Homework on Public and Private Keys - Questions

Transactions are basically digital signatures (you sign a tx). The other use case would be encryption. :slight_smile:

A private Key is a long random number that can be used to identify a person.

A private key generates a public key that can be used by anyone to encrypt the private key. But only the private key can decrypt the message.

Private and public keys can be used to encrypt a message or create a digital signature.

1 Like

Describe the concept of public and private key with your own words.

Private key is randomly generated by computers. Its used to create the digital signatures and
encrypting messages. Public key is derived from private key. Public key is shared to the outside
world

What 2 use-cases can public key cryptography be used for?

a. Message encryption
b. digital signatures.

1 Like
  1. The concept of public and private key is a system in which a data transferred between 2 entities is encrypted.
    The receiver is the holder of the public and the private key. The public key is held by the receiver to encrypt the message sent by the sender (from the receiver private key) and then the message is decrypted thanks to the same private key (held by the receiver)

1st use case: Encryptation which is securing the data sent using the concept/system of private and public key.
2nd use case: digital signature which identify the data sender and can this last one can be verified as the receiver by others.

1 Like
  1. Public key is cryptographically generated by private key and shared to public but access to the public key does not make it possible to reverse or retrace and detect the private key that generated it. That is what is due to the power of hash function used in Bitcoin

  2. Use case 1 is Encryption and can be used in chat messages app to secure the messages and make it end-to-end encrypted
    and Use case 2 is digital signature which is what Bitcoin uses

1 Like
  1. Describe the concept of public and private key with your own words.
  • The private key is a randomly generated number that uniquely represent an entity (i.e. your address). The public key is generated from a private key that can be visible to everyone without compromising one’s private key. Simply, each public key can identify if one thing (transaction, encrypted message, etc.) came from the corresponding private key it was generated from.
  1. What 2 use-cases can public key cryptography be used for?
  • Encryption and digital signatures
1 Like
  1. Public key is used to encrypt information private key solve the encrypted information using the public key (derive the public key).

  2. Encryption & digital signature, digital signature verify the the sender when private key derive the public key.

1 Like

Public keys are are encrypted versions of the private and are viewable by anyone on the network. Private keys are randomly generated computer keys which are represented by the public keys.

Encryption and digital signatures

1 Like
  1. A private key randomly generates a large number which is then mathematically processed in to a public key. The private key cannot be derived from the public key, but anything encrypted by the public key can only be decrypted by the private key, and NOT the public key.
  2. For encrypting data and digital signatures.
1 Like

Public and Private Keys:

Describe the concept of public and private key with your own words.
The concept of public and private keys is to create a secret message between two parties, enabling data to be shared securely.

What 2 use-cases can public key cryptography be used for?
The two use cases public key cryptography can be used for is 1: Encryption and 2: Digital Signatures.

3 Likes
  1. Describe the concept of public and private key with your own words.
  2. What 2 use-cases can public key cryptography be used for?

1:
With private key encryption the sender of a message will generate a private key ment for keeping safe and from that encrypts the message and also generates (derives) a public key. This public key can be given to the public and to the recipient of the message so that this person can use it to unlock (decrept) the message and verify that it is from the correct sender.
2:
In computer science public key cryptography is used for encryption and for digital signatures. In crypto the second usecase is used for verifying the transaction.

2 Likes

1. Describe the concept of public and private key with your own words.

Private key is a unique random number sequence given to an owner of account that requires the use of private keys and should never be shared to others. The purpose of private keys focus on authorizing or decoding sensitive messages and transaction. As to public key which is associated with your private key is used to encrypt sensitive data or verify a transaction after it’s been encrypted or has been requested.

2. What 2 use-cases can public key cryptography be used for?

Two primary use-cases public key is used for is identification and confidentiality, a sender gets an address public key and uses it to encrypt information. The sender sends the encrypted information to an addressee, then the addressee uses his or her private key to decrypt the data.

1 Like

1- Public Key is a adress and the private key is the key to open that mail box adress.
2 - everything connected to digital signatures
important documents to be sent in security

1 Like

1.your private key generates a public key that you use to send across the internet which is able to be verified or paired to your private key inorder to act as your digital signature.
2. The 2 use cases of public key cryptography are for encryption and use as a digital signature.

1 Like
  1. A private key is a key generated by a random number and is not shared with the public. A public key is derived from the private key and is shared with the public so messages or transactions can be done. You cannot determine the private key even with knowledge of the public key because it is derived with a one-way function.
  2. Public-key cryptography can be used to encrypt messages and keep them secret from people that do not have access to the private key. Also, a private key can be used to sign messages, the signature can be verified using the public key.
1 Like
  1. A private key is a randomly generated number that is used to generate your public key. The public/private key pair can be used for various functions such as encrypting messages and digital signatures.

  2. Encryption and digital signatures.

1 Like
  1. The concept is also known as asymmetric cryptography where one uses the Public key of the intended receiver to encrypt the message to be sent to the receiver. The receiver on the other hand will be able to view the message using his/her private key.
    This way, asymmetric cryptography is used for SECURE COMMUNICATION.

  2. Digital signatures where the sender signs a transaction using the private key so that the transaction can be AUTHENTICATED and verified by the public key holders.
    For example, when you issue a cheque to someone, you sign it. When the holder of the cheque wants to deposit it, he/she presents it to the bank and the bank will verify whether the signature is yours based on your specimen signature you already provided them and the bank AUTHENTICATES the cheque you issued, if the signature is a match.
    Note : AUTHENTICATION and COMMUNICATING is different.

If you are clear about the concept of DS its easy to understand the cryptography part of BC.

1 Like
  1. By generating a private key you can generate a public key, public signature, or public address to encrypt or sign a transaction of information. It is impossible to reverse engineer the public key or public address to find the private key.

  2. Encryption, and verification of the transaction using digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private keys is something only the user of an exact address has access to and for decrypting messages to be read by only that user. Public key is open for everyone to see and share.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.
1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

ANSWER:

Public key is the key generated from private key for public sharing, with it transaction can be encrypted on but not decrypted from. The private key is the key you keep private and use to decrypt messages and transactions. The private key can also be used to sign a digital signature, when the private key is used to sign it shows the transaction belongs to only to you, a kind of finger print signature.

  1. What 2 use-cases can public key cryptography be used for?

ANSWER:

1). Encryption.

2). Digital signature.

1 Like