-
The public key is derived from the private key. So you can send a message that is encrypted using a public key on an open forum and you have to use the private key to see the message.
-
The public key in cryptography works with the digital signature and verifies that the sender is who they are by correlating that the digital signature and public key match which means it is backed by the private key of the sender. This can work with sending and receiving money.
- Describe the concept of public and private key with your own words.
- a public key is like an address for a person to receive payments that is formulaicly linked to the priv key only known (hopefully) by owner.
- What 2 use-cases can public key cryptography be used for?
- secure payments and messaging
The key concept of private key is that there are always two keys that are âmagicallyâ tight together and each of those keys can only perform one specific operation. So one key is able to close/lock/encrypt something and only the other key is able to open/un-lock/decrypt something.
There are 2 basic functionalities: encryption and signing:
In an encryption scenario the key that encrypts is the public one, meaning that anybody knows it and can encrypt the message but not decrypt it with the same key (anyway the sender knows the content already). The only key that can decrypt is the private key. So only the sender and the recipient know the content in the message finally.
Another possible use is to use the private key to sign messages. In this case the message is still readable to anybody but contains your signature (basically a hash created with the private key and the message content). It is possible to use the public key to verify the signature. If the verification succeeds it is even sure to assume that the content has not been changed.
There are 2 pre-requisites involved here to know who signed the message:
a) the senders private key must still be secret to the sender (otherwise somebdy else can sign)
b) the private key you use to verify is really provided by the known sender (otherwise some third-party could exchange the private key with his own one, making you think a specific signature belongs to a specific sender where in this case the sender is someone else).
Both functionalities can be combined together depending on the use case.
-
Your computer will generate a private key, which is a random number. No one but you will know this, you must keep it safe and a secret. From the private key, the public key is generated. This is public and can be shared and seen by others. The public key is used to encrypt information and the private key is what de-crypts the information.
-
Encryption and digital signatures.
1. Describe the concept of public and private key with your own words.
The public key is derived from your private key and can be shared with others so they can send you a transaction or encrypt a message that only you can decrypt using your private key. You should guard your private key(s) with your life as anyone who knows them can access and steal your money.
2. What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures
- You create a private key (random number) and from it a public key is created then. Anyone can use it to encrypt and send you a message. But only you have the access to the private key to decrypt respectively verify the message.
2a. Encryption: of messages by using the public key. The recipient can decrypt it by using his private key.
2b.Digital signature: using of a private key as a signature to show that something belongs to you
- You have a key thatâs exclusive to you. You can use that key to generate another key, and this key is available to everyone. However, the key that is exclusive to you is cannot be figured out from the key you give everyone.
- Two use-cases are encryption and digital signatures.
There are enormous amounts of private keys. The actual size of one is very small.
A private key is 256 bits long, which takes up 32 bytes. Bits to bytes is (256/8=32)
Here is an interesting website: https://keys.lol/
âThis website doesnât actually have a database of all private keys, that would take an impossible amount of disk space. Instead, keys are procedurally generated on the fly when a page is opened. The page number is used to calculate which keys should be on that page.â
I am glad you are interested. I changed my goals in these past few years because of crypto. This space is amazing and it gives us many opportunities. Thanks tot his academy its easy to start learning and eventually to become an expert before everyone else.
Thatâs alright. The process of getting a public key from the private key is pretty technical. Even I donât understand it fully. If you really want to go in depth, âMastering Bitcoinâ by Andreas Antonopoulos is a way to start. Keep up the great work.
I assume you meant to say that it unlocks your address.
We actually share public addresses, which are hashed versions of a public key. But all in all, keep up the good work.
Good physical example.
Its the opposite. There is no point in encrypting a message with a private if everyone can decrypt it with the public key. However you can sign a message with a private key, which would confirm that you own a private key to an certain address without actually reveling it.
Very nice set of words used to explain digital signature.
Thanks buddy
-
Private key is the computer generated Key for youre eyes only. Public Key can be seen by everyone on the network.
-
Signatures which can verify that i send the Bitcoin. and Encryption would be the other.
Yes, thatâs exactly what I meant. Thanks
Describe the concept of public and private key with your own words.
Your computer generates a private key by choosing a random number. The number of different possibilities is so large that it is almost impossible for any 2 computers to randomly generate the same private key. From this private key your computer can derive a public key, which can be shared with other users. It is impossible to take the public and work out the private key.
What 2 use-cases can public key cryptography be used for?
- To encrypt messages - the sender uses the receiverâs public key to encrypt the message. The message can only be read after the receiverâs private key has removed the encryption, so only the receiver can read it.
- To confirm identity - the sender uses their private key to create a digital signature. The receiver can then compare the digital signature to the senderâs public key to see if they were both derived from the same private key. If yes, then itâs the same person.
- Public and private keys are used to send confidential information over an open and unsecured network privately using a public key or address with a private key or password.
- 2 use-cases for public key cryptography are Encryption and Digital Signatures.