Homework on Public and Private Keys - Questions

The address is just a hash of the public key. PK cryptography can also be used for encryption. :slight_smile:

  1. Private Keys are a computer generated password, usually a sequence of words. Public keys are derived from a private key, and securely randomized in a way that makes it mathematically impossible to decode what the original private key was. These two keys allow for messages, or crypto to be sent to the owner of the private key via the public key.

  2. One use case for public key cryptography would be sending crypto currency. A separate bitcoin address can be created using this technology and allow someone to transfer funds from one user to another. Since your public key and bitcoin address are derived from the same private key, the blockchain can verify that you have the funds and it was a valid transaction.

Another use case is encryption. Your public key can allow anyone to send to that address without accessing it since you would need the private key for that public key.

1 Like

A1. Public and private keys are a pair to encrypt and decrypt any message communicated between two parties. The public key is public and open to anyone in the system. The public key is used to encrypt data. On the other hand, the private key is private and stored on user’s device to decrypt the data.

A2. Two use cases are Encryption and Digital Signature.

For both encryption and digital signatures, each user of the system generates a pair of keys: a public key and a private key. The public and private keys are mathematically related, but it is computationally infeasible to derive the private key from the public key. If Alice wants to encrypt a short message to Bob, Alice uses Bob’s public key to encrypt the message, and then Bob uses his private key to decrypt the message.

If Alice wants to digitally sign a short message, Alice uses her private key to produce a signature, and then anyone who knows Alice’s public key can verify that the signature could only be produced by Alice or someone who knows Alice’s private key.

1 Like
  1. Describe the concept of public and private key with your own words.

A public key is created by one to transfer messages over the internet that everyone can see. A private key is created by one to transfer encrypted messages over the internet that only the people the creator chooses to see can read. A public key is derived from the private key. A private key cannot be derived from a public key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a random large number generated by ones computer. This number through one way formula becomes a public key that could be publicly shared.
    You could send an encrypted message or create a digital signature and send money in secure way using them.
  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures.
1 Like
  1. Private keys are a unique set of random numbers allocated to an individual or wallet, private keys are not to be shared publicly, they are used to generate public keys and apply digital signatures to messages which can be sent over a public environment.

  2. Public keys are used to encrypt messages which can only be decrypted by the private key. They can also be used in combination with a digital signature to identify which private key sent the message or information.

1 Like

The public key is used to encrypt messages/transactions to person A and can be known and used by anyone. The messages can only be decrypted by the private key which, unless stolen/shared, is known only by person A.

The two uses are encryption and signature authentication.

1 Like
  1. Public and private keys have 2 fonctions. Encryption and digital signature. Private key is generated randomly, then comes the public paired by a formula. it olny goes one way, you cant go from public to private.

a) Encryption : Message encrypted wih public key of reciever and decrypted with the private key of the reciever
b) Digital signature : signature with private key of the sender assure the reciever that the transaction is legit because it is linked to his public adress.

1 Like
  1. Public and private keys are randomly generated numbers used to encrypt and decrypt data to be used and sent between 2 individuals. If I send a message that i want to encrypt to someone, I will use their public key which is generated from their private key. Once they receive that message, only their private key can decrypt the message.

  2. Digital signatures are used as public and private keys when it comes to cryptocurrency. I would use my private key, which is a random generated number. With this, I can generate a public key and then generate a Bitcoin address.

This is a terrible explanation, but is the best I can do at the moment.

1 Like
  1. The private key enables me to send an encrypted message to you with my signature on it. You receive this message and verify the signature for authenticity. You then use the public key that I have given you to open this message box and decrypt the message I sent you. Only people that I have given public keys to can open the message box and decrypt it.
  2. Transferring and digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

Public and Private keys allow two entities to securely communicate data between each other by proving the message is authentic. The private key is randomly generated and kept secure by the generator. The public key is generated from the private key, is publicly viewable, and verifies the private key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital Signatures

1 Like

Transfers utilize digital signatures to work. The other use case is encryption which you mentioned in your first answer. :slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.

When creating a private Key, it will automatically create a public key which allows you to create a crypto currency address to send and receive cryptocurrency. Bitcoin mostly uses this protocol to secure one’s currency as its exchanged for whatever reason. It is equivalate to what a smart contract is to Ethereum.

  1. What 2 use-cases can public key cryptography be used for?

Encryption – if I want to send you a message thru an open unsecure network where you have a lot of spectators or traffic then anyone could see our exchange of information, unless I send you a message privately and encrypted message then no one could see it, and the only way your able to see it is by having access to the encrypted messages’ private key.

Digital Signatures – Are really about identification on how you could identify yourself and how to ensure the integrity of your message, so if I send you a message the private key will create a public key which allows you to create the Cryptocurrencies address for your wallet. Its just an extra step to secure your money in your wallet, so when you’re sending a message w/your public key, you will have to sign it off w/ your public key …which will allow other members to confirm its your legitimate message or currency in this case. Now if you want to receive money into your wallet, anyone could use your Cryptos address to do so. Digital signatures are mostly used in Bitcoin.

1 Like
  1. A private key is a randomly generated number and is to be kept secret. A public key is derived from the private key, and can be used by the sender to encrypt information to the receiver. The receiver then uses the private key to decrypt the information.
  2. Encryption - encrypting information so that only the holder of the private key can decrypt them.
    Digital signing - the sender signs a document with his private key, and the receiver can use the signature along with the sender’s public key to verify that the information source is valid.
1 Like
  1. Public key is generated from a private key. The pair keys are used for encryption and digital signature. Attaching a public key to a message encrypts it. In order to decrypt it - the person who possesses this public key must decrypt it with his own private key. Every transaction on the blockchain is signed with a private key - Digital Signature. The recipient is able to verify that the message was actually sent by the sender by taking the sender’s public key and verifying the message.
  2. Encryption and Digital Signatures.
1 Like
  1. Digital identities one kept secret, one for interaction
  2. Create information for specific party and to verify source of information
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is used to encrypt sensitive data, the private key is then used to decrypt this information that was encrypted by the public key

  2. What 2 use-cases can public-key cryptography be used for?
    message encryption and digital signature for messages to help identify the sender of information

1 Like
  1. Public and private key is like a lockbox that can only be opened from the back with the key that you own. Basically, the front of the lockbox is available to the whole world. Anyone can put a message through it, but no one can take the message out of it unless you have the key that opens the back of the lockbox.

  2. The two use cases for public key cryptography are:

encryption: using the randomly generated private key you can generate a public key. Any one who can use your public key to encrypt a message that is sent to you. With the private key, you can “unscramble” the message and see what the other party was sending you. In transit, the message just looks like a scrambled mess of letters and numbers.

digital signature: with private key and public key infrastructure, you can sign a message with a private key, and when someone receives a message from you but is unsure that it is you sending the message, they can use your public key to verify that the signature comes from your private key.

1 Like
  1. A public key is a unique output from a one way function that uses your private key as the input. This allows you to have a public key you can give out without compromising your private key while still being able to verify all transactions with the private key.

  2. Two use cases would be digital signatures which verify that a message or transaction is actually coming from who it says it is from and encryption which makes a message impossible to read without the key.

1 Like
  1. Private key is used to decrypt the information that we send through the internet or to do digital signature/create public key. Public key is used to encrypt the message which later can be read only with private key (public key is accessible to everyone on internet).
    1. Encryption
    2. Digital signatures
1 Like