Homework on Public and Private Keys - Questions

1.) Public keys are derived from private keys (hash-function). Public keys are meant to be known by more than one party, while private keys should be known by only one party of a network (not necessarily just one person, and not necessarily just one private key per party).
2.) One usecase of public keys would be message encryption, where the receiver first sends the public key for message encryption to the sender. Then only that receiver will be able to encrypt the following message with his private key.
The second usecase would be Bitcoin or Litcoin, etc., meaning that the public key is for everyone to know who sends or how to send to party x, while the private key is the necessary signature to send funds out of party x’s wallet.

1 Like
  1. A public key is number that is not private. A private key is a number that is private. The private key is used to generate the public key. There is no way to ascertain what the private key is using the public key. It is a one-way function.
  2. Public key cryptography is useful in providing a digital signature and privacy of the private key that underlies the public key.
1 Like
  1. Private key is used to generate public key, public key can encode messages and private key can decode messages.

  2. PGP messages and cryptocurrency

1 Like
  1. A private key is used to generate a public key which. This is how a digital signature is created. It encrypts the message (transaction) and it is impossible to figure out. Nor can someone else figure out your private key from the public key.

  2. A: Sending Funds around the world
    B: signing documents.

1 Like

1- A private key is a random number that gets generated by a computer, then through a special formula or function the public key also a random number, gets generated from the private key. it is a one-way function that means you can not find the private key from the public key.
2- first case is to use the public key for encryption, to encrypt messages on a public form that you don’t want other people to see or hack,
the second case is to use it to create a digital signature, your computer will create a private key that will generate a public key that will generate a bitcoin address.

1 Like

Hello,

Can you send me this picture please?

[email protected]

  1. Public key is a random number shared with others and generated with private key. Private key is a random number only you have access to. With the private key you can decrypt for example messages sent to your public key.

2.Digital signatures, Encryption

1 Like
  1. Public key is open, everybody can see it, it stands in relation to the private key and is derived from it. thats how one can see what transactions happened in the wallet or where made and signed with the private key. I can sign a tx with my secret private key and others can verify it by seeing my public key, that it was actually me.

2.Verification of transactions. encryption and decryption of data.

1 Like

The private key is randomly generated. The public key is then generated by equation/encryption from the private key.

  1. The public key can be used by other people to send you encrypted messages, these massages can be decryptade using your private key. Signing transactions is done by using the private key, but inorder to see if you signed it the public key is used, along with the signiture.
1 Like
  1. The private key is a random number generated by a computer, virtualy unique, that we will use to generate a public key. The private key is intented to be used only for the user and the public key is accesible for all users of the network.

  2. Public key cryptography can be used for verify identity of users of the network (by signing with the user private key) or encrypt documents to be only readable for the user that is intended (using its public key)

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is how only you can access messages or funds meant for you. Public keys are used so that others can identify you to send messages or funds meant for you. The two are used together to access the message or funds.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption & Digital Signatures.

1 Like

Homework on Public and Private Keys - Answers

  1. Private Keys are randomly generated bits that encrypt messages. Public Keys are randomly generated bits derived from Public Keys, these being shareable.

  2. Public Key Cryptography can be used to create a Bitcoin address and sign Bitcoin transactions. :pen:

1 Like
  1. The public key encrypts private information, is generated from the private key, and can be seen by anyone. The private key is a random generated number that decrypts the information that was encrypted by the public key it is matched with.
  2. Public keys can be used for encryption as described, as well as digital signatures. Digital signatures verify the private key on the sending end, which match the public key on the receiving end.
1 Like
  1. A private key is generated from your pc, this key is a completely random number that is also your signature. When you send a transaction the private key signs it so the receiver knows it was you who sent it. Keep the private key safe in order to keep your account safe.
    A public key is exactly that a public key for the world to see your address. This is how people can find your account to send a transaction to you.

  2. The use cases for a public key can be to encrypt a message, and also to find the addresses that you would like to send a transaction to.

1 Like
  1. a private key is a randomly generated number which is used to produce a public key .

  2. encrypting data and digital signatures.

1 Like
  1. The public key is used to encrypt the data and the private key decrypts that data. The private key is shared between two parties.

  2. The public key can be used to encrypt data and provide electronic signatures.

1 Like
  1. One way for us to prove ourselves. Cryptography is to prove that the Public Key is derived from a Private Key.

  2. Public keys are used by other users on the network to challenge ownership.

1 Like
  1. Public key is what is available to be seen by everyone which “scrambles” the information so that the private key can “unscramble” it for private use of the intended recipient to see the information.
  2. For signatures to verify it was indeed the party that sent it to the intended recipient. Also for crypto transactions so that no middle man is needed.
1 Like

Homework - Public and Private keys

  1. Describe the concept of public and private keys

A public key is used to encrypt information and the private key is used to decrypt that same information - basically you are taking message and scrambling it so the only certain people can look at your message

  1. What 2 use-cases can public key cryptography be used for?

Encryption - if I am sending a message to you through an open network, an unsecure network or public forum etc, encryption is used to keep the message private in public type environments

Digital Signatures - is about identification, verification and ensuring integrity of messages etc - as there is no central overlord that keeps track of all accounts or wallets, each account or wallet is based on a public/private key pair

Cheers :beers:

1 Like

Ownership utilizes digital signatures, but PK cryptography can also be used for encryption. :slight_smile: