Homework on Public and Private Keys - Questions

Describe the concept of public and private key with your own words.

A: Public keys are private keys are essential to public key cryptography. The keys are used is different ways depending on use case and software environment. The concept of secure transactions and identifying data are the main functions.

What 2 use-cases can public key cryptography be used for?

A: (1) Encryption (2) digital signature

1 Like

Describe the concept of public and private key with your own words.

The public key is used to encrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.

What 2 use-cases can public key cryptography be used for?

The 2 use cases are encryption and digital signatures.Digital signatures verify who sent the message since the private key derives the public key which creates the bitcoin address. You send bitcoin using your private key and receive bitcoin to your bitcoin address.Cryptography and the use of public and private keys solves the security issue when we use the internet.

1 Like
  1. Describe the concept of public and private key with your own words: A private key is unique and used to sign transactions. It must be kept safe and not share it with anyone. A public key is generated from the private key and is used to encrypt the transactions. The message can only be decrypted with the private key of the receiver.

  2. What 2 use-cases can public key cryptography be used for? 1. Encryption, 2. Digital signatures

1 Like
  1. Public and private are call asymetric key and from a private key key you can generate a public key and you can use that private key to sign your Tx in bitcoin
  2. 1 use case, Public key can be use to generate a bitcoin address.
    2 use case Public key and the signature can be use to verify the private key of the sender.
1 Like

1, The concept of public and private keys is such that a computer will generate a set of random numbers use to encrypt information that allows the sender and receivers to be able to identify themselves and the integrity of the information.

  1. Two use-cases are Encryption and Digital Signatures
1 Like
  1. Describe the concept of public and private key with your own words.

public keys are for everyone to use and communicate
private keys back up that data allowing communication to be undecipherable by others if required
in crypto it is for the verification of you account so if you want to pay for BC using a digital signature

  1. What 2 use-cases can public key cryptography be used for?

buying bitcoin suing digital signatures
encryption
your bc wallet

1 Like
  1. A public key is generated from a private key as a pair, for the purpose of allowing cryptographic messages to be shared with others. A private key on the other hand must never be shared with others and must have a sole use case by the owner of that private/public key pairing.

  2. The two case uses are that of.

(i) Encryption
(ii) Verification

Private keys are used to keep assets secure, authorising signatures to validate that the sender was actually the person that sent the message. This is possible by combining both the public and private key function, which signs off on the transaction.

1 Like
  1. .Private key is a random number that is generated by computers. Each computer has a unique private key. And private keys need to be kept secret for security reasons. Public key is made from that private key that is open to anyone to see.

  2. Public key cryptography is used for encryption and digital signature.
    For instance, a public key is used to encrypt messages so only that paired private key can decrypt those messages. It uses encryption to protect sensitive information.
    For digital signature, a public key is used to identify who sent a BTC transaction. The transaction signed by a private key will be identified by being referred to that paired public key.

1 Like
  1. a private key is something that is randomly generated and used like a password and from that private key a public key is generated that people can see which represents that person or account - like an email address (public key) and your password (private key) but instead is created through mathematical encryption and uses cryptic verification

  2. encryption and digital signatures - the use cases are endless a few are… receiving, sending, funds/transactions (anything that contains data)

1 Like
  1. Public and private key cryptography is a system that allows for secure digital transactions without a middle-man.

  2. It can be used for encryption and digital signatures.

1 Like

1.) Your computer generates a private key which then generates a public key. You cannot generate a private key from a public key.

2.) Encryption and digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.

A Public key is a value created from a private key, which is random. The Public key can be given out and used to encrypt messages. The data encrypted with a public key can only be decrypted with a private key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key, a mathematically generated random number is kept by an individual and never revealed. It is linked to a public key which everyone can see. Users can send each other numbers or currency publicly over the internet via a public key but the information or cryptocurrency is kept private only by means of a private key. Digital signatures, a random mathematical number attached to a person’s private key are also used along with cryptocurrency to identify a specific party.

  2. What 2 use-cases can public key cryptography be used for?
    The two use-cases are 1. Encryption and 2. Digital Signatures. Together with public, private keys, digital signatures keep transactions completely encrypted, secure and trustless.

1 Like

1/ The private key it is just for you to see while the public key is chared on internet ,anyone can see.
2/ Encrytion (it is not very used in crypto currencies) and the Digital signature (identification, you ensure the integracy of a message, you check who sended it)

1 Like
  1. A public key is visible to others to send transactions to a wallet. A private key should not be known by others as this is the safe, private info to access your personal wallet.
  2. Use cases for a public key are to send transactions and send encrypted messages.
1 Like

1.- It is an encryption system where every participant recieves a random-generated private number and its related derived-generated public pair. Being impossible to guess a private key from its public key.

2.-

a) Sending private-encrypted data: Sender can encrypt a message using the reciever’s public key, so only the reciever can decrypt it.

b) Sign public messages: The sign is a number generated from the private key. Signing a public message lets everybody to use your signature and your public key to verify if you really have the required private key (but still, nobody can guess the private key).

1 Like

1… Private key generates the unique digital signature for an individual and also generates the public key for the person.
the private key is unique

  1. two use cases for private key and public key
    A - Encryption
    B - Digital signature
1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is the adress you create via the private key. Via the Public Key you can create a Bitcoin adress. A public key is visible to anyone, you need to keep safe the private key, otherwise people can steal in this case your Bitcoin. You can transfer BTC via the Public key.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signature
1 Like

Describe the concept of public and private key with your own words.

Using public-private key pairs increases the security and integrity of data transactions. The private key - a large randomly generated number - is used to create a corresponding public key. It is impossible for anyone to derive the private key from the public key, and, so these keys ensure the authenticity of the origin of the transfer of data.

What 2 use-cases can public key cryptography be used for?

Public-key cryptography is used in encryption and digital signatures. The latter uses the private key to sign a transaction and is what is used for Bitcoin.

1 Like

private key is computer generated private number which is private. Where as Public key is derived from private key and visible for every one . if one has to read the message … the message needs to be de crypted with private key only…

2
used for crypto currencies to secure info .

confidential documents transfer needs cryptography …

1 Like