-
A public key can be shared. It is derived from the private key which is kept secret. Data is sent using the public key and is decrypted using the private key. The private key can not be discovered if you have the public key, the private key is always kept secret and safe.
-
Two use-cases for public key cryptography cases are encryption and digital signatures.
-
Describe the concept of public and private key with your own words.
Private key is a random number that gives you the possibilitie to decrypt a message that
was sending for antoher person and Public Key is derived for the Private Key.
Example:
Alice wants to send a message to Bob ( message is encrypted by Public Key´s Bob and
them in order to see the message Bob has to use his Private Key to decrypt. -
What 2 use-cases can public key cryptography be used for?
- Encryption
- Digital Signature
Alice has to send a message to Bob ( Alice sign the message for her private key , in order to
Bob knows who is the person that send this message. He knows that this private key comes for a Public key from Alice.
-
Describe the concept of public and private key with your own words. A private key is an alphanumeric code that acts as a cryptographic key and can be used to create a paired public key that can be shared with others. The private key can be used to create a digital signature that may be verified using the corresponding public key or to encrypt information that can be decrypted with private key.
-
What 2 use-cases can public key cryptography be used for? Encrypting messages and digital signatures.
-
Describe the concept of public and private key with your own words.
Private key is random number. Public key is derived from the private key. -
What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures
Homework on Public and Private Keys - Questions
- Describe the concept of public and private key with your own words.
Public Kay is generated from Private Kay and it can happen one way, meaning, its one way function. You cant get Private Kay from Public Kay. Public Kay is mant to see by everyone, but Private Kay should be keept with yourself and never shared with anyone.
- What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signature.
HELLO.
CAN SOMEONE EXPLAIN IS IT POSSIBLE TO HIDE ORIGIN ADRESS OR DO TRANSACTIONS WHERE YOU CANT FALLOW ADRESS WHO IS DOING TRANSACTIONS, EVEN ITS DIGITALY SIGNED WITH PRIVATE KAYâS.
HOW HACKERS CAN HIDE THIS IF THAY WANNA GET OUT/SEND MONEY(VALUE) AROUND TO THE POINT WHERE THAY CAN GET FIAT?
**[quote=âivan, post:1, topic:8431, full:trueâ]
Homework on Public and Private Keys - Questions
- Describe the concept of public and private key with your own words.
- What 2 use-cases can public key cryptography be used for?
[/quote]
**
- A private key can be used to generate a public key. This is a cryptographic technique that is unidirectional in that the private key can always generate the public key but the public key can never generate the private key.
- Public key cryptography can be used to encrypt messages and for digital signatures.
-
Describe the concept of public and private key with your own words.
A public key/private key pair is generated by hashing a seed phrase to get the private key then
hashing the private key to obtain a unidirectional public key.
The public key is shared openly and the key private remains secret to the holder. The holder can
then use the private key to âsignâ or authorize a transmission of data to another person.
When that person receives the transmission, they can use the sendersâ public key (through magic,
at this point in my learning) to verify the sender is legitimate. -
What 2 use-cases can public key cryptography be used for?
a) E-mails
b) Cryptocurrency
- public key makes it possible to communicate securely with people(you do or donât know) across the internet by enabling you to identify them and encrypt your communications. Having both a public key and private key is necessary for this process.
1. Describe the concept of public and private key with your own words.
public key is shared
* Encrypt message uses public key.
* Encrypted message can only be read using private key.
Private key cryptography
* Generate a random#
* Generate a public key using private key(random#)
One way function(private key produces public key).
2. What 2 use-cases can public key cryptography be used for?
a. Use case(1)- encryption -send message on open network
b. Use case(2)- digital signature to identify oneself.
-
Public key cryptography plays a vital role in securing digital communication and data. It relies on a pair of cryptographic keys: a public key and a private key. These keys collaborate to ensure the confidentiality, integrity, and authenticity of information. In essence, the public key is used for encryption, while the private key is employed for decryption. This method provides a robust and efficient means of safeguarding data in the digital world.
-
Public key cryptography can be used for sending messages, short or large amounts of data such as in emails or in messaging apps. It can also be used for digital signatures and authentication.
A private key is a random number generated by my computer which is then hashed into a public key that can be displayed publicly. Bitcoin adds another layer of security by generating a bitcoin address.
Encryption and Digital Signatures.
- A private key is a large unique number generated by a computer. Then through a special mathematic formula, a public key can be created, which can trace back to the original private key. The private key is to be kept secret by the individual, and the public key can be shared without fear.
- Digital signatures and encryption.
- The public key is available to anyone and can be used to encrypt and verify messages. The private key is required to decrypt and to sign messages.
- Encrypted communication and signing of messages.
- Public Key: derived from the Private key. The private key is a random number that acts as a key.
- Encryption and digital signatures.
Describe the concept of public and private key with your own words.
Using the public Key of a person you can encript a message for this specific person. Because the public key of this person was produced out of his/her private key, this person only can open the message (Encryption). Therefore there is a mathematical relationship between the private and the public key that enables the encrpytion in a way that only the sender and receiver can âreadâ the messages.
What 2 use-cases can public key cryptography be used for?
No. 1: Sending encripted messages and No. 2: Digital-Signatures
- The concept of public and private key is used for identification or encryption purposes.
- Identification and encryption
- Describe the concept of public and private key with your own words.
User generates a very large number as a private key. a public key is generated through a math function. I share the public key not the private. If the private is key is compromised there is no more security.
THe private key can be used to certify (sign) or decrypt, and the public key can be used to double check the signature of a message and encrypt a message.
- What 2 use-cases can public key cryptography be used for?
Encryption and digital signature and identity
- Private Key is the large random number generated. Public key is derive from encrypting the private key and is viewable to all. Only you cannot derive private key from public key.
- Emails and Cryptocurrencies
-
Public keys are used for encryption and digital signatures for example identification and integrity. Public keys can be shared with the public and have no risk. Private keys should be kept private and should not be shared. If stolen or lost the person who finds it can have access to your account.
-
Encryption and digital signatures.