- The public key is for anyone to see and the private key is secret. You can decrypt messages etc that’s been encrypted by the public key with private key.
- Digital signatures recieving funds
- Describe the concept of public and private key.
A private key is my secret and I am responsible for keeping it secure. A public key is generated from my private key and can be shared with the public. When someone uses my public key to send me an encrypted message, my private key recognizes my public key and then decrypts the message.
- What 2 use-cases can public key cryptography be used for?
Encryption
Digital signatures
- Private key is a personal, secret series of random numbers generated by computer. The owner can use the private key to derive public key. Information written in public key can be deciphered by only its original private key.
- Encryption and digital signature.
- The concept of a public and a private key pair is that it creates a digital footprint and you can encrypt messages and information you want to send on a public networkk. The digital footprint can be created on for example a transaction when your private key signs the transaction and the blockchain system for example knows that you sent the transaction through mathematics because your public key is linked to your private key.
- The 2 usecases of public key cryptography is encrypting messages meant for a specific person, and create digital footprints (identification).
- Describe the concept of public and private key with your own words.
public and private keys are hash functions, they only go one way. public keys are derived from private keys and you cannot find the private key from the public key.
- What 2 use-cases can public-key cryptography be used for?
digital signature and encryption.
Homework - Public & Private Key Cryptography
Functions, Hash Functions, Cryptography
1. Describe the concept of public and private key with your own words.
a. A private key is a series of numbers that is only known to the owner. This private key is tied to the person and is used to either sign or encrypt information. A public key is derived form the private key and is publicly available. It can be used to encrypt messages or verify a signature. The process to derive the public key from the private only works one way. So while you can use a public key to verify that it was derived from a certain private key, you can never reconstruct the private key. To go from the private to the public key is, however, always possible.
2. What 2 use-cases can public key cryptography be used for?
a. Encryption
Digital Signature
-
The private key is a random number generated by your computer. The public key is a number derived from your private key. Any public key can be used to encrypt data but only a private key can be used to decrypt it.
-
Public key cryptography can be used for encryption and digital signatures. The digital signature can be used for identification and to ensure the integrity of data. Digital Signatures is a mathematical creation to sign onto data with a private key.
-
Describe the concept of public and private key with your own words.
A private key is a long randomly random number your wallet generates and allows the owner to access their assets. It must never be shared or you may risk loss of assets. A public key is also a number generated that the public can see transactions of wallet but can not be used to access said wallet. -
What 2 use-cases can public key cryptography be used for?
Protects your data through encryption and verify digital signatures.
-
Describe the concept of public and private key with your own words.
The public key is a randomly generated alpha-numeric number, generated by the uniqueness of the private key number. The private key cannot be generated using the public key. -
What 2 use-cases can public key cryptography be used for?
As a digital signature and for message encryption, are two possible use cases.
The public key is derived mathematically from the private key and can be shared and seen by anybody.
The private key is a large random number created by your computer used to sign your transactions. It is your way to verify your identity and gateway to your crypto assets.
Two use cases for the public key
- To send and receive messages, that can be encrypted.
- To create bitcoin address
- Describe the concept of public and private key with your own words.
Public Keys are open to the public. The public key is used to encrypt data
Private Keys are confidential between two individuals. It is used to decrypt data
- What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures
-
Describe the concept of public and private key with your own words.
the private key is randomly generated and is used to encrypt documents, and as your personal signature.
the public key is generated from the private key and is visible to the world. it is impossible for someone to discover your private key by analyzing your public key. -
What 2 use-cases can public key cryptography be used for?
For encrypting and decrypting messages and, also, for creating a digital signature.
-
Private and Public keys are paired. Private keys produce public keys, but vice versa is not possible. Private keys are responsible for your signature, public keys keep your private keys private and provide you the ability to share your address.
-
Public key cryptography can be used for providing identity verification and it can also allow for sharing your address for messages or wallets etc
- Describe the concept of public and private key with your own words.
A private key is a random number that is generated for you through the computer just for you and must always be kept secrete to keep your bitcoin safe. If you give this private key to somebody else they can steal your bitcoin.
The public key is is a random number in my wallet, public key and a bitcoin address. For an example this number is used to send or received bitcoin to an bitcoin address. -+
- What 2 use-cases can public key cryptography be used for?
The to cases for a public key is an encryption and digital signature.
- A private key is a computer generated number that can then be put into a formula to make a public key. It is used to send encrypted messages or to sign messages on an unsecure connection
- Encryption and Digital signature
Imagine you want to send someone a message which only the reciever can read, you get the Public Key from the Reciever and encrypt your message.
The only way to be able to read the message after it has been encrypted is to get the private Key from the reciever.
If the reciever somehow looses his private Key. He will not be able de decript the info. If somehow someone else gets your private key, all your crypto will esentially be his now.
Use cases:
1) Encryption
2) Digital Signatures -(verify Identity and indtegrity)
The public key is used to encrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.
Encryption and Digital signatures.
-
A private key is a unique grouping of characters generated by a computer. Then a public key is derived via a computation in order to be able to reference your private key. Your private key would then be able to interact or decrypt any data that has been associated with public key.
-
These keys can be used for encrypting data or for digital signatures.
Describe the concept of public and private key with your own words.
Public and private keys are about identification, a verification that you sent the message. A private key is used as digital signatures for transactions, when you own cryptocurrency you really own a private key to the asset. A public key is used for encrypt messages.
On a open forum on the internet, a public key can be used to encrypt a sensitive message so if the reicever logs in with his private key he can access that message decrypted.
A public key can also be used as a address to receive crypto currency.
- Describe the concept of public and private key with your own words.
Public key is generated from a private key to be display and share with everyone, without showing the private key that is generated with random numbers to be unique. - What 2 use-cases can public key cryptography be used for?
To send messages in private inside an open environment, and to sign the message to identify sender and the integrity.