Homework on Public and Private Keys - Questions

  • Describe the concept of public and private key with your own words. ==> A private key is only for the owner of the key and no one else. A public key is available to anyone.
  • What 2 use-cases can public key cryptography be used for? ==> 1. When a person sends information to another person, it is sent with the public key. 2. When a person sends information to another using a private key’s signature and then the receiver can verify its authenticity by confirming that the signature and public key of the sender match.
1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a long string of randomly generated letters and digits that is used to generate a public key for anyone to be able to send encrypted messages/transactions that can only be decrypted by the person with the private key of the specified publicly generated keys.

  2. What 2 use-cases can public key cryptography be used for?
    i.Data encryption intended for a specific reciever.
    ii. A digital identity you can verify through confirmation of your private key.

1 Like
  1. Describe the concept of public and private key with your own words.
  • Asymmetric encryption has 2 keys, one for encryption and the other for decryption.
  • With public private key schemes the public key is derived from the private key
  • The private key cannot be derived from the public key.
  • The public key is shared, private must stay secret.
  • If the public key is and encryption key, only the private key holder can decode messages encrypted with the public key.
  • If the public key is encryption, only the private key can create messages that are decrypted with that public key.
  1. What 2 use-cases can public key cryptography be used for?
  • When the public key is the encryption key it can be used to send messages to the private key owner without anyone else being able to read them.
  • When the private key is the encryption key it can be used to sign messages. Anyone can use the public key to verify a signed message was written by someone with the private key.
1 Like
  • Homework - Public & Private Key Cryptography

    • Describe the concept of public and private key with your own words.

In public key cryptography, every public key matches to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can only decode it using their matching private key.
Imagine a trunk with a lock that two people, Bob and Alice, use to ship documents back and forth. A typical lock has only two states: locked and unlocked. Anyone with a copy of the key can unlock the trunk if it’s locked, and vice versa. When Bob locks the trunk and sends it to Alice, he knows that Alice can use her copy of the key to unlock the trunk. This is essentially how what’s known as symmetric cryptography works: one secret key is used for both encrypting and decrypting, and both sides of a conversation use the same key.

    • What 2 use-cases can public key cryptography be used for?

The 2 use cases are encryption and digital signatures.

1 Like
  1. The public keys is used to encrypt sensitive information. Private keys decrypts the information.
  2. The 2 use cases are encryption and digital signatures. Digital signatures verify who sent the message since the private keys derives the public keys. You send bitcoin using your private key and receive bitcoin to your bitcoin address. Cryptography and the use of public and private keys makes it secure when we use the internet.
1 Like
  1. Public key is generated using private key. Private key is secret and is used only by the owner. Public key is visible for everybody and voudn’t be used to get private key.
  2. Public key is used for electronic signature verification and to receive and send funds.
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is generated/based on a large random number that only the ‘owner’ can see), and can be used to decrypt information sent via the public key. A public key is generated from that private key using a specific formula and is a number that you can share on an open, unsecure network. Also, there is no way for anyone to access the private key through the public key since it is a one-way function.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. A public key is a string of letters and/or numbers cryptographically derived from a private key of letters and/or numbers using a hash function. Public keys can be shared freely without risk of being tampered with, but private keys must be kept secret as they control the contents of the public key.

  2. Two use-cases of public key cryptography are encryption and digital signatures. Encryption makes it impossible to find the private key of the sender. Digital signatures allow the receiver to verify the sender.

1 Like
  1. A private key is an autogenerated encrypted number that gives you access to your account. The public key is a derivative of said public key, one that you can use to have things sent to you.
  2. Public key cryptography can be used for encrypting messages or account numbers, as well as for digital signatures to ensure you are the one using your wallet
1 Like

Public keys are used buy the public to sent and encript data for the receiver, and can only be decrypted buy the holder of the private key

Sending messages and transactions

1 Like
  1. Describe the concept of public and private key with your own words.
    Private Key is a unique random number generated. Private key genarates the Public key using a mathematical formula.The Public key is associated to the Private key. You need both of them to make transactions.
    2.What 2 use-cases can public key cryptography be used for?
    To Encrypt messages
1 Like

1. Describe the concept of public and private key with your own words.
The public key is public and open to anyone in the system while the private key is only stored by the owner. The recipient’s public key is used to encrypt plain text to cipher text which can be decrypted by the recipient’s private key to read the message. The public key can be derived from the private key but not the other way around.

2. What 2 use-cases can public key cryptography be used for?

  • Encryption
  • Digital Signatures
1 Like

And the second use case is digital signature.

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

It’s a type of encryption to communicate through open channels. Private key is generated and then the public key derives from the private key. Public keys work as adresses, and private keys allows the decryption of any message sent through your public key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital Signatures

1 Like
  1. Keys are used in cryptography for encryption and decryption. A public key is a hash that the entire public can see. A private key is known only by you and is not public data and is used for decryption.
  2. Encryption and digital signatures
1 Like
  1. A public key is generated by your computer when you create a wallet for cryptocurrencies. This key is kept confidential. In order to share information like a message or a transaction, a public key is generated and this can safely be shared.
  2. Encryption – for sharing encrypted messages
    Digital signatures – for “signing” transactions
1 Like

Homework on Public and Private Keys

  1. Describe the concept of public and private key with your own words.

Private keys are generated randomly by a computer and are then used to derive a public key.

For example, you encrypt a message using the recipient’s public key. This means that only he can decrypt the message since he is the only one with access to his private key.

You can always derive your public key from your private key but never in reverse since it is a one way function.

  1. What 2 use-cases can public key cryptography be used for?

The 2 use cases for public key cryptography are encryption and digital signatures.

1 Like
  1. The private key is an alphanumeric code which is the identifier of your personal access to the network. This is your key into the blockchain network. The public key is key viewable to everyone on the ledger which is the proof of your transaction.

  2. Encryption and security.

1 Like
  1. Private keys are extremely large sets of numbers used to encrypt messages on a public network. A public key is derived from the private key using a unique formula, so that the public key can be shared freely. Any message sent using the public key to encrypt, may be decrypted using the private key that only one person has. This private key can also be used to sign messages, and is verified using the public key.
  2. The 2 main use cases for private key cryptography are encryption and digital signatures.
1 Like

1.Private keys are a large random number generated by your computer which is used to create a public key that is shareable with others. You are not able to identify the private key from knowing the public key. The private key is used to decrypt the encrypted message sent by the public key. It also is used to verify the intended message is received by the proper source.

2.The two cases that public keys can be used for are encryption and digital signatures.Encryption makes messages private which are sent over public networks and digital signature ensures identity as integrity of the message.

1 Like