Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

Private key is my random unique “Finger Print”.
Public key is encrypted messages used to send and receive massages securely.

  1. What 2 use-cases can public key cryptography be used for?
    I use public key to receive cryptos. eg wallet address.
3 Likes

A public key is one that everyone on the internet can see. It is generated by a private key that only you have.

Public key cryptography can be used for encryption and digital signatures. In the first instance, a message can be sent to someone’s public key address, and only they can access it with their private key. So, the message is encrypted. In the second instance, a private key can be used in order to sign a message/ verify where that information has come from - the recipient will be able to confirm this by seeing the public key linked to the private key of the account that sent the message.

2 Likes
  1. Public keys are like unique individual identification cards that everyone knows about on an open public network which confirms everyone’s existence. In addition, every participant on a bitcoin network also has an individual private key which no one knows about and is generated by the computer and can be any number. Both public and private keys are used when two parties engage in a transaction when messages are sent. It is also important to note that when a private key is generated, a public key is created. You can never create a private key from a public key! Basically, everyone has both a public and private key which must be used on a network for identification, verification and digital confirmation.

  2. Public keys are primarily utilized for two reasons:
    Encryption: Messages sent in a public forum are seen by everyone but the content of the messages are private and cannot be seen.

Digital signatures: Involves identification and ensures the proof and integrity of the messages that are sent. It provides security, verification and assurance that a message sent by a particular party.

1 Like
  1. Public key is kind of your identity on the blockchain, the public key is generated thanks to the private key and a mathematical function, which is a one-way function meaning that the private key can generate a public key (that’s why we can have multiple public addresses), but the public key can’t generate the private key

  2. public-key cryptography can be used for encryption and for digital signatures.

1 Like
  1. The public key open to anyone in the system and encrypts data. The private key, is private and decrypts data

  2. encryption and digital signature

2 Likes
  1. Describe the concept of public and private key with your own words.
    The private key generates the key pair (public key) -> hash function to go from private key to public key.

The private key enables access to the content of the address. Public key only allows for viewing of the address.

  1. What 2 use-cases can public key cryptography be used for?
    Encryption or digital signatures
2 Likes

A private key is your secret identity which; it is a random number generated by a computer.
A public key is a key that can be seen by everyone and it is generated by using your private key.

Encryption and digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.

A public key encrypt information which is sended to you and you can decrypt that information with your private key. A public key is mathematically derived from the private key but it is not possible to derive a private key from a public key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words. Public/Private key pairs enable us to send and receive secure messages over an unsecured network (ie; the Internet). The public key is known by everyone and the private key is known only to the owner. The private key is generated (I don’t know what tool is used to do this) and the result is a very large random number. From that random number (private key) the public key is generated using some kind of special mathematical process. Now there is a mathematical relationship between these two keys. (Note that these keys may be related to each other but they are physically separate keys). With this key pair, messages can be encrypted and sent using the recipients public key and successfully received and decrypted with the recipients private key. In turn the owner of a private key and use it to encrypt a message and that message can be decrypted with their public key. Public/Private keys have another use case called digital signing. When a message is sent, the message can be ‘signed’ with the private key. The recipient can use the public key of the sender to compare the signing hash of the message with the public key. If they are the same, the message came from the original sender. (This is a form of ‘non-repudiation’.)

  2. What 2 use-cases can public key cryptography be used for? The primary use cases for public key cryptography are encryption and signing.

1 Like
  1. you have your private key to hash generate your public key ,not the other way around.
    you have a message can use public key to encrypt that only the way one have the private key can decrpyt. public key is safe to put on the internet, not private key which you need keep safe and never lose it

  2. a)encrypt message b)identfy identity

1 Like
  1. Describe the concept of public and private key with your own words.
    A: Private keys are randomly generated by your PC when you create a Bitcoin address and stored locally on your PC’s drive (or whatever device you used to create the Bitcoin address). As the name suggests it is private and should not be shared, just as you wouldn’t share your online bank account details and passwords. While the Bitcoin address is initially generated, your PC utilises cryptography to perform hash functions on the private key, which in turn creates the public key of your Bitcoin address. This public key is what you will share with other Bitcoin users to receive funds and your private-public key pair will always work in conjunction to verify and process transactions.

  2. Q: What 2 use-cases can public key cryptography be used for?
    A: Public key cryptography can be used for encryption to keep messages confidential between sender and receiver, and also for digital signatures, to verify where the message/transaction came from and establish if the sender is authenticate.

1 Like
  1. Public keys are derived from private keys. You can put your public key out for the world to see, and anyone can use that public key to encrypt a message that can only be decrypted by use of your private key. The private key should be kept safe and secret, not shared with others. Anyone with access to your private key can access or steal something as if they were you. Private keys also act as your unique signature.

  2. Pulic keys can be used by others to send you encrypted messages, or to verify your private key signature.

1 Like
  1. Describe the concept of public and private key with your own words.
    It is a means to handshake and ensure that your messages are encrypted. The public key is derived from the private key and is a one way function that cannot be reversed.

  2. What 2 use-cases can public key cryptography be used for?
    a- encryption
    b- digital signature

1 Like
  1. Describe the concept of public and private key with your own words.

Private is your secretive key that gives you access to your wallet and coins . It can also be used to E sign off messages to other people.

Public is the key that everyone can and that key is derived from your private key.

  1. What 2 use-cases can public key cryptography be used for?

The first case is where you use your private key to create a public key which then encrypts other persons message and the. You use your private key to decrypt the message.

The 2nd use is when you use your private key to sign off on the message and the person looks at your public key and the the signature and by using math to see if it corresponds with your private key.

1 Like

Private keys are kept safe and secure, can be used for digital signatures, and for decrypting messages from your public key; the open-for-public keys are on the internet and can be used by anyone to send encrypted messages.

1 Like
  1. Publicly available information (public key) which can be used by the holder of private information (private key) and no one else. The public key is derived from the private key, linking them.
  2. Identity and encryption.
1 Like
  1. it is used to encrypt and decrypt messages. The public key is meant to encrypt messages and the public key decrypts the message. These can be used for digital signatures.

  2. The public key is meant to encrypt messages and the public key decrypts the message. These can be used for digital signatures. These are used in an environment which is public

1 Like
  1. Describe the concept of public and private key with your own words.
    My computer creates a unique private key; that I must never disclose, and from the private key a public key can be created and shared with others. public keys used for securing transactions and communications.

  2. What 2 use-cases can public key cryptography be used for?
    encryptions and digital signatures.

1 Like
  1. A computer generates a private key, along with a public key that is derived from the private key. It is easy to verify that a public key belongs to a private key, but it is impossible to guess the private key of a public key. Public keys can be shared with the world, while private keys must be kept private.

  2. The first use case is encryption where a sender encrypts a message with the receiver’s public key. The receiver uses his or her private key to decrypt the message. The second use case is verifying messages with digital signatures. The writer encrypts his or her message using thie private key. The resulting hash is their signature. The reader decrypts the hash using the writer’s public key. If the message is genuinely from the writer, the original message should be returned after decryption. If not, you end up with gibberish, and you know it’s a fake.

1 Like
  1. The public key is generated by the private key and can be seen by the public over an unsecured network, and is used to initiate a transaction or encrpyt a message. The private key is for the owner only and is used to receive the transaction or open the message.
  2. The two use cases of public key cryptography are encryption and digital signatures.
1 Like