Homework on Public and Private Keys - Questions

  1. The public key is the key you give to everyone and it is generated by your private key. The private key is only for you, it is a random number generated by your computer and is used to log in to your account or wallet.
  2. Encryption and digital signatures.
  1. Public key is visible to everyone and is used to send/recieve things. With private key you “unlock” that stuff that you recieve, and also you use it to confirm the stuff you send (that it was you who sent it)
  2. Encryption and digital signatures.
  1. A private key is something that is unique to you. You can take your private key and use it to create a public key. In encryption, messages can be sent to your public key but you need to use your private key to decrypt them. In digital signatures, your private key is used to verify that it is actually you that is performing the transaction.

  2. The 2 use cases are for Encryption and Digital Signatures. Digital Signatures are commonly used in bitcoin transactions when you use your private key to create a signature on the transaction.

  1. Public keys are generated by private keys and are used to encrypt information. They are available to anyone. Private keys are random numbers which are mathematically generated and are used to decrypt the information which has been encrypted by an associated public key. Private keys are known only by their owners.
    Used together, public and private keys can solve many security issues for people using the internet.

  2. The two uses for public key cryptography are; a) to encrypt private information and, b) to verify the authenticity of a message that has been digitally signed with a private key.

Private key - a generated number only you possess.
Public key - a number derived from the private key. It is a one way system and the public key cannot be used to recreate the private key.

  1. public key is generated from private key, private key is a large randomly generated number
  2. Can be used to digitally sign, and can be used to encrypt messages

1 - Describe the concept of public and private key with your own words.

Public/private keys is concept where the encryption process, using the public key, is separate from the decryption process, using the private key.This provides a more efficient system to manage key distribution.

2 - What 2 use-cases can public key cryptography be used for?

Signing with private keys to prove ownership or non-repudiation. Ownership of private key provides access to bitcoin. Public keys are distributed to the public and are used as bitcoin owner addresses. Also, public keys are also used to verify signatures.

  1. A private key is a randomly generated large number. Once a private key is created a public key can be generated. A public key can then also generate a Bitcoin address. This function is one way- meaning if the private key is known then the public key can be determined, but if the public key is known the private key cannot be determined. This method allows secure communications over an open network.

  2. The two use cases public key cryptography are used for are a) encryption and b) digital signatures.

  1. Describe the concept of public and private key with your own words.
  • Private key is a random huge number generated by computer then a public key is created and linked on a private key. Private key -> Public key but Public key !-> Private key (One way function).
  1. What 2 use-cases can public key cryptography be used for?

a) encryption - Only those who have private key can communicate the network. Private key will generate public key, and the message will encrypt through public key, the private key can only decrypt the message that encrypted with the public key. used for a private communication

b) Digital Signature - to verify that the data/transaction is legitimate and did not edit by anyone. By using private key, the transaction will be signed and generate a signature. it can verify by a public key that the private key generated. used for the bitcion transaction.

1 Public and private keys are tools for a) sending encrypted messages over an unsecure environment b) identification/signing purposes.

After creating private key (a randomly produced very large number), a linked with it public key produced, probably by hash it. Using my free shared public key, everyone could enrypt messages addressed to me, that can decrypted only with my secret private key. So, the public can produced by private but there is no way to derive private from the public

The “connection” between public and private keys, could used to sign transactions or to identify the senter, like a fingerprint.

2 encryption and digital signatures

  1. Private key is randomly generated and unique to your computer. It’s used to formulate a public key that you share with anyone (not secret). The public key cannot be reversed engineered to identify the private key. This public key can be used to encrypt data such as from an email or verify authenticity.
  2. Digital Signing (identifies or authenticates the message) and encryption (end to end-emails)
  1. Describe the concept of public and private key with your own words.
    A private key, is simply an extremely large and highly random number, public keys can be shared with other people on the network
    We can generate addresses from the public Key.
    Public Keys are used by other users on the network to challenge ownership of Bitcoin.

  2. What 2 use-cases can public key cryptography be used for?
    Public key can be used for encrypting data and digital signatures.

1 Public and private key are a pair of keys which allows you to interact with a not secure world in a safe way. You can derive a public key from a private one but not viceversa, it is a one way function.

2 The two use cases are encryption and digital signature. Trough encryption it is possible, using the public key, to make a message not readable for anyone on a untrusted channel except the owner of the private key. Digital signature is used to verify who sends a particular message, which is the owner of the private key.

It uses eliptic curve cryptography (ECDSA)

Describe the concept of public and private key with your own words.
-Public key cryptography - Private and public keys work together as a pair.
-Private key is generated from random number. Public key is generated from the private key.
-This pair allows ability to do encryption, create digital wallets, and sign messages.

What 2 use-cases can public key cryptography be used for?
-Encryption and -Digital Signatures

A digital signature uses your private key + message + public key of the receiver. It wouldn’t be safe to use your private key as the signature itself. Digital signatures are unique for each message.

  1. Public keys are derived from private keys and are unique to a particular wallet as the address to use for receiving/sending/ and signing transactions. The private key is held by the owner of the wallet or asset and is only visible to this person. The public key is seen on the blockchain and is accessible to anyone.

  2. Public key cryptography can be used to encrypt messages and as digital signatures.

  1. sharing thoughts by words or written down them can be PUBLIC but the way thoughts came about and structured are PRIVATE and doesn’t work the other way around.
  2. Encryption and Digital signature

1. Describe the concept of public and private key with your own words. Public Keys and Private Keys are responsible for carrying out encryption and decryption. Both keys are co-related to each other. Therefore, one private key can only have one public key and vice versa. In this system, data is encrypted using a public key and decrypted through the private key. As implied in the name itself, a public key is publicly accessible.

2. What two use-cases can public key cryptography be used for? Public key cryptography can be used for encryption and digital signatures.

1.A person can generate a private key that is unique and from that generate a public key this public key cannot derive the private key. the public key can be used by the public to encrypt data that only the holder of the private key can decipher.
2. Public key cryptography can be used for digital signatures so messages can be verified that they came from the holder of the private key and can be used in cryptocurrencies to verify transactions and ownership of the coins.