Homework on Public and Private Keys - Questions

  1. The public key is used to encrypt important messages that is meant for a particular person and the private key is used to decrypt the message that was encrypted. The public key is generated from the private key.

  2. Public key cryptography can be used for encryption and digital signatures.

hello,
1) The concept of public and private keys is you have a set of numerically large correlating sets of numbers or ‘keys’. the first key is the private key that only you should have access to. it is then used to generate another called a public key. Everyone has access to the public key and can use it to encrypt any information they would like to keep private. once the message has been encrypted you then use your private key to unlock the encrypted information.
2) The two use cases for public-key cryptography are encryption through the use of a public and private key pair and digital signing by which you take a private key to digitally sign a document then use the public key to authenticate the information.

A private key is a randomly generated number on your computer. This private key is then used to generate a public key which can be shared openly for others to see. Anyone can access your public key and use it to send encrypted information. Only your private key can then be used to unlock the encryped information.

Public private key pairs can be used for creating encrypted messages and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a secret address parallel to the public key which it derives. The public key is an address used as a “public” identity on a network. The private key functions as a signature verifying messages (trxns) that are sent.

  1. What 2 use cases can public key cryptography be used for?

Digital signatures and Encryption.

1 Like
  1. A private key is a random number generated by your computer and should be kept private. A public key is a number generated using your private key and can be made public to anyone becouse the process of generating the public key is a one way process and is impossible to go back from public to private keys.

  2. Encryption of messages and digital signatures

1 Like

Q1: The concept of public & private keys is the core mechanism by which people can send and receive cryptocurrencies (value). It is essentially the opportunity for people to become their own bank and be the custodians of their cryptocurrencies without having to use the services of 3rd Parties. When a wallet is first made a “Private Key” is randomly generated by the computer which then derives a “Public Key” which in turn derives a wallet address. These two keys (Private & Public) form a pair and make the wallet legitimate. These keys are then used to perform transactions. The public key being the key that is used to encrypt a message and is available for everyone to see and is the one that shared with others when a transaction is to be made. By The private key being the one that de-crypts, and signs the message / transaction. The legitimate pair is a “one-way” function as it is always possible to go from a Private key to the Public key. But never from a Public key to the Private Key. So the Private key must be kept entirely secret at all time. Sharing this or losing this key will compromise the security and integrity of the wallet.

Q2: The 2 use cases of Public Key cryptography is “Encryption” & “Digital Signatures”. Encryption is a method to mask a message or transaction over an unsecured public channel like the internet. Digital signatures verify who sent the message.

1 Like
  1. Public and private key are used to encrypt messages and to ensure that only the right person sees the message as it was sent. Public key is derived from the Private key which is randomly generated.The message is encrypted with the public key of the recipient and when he inserts his private key the message is decrypted.
  2. It is used in messaging applications or some sorts of information storages, healthcare…
  1. You generate a private key with a huge random number and derivate the public key from that private key. This is a one way function, so you cant get the private key from seeing the public key.
    post your public key wherever you want and people can encrypt messages with this public key and only you with the private key can then read those encrypted messages.
    2.Encryption & digital signatures (sign messages with your private key so other people can look at the message and at your poblic key and know that you send it)
  1. The private key is a random number created by your computer. The public key is derived from the private key. It is not possible to calculate the private key based on the public key (one-way street).

  2. Encryption and digitally signing messages

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key must be kept safe and not shared with anyone.
    It is used to generate your public key, which can be shared. You can not derive the private key from the public key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.

Public key: is your secret identity which belong to you (only you) and it is a random number generated by computer. You do digital signing with your private secret key. And to “open” for example encrypted message/transaction, coming to you, you have to use the private key.
Public key: key generated with the private key, the key which can be seen by everyone. You use others public keys when you want to send a message/transaction etcetera. To “open” that message/transaction which is send, you have to use the private key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital signature are the two use-cases for key cryptography.

1 Like
  1. Your private key is a random set of numbers generated by your computer and your public key is derived from your private key.

use-case 1: Person A can send an encrypted message to person B by using person B’s public key to encrypt the message. Peron B can decipher the encrypted message by using his private key.
user-case 2: Person A can send bitcoin to person B by signing the transaction with his private key.

1 Like
  1. Private and Public key pair uses cryptography in a way that only the Private key can unlock data that was encrypted using the public key.
    The public key cannot unlock data encrypted by using the Private key but can be used to verify that the correct private key pair was used.

  2. Encryption of data and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    -> The public key as the word says is a key that is openly shared and is necessary for someone to send you a message or info by encrypting is with that public key. The public key is always derived from a private key which then is able to decrypt the message. By knowing the public key you will not be able to know the private key.

  2. What 2 use-cases can public key cryptography be used for?
    ->

  1. Encrypting messages for security reasons in a open network to avoid outsiders to see a message that can be shared between two parties

  2. Signing a transaction be attaching the public key to a message that can be verified by the receiver that this transaction or data set really came from the sender.

1 Like
  1. you generate a large random number, call it the private key, through a special formula you generate a public key, this is shared online, there is no way to take the public key and derive the private key, it is a one way function. Take a message and encrypt it with the public key, the message becomes unreadable and is gibberish, the only way to decrypt this message is to use the private key. Mathematical relationship between public and private key is such that anyone can use the public key but only one person can use the private key. If its forgotten or lost its gone forever.

  2. Encryption and digital signatures.

  1. The concept of private and public key is a concept in which you allow people to send you a encrypted message via the public key that is visible to everyone, but once the message is encrypted using your public key, the only way to encrypt and see it is by using the private key that you have for you. It also allows you to sign a message so that people can verify that it originated from you/ your own private key, without knowing it.

  2. First use case is to send encrypted messages as described above. The second use case is for digital signatures as in Bitcoin, by signing a transaction, it shows that it (your bitoins) belong to you and not to someone else since you are the only one who have you private keys.

  1. Private key is a randomly generated unique key for each user/account, which ID is secured through hash function encryption to allow transmission/receipt of messages with others i.e. public. The public key provides an “address” where others can send you information i.e. crypto payments etc. that then get decrypted with the private key. There is no way to know the private key by having the public key.
  2. Public key can be used to receive payments, messages, or other data privately.
  1. random numbers where the public one is generated from the private one. they can be used to encrypt messages, data and cryptocurrency
  2. When received a fund signed with a private key, you can convert it to a public key and see whether it indeed came from somebody you might know with that public visible key (that’s one usecase for public keys). When you’d like to encrypt a message you could do it with somebody’s public key such that that person can only decrypt it with his or her private key.

Describe the concept of public and private key with your own words

  • Public and private key are instruments to guarantee security throught encryption and digital signature. Private key is a randomly generated number owned by a person, from private key derivates the public key, that is the key ‘seen from the world’, it’s correlated to the private key but it’s impossible to get private key from public key

What 2 use-cases can public key cryptography be used for?

  • Encryption: In this way a crypted message through public key can be read only by the private key that originated the public key;
    Signature: Most used in Bitcoin. It’s used to ensure the identity of the entity who sent the message, who sent signs with private key and through a mathematical operation ensure that public key derivates from that.
  1. Private key is the key to access the encrypted data. You can only go from private key to public key. In BTC case you need to use your private key sign the transaction for it to get accepted in the network.
  2. It can be used to ecrypting data and digital signatures.