Homework on Public and Private Keys - Questions

Homework on Public and Private Keys - Questions

  1. Describe the concept of the public and private keys in your own words.
  • Our original message or digital money can only be opened for transactions using our own private keys generated in the blockchain. The public key can be viewed and read by the public or outside people in the blockchain network.
  1. What 2 use-cases can public-key cryptography be used for?
    The 2 use-cases for public-key cryptography are digital signature and encryption.
1 Like
  1. Public and private keys are a pair of keys that are used for encryption and decryption. The public key is used for encryption and is as the name implies, public. Data encrypted with a public key is only decryptable via the private key that was used to generate its paired public key. This is why private keys need to be kept private.
  2. Besides encryption the other use case is as a digital signature to determine a) the integrity of data or b) to verify the identity of the sender of data.
1 Like
  1. Private and public keys are mathematical algorithms used to identify transactions and verify who has sent them. They are a one-way function, public keys can go to private but private cannot go to public keys due to the security nature of its algorithm.

  2. Case 1: Encryption
    1) Person 1 sends message to person 2 with their public key(message
    is encrypted)
    2) Person 2 can decrypt, unlock message with their personal private
    key to read it

    Case 2: Digital Signature
    1) Person 1’s uses private key to sign and sends message to
    person 2
    2) Person 2 uses their private key and matches it with person 1’s
    public key to mathematical verify that they were the original
    sender.

1 Like

Private key can be generated with any numbers, public key can only be generated with private key, and its only one way, you cannot generate private key from public.

Public key cryptography can be used for signatures and for encryptions.

1 Like
  1. As simple as an explanation as I can give would be using our mobile/cell phones. Your phone number is the public key in which people can send you a message. Now, the only way to view that message would be the code/password/fingerprint/facial recognition security that you have set for your mobile phone. The only difference is that a private key is far more difficult to crack than everyone’s passwords etc. It more ties to a fingerprint in that no 2 people in the world have the exact same fingerprints.

  2. Encryption and Signatures are the 2 use cases for Pub Key Cryptography.

Sending and receiving secret messages which are encrypted using your public key and decrypting it using your private key.

Signing transactions so that the network knows a certain individual or group (if multisig) have signed and authorised such a transaction.

1 Like
  1. A private key is a randomly generated number that is to be kept secret. A public key is derived from the private key using a 1-way function so you can not ascertain a private key from the relevant public key.

  2. Encryption & digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

Public key is for encryption.
Private key is for decryption.
Sender encrypts a message with the receiver’s public key.
The receiver decrypts the encryption and read the message from the sender.

  1. What 2 use-cases can public key cryptography be used for?

digital signature and encryption

1 Like

Describe the concept of public and private key with your own words.
Allows information to be sent one way from one participant to another securely eventhough there are others looking…a secret message/information that no one understands.

To do so, first the participant takes the private key and generates a public key. Second, the participant or anyone given the public key takes the message/information and encrypts it so nobody can understand it without the private key. Then the holder of the private key uses it to unencrypt the message/information. Or the private key holder generates a digital signature that anyone given the public key can use to verify that the holder is authentically the private key holder.

What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures to verify that you are who you say you are (authenticity). Crypto typically uses it for digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    [and] Public and private key pair is used in crypto world for digitally sign transaction, so it is known if the right owner has signed the transaction. Private-key is randomly generated value from which a public key is generated. This public-key serves as unique address for any user in cryptoworld. there is no way to derive private-key from public-key. so it is fully secure.
  2. What 2 use-cases can public key cryptography be used for?
    [and] Digitally signature and Encryption
1 Like
  1. Private keys are used to protect ones identity so to speak, while a public key is used to identify different users on a network and to encrypt data. The private key is used to decrypt data and is kept secret.

  2. private and public keys are used for purchasing crypto and having the transaction recorded on the blockchain. The keys are also used for sending and receiving messages and signing electronic documents

1 Like
  1. Private Key is a large random number generated by the system and with that private key we can derive the Public Key. This private and public keys are used in encrypting the transaction or providing the digital signature to a transaction
  2. Encryption and Digital signature of the transaction are the 2 use-cases
1 Like
  1. Public keys can be shared with anyone. Each public key comes paired with an unique private key. A private key makes sure only you make it through.

  2. Public keys can be used for encryptions and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

It’s a pair of key, where the private key is generated randomly and the public key is generated from the private key through a one way function, meaning is not possible to find the private key from the public.
Messages encrypted with the public key can be de-crypted with the private key and message signed withe the private key can be authenticated with the public key

  1. What 2 use-cases can public key cryptography be used for?
  • encryption. Message is encrypted with the public key and only the private key owner can de-crypt it
  • digital signature - message is signed with the private key and everyone can verify through the public key who the sender is

This two can be combined

1 Like
  1. Describe the concept of public and private key with your own words.

Each user on a network is identified with a unique public key. Data is encrypted by the sender with the end user’s public key. The end-user decrypts the data with his or her private key.

  1. What 2 use-cases can public-key cryptography be used for?

Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key / public key pair can be used to avoid people from reading information transmitted between two people on an “open” / “public” network. The private key is a random generated number which needs to be kept secret. The public key is derived from that private key. A message encrypted using the public key of a person can only be decrypted using the private key of that person.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signature

1 Like
  1. Private key is the key to my wallet, without it, my wallet is useless, more vulnerable to attacks, so it must be kept very safe and secure at all times, not to be shared with anyone. The public key is derived from the private key and can be shared with the world.

  2. Encryption and to verify.

1 Like
  1. Private key is any random number. Through a one-way function, we transform a private key into a public key.
  2. digital signatures; encryption
1 Like
  1. Public keys are derived from private keys. In bitcoin your private key is used to verify you are acting on your own behalf and it is important for security reasons that you keep your private key secret. It is impossible to figure out some ones private key from the public key.
  2. Public key cryptography can be used for digital signatures to verify the sender and also for message encryption.
1 Like

Private key is a certain set of numbers generated from your computer that only you will have access to. It can never be recovered or copied unless you provide it to someone. Your private key will then generated a public key that is linked to your private key for use in sending transactions or messages.

The two uses of using your public key is to sign a message or send crypto currencies

1 Like
  • Describe the concept of public and private key with your own words.
    Public key is what is visible to anyone and is used to encrypt transactions while the private key is only known to the wallet holder and allows them to access their crypto

  • What 2 use-cases can public key cryptography be used for?
    It’s used for verification purposes and security/encryption of the transactions

1 Like