Homework on Public and Private Keys - Questions

  1. Your public key is your wallet for the world world to give you money. Your private key allows you to sign transaction from your public key. You can not derive the private key from the public key but only vice versa.

  2. The two use cases for cryptography is encryption and digital signatures .

1 Like
  1. Private key is a random encrypted number generated by a computer.

  2. Public key is a one way cryptographic function to generate messages or transactions.

1 Like

1- Public to Private Key. Number one it’s irreversible. So you can offer a Public Key in the open, however, nobody can reverse the Public Key and see your Private key… Unidirectional Encryption.

2- first use is Encryption of messages. Use your Private key to generate a Public Key. Anyone can use that Public key to send a message which only the holder of the Private Key can Decipher.

Second is digital signature. Use your Private Key To generate a unique Public Key Signature which anyone can see. When you Digitally sign something you use your Private Key to generate a Public Signature and attach it to a message/transaction. This is a signature (like a fingerprint) which only you can generate. If somebody wants to conform that the transaction was from you, they compare the Digital Signature to your Public Key and yiu have been verified as the signatures origin

1 Like
  1. Describe the concept of public and private key with your own words.
    its like bankcard and pincode, bankcardnummer is public pincode not
  2. What 2 use-cases can public key cryptography be used for?
  • encryption of mesaages
  • signing didgitale signature
1 Like
  1. Public key is generate by private key. The public key is known by everyone and private key, only you knows.
  2. Use for encryption and digital singatures.

Encryption: Sending an encrypted message
Digital signatures: are used to verify identity /integrity of the person who sends the message, transaction, etc.

1 Like
  1. Describe the concept of public and private keys with your own words.
    A private key is a very large random number that is kept secret by a message sender. It is used to generate a public key through a hashing process. This is a one way function in such that the private key cannot be determined from knowing the address or public key.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption to make information secure and Digital Signatures for identity verification.
1 Like

Describe the concept of public and private key with your own words.
The PRIVATE KEY is a casual number that shoud be de-facto unique
The PUBLIC KEY is a derivate from the private key after HASH-256 encription. With public key is impossible to re-calculate back the private key.

What 2 use-cases can public key cryptography be used for?
1 - For encription
2 - For digital signature

1 Like
  1. Private key is an encryption translator, public key is the assigned parameter for converting any data to it’s private key encryption’s “language” for later translation.
  2. Encryption & digital signatures
1 Like
  • Describe the concept of public and private key with your own words.
    Private key is a randomly created number. The private key generates the public key that you present the network. The private key is used to verify your identity and access messages sent to your public key.
    Public key is the key you show openly in the network. Everybody can send messages to your public key.

  • What 2 use-cases can public key cryptography be used for?

  1. You can access an encrypted message sent to your public key by signing it with your private key.
  2. With your private key you can sign a message you send to somebody to validate to the network that this message comes from you.
1 Like
  1. Describe the concept of public and private key with your own words.

A public key is generated from a private key. A public key is public but is used to encrypt the original unencrypted message. Even though the public key is public the encrypted message cannot be unencrypted by anyone except the original private key generator.

  1. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used to encrypt messages and to create a digital signature to verify the sender is the original sender of the message.
1 Like
  1. Encryption could be symmetric and asymmetric. Let’s focus on the asymmetric way which is the method used by Bitcoin and Websites protected with a certificate.
    Basically when considering a transaction between Bob and Alice, both of them will have 2 keys – a private key and public key (which is derived from a private key). Only a private key which created the public key, can in fact decrypted the public key. Not vice versa.
    • Alice wants to send to Bob a transaction
    • Both of them exchange their public keys
    • Alice uses Bob’s public key to encrypt and sends the transaction
    • Bob receives the transaction
    • Bob can open the transaction only using his private key
  2. Bitcoin transaction and secured websites (HTTPS)
2 Likes

Describe the concept of public and private key with your own word?

A private key is your own key that can decrypt messages with, the public key is derived from your private key. If you send a message through your public key then you need your private key to decrypt it.

What 2 use-cases can public key cryptography be used for?

  1. it can encrypt messages and be used as a digital signature to confirm transactions.
1 Like

1. Describe the concept of public and private key with your own words.

  • Private key: a randomly generated number that the possibility of someone else generating that same number is almost zero. This number is used when sending Bitcoin to someone.
  • Public key: is generated based on the private key and is also unique. It is used for receiving Bitcoin

2. What 2 use-cases can public key cryptography be used for?

  • Encryption
  • Digital signature (identity integrity)
1 Like

Thank you. This making me go back over my notes, which were more similar to your answer?

2 Likes

1)this concept is comparable to how we use i.e. bank accounts already. We have a private key (aka a password or a Pin, that nobody else may know…or we are in trouble).
and we have a public key (that is known to the public, i.e. a bank-account-number, that may be used by people to make transactions to it)

    1. encrypting messages (so users can’t, who are not supposed to, can’t read)
    1. digital Signature (to verify identity)
1 Like

Everyone has a private key which is basically their password, from that password they create a passphrase. this pass phrase is what people send encrypted messages to, in which the receiver uses their password to read.

To decrypt to the incoming messages, and to sign your sent messages.

1 Like

1.Describe the concept of public and private key with your own words.
A private key is a randomply generated number and a private key is a numer generated as a function of the private key.

  1. What 2 use-cases can public key cryptography be used for?
    The two use cases are for encryption or as a digital signature.
1 Like
  1. Describe the concept of public and private key with your own words.- Public key encrypts data and private keys decrypts that data. For bitcoin, Your computer generates a private key. The public key is then derived from the public key and from the public key you create a bitcoin address
  2. What 2 use-cases can public key cryptography be used for?Encryption and Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

-a private key is used for encryption and adding a digital signature
-A Public key We can give publicly to receive a transaction
From Private key we can generate Public key-One way function
2. What 2 use-cases can public-key cryptography be used for?
Public key -to share with other -receiving transactions
A public key is created from Private key
From Public can The BTC address is created

1 Like
  1. Describe the concept of public and private key with your own words.
  • the private key is proof of ownership
  • the public key is proof of address

The private key generates the public key. The public key is used to send and receive messages or transactions. The private key is used to decrypt secret messages meant only for you. The private key is also used sign messages, e-documents or transactions. It is impossible to reverse engineer the private key from the public key.

  1. What 2 use-cases can public key cryptography be used for?
  • encryption
  • digital signature
1 Like