Homework on Public and Private Keys - Questions

Public keys allow transactions to happen but in a one-way system. These public keys make it impossible for the recipient of a transaction to view the transaction source, which is the private keys.

  1. Sending BTC and payments using a digital sig
1 Like
  1. A public key is what everyone can see, it is public. A Private key is literally the key to your “vault” it should be kept secret.
    The public key is generated from the private key so that they are related and connected.

  2. You can use public key cryptography for encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is derived from the private key and can be shared with others. The private key is meant to be kept secure by the holder and is used to decrypt the message.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures. Encryption is a key use case of public key cryptography. It permits sending of messages securely through an open communication channel. The public key is used to encrypt the message. The message can only be decrypted with the associated private key. Only the holder of the private key can decrypt the message.

    Digital signatures are used for the verification of identity, digital signatures are used in
    cryptocurrencies like Bitcoin. The private key is used to sign the message, the recipient can
    verify mathematically that the signature is originating from the private key that generated the public key. When Bitcoin transactions are sent, the private key signs any transactions the user executes

1 Like

[quote=“ivan, post:1, topic:8431, full:true”]
Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
  • Private key is computer geenrated unique random number allocated to a user - it is accessed via a public key.
  • The public key is calculated from the private key via a hash algorythm and is both unique and cannot be used to calculate the private key. Payments to the private key can be made using this public key.
  1. What 2 use-cases can public key cryptography be used for?
  • Digital signature verification.
  • To verify a transaction
1 Like

PK cryptography can also be used for encryption which would be the other use case. :slight_smile:

1 Like

1.Describe the concept of public and private key with your own words.

A public key is generated from a private key that the whole world can view and communicate with.

A private key is something that should be kept secret and not shared also every signature is required if lost then you cannot access it. I like to think of it as your Pincode that cannot be changed.

  1. What 2 use-cases can public key cryptography be used for?

It can be used for encryption and digital signatures, the encryption creates a public key that can only be created through a private key to interact with the network, and the digital signature is used to verify who sent you that exact message and to see if its even legit.

1 Like
  1. Encryption – Message encrypted with a public key can only be decrypted with the private key that is paired with this public key.

  2. Digital signatures – You can use your private key to sign and create a signature. With this signature and the public key, the receiver can verify that these two match and come from your private key and that you are the sender.

1 Like
  1. Describe the concept of public and private key with your own words.a public key is a key that evryone can see on the network no mather who now a private key is where let say ariel would want to send a message to ivan well ivan can only read it by encrypting his public key and then his private key to then make the message readable
  2. What 2 use-cases can public key cryptography be used for? cryptocurrencies and also encrypted PGP messages
1 Like
  1. A public Key can be share with everyone and the private key is kept secret never available to the public.
  2. Public key cryptography can be used for encryptions and digital signatures.
1 Like
  1. A private key is a randomly generated number which is use as proof of ownership and should be kept secret and a pubic key is a number generated from the private key which can be shared with the pubic and is used to identify the account related to the private key without giving access to the account.

  2. It can be used for encryption and authentication.

1 Like
  1. Public keys are unique keys/values derived from your private key. This public key is what’s supposed to be given out and shown publicly for transactions and communications to you. The private key is your own personal and secret value/key that is generated randomly and unique. Private keys can be generated into public keys but it cannot be the other way around.

  2. Encryption and signatures. Encryption because cryptography hides and secures your private key and is completely random at the same time, unique. This way there is absolutely no way for anyone to be able to brute-force their way in. Signatures because everyone can see your public key. If you generate a new private key specifically for something like a message, they can check it with your public key to see if it was derived from it. If it is true, it means that it truly came from you, and can be easily verified to avoid impostors.

1 Like
  1. They are a pair of large numbers. Private key is randomly generated number that a Public or Private key can be generated from.

  2. 2 uses for this are to encrypt messages or to create a digital signature.

2 Likes
  1. public and private key
    public key is the key use to encrypt data and private key is to decrypt data.
  2. 2 use-cases for public key cryptography used for?
    public keys are use for encryption and generate digital signatures
    an example of digital signatures:
    some other application using public-keys: IPsec (VPNs) and SSH (secure shell )
2 Likes
  1. A person can use a public key to decrypt a message and Ithe receiver of the message is the holder of the private key and can decrypt the message .
  2. Other use cases include sending encrypted messages and use it as digital signature.
1 Like
  1. Describe the concept of public and private key with your own words.
    Public and private keys are used to encrypt and decrypt messages. Private keys are made from a large random number which then a public key is derived. Encrypted messages can only be decrypted by the recipient who has the private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures

1 Like
  • Describe the concept of public and private key with your own words.

    Public and private keys make up a users address. Private keys are a completely random set of numbers that are impossible to guess. Public keys are then derived from private keys using hash functions which cannot be reversed.

  • What 2 use-cases can public key cryptography be used for?

Public key cryptography can be used for encryption or as digital signatures. One could encrypt a message or transaction using the receiver’s public key. The receiver would then only be able to open the encrypted message if they had their private key. Digital signatures are a way of signing a message (or transaction) with your private key. This signature can be then compared to your public key and verify that you are really the sender.

1 Like
  1. Describe the concept of public and private key with your own words.

A public-private key pair is used in Bitcoin. A public key is a key exposed to the public eye, that anyone can see. A private key should always be kept private and never ever share with anyone, nor publish or post online. Example: if Maria wishes to send Pepe a encrypted message, she generates a public key that can derive a private key. Maria then sends Pepe the public key, with which Pepe can derive his own private key to open the message.

  1. What 2 use-cases can public key cryptography be used for?
    The 2 main use cases are digital signatures (identity integration) and bitcoin transactions.
1 Like
  1. Describe the concept of public and private key with your own words.

Public and private keys are used as a signature/addresses. Private key is your personal set of numbers that keeps your information secure. You can use the private key as your signature to verify that it is linked to you. The public key can be shared everywhere and is based on the private key.

  1. What 2 use-cases can public key cryptography be used for?

Public key cryptography can be used for encryption and/or as a digital signature.

1 Like

Homework-Public and Private Key Cryptography

  1. Describe the concept of public and private key with your own words
    Public and private key pairs: A randomly generated private key has its public key pair, which is visible to the public. The private key, however, is private and must always be kept secret from all by its owner. It is impossible to derive the private key from the public key. For example, if A wants to send a message to B, A can encrypt the message with B’s public key, and nobody will be able to decipher the message except B since B has the private key that generated the public key with which the message was encrypted. The private key must always be kept secure and safe because losing it means losing access to what it protects.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used for (1) encryption and (2) Digital Signatures, which is used in cryptocurrency as the means to verify signature. In transactions, the receiver compares the sender’s public key and digital signature for verification

1 Like
  1. Private keys are unique to each individual. Public keys are public. Private keys can be used to encrypt info so it can be shared with others. This makes it safe to send sensitive information over an unsecured network
  2. For signing anything digital that needs your signature. Also to Encrypt a message
1 Like