Homework on Public and Private Keys - Questions

  1. A private key is a secret digital signature that belongs to a certain person, using formulas we can go from a private key to a public key and share it, when an action is performed the public key will make sure that the action is delivered to the right person, whereas the public key will decrypt the message so it can be read by the person.
  2. one is data encryption and the second is digital signature
1 Like
  1. Public and private keys are a secure way to transact between person to person or also wallet to wallet using Cryptocurrency. To start a person that would like to send a message in the most secure way possible would first generate a private key that him/her would keep private. Second they would then generate a public key that can be sent out and be used publicly, to send a message the message would have to be verified by the public & private key to be read.

  2. For sending important messages and data and also sending bitcoin / Cryptocurrency from wallet to wallet.

1 Like
  1. Public Key is a number that is generated from your private key that is shared with everyone and used to encrypt sensitive information. A private key is a number that is generated from your computer that you must not share with anyone, because that number is used to decrypt information that is sent to you. A private key is also used as a digital signature that one can verify via public key.

  2. Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is a key you can share to the world, the private key is the one you kep to yourself. You can go from the private key to the public key but you cant go the other way.

  2. What 2 use-cases can public key cryptography be used for?
    Traffic incription and digital signature.

1 Like
  • The pair of keys are used in encryption process. Private keys are a randon number that only the owner knows (that’s why it’s called private) and must keep safe so none can stole his data, money or whatever he keeps stored. The private key has mainly two functions, decrypt messages sent through a public key and provide sign to a message sent (to validate the origin of the message). The public key it’s derived from private key but, as the name says, it’s public, everyone can see it and it can be encrypted or not (usually is). You can use a another person public key to send an encrypted message to him/her and only who possess the private key (that origins this public key) will be able to decrypt the message. Or you may send a public key (that isnt encrypted) with your sign (origined by your private key), so the receiver will be able to check if it’s you that really send that information. Kinda prolix… but i think that’s it… ah, it’s important to say that some will never get into your private key through your public key…

  • To send information and to origin your Bitcoin Adress

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A public key is created using a private key. Anyone that has access to that private key is able to decrypt messages or digitally sign transactions.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.

1 Like
  1. Public is that is which everyone has and private key which we only have and is confidential

  2. The public key can be used for encryption and in digital signatures to verify the transaction

1 Like
  1. Describe the concept of public and private key with your own words.
    The message is hashed and created private key and than public key, that are different from each other. Public key can be shared outside, private key should be kept secure to avoid lost of Bitcoin or data.
  2. What 2 use-cases can public key cryptography be used for.
    For Encryption and Digital signature
1 Like
  1. Public keys are addresses for the public such as the numbers on every house on the street with digits on them. Private keys are the secondary address to that house that’s even more secure. such as for example, having two locks on the house instead of just the one provided.
  2. Public keys can be used to send and receive messages and currency
1 Like
  1. Private and public keys are hexadecimal codes which are used to either encrypt or verify messages and transactions.
    The process of establishing one’s presence on a network in this way begins with a randomly generated private key, a code, by computer. The possessor of this key code must keep it secret on pain/risk of losing all security and assets.
    From the private key, a public key is derived. This public key may be shared with all, for it is a mathematical impossibility that a public key may be cracked in order to discover one’s private key.
    For the use of Bitcoin, the pairing of these two keys—the private and public—automatically creates one’s Bitcoin address.
  1. The two use cases of private and public keys are (1) encryption and (2) digital signatures.
1 Like
  1. Computer generate for user a private key - very secured combination of numbers (access to that key van have only an owner, otherwise can lose all coins and information) to excess the transaction or other operations online. Out of private key computer will generate public key that helps in communication between users (send money or do various operations).
  2. Encrypt and digital sign.
1 Like
  1. The concept of public keys and private keys is that you can generate a private key to decrypt stuff, and use that same private key to generate a public key that can be used to share with public and encrypt stuff that can be decrypted by private key.
  2. The two use-cases that public key cryptography can be used for is encryption and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.

The private key is a random number that is not shared. The private key is used to generate a public key based on the private key value. The public key is shared. Others can encrypt a message using the public key and only the holder of the corresponding private key would be able to read the message.

  1. What 2 use-cases can public key cryptography be used for?

Encrypting messages and digital signatures that allow a receiver to confirm the message sender.

1 Like
  1. Describe the concept of public and private key with your own words.
    this set of keys, private and public, are used to seal and sign a "message/transaction/etc/ " that can only be open in a certain way. kind of like a locked mail box. anyone (in this a mail carrier) can open your mailbox, and place a piece of mail in the box and once the mail, however to open it, only you, the mailbox key holder can open it from your side.

  2. What 2 use-cases can public key cryptography be used for?
    the two use cases are to encrypt something or to sign something.

1 Like

Describe the concept of public and private key with your own words.
What 2 use-cases can public key cryptography be used for?

A public key is a key that is required to encrypt communications. It is publicly available for anyone to use. On the other hand, a private key refers to the key used to compound encrypted data and is owned only by a specific user.

1 Like
  1. Describe the concept of public and private key with your own words.

The private key generate the public key which can be used to verify that the private key was used to sign a transaction without knowing the private key itself.

  1. What 2 use-cases can public key cryptography be used for?

Encryption
digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is used to encrypt information while the private key decrypts that information. The public key can be shared without compromising the security of the private one.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.

1 Like

This is a great video for understanding the maths specifically for crypto

https://youtu.be/S9JGmA5_unY

1 Like
  1. Private keys and public keys function similarly to a lock and a key. The private key enables you to sign and verify that you authorize a transaction and the public key is used to broadcast to the world your holdings.

  2. Public key cryptography is used for encryption and digital signatures.

1 Like
  1. A public key is generated from a private key, a unique identifier anyone can see and use to send or encrypt a message to you
    A private key is what generates a public key and can only be used to decrypt messages sent to the public key, meant to be kept secret and safe, seen by only you.

  2. Encryption
    Digital signature

1 Like