-
The concept of a Public key is similar to an email address expect its your bitcoin wallet, and the concept of a private key is like your password to your email account except its the password to your wallet. Its allows for verification
-
Encryption and Digital Signatures
[
[quote=“ivan, post:1, topic:8431, full:true”]
Homework on Public and Private Keys - Questions
1. Describe the concept of public and private key with your own words. One key ( public key ) is used for encrypt the plain text to convert it into cipher text and another key ( private key ) is used by receiver to decrypt the cipher text to read the message.
2. What 2 use-cases can public key cryptography be used for? Digital Signature & Encryption
[/quote]…
The private key is a 64 hexadecimal code. Thorugh encryption from the private key a public key is created. This is a one way road. You cannot find the private key through the public key.
Your wallet (bitcoin) adress is created by a hash from the public key.
2. Signing the transaction and create an adress
-
The concept of private and public keys is very basic. It is basically just that you have one key the private and with that you generate the public. This allows you to decipher anything that is encrypted via the public key. so if someone sent me a message using my public key I am the only one that can decrypt it with my private key.
-
The 2 use cases are for security and to be used as a digital signature. meaning if you want or need to send / receive encrypted messages you can use these keys. In the sense of a digital signature, it can be used sign a message you have sent.
1.Describe the concept of public and private key with your own words
Public and private keys are important components in the public key cryptography process. The private key is used to create a public key. The public key is then used to create to create an encrypted message that can can only opened using the private key.
2.What 2 use-cases can public key cryptography be used for?
Encryption and Digital signatures, These two use cases are really about identification and insure the integrity of a message.
-
A private key is what you use to sign transactions (or in the case of encryption, decrypt messages). This is randomly generated and is your digital signature that says x transaction is yours.
A public key is generated from the private key and can only be unlocked by your private key > this is what is shared with others but only your private key can unlock what goes to its corresponding public key. You can get a public key from a given private key, but cannot get a private key from the public key. Thus, if someone gets your private key, they can “sign” for you, meaning they have access to your funds. If you lose your private key, you can no longer sign and your funds are lost. -
Encryption and Digital Signatures
-
A private key is a randomly generated number that can be used to decrypt messages or sign digital transactions. Keep it safe! A public key is formulated from a private key and is shared to the public. A public key can be generated from a private key, but it is a one way function and therefore a private key can never be generated from a public key.
-
Two use-cases include encryption and digital signatures.
-
The public/private key concept is used to communicate sensitive information over an unsecure medium - like the internet, where outsiders can listen in on the dialogue. The receiver Generates and holds a private key and through special functions generates a public key that is attached to the private key. That public key is free for all to use. The public key can be used to encrypt the message going to the receiver. Only the private key - known only by the receiver - can decrypt and hence understand the message.
-
The two common use cases are: encryption and digital signature
1 a public key is a key that is generated from your private key and is safe to give to anyone .
a private key is a random generated number that you should keep only for yourself as it can be used as proof or verification when you make a transaction and also no one can ever guess your private key based on your public key which makes it a very secure way to transact money (for example)
2 for encription and for digital signitures
- The private key is the key that only I know and I use to generate a public key. Through the public key, I can share data with others. The private key is used by us to sign data, the public key is used by the others the send us data.
- Encryption and digital signatures.
1
Public and private keys are strings of letters and numbers without spaces. The public key is generated by a formula reading the private key in a way that’s impossible to do a reverse operation: It will be impossible to reconstruct the private key from the public one, possibly exposed by the owner on his social accounts.
2
One case is the message encryption, the other is digital signature (used in the Bitcoin blockchain). The private key on BTC is a random string with the particularity to be unique, as we can say it’s impossible to randomly generate, in another occasion, the same one.
- A public key is generated from a private key, never the opposite way, as it is a one way function. If we want to send a message, we can encrypt it with the public key and decrypt with the private key.
Any legit private and public key is a legit bitcoin address.
When you want to send bitcoin you have to use your private key, if you loose it, you have lost your bitcoin. - Public keys can be used for:
a) Encryption
b) Digital signatures - which are about verifying who sent a particular message or transaction. The signature shows that a public key was created by a private key.
1 - The private key is my personal key that allows me to read messages sent to myself using my public key. The public key is generated from my private key though a one way system that doesn’t allow from the public key to find the private key. In cryptography my public key is available to anyone who wants to send me a private message that only myself will be able to decrypt with my private key.
2 - The use cases for public key cryptography are: Digital signatures (as in crypto), or encrypted messages (PGP)
-
A private key is a randomly generated number by your computer when you create a bitcoin wallet. The public key is generated from the private key, this is one way function i.e. private to public but not public to private. This is critical as if someone has access to your private key they have access to your wallet. Public keys are available for anyone on the network and is essentially your Bitcoin address for receiving bitcoin.
-
Cryptography and Digital Signatures.
- private key is a big random number that should be stored securely as a secret , public key is derived from private key by applying hash function algorithms ,
- public key cryptography can be used in cryptographic messaging either for encoding the complete message contents or just to sign and prove origin of message ( “prof of source” = digital-signature )
- Describe the concept of public and private key with your own words.
They are a key pair (the public key is generated from the private key, which is a random number generated by the computer) that when used together can encrypt and decrypt data, and for signing data. - What 2 use-cases can public key cryptography be used for?
Encryption of data and signing of data.
-
Private key is basically your private identification to keep your assets safe while public key is open for the public to see .
-
Public can be used to send messages and transactions .
-
Public keys are the keys that are used and can be seen by all on the internet. This is like your credit card number that you list on a web site to use to by products. Private keys are used in conjunction with the public keys to verify who you are. The credit card analogy would use another number that would not be seen on the internet that would be private that would be used some how without making it visible to all on the internet.
-
The two use cases for using public key cryptography are:
A. Encryption - where the public key of the receiver of the message is encrypted by the sender, then bobs private keys would be used to open and be able to read the encrypted message.
B. Digital signature is just the opposite. The public key of the message receiver is used by the sender to match the private key of the sender who has originally sent her private key to the receiver to read the message.
-
Public key is a numerical value visible to the public and is generated automatically using mathematical algorithms and is generally used to receive encrypted messages.
Private key is, as the word say, private and should not be shared with anyone. -
Public keys in cryptography are used for encryption and especially digital signatures: Alice sends a message to Bob using her private key to sign the message so, when the message arrives, Bob verifies that the message has been signed by Alice by comparing the private key on the message with her Public Key
-
Describe the concept of public and private key with your own words
Public and private keys are a are a one-way function used to verify information or transactions, send private messages or verify who sent a message. -
What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures.