Homework on Public and Private Keys - Questions

  1. Private keys are giant random numbers created by your computer that cannot be randomly generated a second time. Private keys need to be kept private to be able to transact on the public network. Public keys are derived from private keys, public keys can be and must be shared to interact with the public network. Although public keys are generated from private keys, someones private keys cannot be attained from someones public key.

  2. Encryption and digital signatures which are used to identify oneself on public networks.

1 Like
  1. The concept of a public key is to encrypt a message and the concept of a private key is decrypt the message and also to be used as a digital signature to verify you wrote the message.

  2. Public key cryptography can be used for encryption and digital signatures.

1 Like
  1. Private key is a random number generated by you. The public key is the output of the private key put through a hash function. Thus, private keys cannot be derived from public keys.
  2. Encryption as we can take a message and encrypt it with the other person’s public key. Making it so only a person with access to their private can read the message. Digital signatures; using a private key, a person (A) can make a digital signature which another person (B) can compare with A’s public key to see if it came from one private key.
1 Like
  1. Public and private keys are a pair of keys use in cryptography. A private key can be used both to encrypt and decrypt a message and should therefore be kept secret. A public key can only be used to encrypt a message and can be shared.

  2. Two use cases are encrypted communication through an open network and digital signitures.

1 Like
  1. A private key is the input from the hash function and the public key is the output from that function. The private key is the tool for decrypting messages encrypted with its public key.

  2. The 2 use cases of cryptography are encryption and digital signature.
    Encryption is used to keep private/secret messages safe in a public channel, while digital signature is used to verify the identity of the sender.

1 Like
  1. A private key is a randomly generated number. A public key is generated from the private key using a hash function. It is not possible to determine the private key using the public key.

  2. Encryption - the sender of the message can use the public key of the recipient to encrypt the message, and the recipient can then use the private key to decrypt the message. Digital signatures - the recipient can verify that the signature created by the sender using the private key is legitimate by using the public key.

1 Like
  1. A private key is a large randomly generated number. This number is used to generate a hash which is the public key. A private key can generate the public key, however, you cannot do the reverse and generate the private key from the public key.
  2. Two use cases are Encryption & Digital Signatures.

2a. Encrypted messages can be sent to a receiver, using the receiver’s public key. The owner of that public key must then use their private key to decrypt the message.
2b. Senders can also sign messages sent to other public keys using their private key to verify they are the sender. Their private key acts as a digital signature without exposing itself.

1 Like
  1. Describe the concept of public and private key with your own words.
    In public key cryptography every public key only matches to one private key. They are used together to encrypt and decrypt messages.

  2. What two use-cases can public key cryptography be used for?
    The two major uses are encryption and digital signatures.

1 Like
  • Describe the concept of public and private key with your own words.
    The concept of a public key is that it is for everyone to see and read and to make it possible to understand the language and is a encrypting of your private key.
    The concept of a private key is that only one person owns the key from the begining and it can create a public key and is used to make a digital signature of sorts.

  • What 2 use-cases can public key cryptography be used for?

For encrypting data and used for digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    You private key is randomly generated by your computer and is then used to derive the public key. The public key can be used to confirm your identity because it is mathematically derived from the private key, however you cannot know the private key by having the public key. The private key can be used to access the wallet. If the private key is lost, your bitcoin is lost.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures. Digital Signatures are used in bitcoin as described above.

1 Like
  1. Describe the concept of public and private key with your own words. A private key is a random set of numbers generated by a computer. A public key is derived from the private key. A public key can be used to create a message. You can only decrypt the public key with the private key.
  2. What 2 use-cases can public key cryptography be used for? Encryption and Digital Signatures
1 Like
  1. Describe the concept of public and private key with your own words.

A public key is a key that is derived from your private key and is shared with whomever you want to be able to share private, encrypted information with. A private key is a key that you never share, and that you use to encrypt and sign files, documents, BTC transactions and email.

    1. What 2 use-cases can public key cryptography be used for?
      Public key cryptography can be used to encrypt messages, documents and files and to sign and verify documents with digital signatures.
1 Like
  1. Private key is a randomly generated number that I keep secure and private. A public key can be generated from the private key which can be made public. People can send messages for example to my public key. I then use my private key in order to decrypt the message.
  2. Encryption and digital signatures
1 Like

1 The private key is used to decrypt the information and public key is used in order to encrypt the information which derives from the private key

2 Encryption and Digital signature

1 Like
  1. Private key is a random numbers that generate by computers. Public key is originally derived from the private key.

  2. 2 use cases can public key cryptography be use for are:

  • Encryption
  • Digital signature (Identification)
1 Like
  1. public keys are derived from private keys, you can obtain the public key from the private key but not vice-versa. Private keys are kept secret are public keys are shared everywhere without any issues.

  2. Encryption and digital signature

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is created by your private key which gives it a digital signature only your private key can decipher. this allows you to share your public key to the world. and data sent back to you can only be read by your private key, this is why your private key should be kept safe for your eyes only.
  2. What 2 use-cases can public key cryptography be used for? First use is for encryption and second is for digital signature.
1 Like
  1. Private keys refer to the random numbers generated by a computer and only known to or unique to the owner. From it, other keys can be generated such as public keys which are then made public and are known as well as used by others.

  2. Encryption and Digital Signatures.

1 Like
  1. Public key is the way we interact with other people on the internet, openly. Private key is a huge random number generated at the creation of a crypto wallet that serves as the password

    1. encryption
  2. digital signatures

1 Like

I see the public key and the private key as a banks routing number which is public information and a private key as your personal account number which is private information.
The two use cases for public key crytography are encryption and digital signature.

1 Like