Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

A public key is used to encypt messages. A public is published so anyone can send a paticular receiver a secure message.

A private can be used to decrypt messages encrypted with a matching public key. As the term suggest, private key are intended to be secret.

  1. What 2 use-cases can public key cryptography be used for?

Bitcoin transactions (value transfer) and send and receive encrypted message

1 Like

Homework on Public and Private Keys - Questions

Describe the concept of public and private key with your own words.
A private key is a key that is randomly generated by your computer. This key is private and only you know it.
A public key is a key that you can generate using your private key. Other people can see this key and that is fine.
Your private key can be used to decrypt the messages send by others to your public key.

What 2 use-cases can public key cryptography be used for?
People can send messages (transactions) to your public key.
You can encrypt messages sent and do a digital signature.

1 Like
A private key is the only way to read a public key. Using the private key you can decode the public key. A Digital Signature Verifies who sent the message so using it for transactions and messages are a good use-case.
1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is an extremely large random number in BTCs use case. The public key is generated mathematically from the private key and can be used to figure out, that a signature of a block is correct and the block was signed by the correct entity.
  2. What 2 use-cases can public key cryptography be used for? Decryption/Encryption and signature processes
1 Like
  1. The public key is used to encrypt and the private key is used to decrypt transactions.

  2. It uses combination of public and private keys to sescure the transactions.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private / Public key concept can be used for the two use cases of proof of identity, as well as for encrypting messages. So sender and receiver use this concept to either achieve encryption (sender encrypts message by using public key of receiver) or Digital signature ( sender signs message with his private key and receiver can veryfy it by using senders public key).

  2. What 2 use-cases can public key cryptography be used for?

Digital Signature
Encryption

1 Like

1/ Private key is a randomly generated key used to digitally sign a message, transaction. A public key is derive from a private key and used for both encryption and digital signatures and creating bitcoin addresses
2/ Encryption and digital signature for receiving funds for example

1 Like
  1. Public keys can be shared to allow senders to identify a message target; the private key that created the public key will decrypt the message.
  2. Encryption and Digital Signature
1 Like
  1. Describe the concept of public and private key with your own words.
  2. What 2 use-cases can public key cryptography be used for?
  3. A private key is a unique random number form which a public key is created. There is a mathematical relationship between the public key and the private key that allows a recipient of an encrypted message sent from you and signed by your private key to know that the message is valid and actually came from you.
  4. Email and crypto currency transactions.
1 Like

1.Private Key is a Key that is generated by the wallet. It has to be kept secret and it is used to create the public key as well as to sign the messages you send.
2.It an be used for Encryption and for Digital Signatures.

1 Like

1 a private key is a large number generated by a computer, from that the public key will be derrived.

2 encription, identification

1 Like
  1. A private key a randomly generated number which serves as a key to access one’s funds, leave a digital signature on transactions. The public key is then created and a functional output from the private key which is then used for verification on the blockchain by other users. These days, there’s also one more security step involved to create an address.
  2. The public key is then used for verification and identification on the blockchain by other users. In specific cases, we’re talking about encrypted messages or files as well as digital signatures of ownership.
1 Like
  1. Describe the concept of public and private key with your own words.
    A private key (x) is a random string of bits. Using the private key a public key (y) is generated. The public can then be share to public to encrypt messages. In turn the private key can decrypt the message. In addition one can sign a message using the private key, which in turn can be verified using the public.

Key creation function f1(x) = y
Encrypted Message Creation f2(y,msg) = zMsg
Decryption of the Message f3(x,zMsg) = msg

  1. What 2 use-cases can public key cryptography be used for? Encryption & Signatures
1 Like
  1. public key is generated from private key and is shared with others. Private Key is kept within ourself.
  2. Its is used in generating Bitcoin addresses.
1 Like
  1. the private key is your random generated number and the public key is derived from the private key that can be seen by the public. the private key is needed to decode the public messages

  2. encryption and digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key has 2 main use cases, Encryption and Digital Signatures. Public key encrypts sensitive information and private key decrypts it.

  2. What 2 use-cases can public key cryptography be used for?
    Two use cases, E-mail system and Banking system.
    Encryption: To hide sensitive information.
    Digital Signatures: To ensure integrity of the information and identifying the sender/receiver.

1 Like

1- Public key can be use to receive anything from someone else private key. Private key needs to be secure place and thats where you keep all your assets. You should never give anyone your private key.

2- Encryption and digital signature.

1 Like

1.-
It is a system applied when we need privacy.
Using math it can be generated a random number that plays the role of the private key which need to be kept in secret. From this number or “key” many other can be derived, which are called “public keys”.
When a message is encrypted using one of the public keys, only the owner of the private key can decrypt it.

2.-
Encryption.- used to keep entities (people or computers) that are not meant to know it, unable to see the content of the messages interchanged by other ones.

Digital Signatures.- used to make sure that a message was created by the owner of the private key.

1 Like
  1. The public key is available to the public and the private key is for your eyes only. The private key is large & highly random number and from this private key, we can generate a public key.
  2. We can use the public key for encryption and digital message.
1 Like
  1. A private key is generated when you create a wallet. This private key serves as your signature when making a transaction. It proves it is you who created the transaction. A public key is generated from the private key. It is related mathematically to your private key. It can be shared with the pyblic. It is used to create a wallet address for receipt of fubds. It is also used to encrypt data that you transmit.
  2. Encryption and digital signatures.
1 Like