Homework on Public and Private Keys - Questions

  1. Public key is like you address, everyone knows that information and anyone can see it. Private key is similar to your actual house keys, if anyone but you is in possession of them your security is in jeopardy.
  2. To encrypt and to sign transactions.
1 Like
  1. Public and Private keys are widely used in blockchain to ensure data transference and security of information based on encryption. A piece of code - whether is encrypted or not - can be sent from A to B through a public key. This data sent through a public key can be encrypted into a private key to ensure the security and privacy of the data, and then it can only be seen as a new encrypted piece of code that can be decrypted by using the private key that has created the latter public key. A public key allows the users to transfer or send messages, then the private key helps to encrypt the data, creating a new random code for the information.

  2. The first use-case is when choosing to send a message through the public key with encryption, which is reached by using a private key to generate a new random code of encryption for the data. The second one is for data transference that has been made with a digital signature, in which the transference is signed by the sender’s private key. In this case, the recipient is able to access the information shown in the sender’s public key by confirming the signature and the public key associated to the sender.

1 Like
  1. Describe the concept of public and private key with your own words.

Private key is a set of unique random numbers generated by the computer serves as the only ‘password’ to access and to gain control a transaction that’s been kept private. Public key is derived from the private key mainly to allow sharing among the public. Private key can unlock transactions through the use of public key but not vice versa.

  1. What 2 use-cases can public key cryptography be used for? First user case is encryption and the second user case which is also the main user case is digital signature.
1 Like
  1. The public key is derived from the private key, it can be shared/seen by others (your wallet address for example). private keys are randomly generated by the computer
  2. encryption, digital signature
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is used to encrypt private or sensative information. And the private key is used to decrypt the public that information that was encrypted by the public key.

  2. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. public key is to show to the public everyone can see it and private key is your secret signature to generate public key and make an transaction.
  2. public key is used for receive transaction to your unique public key. and second use can be verified through public key an transaction
1 Like
  1. Describe the concept of public and private key with your own words.

    It’s a technique where you can create/read encryptions or digital signatures based on both the message and the public key/private key. The private key is a very large random number that’s the seed to create its respective public key. Since this is an asymmetric encryption, it’s not possible to identify what’s the private key given a public key.

  2. What 2 use-cases can public key cryptography be used for?

    1. Encryption
      a) The owner of the private key can create messages with its private key and anyone with they public key will be able to read it.
      b) Anyone can encrypt a message with someone’s public key, and only the owner of the private key will be able to decrypt it.
    2. Digital Signature
      a) If you create a digital signature with your private key, anyone who has access to your public key will be able to validate the the signature belongs to the owner of the private key.
1 Like
  1. The Private Key is my secret Key, with which I can generate the Public key that I can share publicly so that anyone can use it to send me encrypted message that can be decrypted only by me with my Private key.
  2. The 2 use-cases for Public key cryptography:
  • Encryption;
  • Digital Signatures (for Identification and Integrity).
2 Likes
  1. A private key is a randomly generated number of specific length that is kept secret and used to generate (in unidirectional fashion) a public key that is shared openly. The private key can generate public keys, but the public keys can’t be used to determine the private key.

  2. Encryption and digital signatures

2 Likes

Homework on Public and Private Keys – Questions

  1. Describe the concept of public and private key in your own words

A private key is a randomly generated number of a specific length that is kept secret and used to generate (in unidirectional fashion) a public key that is shared openly.

The private key can generate a public key, but a public key can’t be used to determine the private key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

For encryption, the owner of the private key can create messages with its private key and anyone with they public key will be able to read it. Anyone can encrypt a message with someone’s public key, and only the owner of the private key will be able to decrypt it.

For digital signatures, if you create a digital signature with your private key, anyone who has access to your public key will be able to validate the signature belongs to the owner of the private key.

The public key is used to encrypt private or sensitive information. And the private key is used to decrypt the public that information that was encrypted by the public key.

1 Like
  1. Private key is a random number which we can use to derive a Public key. Both this pair of keys allow us to encrypt and decrypt data and also having a digital signature.

  2. Encryption and Digital Signature.

2 Likes
  1. We randomly generate a number which ends up being our secret, private key. This private key is hashed with an asymmetric algorithm to create a public key, which can be shared with others. Nobody will be able to determine the private key from the public key.
  2. Public key cryptography can be used to encrypt/decrypt information and to digitally sign information.
1 Like
  1. Let’s say that you generate a private/public key pair: Key A and Key B respectfully. It’s
    computationally infeasible to derive Key A from Key B so you make Key A the private or secret Key. While it is easy to compute Key B from Key A so you make Key B your public key. The way that asymmetrical cryptography works, the private or secret key is generated first then the public key is generated from the the private key.You call your private key “private” because you should be the only person that has access to it. You share your public key with others that why it’s called a public key. If you encrypt something with one key then you can decrypt it with the other key.
  2. The 2 use cases for asymmetrical or public cryptography are encrypting communication and digital signatures. Let’s suppose that Alice want Bob to send her a secret message so Alice and Bob exchange public keys. Bob wants to digitally sign the message before he encrypts it to Alice so she knows that the message really came him not someone trying to pretend to be him and knows that message was the message he had intended to send her. To do this, Bob first takes a hash of the message then he encrypts the hash with his private key along with the exact time and date it was signed. After Bob generating the digital signature for the message, the digital signature is attached to the message then the messageis finally encrypted with Alice’s public key and it is sent to her. She decrypts the message that she has received from Bob with her private key. After that the authenticity of the message is verified by putting the message through the very same hash function that Bob used to sign the message. Also, the digital signature is decrypted with Bob’s public key and the hash from the hash function is compared with the hash from the digital signature to see if they match. If they match then Alice can be certain Bob was the one who signed the message and the message hasn’t been changed after it was signed. In general digital signatures are used in crytpocurrencies and blockchain technology not encryption to send encrypted messages.
1 Like

Private key only stays with the owner and therefore not accessible to others on the network. On the other hand, public key, which is derived from the private key, is accessible to others on the network.

In terms of encryption:

A sender of the data (information) encrypts the message using the recipient’s public key. Once it is delivered, the recipient will use its private key to decrypt the data to make its contents user-readable, i.e., plaintext. This method ensures to deter anyone, who may intercept the data, to view the actual information.

In terms of BTC transactions:

A user (X) makes a transaction/message using the digital signature, which uses the user’s private key to sign it. Then, for the recipient (Y) to verify it, Y uses both the digital signature and X’s public key to confirm whether the public key corresponds with the private key, without having to get access to it.

  1. Two uses of public-key cryptography are (a) encryption (b) digital signatures.
1 Like
  1. The public key encrypts the information — then the private key decrypts the information that was was encrypted with the use of the public key. Private key must stay secret and private as it is a random generated number by computer mathematic computation.
  2. Encryption and Digital Signatures
3 Likes
  1. Private key is a string of numbers generated by your computer in a way that it would mathematical impossible for another computer to duplicate. It then creates another string of numbers called the public key which others can see. But it would be impossible to retrieve the private key based on the public key.

  2. encryption and digital signature.

1 Like
  1. A private key is a number or more complex number with letters…created by your computer. It is a random number. The private key is than used to create a public key. The public key can not be used to regenerate the private key.
    For example:
    If you want to send a encrypted message, you use the public key (of the person you want to send it to)to create it and encrypt it and than they can than use their private key to read it
  2. The private and public key system is used for encryption and digital signatures.
1 Like

Describe the concept of public and private key with your own words

Private keys are used to both encrypt and decrypt public keys. Public keys are used to send encrypted information (such as a transaction or message), and cannot be reverse engineered to access a private key.

What 2 use-cases can public key cryptography be used for?

Public keys are of course ideal for crypto transactions, and can also be used for messaging. They are ideal for any scenario where private information or digital signatures need to be sent between parties on public networks or platforms.

1 Like
  1. A public / private keypair are two numbers which are used to encrypt and decrypt information.
    The public key is generated from a private key and can decrypt information encrypted with the private key. The private key can decrypt information encrypted by the public key.
  2. Use cases:
    a. You can use someones public key to encrypt information in such a way that only the holder of the private key can read them.
    b. You can authenticate a message by encrypting it with your private key. This means that anyone with a public key can read the message, but they will be certain the holder of the private key was the sender.
1 Like
  1. A public key is generated from a private key. They can be used to encrypt messages and when sending Bitcoin the private key is used to sign the transaction and verify it.
  2. Encryption and Digital Signature
1 Like