Homework on Public and Private Keys - Questions

  1. Public key is like an identity for interact with other people and private key is a password, a proof you are a true owner. Public key is generated from private key.
  2. First, as a digital signature. Second…I can’t remember.
2 Likes

Private key is a random number
Public key is derived from private key

Private key is secret

Public is for all to see

2 Likes
  1. Describe the concept of public and private key with your own words.
    Public key is the output of hash function from private key. Public key is like the address that everyone can see. Private key is like the key to that address.

  2. What 2 use-cases can public key cryptography be used for?
    Digital signatures (to identify who sign the message) & Encryption (to encrypt the message)

2 Likes
  1. a random generated number as a private key then generates a public key. Public key for everyone to see, basically receiving address, someone takes the public key and encrypts their message , sending that message to the private key…keep your keys.
  2. Encryption and Digital signatures.
2 Likes
  1. Private keys are a unique password given to an account. Public keys are then generated from the Private keys which can be shared with others without compromising the safety of your private keys or account.

  2. Encryption and Digital Signature or Identity

2 Likes
  1. Describe the concept of public and private key with your own words.

Your private key is a completely unique combination of numbers that ideally should only be accessible to the user and is used for encryption of messages or used to sign digital signatures. A public key is an encrypted version of a private key (through a mathematical function) for the public to see, it is virtually impossible to decrypt a public key to obtain the private key

  1. What 2 use-cases can public key cryptography be used for?

  2. To send messages

  3. And to verify that the digital signature of a transaction was singed by the private key.

2 Likes

Encryption(to encrypt message)

1 Like

And what are use-cases??:slightly_smiling_face:

1 Like
  1. A public key is generated from the private key. The public key is seen on all public platforms, but not your private key.
    2, The two cases where cryptography is used are for encryption of a message and for digital signatures.
2 Likes

Thanks! Maki. I tried not to look at previous answers. :smile:

1.- Private Key it’s a random large number generated and keep secret for the user, it can be use as a digital signature as a prove identity or it can be use to generate a public key. The private key is a one way function, that means is impossible to go from public key to private key.

Public Key: its generated from a private key and is public to anyone is a mean of identification messages or any kind of that from a determinate user in public spaces.

2.- Encryption
Digital Signature,

2 Likes

1 Public and Private keys are a way of sending messages over an unsecured network using a form of encryption. A private key is generated from a random number that your computer produces and from that a public key can be derived which allows you to encrypt messages when necessary,
2 They can be used for encryption and digital signatures providing identity and integrity.

2 Likes
  1. Describe the concept of public and private key with your own words.
    Public key is a string of random numbers that can be used to encrypt messages that only the intended recipient can decipher and read using the associated private key, which is also made up of a long string of numbers. The public key is derived from the private key. Both the public and private key are mathematically bonded, the difference between the two is that with the public key you can put on display for everyone to see and be able to transact with you in an encrypted manner where security does not get compromised by malicious actors, the private key is what unlocks that corresponding encrypted transaction and gives the person with the private key the right of ownership to that encrypted transaction. The private key should not be revealed or shared because it is what allows you to decrypt messages and give you the right of ownership to cryptocurrencies.
  2. What 2 use-cases can public key cryptography be used for?
    The two uses-cases public key cryptography can be used for are 1. To send messages 2. To send funds.
2 Likes
  1. Public key - an encrypted random number. Private key - a random number.
  2. Encryption and digital signature (identity).
2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is a randomly generated number. A public key is derived from a private key.
  2. What 2 use-cases can public key cryptography be used for?
    Digitally signing messages and cryptocurrencies
2 Likes
  1. The concept of public and private keys is a way to send messages in a way where only the intended receiver is able to read your message. This is done by using the receiver’s public key to encrypt the message so that only the receiver’s private keys can unencrypt it and read it.
    Public and private keys can also be used to verify whether the person who generated the message is the actual person that did it. In this case, you would get the private key, you can use the algorithm to verify the public key. If the private key matches the public key, you can be certain it was the person that sent it.

  2. 2 use cases are: to encrypt messages and to be used as digital signatures

2 Likes
  1. Public and private keys are a way for identification and encryption to be used in a trustless manner.
  2. Public key cryptography can be used to send private encrypted messages in a public forum in a way that only the intended reader can read the message. It can also be used to sign messages/transactions to prove that you or someone else sent it.
2 Likes
  1. Describe the concept of public and private key with your own words.

A private key is a large randomly generated number that a user gets. This number is viewed as their personal safe or social security number that must be kept private. A public key is generated by a private key. The public key is the identity of you that people see on the blockchain. The private keys are used to decrypt messages from senders.

  1. What 2 use-cases can public key cryptography be used for?

Encryption - sending messages secretly on a open and unsecured network.

Digital Signatures- Helps preserved the identities of senders and receivers using public and private keys.

2 Likes
  1. Describe the concept of public and private key with your own words.
    Public keys are used to encrypt information that is intended for the owner of the corresponding private key

  2. What 2 use-cases can public key cryptography be used for?
    1 To encrypt a message, 2 To verify a holder of a private key

2 Likes
  1. The public key encrypts the message sent by the sender and the private key is in charge of signing the transaction message. This allows the receiver to verify that the message belongs to a certain person because he can verify the public key of the sender.
  2. For message encryption and for digital signature of documents or files.
2 Likes