Homework on Public and Private Keys - Questions

The private and and public key are digital signatures generated from a random number. The private key is used to decrypt messages and the public key to encrypt messages. The digital signature use the one way hash function SHA-256. The private key or digital signature can create the the public key or digital signature, but the public key can not create the private key or digital signature.

2 Likes
  1. A public key is like specific type of lock which any one can see and even lock, but cannot unlock. The private key is the key or combination that can unlock the lock. Private keys are secret and only known by the owner while public keys are shared with the public. Pricate keys can also be used to generate a signature that can be verified with public keys.

  2. A public key can be used in cryptography to verify a users signature. They can also be used to generate a wallet address for cryptocurrencies.

2 Likes

Bitcoin address is basically just a hash of the public key. PK cryptography can also be used for encryption. :slight_smile:

2 Likes
  1. Private keys are random numbers that are generated by your computers, from which your public key can be derived. It is unidirectional meaning we cannot source the private keys from the public keys.

  2. A message can be encrypted with a persons public key for their view. Digital signatures that can be verified by the anyone who has the senders public key

2 Likes
  1. Describe the concept of public and private key with your own words.
    private key is not shared with anybody, public key can be shared with the world. In bitcoin, private key is used to sign a transaction so you can send money only if you have the private key. A bitcoin address is generated from a public key.

  2. What 2 use-cases can public key cryptography be used for? encryption and digital signatures

2 Likes
  1. A private key is a random number generated by a computer for an individual user. This private key is exactly what the name implies - it is “private” and not shared with anyone else. From the private key there is a corresponding public key which can be seen by everyone. There is no way for someone to derive your private key from your public key. The use of private and public keys allows for secure peer-to-peer transactions that have high integrity as users can verify the identity of the individual or entity they’re communicating with.

  2. A) Encryption; B) Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private keys are used for Digital Signatures and to decrypt a message that someone one sent you using your Public Key. Public key is public, everyone can see it. Private Key is only for you to decrypt and digitally sign. If you lose your Private Key you are doomed.

  2. What 2 use-cases can public key cryptography be used for?

  3. Encryption

  4. Digital Signatures

1 Like

1)Public key is a numeric number derived from private that everyone can see and it acts as your address
2)Private key is a numeric number that only the user should have access to and is used to access the message.
two user cases that public cryptography can be used for are:

  1. encription
    2)to act as a digital signature
1 Like
  1. Public and private keys are used in encryption - messages are encrypted using the public key and the private key is needed to decipher them. Both a public key and a private key are very large random numbers and so they are impossible to duplicate. The public key is generated from the private key and so the public key can be worked out using the private key but not vice versa - anyone can see a public key but only the individual generating the private key has it.
  2. Can be used to encrypt private messages or as a digital signature. Digital signatures are used in bitcoin transactions to confirm the user making the transaction.
2 Likes
  1. The public key is the key that you share with anyone that is used to encrypt information. The private key decrypts the information with th use of the public key

  2. the two use cases are encryption and digital signatures; cryptocurrency, and signing digital documents and then encrypted emails

1 Like

1. Describe the concept of the public and private key with your own words.

A private key is a large number generated randomly. The public key is derived from the private key. The public key is used to encrypt sensitive data which can only be decrypted using the private key.

2. What 2 use-cases can public-key cryptography be used for?

Encryption and Digital signatures are the two use cases of public-key cryptography.

1 Like
  1. Public keys are used by other users on the network to challenge the ownership of cryptocurrency such as Bitcoin. Public keys can be shared on the network. We derive our Bitcoin address from the public key. Private keys are a large random number generated by the users computer.The private key cannot be derived from the public key as it has a unidirectional function.
    These keys are essentially digital signatures. The public keys are shared on an open network, however, private keys need to be kept secure. Loss of private keys will result in being unable to access your cryptocurrency. Disclosing your private key to others, creates the risk of your cryptocurrency being stolen.

  2. a) Encryption
    b) Digital signatures

1 Like
  1. public-shared with people wanting to send you info
    private- you keep if private-never share. used to confirm your identity when sending a message or transaction.

  2. Two uses for public key: encryption and digital signatures.

1 Like
  1. Private keys are created using a random number that belongs to you, that key is then used to create a public key that everyone else can use. Anything sent to the public kay can only be unlocked using the private key.

  2. sending encrypted messages and digital signitures.

1 Like
  1. A public key is the side of the security function that you can display to the public in order to receive cryptocurrencies or other cryptography information. Your private key is what controls and maintains custody of your digital assets, and it should not be shared. The combination of both the public and private key provides significant security in transactions.

  2. Encryption and digital signatures

1 Like

Questions:
. Private key is a randomly generated number used to create the public key, which is shared on the internet, unlike the private key which must be kept secret. The public key is used to encrypt a message and sign it off, while the private key is used to decode received messages.
. Public key cryptography is used for signing digital messages and encrypting them so that Bitcoin transactions are valid.

1 Like
  1. A public key is generated from your private key on your computer. the public key can be seen by anyone, the private key is secret.
  2. two use cases: 1) encryption 2) digital signatures.
1 Like
  1. Private keys should be kept secret, and is only a very large number. Public keys are derived from the private key, and can safely be shared with the rest of the network

  2. Public Key cryptography can be used for encryption and for digital signatures

1 Like
  1. Private key is a secret key used to both encrypt and decrypt messages / transactions between two parties. Public key is publicly available. Sender encrypts the message / transaction with the public key and receivers decrypts the message / transaction with corresponding private key - parties without the private key cannot access the message / transaction.

  2. Cryptocurrencies and digital signatures / proof of ownership.

1 Like

The second use case is encryption which you mentioned in your first answer.