Homework on Public and Private Keys - Questions

1. Describe the concept of public and private keys in your own words.
The private key is an extremely large random number generated by the computer. It is meant to be kept private. The public key is created from the private key through a complicated mathematical algorithm that is one-way (process cannot be reversed).

2. What two use-cases can public key cryptography be used for?
a) encryption
b) digital signatures

2 Likes
  1. Describe the concept of public and private key with your own words.
    The public and private key are encrypt long information wich are used trough insecurity environment …The public key is generated from private key
  2. What 2 use-cases can public key cryptography be used for?

-To Digital Sign
-To send and received information

2 Likes
  1. A public key is derived from the private key. It can only go one way meaning you cannot figure out the private key by seeing the public key. It allows for transactions to be made anonymously on an open network, but the encryption ensures that it is always secure for both users in the transaction.

  2. One use case would be financial transactions to send money to someone or receive money.
    A second use case would be to sign certain documents securely over the internet.

2 Likes
  1. Public key everyone can see and it is a way to send you digital messages etc. It is almost like your email address. You Private key only you have access to and it can unlock encrypted messages etc that has been sent to you. Private key will also create your public key.

  2. Encryption and digital signatures or ID

2 Likes
  1. confidential password, public address

  2. digital signature and encryption

2 Likes
  1. computer generate random number it creates private key, then with private key and formula creates public key. Public key is public, private key need to kept secret. A wants to send message to B. A sign message with private key with creates signature for the message. B will confirm signature is from A private key with A public key.

  2. For security and digital signature.

2 Likes
  1. private key is created for user to keep private which also generates a public key that others can see when interacting.

  2. encryption and signatures

2 Likes

1 The very long and complex private key is the source from which the public key is generated

2 The PubK is used to validate that the message comes from the specific PriK without revealing it. it is also used to sign a transaction

2 Likes

1.) a private key is like your code for your treasure that nobody should have. you are the only one if someones steals the password you lose everything.

2.) Public key is derived from private key but nobody can access your private key with the public. it basicly assures that the person receives the transactions.

2 Likes

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A// Private key is a ramdom number that is generated and with that number you can have access to messages , money , information which have a relationship with encryption, this private key is only for your own and with a mathematical procedure is created the public key which allow to see by the public and other persons can encrypt with that public key but only the owner of the private key can see what contains.

  2. What 2 use-cases can public key cryptography be used for?
    A// send messages,money,verify who send what

2 Likes
  1. Private key is a random number generated on your computer, that is only visible to you. A public key is also a randomly generated number which is derived from the the private key. You can’t trace back to the te private key because the derivation process used the hash function for it to be irreversible. The public key is visible to everyone. Once you create a private and a public key you have access to all the Bitcoin operations imaginable.

  2. Cryptography can be used for encryption and making digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.
  • It’s all in the name. A private key should be kept private and never shared, it is also the identifier in which proves ownership over itself, its public key, and any other addresses connected, such as a Bitcoin address. A public key however is that which you can share with others to receive data, whether that be media, finance, etc.
  1. What 2 use-cases can public key cryptography be used for?
  • Encryption (allowing you to share over a private forum)
  • Digital Signatures (identification and verification)
2 Likes
  1. Private Keys are random numbers generated for encryption and digital signatures. One must keep their private key private and in secret. If you don’t do that other may use your private keys to perform digital signatures and encryption using your key. In the crypto universe it means that you have lost control to your funds.

Public keys are derived from private keys and can be shared with others. Today there is no way to go from a public key to a private key in the bitcoin network.

  1. Public key cryptography can be used in encryption and for digital signatures.
2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is like your secret code or a password only you will know and a public key is like an account number which every one can see.
    Private key is made by sender holding a package (ie token)- its encrypted into a public key which anyone can see but cant be opened then the receiver used the private key to open or verify

  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures

1 Like
  1. Public key is to be shared with anyone. Private key is only for you and NOT to be shared.
  2. Encrypted and Digital Signatures.
1 Like

a public key is generated from the private key both are random but also calculated randomly? he did say it gets complicated so i assume he explains it further on and surely this cant be all there is for an explanation as to the inner workings of the task. but a private key can be “dog cat far tap lap run fun sun one sum pub bum rap sap nap yay hey say way day” and then the public key can generate using a hash function of sha 256 probably i think idk but hash it up and then you get a public key like “7etw6234trcv23ut6rd28364dt23etdutg3” total nonsense i know but i am not trying to think of more 3 letter words ok that was all of em. but yeah a random set of numbers and characters will appear as a public key but i did not understand the concept of how it can be used as a signature when it relies on using the private key?? so if you could help me with that that’d be cool. next question sorry for the fuckin essay. um public key cryptography can be used for digital signatures and private conversations? i seem to have forgotten but i am being honest about my retention of information and i will be better next questions sorry…

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is for yourself, and can generate a Public key to control and verify transactions shared in the public blockchain.
  2. What 2 use-cases can public key cryptography be used for?
    Sending encrypted data (messages or transactions) through digital signature and/or verification.
1 Like
  1. Describe the concept of public and private key with your own words.
  • Private key:
    Random/pseudorandomly generated string of an acceptable length that would be unfeasible to guess within the lifetime of value for the message / data. This Private key (priv-key) would be used to create and validate a key that anyone can use.
  • Public Key:
    The key used to encrypt a message / data for decryption by the key that created it.
  1. What 2 use-cases can public key cryptography be used for?
  • Use cases are
  1. Securing website data
  2. Secure Shell (SSH) for remote access to online resources
  3. Signatures in the realm of CryptoCurrency
1 Like

Hash functions like SHA256 are not used to derive public keys, for that the elliptic curve function is used.

This video will answer your question https://www.youtube.com/watch?v=Aq3a-_O2NcI&t=586s

  1. Describe the concept of public and private key with your own words.

The concept of public and private keys is to uphold the anonymity & integrity of raw data that is held within a profile. They are randomly generated by your computer. The private key is the access pathway to your personal data & it produces a public key that is derived from your private key & this is used as a destination for the public to send encrypted messages to you that only the private key can decrypt.
You can never calculate the private key from the public key, it is also unidirectional and solved in a linear manner.

  1. What 2 use-cases can public key cryptography be used for?

Use-case 1 is to send and receive encrypted messages or data.

Use-case 2 is to digitally sign a process of data with your private key. Where somebody would send data to your public key & you would then be able to sign and send it from your private key, without anybody having exposure of their private key, information or data.

1 Like