Homework on Public and Private Keys - Questions

1- Public key serves as ID of transmitting signal/data/info/message. It is open. Private key is necessary to generate signal/data from a certain source, private key is hidden. it’s not possible to reach private key through public key
2- for using encryption for messages to prevent 3rd parties to reach in public open areas.
for digital signatures for identifying host

3 Likes
  1. Basically the concept of a private key is in terms a large inconceivable number that can be used to make your work or transactions in crypto or cryptography secret. This allows only those who have access to your public key to see and interact with your work since it acts as a signature on the material.
  2. The two uses of a public key can be used for is for identification of a used to make sure they are who they say they are, or it can be used for confidentiality reasons to keep your proof of work private.
2 Likes
  1. Private Key is a randomly generated number only available to you and for you to manage and verify any transactions done online in a genuine manner. Privte Key generates a public key, which in turn can be utilized to verify messages, transactions etc., by comparing the public to the private key and make exchanges of any type possible on the internet. (Not sure how that works yet, that no one can see our private key, but somehow your computer or whatever it is got access to check and compare the digital signature matching with the private key)
    In other words, private key is the identity and the public key gives the ability to interact in a genuine and secure manner based on that persona, by which others can verify you and your transactions too.

a.) Encryption = Send a private message or exchange even within a forum of potentially many observers without any danger
b.) Digital signature = How do we know who send the message or transaction and verify it on it’s trueness, well you need a way to check and balance. Like the example said Alice sends a message to Bob and adds her private key signature (which generated an associated public key), which can be checked and verified by Bob comparing data of her public key.

3 Likes
  1. Describe the concept of public and private key with your own words.

A private key is a random number created that’s unique in the sense that it is probabilistically impossible to generate two identical numbers in all history. This private key is used to sign every transaction made, and from it a public key is also derived that can be seen by everyone in the network and can be used as an address to send information that can only be understood by using the private key.

  1. What 2 use-cases can public key cryptography be used for?

It is used to encrypt messages and can act as a digital signature. Shared in public but hidden the private key so all the information received remains private.

1 Like
  1. Describe the concept of public and private key with your own words.
    Like we talked about about one way functions, you have a private key, and you can “hash it” to get to a public key. The public key is unique to your private key, but noone can get to your private key from that. This “one way relationship” allows for many interesting use cases.

  2. What 2 use-cases can public key cryptography be used for?
    It can allow me to send a message to X, and only X can decode/read that message
    I can send a BTC transaction, with my signature, and everyone can verify that it was me who sent it.

1 Like
  • Describe the concept of public and private key with your own words.

Private key is a random number you keep secret in case you want to encrypt a message. Public key is generated based on private key. It can be used by anyone to encrypt the message. After the message is encrypted by public key it can be unencrypt only with private key.
In case of digital signature private key is used to sign messages. It can be verified by public key but can not be generated by it. Function that transform private key in public key works only in one direction.

In a nutshell:
Privat key is random number and public key generates based on private key with irreversible function, so you can use private key to unencrypt message encrypted by public key but you can not generate private key if you got public.

  • What 2 use-cases can public key cryptography be used for?
  1. Encrypt messages; 2.Digital signatures.
1 Like
  1. A public key is used to encrypt information while a private key decrypts the information encrypted by the public key.
  2. Sending messages or sending funds.
1 Like

1. Describe the concept of public and private key with your own words.
A private key is a random number that you use to create a public key. It is not possible to recreate the private key from the public key. Then the public key is used in sharing with other people. And you use the private key to encrypt or to verify you sent a message (digital signature).

2. What 2 use-cases can public key cryptography be used for?
a.) encryption of messages
b.) digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a random number (can be very large) that your computer generates.
    Public key is the output of taking private key and passing it through a hash function. Given the characteristics of hash functions, private keys cannot be derived through public keys (one way encryption); and public keys can used to verify the right private keys.

  2. What 2 use-cases can public key cryptography be used for?
    Public key is used widely in encryption and digital signature.

  • Encryption: When sending messages in internet, the sender creates a private key and uses it to generate a public key, they then encrypt the message with the public key and send it across the internet. Only users with the right private keys can decrypt the message.
  • Digital signature: In crypto currency, when someone wants to send a transition, they sign it with their private key. The blockchain can then verify the identity of the sender by comparing it with the public key.
1 Like
  1. Public keys are used to encrypt data, private keys are used to decrypt data.

  2. Public key cryptography can be used for encryption and digital signatures.

1 Like

1.encryption
2.digital signature

  1. Public Key is like a published phone number- anyone can call it and leave a message on voicemail;
    Private Key is like the voicemail passcode- you keep that private to control access to messages.

  2. Encryption and Digital Signatures

1 Like

1.Public keys are used where all can see and Private keys are only available to you personally. Private keys can be used to decrypt messages that was encrypted and it can serve as a digital finger print when accessing private Wallets.

2.Encryption and digital signatures.

1 Like

1.) A public key is a very large randomly generated number generated by a computer in hash form that can only be deciphered by it’s private key.

2.) Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is the one you share with others and use it to encript messages.
    Private key is the one you keep safe only for yourself and use it to read the encrypted messages.

  2. What 2 use-cases can public key cryptography be used for?
    For encription and digital signature.

1 Like
  1. If someone create an account, a private key is randomly generated. Then, with this private key, a public key is created (depends on the private key). It is like this : private key -> public key, but it is not possible to go from public key to private key.

  2. To add a lot more security / To crypt messages so no one can know about it, only the guy who has the keys.

1 Like
  1. private key - is a random number generated by a computer and should be stored privately and only for you to see.
    public key - is derived from the private key. This key is used for the world to see and can be shared.
  2. Encryption / digital signature
1 Like
  1. Private key is your own. Public key is for the public. Encrypted message/transaction to a specific public key can be decrypted only by using the private key that created the public key it was sent to.
  2. Public and private key are used for 2 main purposes; encryption & signatures.
    You can encrypt a public message to someone else’s public key they can only open using their own private key. Other way around someone can send an encrypted message using your public key which you can only decrypt using your own private key.
    You can sign a message using your private key, the signed message can be compared to your public key so everyone knows the message is authentic.
1 Like

Describe the concept of public and private key with your own words.
The private key is a random number which is generated by a computer. The public key is generated by the private key. No one can use the public key to find out the private key! But anyone with the private key can have access to the Bitcoin

What 2 use-cases can public key cryptography be used for?
Encryption
Digital Identification

1 Like
  1. Describe the concept of public and private key with your own words:

The private key is a largely, from your computer generated, random number when you create a wallet. The public key is generated from that private key. You can´t get from the public key to the private key ( irreversible). With the recipient´s public key you can encrypt information and with the private key the recipient can decrypt that information.

  1. What 2 use-cases can public key cryptography be used for?

First it can be used for encrypting a message by sending it with the public key of the receiver so only he has access to it through the medium of his private key. Secondly it can be used to sign transactions with your own digital signature derived from your private key in order for everyone to be able to verify any transaction you send is actually being sent by you.

1 Like