Homework on Public and Private Keys - Questions

  1. Private key is a randomly generated string of numbers that unlocks your “safe”. The one who haves access to this string of numbers also have access to everything in your safe. Public key is a string of numbers generated by a private key, you can make a public key out of a private key but you can never find out the private key based on the public.
    So when encrypting a message and which is intended to be read only by a specific person (A), person A generates a public key out of his private key which he keeps public for everyones access. When sending a message to person A, one uses his public key to encrypt it into something unreadable and the only way to decrypt it is with person As private key.

  2. One example listed above which was encryption. The other one is digital signature which is more used when it comes to crypto. Here, the private key is used to sign sent message so that its origin can be confirmed. Credibility is checked by comparing signature with the public key, it can then be confirmed that the signature actually was made by the desired private key.

  1. The concept is that the private key remains hidden from anyone while the public key are used to let other user transfer encrypted data, similar with a personal locked mailbox uses in the physical world, but in this case no one can make other people mailbox keys by copying the physical form of lock and imitate the key. thanks to math magic.
  2. Encryption and digital signature.
  • Describe the concept of public and private key with your own words.
    A private Key is a very long number generated Randomly by the User computer and is meant to remain hidden. A public key, which is meant to be published, is then mathematically derived from the user’s private key.

  • What 2 use-cases can public key cryptography be used for?

Public Key Cryptography can be used for
1-Encryption of messages over unsecured networks or open forums.
2-It can be used to derive digital signatures to identify and verify the integrity of messages from a particular sender. This is key to cryptocurrency account verification.

1 The private key it’s a random number generate by you pc, the public one it’s made out of the first and it could be seen by everybody, not as the private one.
2. encryptation and digital signatures.

A computer creates a large random number and a person keeps this number private. The computer derives a public number from its private number. The relationship between the public number and the private number is so unique the relationship between them can never be derived. This unique relationship can be used for several purposes.

Encryption and Signing

  1. Describe the concept of public and private key with your own words.
    Public and private key pair helps to encrypt information that ensures data is protected during transmission. Public key convert messages into an unreadable format. Private key is used to decrypt the message. The public key can be displayed publicly and is linked to your private key.
  2. What 2 use-cases can public key cryptography be used for?
    For encryption and digital signatures.
  1. Public key everyone can see and not decipher without the private key which is kept secret.
  2. Encryption and Digital Signature
  1. The private key is a randomly generated encryption, known only to its owner (hopefully). The public key is derived from the private key (also randomly generated) and available to anyone to use in combination with the original owner’s private key, (still hidden to all except the owner) with permission to decrypt an encrypted message. This allows person A and person B to securely send or receive a message without other external parties having access to the decrypted message.

  2. Two use-cases for public key cryptography are Encryption and Digital Signatures.

  1. one uses a random number to generate a private key, by adding a special formula the public key is generated. The public key is public meaning everyone can see that key. The private key is private and only the person which generated the key should see it. However, if someone sends a msg and adds the public key, the private key is needed to make actually sense out of it. Without the private key, the msg is not readable.

  2. Encryption and digital signatures (second is used in Bitcoin)

  1. A private key is generated by your computer and with it you make your public key with a special formula. The private key is a huge number. It is not feasible to deduce the private key with the public key.

  2. (1) By using the recipient’s public key to encrypt your message and then only the private key of the recipient can decrypt your message and read it. This enables private messaging. (2) Digital signatures is another use case where you can sign your message or in Bitcoin’s case, transaction, with your private key and then the receiver of your message/transaction can see that it was you who sent the message by using your public key.

  1. The private key is a random number generated by your computer which the public key is then generated from. The public key is open to the public and can be used to encrypt information. That same information can then be decrypted only by the private key, that only you have, and therefore makes the line of communication secure.

  2. Two use cases are encryption and digital signature.

  1. Public key is a randomly generated number that is available for the public to see which is . A private key is then derived from that public key which is kept hidden from the public. Both keys are used to encrypt / decrypt messages and verify digital signatures.

  2. encryption and digital signatures.

  1. Private key is from a random string created by your computer that only you know.
    This private key is used to create a public key that anyone can see.
    An encrypted message containing your public key can be read using your private key.

  2. Encryption and Digital Signatures.

  1. Describe the concept of public and private key with your own words.

    A public key is the address that you give out to people so they can make transactions with you. A private key allows you to access those transactions. The public key is derived from the private key and only the private key can decrypt transactions sent in through it’s private key.

  2. What 2 use-cases can public key cryptography be used for?

    Encryption and digital signatures.

  1. Public and public keys are derived from an elliptic curve math function which has a trapdoor function (discrete log problem); the public key is function of the private key but you cannot derive the private key from the public key.

  2. Encription and digital signatures.

  1. A private key is a self generated random large number to be kept private. It is used with a formula that will give a public key so that you cannot figure out the private key from the public key. This public key can be shared to allow recipients to return messages encrypted with this public key. Only the private key holder will be able to decipher them with the use of the private key. Alternatively, a user can sign a message using a private key. The signature, combined with the public key that is as its name suggests - publicly available - will allow the recipient to derive the private key that defines the identity of the sender.

  2. The first use is as described above, in communication. The second use is in cryptocurrency, for creating a private address that is derived from a wallet, then deriving a public key from the private one in order to make transactions.

  1. Private keys are generated randomly by a computer to identify that computer when sending information. Public keys are generated by the private key as an access point for other users to identify one another.

  2. The two use-cases for public key cryptography are encryption (not really used in cryptos) where a message can be made private and sent from one user and verified by the other that the first user was the one to send it; the intention being to be able to make something secret/private. And digital signatures (used the most in cryptos) that verifies who sent a particular message; the intention to ensure integrity of a message.

1a) As a CONCEPT: “Public key” is like your Bank Account number - you give it out to people so they can pay you or deposit money into it. “Private Key” can be thought of as your credit card number. You use it spend your money but if anyone else has, they can spend your money too!

1b) In DETAIL: For Bitcoin, a “Private Key” is a unique number generated by you or your wallet. Then, through a SGA256 (one way process) a “Public Key” is generated. From this public key a BTC address is created on the BTC blockchain. You hand out your public key to enable people to pay you (into your BTC account). The only way to spend or access your BTC account is to sign in with your “Private Key”.

  1. Two use cases for PUBLIC key Cryptography: 1) PRIVACY through Encryption (of a message or other data like funds) 2) IDENTIFICATION through Digital Signitures

Describe the concept of public and private key with your own words.

In regular encryption the public key can be seen by anyone and used to encrypt a message that would be sent to another with a private key which is the only key that can decrypt it.

What 2 use-cases can public key cryptography be used for?

It can be used to send encrypted messages that can only be dencrypted by the person with the private key that spawn the public key sued to encrypt the message

In bitcoin digital signatures are used. The private key is used to sign a message and send it to the receiver. The receiver then uses the public key from the sender to verify the signature was created by the private key.

  1. Private key is just a random number that is generated by system & public key is generated through that private key. Private key needs to remain safe either to decrypt the msg or to sign the digital tx.

  2. Encryption and digital signatures