Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A private key is a “password” that your computer generates randomly and that only you can access. A public key is a “password” generated from your private key and it is visible to all of the net.

  2. What 2 use-cases can public key cryptography be used for?

  • Encryption
  • Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a series of numbers that only the owner knows.
    Public key is created with private key with special functions and can be exchanged publicly.

  2. What 2 use-cases can public key cryptography be used for?
    first, encryption. encrypt the message first with the receiver’s public key, the receiver use the private key to decode.
    second, digital signature. Has own private key and create a public key, sign the item with private key to have a digital signature, and receiver use the digital signature and public key to decode the message, or verify the transaction

1 Like
  1. A private key is your personal signature that is meant to be kept to yourself and no one else can know it. A public key is derived from the private key and other people can see your public key. Public keys can be used to encrypt however only the private key associated with that public key can be used to decrypt.
  2. It can be used for encryption and digital signatures.
1 Like
  1. If you want to send a message encrypted on a public platform you have to generate a private key, which is a random number. Then from that random number a public key is generated using a special formula that is used to encrypt the message. The only way to decrypt is to use the private key. And, If I want to verify who sent the message I can use the digital signature and public key to do so.

  2. The two use cases that public key cryptography can be used for are encryption and digital signatures. If I want to send a private message on an open platform I have to encrypt it. Digital signatures are used to identify yourself and to maintain integrity. Each wallet is built on this technology and this is what we use the most in crypto.

1 Like
  1. The private key is a large number generated by network/computer/wallet and only the owner of this private key will have this information (unless they share it with someone else). The public key is generated from the private key and is available to the public.

  2. Public key cryptography is usually used in encryptions and digital signatures. An example of encryptions would be emails, text messages, instant messages, direct messages. An example of digital signatures would be in sending and receiving bitcoins.

1 Like

It took me quite a while to answer this question. I listened to the video about 10 times :grinning:

  1. Private key is generated by a computer. It is a very long, unique number that decrypts a message encrypted by a public key. Public key is derived from a private key… Public key is visible to everyone, private key must be kept private.

  2. a) Encryption, b) Digital signatures

1 Like
  1. Public key is to see messages are ‘‘traveling’’.
  2. Private key is: to read the message, sign (confirmation-I am receiver of a message), to have an access to messages using different devices.
1 Like
  1. Public key is for everyone to see whenever you make a transactions on the network. Private Key is produced on your computer to decrypt encrypted messages or transactions you receive from the network.
  2. The 2 use-cases for public key cryptography is encryption and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.

Public and private keys are an integral part of Bitcoin and other cryptocurrencies. They allow you to send and receive cryptocurrency without requiring an intermediary to verify the transactions. You can use these keys to send your cryptocurrency to anyone, anywhere, at any time. The public and private keys are a key pair. The public key is generated from the private key. Your public keys can be shared in order to receive transactions, your private keys must be kept secret and safe. If anyone has access to the private key, they will use it and have access to your cryptocurrencies.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital signatures.

1 Like

Private keys are a large random number generated by your computer which is used to create a public key that is shareable with others. You are not able to identify the private key from knowing the public key. The private key is used to decrypt the encrypted message sent by the public key. It also is used to verify the intended message is received by the proper source.

2.The two cases that public keys can be used for are encryption and digital signatures.Encryption makes messages private which are sent over public networks and digital signature ensures identity as integrity of the message.

2 Likes
  1. Public and private key cryptography is technology employed in encrypting information shared over a public network. Private key is created from random numbers, public key is generated from public key; private key is used to decrypt information encrypted using public key.

  2. Two use cases of public key cryptography are Encryption and Digital signature.

2 Likes
  1. Describe the concept of public and private key with your own words.

  2. What 2 use-cases can public key cryptography be used for?

  3. Public key which is seen by all is derived from a private key which is a random string of numbers seen only by its owner. The private key is statistically almost impossible to duplicate

2- Public and Private key are used in two manners: To encrypt information and to
Sign digitally and verify identities.

2 Likes
  1. A private key is a randomly generated number which is needed to decrypt messages or sign transactions or messages but the private key is kept secret. A public key is generated from the private key and this public key is what other people can use to encrypt messages for the private key owner or to see that the private key owner has signed something.

  2. Encryption and digital signatures

2 Likes
  1. Describe the concept of public and private key with your own words.
    The private key is a random generated number. You can hash it to get a public key. The private key should be kept secret and is used to sign a piece of data. The public key can be used by others to verify that something has been signed by your private key. You can use someone else’s public key to encrypt a piece of data and then it can only be decrypted by that person’s private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.

2 Likes
  1. Private key: randomly generated number
    Public key: derived from private key via a computational function

  2. Two use cases
    To encrypt messaging by attaching the public key to a sent message
    For digital signature verification since private and public keys are paired via the mathematical relationship described in answer 1.

2 Likes
  1. A public key is generated from your private key and designed to be available to anyone. You can use the private key to reveal data encrypted by the public key, but never the other way round which relates back to the unidirectional nature of the hashing process.

  2. It can be used to encrypt and send messages in public forums for example, it can also be used to verify transactions on the blockchain.

2 Likes
  1. public key is the key that others can see and send you cryptocurrency, private key is what is used to generate the public key and can only be accessed by you.
  2. public keys can be used for signing digital documents or encrypting files.
2 Likes

1 & 2 - public key is generated from a private key. The private key can be used to generate a digital signature and a public key. So when you send some bitcoin with your digital signature, it can be verified that the bitcoin came from you. Because the the public key (or bitcoin address in this case) can be used with your digital signature to verify that you hold the private key.

You can also securely send someone a message encrypted with their public key than the person can unencrypt with their private key.

No one can determine your private key from your public key or digital signature. However the private key can be used to generate both the public key and digital signature. It only flows in 1 direction.

2 Likes
  1. a) Private key is the original encryption type. The private key is the cipher that is used to scramble and unscramble data being encrypted. Both parties must possess and exchange private keys to send messages.

b) Public keys are derived from the private key. The public key can be used to encrypt messages while the private key can be used to decrypt. The public key can also verify signatures left by the private key.

  1. Public key cryptography is primarily used for encryption and digital signatures, which are performed during the ‘handshake’.
2 Likes
  1. The public key is visible to everyone but the private key is my own. We do need both to process a BTC transaction - the BTC can be sent to me using the public key but I cannot use that BTC without my private key. The private key can also be used for digital signatures.
  2. Encryption and digital signature.
2 Likes