Homework on Public and Private Keys - Questions

  1. A public key is derived from a private key. The private key is generated randomly and cannot be derived from the public key.

  2. A public key can be used to encrypt a message and to verify a digital signature.

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key should be kept secret and can be used to decrypt and sign data.
    The public key can be shared publicly and is used to encrypt and verify data.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures
1 Like

I write a unique answer.
The private key is the one you keep secret and you need to decrypt the messages that come to you from someone who has encrypted them use your public key. The private key is also used to sign the messages you send to a person so that he can verify that it is you who sent the message, using your public key. The public key instead is shared with the whole network and is used to allow others to send you messages (or other) or to verify your identity.

1 Like
  1. Public and private keys are like a post office box. Anyone can know and utilize the public key address, as the physical post office box address, but only the owner of the post office box can access the mail that the post office box receives, by using the key to the post office box.

  2. Two use-cases of public key cryptography are digital signatures and encryption. Digital signatures are great for verifying the integrity of files, to know that a downloaded file hasn’t been compromised. Encryption is great for sending messages in public channels, such that only the recipient will be able to decipher the messages.

1 Like
  1. A private key is a belongs to you only, it allows only you to send transactions from your account. A public key is generated by your private key that allows someone to send funds/data to your account.
  2. Encryption and digital signatures.
1 Like
  1. You can generate your private key, which is large random number. Then you can generate public key out of this private key, which is low on computation power. It is extremely hard to do reverse, which is generate private key given public key (very high computational power). Then you can publish you public key, which can be used to verify your digital signature. You are the only one who can create digital signature, because no one else has your private key.
  2. Encryption and Digital signatures.
1 Like

1.Bitcoin as well as all other major cryptocurrencies that came after it, is built upon public key cryptography, a cryptographic system that uses pairs of keys public keys which are publicly known and essential for identification, and private keys which are kept secret and are used for authentication and encryption.

2.Encyption and Digital Signatures

1 Like
  1.  Describe the concept of public and private key with your own words.
    

Wallet keys provides the means, a bridge, and handle to facilitate transactions

  1.  What 2 use-cases can public key cryptography be used for?
    

Encryption and Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.

The concept of a public and private key centers around the need to be able to transfer sensitive private information confidentially over the public internet. A private key is a randomly generated complex key that is then used as the source to generate a public key. A digital message or file is then encrypted with the private key which can later be decoded with the public key.

  1. What 2 use-cases can public key cryptography be used for?

Two use-cases for which public keys can be implemented include the encryption of digital files, and for digital signatures which can be used to verify identity on the web.

1 Like
  1. It is possible to generate public key using private key, but not vice versa. Public key is available to everyone.

  2. Following uses of private-public key :
    A. ENCRYPTION
    Alice needs to send data to Bob. Bob will generate a public key using private key. Alice will now encrypt message using Bob’s public key. Now only Bob will be able to read messages using his private key.
    B. DIGITAL SIGNATURE
    Bob needs to verify that the money actually came from Alice. Alice will sign the transaction using her private key. Bob can then use Alice’s public key and signature and verify the transaction through a formula.

1 Like
  1. Public key can be visible to anyone while private key should be kept secure at all times. An example of a public key can be an early address of Bitcoin, while private key is used to send transactions from this address.

  2. Digital signature of documents and encryption of messages.

1 Like
  1. The Private Key is a random number picked by a client, which the public key is derived from. Public keys can not be used to find the it’s associated Private key though.

  2. The two uses of public key cryptography are Encryption and Digital Signatures/ Integrity of transactions or verification of message senders.

1 Like
  1. Describe the concept of public and private key with your own words. Public key is the key that is opened or signed by the private key, the public one is accessible and the private key can not be found with just public key

  2. What 2 use-cases can public key cryptography be used for? Public key for use in anycase of QR code data transmission. All of the QR code readable ways to save a specific data set into the code, Public Bank information to pay fines for Example can have a public crypotgraphically encoded data set.

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    The private key is a randomly generated number and should be kept very secret. The public key is generated by the private key and can be shared anywhere without the risk of losing your funds.

  2. What 2 use-cases can public key cryptography be used for?
    It can be used for either encryption of data/massages or signing bitcoin transactions

1 Like
  1. The public key is known to everyone, it is derived from the private key through a one-way function, meaning that it is infeasible to determine the private key from the public key.
  2. it can be used for identification and to sign messages, or transaction in the case of bitcoin. Basically, the sender sign the message with its private key. The receiver sees the signature and the public key of the sender and given these he can verify that the message was sign with the private key that generates the sender’s public key.
1 Like
  1. A private key is used to sign a bitcoin transaction. A private key is generated when you open a wallet. The public key is then generated from the private key.
    You cannot reverse this direction it flows in this direction.
    A public key is shared. So Alice can take Bobs public key to send a message (not crypto) encryption.

  2. a.Encryption b. Digital Signatures

1 Like

A private key is any number which is generated and then from the private key a public key is generated. Public key is only revealed publicly. It is impossible to find out the private key through the public key.

The two use cases are encrypting messages and signing transactions.

1 Like
  1. A public key is shared with everyone, it is generated from the private key that only you should have access to.
  2. By using the private and public key together you benefit from encryption (sending a massage that no one can read unless they have the private key). And use digital signatures that ensure that you are the one that has signed the massage.
1 Like
  1. The public key encrypts the message then the private key is used to decrypt the message.

  2. Digital signatures and encryption.

1 - A private key is a randomly chosen, very large number. Utilising a mathematical formula a public key is derived from this private key. With today’s current technology it is not feasible to defer the private key based on knowing only the public key. Any data that was encrypted with either public or private key can only be decrypted by its counterpart.

2 - Use cases for public key cryptography are

  • Encryption
    When using open channels one may want to make sure only the intended recipient is able to read the message. Encrypting the message with the public key makes sure only someone in possession of the private key can decrypt and read the message.

  • Digital Signature
    Someone in possession of a private key can utilise it to sign a message. In this case it does not matter wether the message is encrypted or not. The main purpose is to prove to the recipient that the holder of the private key is in fact the author of the message. Anyone in possession of the public key is now able to verify this.

1 Like