- Describe the concept of public and private key with your own words : Your Public Key is derived from your private key through a mathematical relationship or function. Your public key is visible to other users on a network or application and your private key are only known to yourself. It is possible to derive your public key from your private key but not possible to derive your private key from your public key.
- What 2 use-cases can public key cryptography be used for : For encryption of messages between two parties or for digital signature of say for example a document using e-signature.
- Describe the concept of public and private key with your own words.
âPublic key cryptography is at the core of cryptocurrency industryâ Ivan on tech, Public and private key are used for 2 main reasons, encryption and digital signature.
The private key is generated by a computer (in bitcoin it is generated thru a wallet in a computer) as a random number (It is very, very, very unlikely, almost impossible to get the same private key that someone else), it shouldnât be shared with anyone and if its lost or forgotten it canât be restored.
The private key is used to sign the transactions.
The public key is generated or derived from the private key thru a special formula, it is associated to the private key, but it is not possible to go from the public to the private key. Public key can be shared. It is like your wallets address.
They are both almost unique. A good example is that when when someone shuffles a deck of cards the probability that another individual shuffling another deck of cards and getting the same order in the decks is very unlikely, the number of possibilities is 52! (52 factorial, that is a very big number, it is 8.0658 x 10^67), the number of private keys that can be generated by the computer a computer is a way bigger number.
In bitcoin:
Computer generates private key â A public key is generated thru a special formula with the private key â From the public key a bitcoin address is created.
In encryption (not used in crypto):
Public key can be share thru a public channel, so if someone sends me a message he would use my public key to encrypt the message (at this point if someone sees the message he wouldnât understand it because it is encrypted, it would just look like random characters), when I receive it I will use my private key to decrypt it. The only method to decodify the message is thru my private key, other private keys wonât work because my public key was used to encrypt the message and my public key was generated thru my private key.
Anyone can use a public key to encrypt a message, but just someone that knows the private key which generated that specific public key will be able to decrypt the message.
Digital signature (used in crypto):
It is used to verify who sent a message. When a someone sends a message, he uses his private key to âSignâ it, the message has a signature which was generated with the private key. The receiver will be able to verify mathematically that the signature comes from the private key that belong to the public key of the sender. The relationship between the signatures and the public key enables to verify that the private key was used to sign.
- What 2 use-cases can public key cryptography be used for?
Encryption and digital signature.
1: Private key is what keeps your data, bitcoin, etc. secure and only belongs to you. A public key is what you use to share with others in the transaction of data.
2: Encryption and digital signatures are the two use cases that best demonstrate the concepts above.
- Public and private keys are a pair of large numbers where a private key is a randomly generated set of numbers from which is generated the public key. The public key is used to be shared with others while the private key has to stay secret.
- Tow use cases are where somebody is sending us the message they signed with their private key. We get their message and public key from which we can authorize that this is the correct message from the correct person. another way is where we are sending the message that we encrypt with our private key and sign it. We share it with another participant through their public key.
- Describe the concept of public and private key with your own words.
Public Key â to encrypt a message
Private Key â De-encryption a message
- What 2 use-cases can public key cryptography be used for?
To encrypt a message and to check on the Digital Signature.
- public and private key. public key is for you and everyone to see and essentially use. private key is your only as long as no one else has stolen it and cannot be randomly obtained with todays tech.
- you can use you public key to send messages and transactions.
-
A private key generates a public key, and this operation is not reversible. Public key carries the encrypted msg and private key decrypts this msg. Public keys are visible on the public ledger, while private key is only known to the holder of this key.
-
Public key cryptography are used to do digital signature (for verification and approval), and to encrypt a message
- A private key is a random computer generated alpha numeric data set which generates the public key which can be used to verify the private key.
2 . Encrypted data sharing and verified data storage/sharing.
- a public key is a giant number generated and shared with the public as an ID number;
- Public key cryptography can be used to make keep messages private between the sender and the receiver, and can be used to identify the owner/sender/ receiver of a cryptocurrency in an exchange.
Public key is generated by the private key.and can be visible to everyone. Private key is a collection of random numbers that can not be shared with anyone, it keeps your private information. Bitcoin added another security step-bitcoin address.
Public key cryptography is used for the encryption of sensitive data and to create a digital signature (used in Bitcoin transactions)
- Public and private key pairs can be used in cryptography. A private key is a very large, random number and needs to be kept secret. The public key can be derived from the private key with a one-way mathematical function. This means that the private key can never be derived from the public key.
- The public / private key cryptography can be used for encryption and for digital signatures. In encryption person A and B want to communicate privately. If person B wants to send a message to person A, they use person Aâs public key to encrypt the message before sending it to a potentially public of unsecure network. Person A can then use their private key to decrypt the message. Since nobody else knows the private key, only person A can read the message. For digital signatures, person B wants to verify that a message comes from person A. Before sending a message to person B, person A signs the message with their private key. Person B can then verify that the message was signed by the private key belonging to person Aâs public key, even without knowing the private key. This way the identity is verified. For Bitcoin, digital signatures are the more relevant use case.
To generate a random or unique number by computer which is a private key. In turns generate a public key to share every where for the world to see. Can always go from private to public, but never from public to private.
The two uses of public key is for encryption and digital signature for verification.
- the public key is used to transfer encrypted data or messages than can only be decrypted by a private key.
- 2 use cases are encryption and digital signatures.
-
To me, the concept of public and private keys are a direct way for users on a network to share and transfer information / data between each other in a secure way. The public Key is derived from your private key which is used to decrypt the message or data sent to them via the Public.
-
Using someones public key you can send them a message and they can decrypt via their private key. Second, you can use your private key to digitally sign a document.
-
Public and Private keys are used for encryption and digital signatures (verification). Private keys are used in a function to produce a Public key. That public key can be used to encrypt messages and verify digital signatures while only being able to be decrypted by the person holding the private key. Private keys are by no means supposed to be shared.
-
Encrypted messages and digital signatures.
-
Public and private keys are used to send data across a public environment/network in a way that is secure and secret to only the parties privy to the transaction and which creates a way for the two parties to confirm the validity of the transaction. Data can be encrypted so this data can be transacted across the network without outside viewers gaining access to it. A public and private key pair is used so the data can be sent across the public network but only the person with the private keys can access the information. In addition, through the use of mathematical equations, you can use public and private keys to create a digital signature where by individuals on the network can validate that a transaction was made by a certain party whereby the receiving party can verify that a particular message is related to a network participants private key through the use of a digitial signature without providing the sends private key.
-
Public key cryptography can be used for encryption and digital signatures
-
Public and Private key concept is a method to hide transmitted data from listeners between the sender and recipient, OR a method to confirm the identity of sender or integrity of data sent by use of a randomly created large number as private key to generate a public key for the recipient to verify the data or decrypt it if encrypted.
-
Public Key Cryptography is used in 2 use cases:
i). Encryption - for restricting unauthorized access to sent message content
ii). Digital Signature - to verify the identity of the sender or the integrity of the sent message.
-
A private key is a random sequence of characters assigned to you by the computer upon request. The public key is then created from the private key and is used to conduct transactions with third parties.
-
Public key cryptography can be used for encryption and digital signatures.
Homework on Public and Private Keys - Questions
- Describe the concept of public and private key with your own words.
A: The concept of public and private keys are:
- when the reciever wants to communicate with others with secret messages they must establish both a private key (random digital word) that they keep private. From that private digital word, they generate a public key which is also also a random digitized word. The public key is sent to whomever they want to recieve messages from or broadcast it to everyone they know. The Sender of a secret message will use the public key to encode the secret message, the receiver of the secret encoded message will use their private key to decode the message.
- What 2 use-cases can public key cryptography be used for?
- message encryption
- digital signatures - used by bitcoin
Describe the concept of public and private key with your own words.
private key is a unique generated random number from which a public key is generated.
Public key is what everyone sees. We can send and receive btc using our btc but only unlock
using our private key.
What 2 use-cases can public key cryptography be used for?
can be used for encryption and digital signatures.
If a message is encryped with a public key only that person private key can unencrypt it.