key. Itâs a one-way mechanism, means itâs not possible to derive a private key from a public key.
2. What 2 use-cases can public key cryptography be used for?
- Encryption
- Digital Signature
- Private key is a large number that is randomly generated with no real probability to randomly generate the same number again. Public key is a number generated from the private key, and it is visible to the public.
- a) encryption: a msg can be encrypted by using the receiverâs public key, therefore only the receiver can decrypt it with the corresponding private key.
b) digital signature: a msg can be signed by the sender using its private key, and the receiver can validate the sender of the msg by applying some math function on the senderâs public key.
- Describe the concept of public and private key with your own words.
Due to there being no accounts within the blockchain network; a computer generated key is assigned to be your âaddressâ. This is your private key. The private key generates a public key directly linked to your wallet, but the public key cannot reverse engineer the private key⌠Unilateral function.
The odds of generating the same private key as someone else is astronomically small. 0%~
- What 2 use-cases can public key cryptography be used for?
Encryption - When sending a message, you can seal it with a public key (mathematically linked to a private key) in which no one has access unless they have the private key linked to the public.
How will anyone verify the message is from who they think?
Digital signatures - Alice sending a message to Bob with proof it is from her can be done through a signature & public key generated and linked to her private key (proof of ownership). The message may be encrypted using bobs Public key but not necessarily. The use case here is provenance; which is important to prevent attempted theft of funds from any user.
The private key cannot be reverse engineered in either concept.
- a private key is a random number that is generated for yourself that one uses to sign transactions to authenticate that it is you who is making the transaction, a public key is a random number generated from oneâs private key that allows one to share their key with the public so they can receive and send messages or money
- public key can be used to send and receive bitcoin
- Describe the concept of public and private key with your own words.
Public keys are how we identify our wallets to others during transactions, private keys are what we use to sign transactions we send to others. - What 2 use-cases can public key cryptography be used for?
a) People can see the public key they receive transactions from. b) We can use our public keys to create bitcoin addresses for extra security
1. Describe the concept of public and private key with your own words.
The public key is, as the name suggests, public and accessible to everyone in the scheme. The public key is used to encrypt data. The secret key, on the other hand, is private. It is stored on the userâs computer and is used to decrypt data.
What 2 use-cases can public key cryptography be used for?
Encryption and Digital signature are two use cases used.
- Describe the concept of public and private key with your own words.
Itâs a unique key generated from random numbers & can not be reproduced. Uses SHA 256 encryption. Private key is personal key that owner has through which he access any sort of information. Public key & digital signatures are derived from the private key. In case of theft of private key may lead to leak of information, digital currency or anything stored in the digital form under a private key.
- What 2 use-cases can public key cryptography be used for?
Transfer & retrieval of data, Digital Currency, Digital Art etc. inside a peer to peer network.
Public keys are derived using the elliptic curve function, not sha256.
Transactions utilize digital signatures to function. PK cryptography can also be used for encryption.
Address is just a hash of the public key and is primarily done to save on storage on the blockchain, not specifically for security (PK is 65 bytes and the hash is 20 bytes long). The public key is technically secure enough in this regard.
PK cryptography can also be used for encryption which would be the other use case.
Hey Thnx buddy
I will keep this in my mind.
1 Describe the concept of public and private key with your own words.
Private keys are your own keys that u use to sign transactions. It is statistically impossible to guess Privrate keys since they are so large. It is this that makes the number safe. Public keys are derived from this number and used to receive funds.
2 What 2 use-cases can public key cryptography be used for?
- Encryption
- Digital signatures
-
The public key is visible to all, and is what is used to encrypt my information. The private key is confidential and allows me to decrypt information sent to me, encrypted by my public key.
-
Public and private key cryptography can be used in cryptocurrencies, as they are linked to my bitcoin wallet. They can be used to send encrypted messages or documents.
-
A public key is as the name says a public key for the world to see. A private key is private. To get a public key you need to generate a private key. Once you have generated a private key from that then you could generate a public key linked to your private key.
-
Public key cryptography can be used for
a) Digital Signatures
b) Wallets and transactions
- A Private key is a randomly generated number in your wallet that is unique to you. The numbers that are used to generate the private key are so large it is almost impossible to guess someones private key. The public key is derived from your private key and it is kept public. The public key is used almost like a username, many people can see it. You can never figure out someones private key from their public key.
- The first use case is encryption. You can send a message to someone and attach their public key to is so that they are the only ones who can read it. The message will only be read if someone uses the private key that the public key attached was derived from. This keeps messages secure from the publics eyes.
The second use case are signatures. When performing transactions you must sign with your private key. This ensures that the money used will come from your account, since the private key is so unique. Once the person receives the transaction the public key is used ti verify that the private key signature is related to the public key available to the other party. This is one of the big ways blockchain is so secure.
-
Private key is a random number that is generated and is virtually impossible for someone else to have. A public key is a number generated by a private key that can be used for such things as verifying transactions.
-
2 uses for public key cryptography would be identifying a transaction on the blockchain and provide a key to receive a transaction.
it can also be used for encryption.
- Describe the concept of public and private key with your own words.
They are used to enhance security in an open and unsecured network. The public key is what everyone can see, but the private key is meant for the individual that owns it and should not be share with anyone else. Both public and private keys are what make encryption and digital signatures possible to initiate.
- What 2 use-cases can public key cryptography be used for?
Encryption to ensure that in an interaction between two parties, no one but the two parties can see what the interaction was and digital signatures to verify and identify that any sender or receiver is who they claim to be.
- Describe the concept of public and private key with your own words.
Your private key is the one that can open your wallet, therefore it is important to keep it safe!
Your public key can be used for verifying your identity. It is generated by hashing your private key.
It is only possible to go from private to public not the other way.
- What 2 use-cases can public key cryptography be used for?
-
Encryption â to send secret messages in an open forum
-
Digital signatures â indentity and verification of who you are.