Homework on Public and Private Keys - Questions

You private key is used to generate your public key so decrypt the transaction

Encryption & digital signature

1 Like

the private key is personal only you know the private key, public key everyone can see

digital signature security and encryption

1 Like
  1. Private key - random number generated by the computer that is unique and must never be shared with anyone else.
    Public key - number (key) generated by the private key, but this one can be freely shared with the public for transaction/message purposes.

  2. Can be used as a digital signature (which is unique for every person), this signature is generated by the private key.
    It can also be used for encryption, and the only way to see the message/transaction is by using the private key that generated said public key.

1 Like
  1. The concept of public and private keys are as follows: In communication over public networks i.e. networks with other people listening in there are many risks including phishing or interceptions of the messages for various undesirable purposes by non-intended-recipients. So to enable secure messages to be sent over a public network the concept of public and private key is utilized. Each party has a unique private key that is not shared with anybody else. The unique public key is then derived from the private key, this public key may be shared with anyone. Messages are then encrypted inclusive of the public key and be verified at destination with the digital signature of the sender since their public key and signature could have only possibly been generated with their private key.

  2. The 2 use-cases that public key cryptography can be used for is in wallet addresses for sending and receiving cryptocurrency such as bitcoin for example and also digital signatures in say smart-contracts or other documents requiring digital signatures.

It can also be used for encryption which would be the other use case.

Thanks for your feedback :slightly_smiling_face: : :+1:t5:

  1. the public key is what everyone else can see. It’s what you can give someone in order to transact. Your private key is what no one else should know besides yourself. You can generate a public through your private key but not the other way around.
    2.The 2 uses cases are authentication and encryption.
1 Like
  1. a private key is used to generate a public key, and this is what is used to send encrypted messages to another person. You cannot use a public key to find out the private key, this is what makes it secure
  2. the two use cases are encryption and digital signatures (used in Bitcoin)
1 Like
  1. Describe the concept of public and private key with your own words.
  • private key is the special, secret ID that can be used for generating public key or digital signatures
  • public key is derived from the private key.
  1. What 2 use-cases can public key cryptography be used for?
  • can be used to encrypt message
  • to verify if the signature of the transaction corresponds to the same private key that generates the public key.
1 Like
  1. private key is used to create a public key. If you lose your private key then you longer have access to that asset.

  2. encryption and digital signatures

1 Like

Describe the concept of public and private key with your own words.

Public and private keys are special numbers made by a computer. The private key is a random number, which is so large that it is almost impossible to guess, so it is secret and secure, if the key is hidden from persons who do not have permission to see it. Because of the huge size of the number, is also almost impossible to make a private key number which matches an earlier one. Therefore, for practical purposes, the private key can be considered as being completely unique. The private key is used to make a public key, which is not secret, and can safely be shown to anyone. The public key number can be used to encrypt data, which can then be decoded by using the private key. Though the private key is used to make the public key, there is no way to use the public key for deducing the private key.

What 2 use-cases can public key cryptography be used for?

A pair of connected public and private keys can be used:

1 to encrypt and decrypt information, for privacy or security.

2 to verify that an action with digital information (such as sending a message or approving a transaction) was done by a person who controlled the private key (which was connected with that action) at that time. Assuming that a particular person had control of the private key, and no other person had control of the private key, you can verify that the digital action was done by that person, and not by another person.

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is generated as unique identifier (and should therefore be kept private so you are the only one knowing and using this unique identifier). The public key is a representation of the private key using an encryption algorithm / hash function to create that public key from the private key.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption of a message
    Identification of the sender of a message by using it for a digital signature
1 Like
  1. Public keys and private keys are mathematically related in such a manner that one cannot attain the private key from the public key. For this reason, the public key can be sent to the world where the private key must be kept secret.
  2. Public-key cryptography can be used for the encryption of data or for digital signatures, which is what is used in Bitcoin and blockchain technology.
1 Like

1- a public key is a key derivated from a private key . It is mathematically generated so its impossible to generate exactly the same one as another that was previously created .
2- For digital sign any document as it used nowadays and for make secure transactions

1 Like
  1. In public key cryptography, two keys are used, the public key is used for encryption and while the private is used for decryption. In public key cryptography, one of the two keys is kept as a secret.

The public key is used to by the sender encrypt plain text to convert it into cipher text and the private key is used by receiver to decrypt the cipher text to read the message. The public key is derived from the private key, but you cannot derive the correct private key from the public key, making the transaction secure.

  1. The combination of a public and private keys can be used to send and receive a secure transaction or message. It also provides a digital signature.
1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is the unique key that gives you access to your crypto account. (deencrypt account)
    The public key is derived from the private key. However, the private key never be derived from the
    public key.

  2. What 2 use-cases can public key cryptography be used for?
    First Send encrypted messags to eachother
    second digtial signatures

1 Like

Homework on Public and Private Keys - Answers:

  1. Private key is a random number generated by computer. It as a basis of a person digital safety must be kept super secret. A public key is generating from the private key using some formula. Since getting the private key from public key is impossible the owner can share the public key with the whole world.
  2. Public key cryptography is using for
    a) encryption of messages sending to the owner of the key;
    b) digital signature of the key owner, verifying his identity.
1 Like

Describe the concept of public and private key with your own words.
private key is a code of numbers assigned to a person, this is a private key which only you will hold, from this key you can generate a public key which is paired with your private key, this public key is the key you show people

What 2 use-cases can public key cryptography be used for?
encryption and digital signatures

1 Like
  1. A Public Key is open and visible to anyone, it can be shared, it can be published and no one with it can derive what is the private key associated to it.
    A Private Key however must be only know to myself, with it I prove to be the owner of whatever is my Public Key, or that I am who I say I am when I make transaction in the blockchain or I signe electronically y document
  2. 2 cases: Encryption (Web 2.0, for example secure emails o ecommerce transaction with payment cards) and for Digital Signature (when signing electronically documents. The latter case is the one used in case of Bitcoin
1 Like

Describe the concept of public and private key with your own words.
Public and private keys allow to send and receive transactions.
Private keys are used to sign and prove someone can receive the transaction through decryption.
Public keys are used for receive transactions.
Public keys are generated from private keys but is not possible to generate the private key from the public key.

What 2 use-cases can public key cryptography be used for?
It can be used for encryption and for digital signatures.

1 Like