Homework on Public and Private Keys - Questions

1- The public key is used to encrypt sensitive information and the private key decrypts the message.

2- one of the uses is encrypting informartion, and second we can use it to verify who send me the message.

2 Likes

ad.1. A private key is a randomly generated (using SHA-256 (might be different)) number which is processed in to a public key. The private key cannot be derived from the public key, but anything encrypted by the public key can only be decrypted by the private key.
ad.2. digital signatures and encrypting data

1 Like
  1. Public keys are shared with others to encrypt data, private keys are kept secret and are used to decrypt data.

  2. Public key encryption is used to encrypt data and also send it.

2 Likes

Private key is a large number that is randomly generated by a computer. Public key is derived from a private key by a special formula.

The 2 use cases are encryption and digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is my own secret key to my wallet. No body can enter my wallet with out my private key.
    The private key generate a public key, witch i use to sign messages/trancations and generate a bitcoin wallet adress to recive/send BTC.

  2. What 2 use-cases can public key cryptography be used for?
    Sign messages and generate wallet adresses to send and receive BTC:

1 Like
  1. A private key is a very huge random number the the computer generates. The public key is a large number that is generated from private key. The public key is shared on the network for either encrypting or creating address while the private key must be keep…well private. Otherwise who ever has you private key can read any message encrypted with you public key or sign a transaction from that address and steal you funds.
  2. Data encryption and and digital signature for identity integrity.
1 Like

Describe the concept of public and private key with your own words.

your public key is produced from your private key, you can Never find the private key just knowing the public key, but getting the public key if knowing the private key is no issue

What 2 use-cases can public key cryptography be used

Cryptocurrency and key public signing.

1 Like

A private key is your own personal key that cannot be accessed by anyone, This key is used to either decrypt msgs that was send specifically to you, and also this key is used to generate a unique signature to verify that it’s actually you.
A Public key is a generated key based on your private key that can be shared anywhere and through that anyone can send you either a encrypted (private) msg or a public open msg, and also it can be used to compare that public key with the signature to verify the sender.

I think somehow I managed to answer both of the questions with one short paragraph instead of 2 separate answers (If I understood the questions correctly)

1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is used to encrypt information and the private key is used to decrypt that information. The private key is used to sign transactions.

  2. What 2 use-cases can public key cryptography be used for?
    The two use cases are the ability to sign transactions using the private key and encryption. Cryptography with the use of private and public keys creates the solution for many security issues for the internet.

1 Like
  1. Private key is a unique combination of characters that are assigned to one particular ‘wallet.’ The private key is known only to the user unless divulged by the user. However the private key will be encrypted and verified in a hash function, however the address is not displayed publicly.

The public key is derived from the private key and is used to represent or identify the private key without giving away control of the private key. A good analogy for a private and public key relationship is an associate working for a company selling goods. The associate is a representative of the company and has the authority to confirm the transfer of goods but does not give away the contents of the company.

  1. Secure messaging and transaction record keeping.
1 Like
  1. The private key is used to sign messages sent to the receiver so they can confirm that it is sent by you by comparing the signature with the public key. The public key is always generated from the private key which is only known to you. It is what controls your information and if someone was able to get your private key they have access to everything. Since it is what is used to gain access to messages sent to you such as your coins.
  2. To create your bitcoin address and be given to others to send you messages.
1 Like

#1 - A privat / public key pair is a unique mathematical combination of two random numbers. Private keys, as the name already suggests, should always kept private. The public key can be shared within the public space.

#2 - Signing messages / encrypting messages

1 Like
  1. A public key is used to encrypt information which can only be decrypted with the use of the private key.

  2. Creating digital signatures to verify your identity and encrypting messages to secure communications.

1 Like
  1. Describe the concept of public and private key with your own words.
    The Private Key is used to derive the Public key.

The Sender Private key is used to generate a unique signature when a message is sent, the Sender Public Key is used to verify the message by the reciever. In this example, the message is only signed but not encrypted.

Where as the receivers Public key is user to encrypt the senders message, and the the receivers Private key is used to Decrypt the senders message for the receiver to read the message.

  1. What 2 use-cases can public key cryptography be used for?
    2.1) The (receiver’s) Public key can be used by the sender to encrypt a Hash address.
    2.2) The (receiver’s) Public key can be used by the receiver to verify a message from the sender. The sender’s Private key signed the message but the message was not encrypted.
1 Like
  1. Private keys are to be kept private/safe, but this number generates the public key which anyone can see.

  2. Encryption and digital signature

1 Like
  1. The computer first generates a random number, which is the private key. The user is the only one that knows what the key is and it’s used for example to encrypt sensitive information. From the private key the public key is then derived, which the public has access to.
  2. To send encrypted data to the host and to verify messages by signature.
2 Likes
1. Describe the concept of public and private key with your own words.

A private key is a random 256-bit number. This is usually generated by a wallet from 24 words. The public key is derived from the private key using a one way elliptic curve function.

2. What 2 use-cases can public key cryptography be used for?
  • Encryption/decryption: by sharing public keys person A can send a message to person B by encrypting the message with B’s public key. Then only way to read the message is with B’s private key.
  • Digital Signatures: to “sign” a transaction (or document) a digital signature can be created by hashing the transaction together with the private key. Then the transaction is sent along with that person’s signature and public key. The receiver can then verify mathematically that the only way the signature could have been generated was with the private key associated with the given public key.
1 Like
  1. Alright, a public key is created by a function receiving your sudo-unique/random private key as input. I say sudo-unique because there is a super small chance you get the same private key as someone else, but the chances are so high that it is deemed infeasible. This function will guarantee a unique public key generation from this sudo-unique/random private key. You will always be able to find the public key from the private key, but not vice-versa. The public key is then used to generate a public bitcoin address.
  2. Encryption and Digital Signatures.
2 Likes
  1. Describe the concept of public and private key with your own words.

Public and private keys together allow transactions to be processed. A private key is a random large number, and the public key is created by applying an equation to the private key. It is infeasible to decode the private key from having only the public key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signature.

2 Likes

1.The Public key is a set of numbers which are available for everyone to see and available for everyone to send encrypted information to.
A Private key is a set of numbers which no-one else knows and only you have access to.
A private key can produce a public key but none can find your private key through the public key.
2. Public key cryptography can be used to receive encrypted information and receive digitally signatured crypto currency

2 Likes