Homework on Public and Private Keys - Questions

Cryptocurrencies mostly utilize digital signatures, PK cryptography can also be used for encryption. :slight_smile:

  1. Describe the concept of public and private key with your own words.
    Private key is one the one that must be kept safe with and the public key, that can be shared with anyone, derives from it. Public key is used to received any form of information and private key is used to decrypt that information, be it a transaction or a message.
  2. What 2 use-cases can public key cryptography be used for?
    It can be used to encrypt messages and/or digitally sign them.
1 Like
  1. A private key is a random number generated by the computer. From that private key, through a special formula, a public key is created. That function is a one way function, that means that itโ€™s impossible to retrieve the private key from the public key. The possibility of generating the same private key as someone else, is as good as zero. So everyone has a unique private and public key.

  2. It can be used for encryption and digital signatures.

Encryption: The sender of a message can use the public key of the receiver to encrypt it. The only way to decrypt the message, is with the private key of the receiver (out of which the public key was created). So only the receiver can read the message.

Digital signatures: The sender of a transaction uses his private key to sign it. This way, through a formula, everyone can verify if the signed transaction corresponds to the public key of the sender.

1 Like

1- The private key is generated first (no one have access) and then, from that key is produced a public key (everybody can see it).
2- The encryption is used for sending cypted message using the public key and the digital signature is mostly used to send cryptocurrency to someone, using our private keyโ€™s signature that is linked to our public key.

1 Like
  1. Your private key is an encrypted number you generate for yourself and is used to verify that you are the true owner of a message. The public key is generated from the private key and is used to let other people send you messages.

2.Can receive messages from other people using public key. Public key can be used to verify that you signed a transaction.

1 Like
    1. A private key is a randomly generated number. A public key is mathematically derived from a private key, but a private key canโ€™t be derived from the public key. Only the person who owns he private key can can sign messages or data.
  1. It can be used to encrypt messages and digitally sign them.
2 Likes
  1. Private keys derive public keys and like hash functions can only work in one direction. This added security means that a public key can be shared with everyone and no one can derive the private key which is kept secure and allows ownership.

  2. Public key cryptography can be used to sign transactions or to sign messages proving ownership and/or legitimacy.

2 Likes
  1. A private key is a random and long number which is produced from your computer or device. Using your private key, you can generate a public key, which people can interact with. The function from private key to public key can not be reversed; similar to hash functions, the input cannot be retrieved using the output; this is a one way process.

  2. Public key cryptography can be used for encryption and signing transactions

The private key is used to sign transactions, which helps with authentication and validity whereas the public key is used to encrypt messages and information sent between two or more parties.

2 Likes
  1. sending hidden messages on network with outside viewers
  2. sending funds
1 Like
  1. Public Key in Cryptography is a large numerical value that is used to encrypt data and is available to everyone, while a Private Key is share between a sender and a receiver.

2.The two uses for public key are digital sign or encrypted messages.

1 Like

1. Describe the concept of public and private key with your own words.

A private key is a randomly generated number and the public key is derived from this private key. A public key is for everyone to see and is used by others to send you Bitcoin(or messages). You can subsequently send this Bitcoin with your private key, because your public key is derived from your private key. However, others can not find out what your private key is through your public key. One signs transactions with the private key, so others can verify that it was really you.

2. What 2 use-cases can public key cryptography be used for?

  1. Encryption
  2. Digital Signatures
1 Like
  1. Describe the concept of public and private key with your own words.

Private and Public keys are used to send messages on a safe channel. Private key stands for a large, random number that can be hashed to create a public key. The path is from private to public key but never the other way around (when this happens, the hashing function that created the public key from the private key is considered broken).

  1. What 2 use-cases can public key cryptography be used for?

The 2 main uses are: encryption and digital signature

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a large sequence of numbers generated by a computer, that is required for digital signatures. This private key then generates a public key, which can be used to encrypt messages. Though the public key can be viewed by anyone, it is not possible to derive someones private key from their public key because it is generated in a unidirectional manner similar to hashing.

  1. What 2 use-cases can public key cryptography be used for?

Public keys can be used to encrypt messages on public platforms, so that only the intended recipient can view their message. Public keys are also used to generate an address to receive transactions.

1 Like
  1. A public key is an address that is linked to my private key that can be used to encrypt information and send over the internet where others may see it. The private key will read or decrypt the information from the public key.
  2. 2 use cases are encryption and digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is free for everyone to be used in a way to encrypt data that only you can decrypt with your private key. You can also use your private key to sign transactions or messages to verify the authenticity
  2. What 2 use-cases can public key cryptography be used for?
    For encryption of messages and to sign transactions
1 Like
  1. Describe the concept of public and private key with your own words.
    To be able to navigate the digital world you need a private and a public key. This is so you are able to both encrypt and digita sign messages and transactions. So my computer comes up with a random huge number - this is my private key. Then my computer generates a public key from my private key through a special formula. My public key can be shared with anyone and is a way for them to know that I am me since they can use my public key and make sure it comes from my private key.

What 2 use-cases can public key cryptography be used for?
To encrypt and decrypt data, to digital sign, to verify information etc

1 Like

Private key is a random algorithmic generated number that should only be known to yourself. This is the identification verifying that is used to validate blockch\in transactions by a given person or persons.
Public key is also a random algorithmic generated number that is used to communicate publically on the blockchain when transacting with another party. The public key is connected to the private key. The encrypted transactions are public and are verified by the private.
Uses cases for public key can be used when buying Bitcoin and when utilising a supply chain.

1 Like
  1. Private keys can be used by a sender to digitally sign data and public keys can be used by received to verify that the data was in fact sent by the person who claims to have signed for it. Private keys can also be used to decrypt messages that have been encrypted using the public key (which was initially derived from the corresponding private key).
  2. The first use case is encryption. The second use case is digital signatures (identification and integrity).
1 Like
  1. Describe the concept of public and private key with your own words.
    A Private Key is used to both encrypt and decrypt data. A Public key is only used to encrypt data and to decrypt the data, the private key is used and is shared.

For example, if you want to send a message over an unsecured network, you can encrypt the message using a public key derived from a private key. The recipient of the encrypted message can only decrypt the message using the private key.

  1. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures
1 Like
  1. The concept of Private and Public Key is securing online transactions via a 2 - Step verification prozess.

  2. encrypt messages & sign digital messages

1 Like