-
Once you give someone your public key, they use that to send you a message and encrypt it, only the private key of that public key can decipher the message.
-
Digital signatures, Proof of Ownership.
-
Private keys are meant for only you and no one else can see them. You should keep your private key very safe. Private keys are used to send digital signatures when you send a message to someone. Private keys are also used to view encrypted messages that were sent to you with your public key. Public keys are derived from private keys and anyone is allowed to see them. People use your public key in order to send an encrypted message or to verify where a transaction has come from.
-
Public key cryptography can be used to send a encrypted message or to check digital signatures.
- Describe the concept of public and private key with your own words.
Public key is used for the public to communicate with you whereas the private key decrypts messages for you. Private key proves your ownership of the object whether it be Wallet, Server, etc. Public key initiates the channel to communicate with the owner of the private key. Losing your private key means you lost it all. - What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signature
Private key: not to be shared with anyone. to decrypt a message/transaction. is a digital signature to authenticate. generates a Public key
Public key: to be shared by the receiver. used by a sender to encrypt a message. used to generate a Bitcoin address
- Two use cases: Encryption (security) and as a Digital signature (unique identity for each person, authenticate integrity
- Public key encrypt sensitive info while the private key decrypts the information.
2)Encryption and digital signatures.
1.With a special mathematical formula we generate a random private key and ,from this, we generate a public key which is visible to everyone.
2. The public key cryptography is used for encryption and digital signature.
- Describe the concept of public and private key with your own words.
A public key is use to send and receive bitcoin/cryptocurrency while a private key is use to sign digital signature and store your bitcoin/cryptocurrency in a safe place.
- What 2 use-cases can public key cryptography be used for?
Digital signatures content is digitally signed with an individualās private key and is verified by the individualās public key.
Encryption content is encrypted using an individualās public key and can only be decrypted with the individualās private key.
1.A private key is a random number generated by a computer using encryption. A public key is generated from the private key and can be seen by everyone.
2. The 2 cases for public key cryptography are encryption and digital signatures.
-
Describe the concept of public and private key with your own words.
The pair private/public key is one of the most secure way of communicating with other people on the internet. Many services already use it like SSH or BITCOIN.
The private key has to be kept secured and safe, because it gives you access to the resource you own.
The public key derives from the private key and is given to the public to exchange informations with another parties. -
What 2 use-cases can public key cryptography be used for?
First one is encryption:
Any informations sent between 2 parties can be encrypted using the destination public key. The source will encrypt its message with the public key of the destination and privately only send the message.
The message is not readable otherwise⦠Thatās a pretty secure way of exchanging information but it is not the method that use Bitcoin blockchain.
Second one is Digital Signature:
This method aims to āsignā the message with the private key of the source.
Once the message is signed, the source will send its public key to the destination fo the message.
Then, the destination of the message will be able to read the message using the public key of the source and verify that it is the real source that is trying to communicate with it.
Bitcoin blockchain uses that method to sign all of its transactions.
-
With public keys, you can share it with others and they can use it to encrypt (i.e. protect) specific data been provided to them. However, only you can decrypt it. But with private keys, itās kept safe and secure for you only. In addition, it is a random number whereby a public key is derived from. You can also decrypt messages that are encrypted through the public key that you have provided to another person, as long as you have the private key.
-
Digital signatures - allows you to verify that the message from your mother for example actually did come from and not from another source.
Encryption - enables you to encrypt messages from your father for example, on a unsecure network through the use of a public key that your father has shared to you which actually derives from his private key.
My Answers:
-
A private key is a long random generated number, that is kept secure and safe. A public key derives from the private key that was created and can be known to anyone. It is a one way function meaning you canāt figure out someones private key with their public key. A public key is used to encrypt a message and a private key is used to decrypt the message. The private key is also used as a digital signature to sign transactions.
-
Encryption and Digital Signatures
-
Describe the concept of public and private key with your own words.
A private key is a random number generated by your computer that nobody else should have. It should be as the name states, private. A public key is generated from your private key that can be shared and used for transactions. It is impossible for anyone to have your public key and be able to guess your private key. Your private key keeps your bitcoin safe. -
What 2 use-cases can public key cryptography be used for?
A public key can be used for encryption or as a digital signature.
-
Public and Private key works in such a way that when a user creates a bitcoin wallet, he will create two keys the public and private key. Whenever he sends a transaction, the transaction will be signed with the private key of the sender and this digital signature is used to proof authenticity of a transaction. The receiver can then know whom the transaction is from and also able to decode it using the public key of the sender.
-
Digital Signature and Encryption
1. Describe the concept of public and private key with your own words.
Private keys are unique numbers to identify the owner without doubt. Public Keys are generated by the private key and mathematicly related to the private key. As the private key is used to e.g. sign messages, the public key works as a identifier/verifyer due to the mathematical relation to the private key.
2. What 2 use-cases can public key cryptography be used for?
Encryption, digital signatur
- Asymmetric Encryption is a simple but innovative idea. A public key is shared via the internet through an unsecure channel. Some other person in the unsecure channel acquires this public key and uses a program with PGP implementation to encrypt data. The data is sent through this unsecure channel, and the person who owns the private key corresponding to the aforementioned public key can decrypt it. This works the same way backwards, if say, a keypair owner only wanted some people to be able to decrypt files he sends out on the internet. Symmetric encryption on the other hand, is two-way encryption that uses only one key for both encryption and decryption. This is not very ideal, as a secure channel needs to be established for a key to be communicated.
- Asymmetric Encryption and Digital Signing (works similarly to how encryption is implemented).
- the concept behind public and private keys is that:
the computer creates a private key which mathematically creates a public key, public keys are created in order to share with a network so that others may send you data that can be encrypted and only the private key of the receiver can decrypt the data sent, this cannot happen in a reverse action as the bitcoin protocol would not allow ( e.g reverse = public key - private key).
The 2 user cases for public key cryptography are 2a. Encryption for sending data.
2b. Digital signatures work on par with public keys and are used for verifying provenance of data sent as mathematically using public key and digital signature 1 can verify if it originated from A private key that created the public key.
the private key is a random number generated to create a public key. a public key is essential a math problem given to the public with the answer being the private key .
two use-cases for a public key
Bitcoin wallet address
and signatures
- Random number generator is used to generate a Private Key.
- Private Key is used to generate the Public Key.
- Private Key is used to the sign message and generate the Digital Signature
ā DigitalSignature(message, privateKey) - Public Key, message, and Digital Signature are used to verify signature is valid.
ā VerifyDigitalSignature(message, digitalSignature, publicKey)
Public key cryptography can be used to encrypt and decrypt communication, as wells authenticate documents.
To encrypt and/or sign a message you create a private key, which creates a public key, which create an adress. Private key is your secrect and everyone can see and use the public key from the private key. With this system you can encrypt and safely sent and receive messages/money/coins etc
Encrypting and Signing
- Describe the concept of public and private key with your own words.
Private Key is the key used to decrypt the information stored in a public key which only you can access. - What 2 use-cases can public key cryptography be used for?
Digital Signatures, Encryption