Homework on Public and Private Keys - Questions

  1. Public and private key pairs are pairs of random numbers such that the public key can be derived from the private key but the private key cannot be derived from the public key.

  2. Public key cryptography can be used for encryption or digital signatures.

1 Like

Describe the concept of public and private key with your own words.
The concept of a private and public key is to uniquely encrypt/decrypt data specific to their owner. The private key is only known to the owner to be able to decrypt incoming data and encrypt outgoing data. Other people can use the public key of the owner to decrypt messages coming from them or encrypt messages sent to them.

What 2 use-cases can public key cryptography be used for?
Encryption is used to encrypt messages between different entities.
Digital signing is used to embed a signature to a sender of a message to identify the true sender.

1 Like
  1. Billy uses Public Keys to send encrypted messages on an open platform to Bob, who then uses a private key to decrypt the message intended for him by Billy ( i hope I’m correct).

  2. For cryptocurrency and as a digital signature.

1 Like
  1. Private key is like the key to your safe deposit box at the bank. Never share it with anybody. You need it for transfering your funds. Public key is like the number on the depostit box. You need it for transfering and sending funds.

  2. encryption and digital signature.

1 Like
  1. Public key is the key generated from private key and can be pass to other, while the private key is the key of the author which is the pair of private key(for decryption).
  2. Signature and Encryptions.
1 Like
  • Public key Cryptography: used for two major purposes: encryption and digital signatures for integrity and verification.

    • A private key is generated, and then a public key is derived from it. The public key of the receiver is used to encrypt the message and decrypted by the private key of the receiver.

    • Digital signature: This is the major use of cryptography. To verify the sender of a message. The sender signs the message with his private key. The receiver can validate that the signature of the message is signed with a private key that produced the senders public key that is public

  • A wallet address is generated from the public key

1 Like
  1. The public key is used to encrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.

  2. The 2 use cases are encryption and digital signatures.Digital signatures verify who sent the message since the private key derives the public key which creates the bitcoin address. You send bitcoin using your private key and receive bitcoin to your bitcoin address.Cryptography and the use of public and private keys solves the security issue when we use the internet.

1 Like
  1. Describe the concept of public and private key with your own words.
    Your private key is used to generate your public key. Your public key can be posted on without the possibility of your private key being revealed.
  2. What 2 use-cases can public key cryptography be used for? Your public key can be used to send a message. Your public key can also be used to encrypt a message.
1 Like
  1. Describe the concept of public and private key with your own words.
    Encryption enables each one to have his/her computer creating a unique private key.
    The device generates a public key out of this private key.
    The private key should be kept securely as it is the only way to be used to decrypt or sign personal/private documents or transactions (obviously should never be shared) The public key generated from the private key can be shared in any social media As it uses unilateral hashes it is not possible to figure out a private key from a public key)The probability to have the same sequences of numbers twice being impossible, each private key is unique. The public key is a way to unlock a private key with the permission of the owner of the private key.

  2. What 2 use-cases can public key cryptography be used for?
    1/ Create a unique signature for documents. The public key will decrypt the encrypted signature and therefore certifying it’s the right person signing. (Exactly like we would use fingerprints or DNA sequences)
    2/ for sending cryptocurrency. For this purpose we will need our crypto platform to create our unique wallet, which will create our unique private key, generating a public key, creating a Bitcoin address. This is also a collision proofed method.

1 Like
  1. Describe the concept of public and private key with your own words.

This concept makes sure you can send data over a public network without being compromised. When sending data a private key is generated, after wich a public key is generated. So every private and public key is paired and unique. You can use the public key to encrypt data and the private t odecrypt that data. Or you can use the private key to sign a certain transaction or message and use the public key to verify that transaction or message.

  1. What 2 use-cases can public key cryptography be used for?

1 encryption

When sendig data a private key is generated. Trough a formula a public key is derived ftom that private key. The public key can be used to encrypt the data being send. After wicht he private key can be used t odecrypt that message.

2 digital signatures

When sending data or transaction a private key can be used to sign the transaction. The reciver of the transaction can verify the transaction by compairing the signature with the public key (that was derived from the private key).

1 Like
  1. A public key is an address that it’s for everyone to know. It is created with a corresponding private key, this private key should be kept only by the person who wants access to the assets/information.

  2. By having a public/private key pair allows people to share sensitive information on an open network. Party a has a message, they use party B private key for encrytion. Now the only person who can read the message is B. Another use case is to sign a document or send funds by using a digital signature. The party receving the message has some data that allows them to compare the private key/public key pair.

1 Like
  1. Let’s say I have a special, unique magnet and it only pulls certain materials which no other magnet pulls. I create a mixture of these materials too, and I share this mixture with whoever wants. When someone wants to send me other materials, they mix them with my mixture.
    I use my magnet to pull out all of my mixtures and there are only the materials, the person sent me left.
    It was a secure transaction.
  2. Sending encrypted information and comparing signature with the public key to authanticate the transaction.
1 Like

The public key is used to encrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.

Private key is thus your secret identity which belong to you and only you and it is a random number generated by computer while Public key is the key which can be seen by everyone and it is generated by using your private key. It is used to assure that you have signed the transaction in cryptocurrency

The 2 use cases are encryption and digital signatures.Digital signatures verify who sent the message since the private key derives the public key which creates the bitcoin address. You send bitcoin using your private key and receive bitcoin to your bitcoin address.Cryptography and the use of public and private keys solves the security issue when we use the internet.

1 Like

1. Describe the concept of public and private key with your own words.
Public key use to encrypt information and private key use to decrypt information from that public key and only me know the private key.

2. What 2 use-cases can public key cryptography be used for?
One is encryption which to use to decrypt and encrypt message from the private key and public key.
Second is digital signature which use to verify who is the owner of that message or transaction by checking the private key that sign with that message to the public key which available to see anywhere for anyone.

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
  • Public and private keys are forms of cryptography that can be used to send messages back and forth in public while also in secret. Anyone can see a public key but not everyone can see a private key. Private keys are used to decrypt messages that are encrypted in corresponding public keys.
  1. What 2 use-cases can public key cryptography be used for?
  • Public key cryptography can be used for Encrypting messages, and they can also be used as a form of digital signatures for money transactions and contracts.
1 Like
  1. Private key randomly generated kept secret can derive a public key for everyone else to see and confirm with your private key signature sent with message.
  2. Use case for public key cryptography is Encryption & Digital Signatures verified by recipient using reciprocal public key.
1 Like
  1. Describe the concept of public and private key with your own words.
    Public keys are used to receive encrypted data . Public keys are meant to be available for anyone to send encrypted data. The public key is generated by the private key, and can only be decrypted with the private key.
  2. What 2 use-cases can public key cryptography be used for?
    For sending/recieving encrypted messages. Also for digital signatures to verify blockchain transactions
1 Like
  1. Private keys are for oneself only. By using your private key, decrypt messages. Public keys are for everyone else to see you.

  2. Encryption messaging and digital signatures.

1 Like

private key is a computer generated random number and is the origin of the public key.
private key is owned and protected, and public key is accecced by the whole network.

private key and public key needs to work together to make a transaction.

Private key public key is a cryptographic system that takes a random number and generates a private key (known only to the user) and a public key (that can be known by everyone). The keys are generated by a one way mathematical algorithm. These two keys are paired and only the private key can be used to decrypt anything that has the corresponding public key attached.
Encrypting messages /transactions and creating digital signatures

1 Like