Homework on Public and Private Keys - Questions

  1. A private key is essentially decrypts the information that was encrypted derived from the public key.
  2. Encryption and digital signatures.
1 Like
  1. A private key is a large, randomly generated number that is kept secret. This number is used with a hash function to generate a public key which can be shared with others.
  2. Public key cryptography can be used for data encryption or for digital signatures.
1 Like
  1. A private key is a randomly generated sequence unique to you, used to prove ownership of your funds. A public key is a sequence derived from the private key and is available to anyone, used to receive funds securely.

  2. Public keys are used to encrypt/decrypt transactions and verify digital signatures.

1 Like
  1. They are generated as a pair starting with a private key, which takes the form of series of randomly selected words. The private key is uniques and personal. It must be kept safe in order to keep your wallet safe.

This private key is then converted into a public key by your computer via hash functioning. This is available to see and is a string of digits and letters that represent your unique private key.

Public and private keys are one way functioning. A private key will unable to you to access a public key and then a Bitcoin address, but you can not reverse this access route.

  1. a) Encryption for anonymity
    b) Digital signatures for verifying who sent a particular message.
1 Like
  1. The private key is a randomly generated number. The public key is a number which is derived from the private key. It is not possible to take the public key and figure out the private key.

  2. Encryption of messages and digital signature for sending or receiveing crypto currencies.

1 Like

1.Private key is unique and secured created for user whereas public key is derived from private key and used for digital transactions
2.Public key can used for digital signatures and also for keeping bitcoin address to way more secure the transaction

1 Like
  1. A private key is a random number. The private key creates the public key through a formula that is then used for public to see and use. When someone sends an encrypted message on a public forum to a recipient the recipient of that specific public key is the only one who can encrypt it with their connected private key and read what the “secret” message is. A private key can create a public key which can then create a bitcoin address. It is a linear process. You can never find the private key by going the other direction.

  2. Public Key Encryption can be used for creating a bitcoin address and transactions. The public key is used for people to send and receive bitcoin from one’s bitcoin address. It can also be used for digital signatures. A signature can be verified as to who or what address the signature came from because the public key number is mathematically associated with a private key number. It is used to verify the authentication of the identity of the signature.

1 Like
  1. I digital signature and bank account
  2. Can prevent fraud with a verifiable digital signature and adds a level of privacy to basic day to day transactions
1 Like

Homework on Public and Private Keys - Questions

1. Describe the concept of public and private key with your own words.
Private keys and public keys are large prime numbers used for transferring data securely. Public key is derived from the private key. Public key is used to encrypt the data for the intended recipient and whatever is encrypted by the public key can only be decrypted by the associated private key.
In short:
Public key is used to encrypt the data whereas Private key is used to decrypt data and also to create digital signature without revealing the key.

2. What 2 use-cases can public key cryptography be used for?
Public key Cryptography can be used for :

  • Encryption
  • Digital Signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a randomly generated number while a public key is derived from the private key. The public key encrypts information while the private key will decrypt the information.

  2. What 2 use-cases can public key cryptography be used for?
    for encryption such as sending a message and digital signatures like knowing who sent a message.

1 Like
  1. Private key is your main key that you have to keep save , to do that you genererate a public key so you can be in contact with others without them knowing your private key

  2. Sending encrypted messages
    Verifying you are actually “communicating” with the right person

1 Like

Describe the concept of public and private key with your own words

Private key is a univoque, large-sized RANDOM number automatically generated Public key is a number generated from the Private key by, simply speaking, a mathematical formula. Its’s both physically and mathematically impossible to get the Private key from a Public key since this mathematical equation is impossible to reverse (Trap-door function)

What 2 use-cases can public key cryptography be used for?

Basically to verify and guarantee a digital transaction using public key like a sort of digital signature

== Thank to marsrvr who shared that super handful image above :clap: :facepunch:

1 Public key is the public sequence of numbers and words, that everyone has access to, and also is one way derived from the private key.Private key should be only known to the owner of the public key and address, and it is use to decrypt or sign a message.
2 To encrypt a message, or to check for the signer of the given message.

1 Like

Using a private key to generate a public key allows two or more parties to communicate in private over a public network.

Public key cryptography is used for encryption and digital signatures.

1 Like
  1. A mathematical computer generates a private key …then that private key generates public key …the public key is for receiving from public…then the private key is used as a signature for your public key in case of confirmation or verification.

  2. It can be use for hiding private massage and also it can be used to recieve funds from other crypto addresses.

1 Like
  1. When you use public and private key cryptography, you generate a private key, and then derive a public key from it. The public key is public, that is, you can give it to anyone, and they will be able to do something with it (it depends on the use case of this technology). The private key must remain accessible to you only. And the main thing is that you have some cryptographic relationship between this two keys. In one use case, you can decode a message signed with a public key only using your private key, allowing secure messaging. In another use case, you can verify signatures that were made using the private key with the public key.
  2. 1 - Secure messaging through an open channel. 2 - digital signatures.
1 Like
  1. Private key is a random number that is generated by my computer. We use a one-way cryptographic function to generate a public key, which can be open to public. Bitcoin adds one more layer of security and generates bitcoin address.
  2. Encyption and Digital Signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    A computer generates a large random number thus creating a private key. Then from the
    private key a number is derived (mathematically) producing the public key.

  2. What 2 use-cases can public key cryptography be used for?

    • The concept can be used for;
  • encrypting a message on a public platform.
  • authenticating a message by an encrypted private key signature
1 Like
  1. Private key is randomly generated should be kept safe to prevent loss of information. Public key is generated from private key as your identifier.
  2. Digital signature, encryption
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key could be thought of as your mailing address, anyone who wishes to send me anything from cryptocurrency to other digital assets, could be sent to my public key. In laymen terms, my private key could be thought of as my private combination to my secret vault, if anyone finds out what that information is, they will have access to all my information and assets.

  2. What 2 use-cases can public key cryptography be used for? Encryption and Digital Signatures.

1 Like