Homework on Public and Private Keys - Questions

  1. The public key is derived from the private key and vice versa is impossible. The private key is used to sign transactions (encrypt also)
  2. Encryption and digital signature
1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

Private key is randomly generated numbers. With the private key, a public key can be created. To encrypt and decrypt information, a private and a public key is used.

  1. What 2 use-cases can public key cryptography be used for?

Encyption and Digital Signatures

1 Like
  1. A private key is created using a computer system that produces a large string of numbers. One can then derive a public key from this private key. With the public key, messages can be encrypted rendering the message unreadable. This message can then be decrypted using only the private key in which the public key used to scramble the message was derived.

  2. Encryption and Digital signatures.

1 Like

— My answers —

  1. Public and private key are a pair of numbers (the first generated from the second, while the second is random) which represent the core of cryptography and digital signatures: any data encrypted with a public key can be decrypted by using the corresponding private key.

  2. Encryption: a piece of data can be encrypted with a public key to make it unreadable to whoever doesn’t possess the private key which generated the public key. Digital signature: a private key can be used to digitally “sign” a piece of data and prove that actually comes from the owner of the key.

1 Like
  1. Describe the concept of public and private key with your own words.

    Public key can be seen by any one and can use as an address but Private key only seen by the owner and if Private key is exposed to any one it is as if you have no control on your Wallet and the party who got access to your private key can access your messages and Bitcoin.

  2. What 2 use-cases can public key cryptography be used for?

To receive encrypted message and decrypt messages.

1 Like
  1. Private key is a unique random number generated from my computer and should only be known by me - its used to decrypt data; public key is accessible to everyone and is a derivative of the private key - its typically used to encrypt data
  2. Can be used for both encryption and digital signatures
1 Like
  1. Public and private keys are used to send information trough network. To encrypt a message you use public key which is generated from private key. To decrypt this message you need to have private key.
  2. To encrypt messages, to create bitcoin address.
1 Like
  1. Public keys and Private keys are ways to encrypt transmission of data securely. A private key is a long string of random numbers generated by your computer which then can be used to generate a public key. In the case of cryptocurrency, a bitcoin address can be generated from your public key.

  2. Two use cases for public key cryptography include encryption and digital signatures.

1 Like

1- public and private key is a cryptographic system that use pair of two key the public you share with the world and private keep it to your self only, private key is a random number that generate and public key generate from a private key,this pair can be use in two form in the digital world 1 is to encrypt data such as message or email in unsecured network so nobody other that sender and receiver can find out what the data is and 2 for digital signing to make sure that the sender of message is the expected person (computer, Device, Bitcon wallet, etc) it self not someone else.

2- encryption and digital signing.

1 Like
  1. the private key is a random generated key where from you create the publik key.
  2. digital signature and encryption
1 Like
  1. A private key is like a random number that has the ability to decode any messages sent to its public key, which is derived from the private key. The public key is also a random number where outside parties can see transactions or messages going to and from that particular key.

  2. Sending information that can be encrypted and only seen by the person it goes to. Sending value using a secure method that cannot be censored or stopped.

  1. Describe the concept of public and private key with your own words.
    Users’ public keys are accessible to the public, and used to encrypt data that can only be decrypted by the users private key. The users private key is used to generate their public key, and allows the user to unlock encrypted messages that were encrypted using their public key.

  2. What 2 use-cases can public key cryptography be used for?

This can be used to send and receive encrypted messages. Also, private keys can generate a digital signature to verify transactions.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private and public keys are uniquely related mathmatically. A public key is generated from a private key so anything that is sent to the public key (for example messages or transactions) can only be decrypted by the private key. As it is a one way function, it is almost impossible to determine the private key, solely using the public key.

  2. What 2 use-cases can public key cryptography be used for?
    They can be used for encryption of messages in a public forum, or digital signing messages to verify the identity of the source.

1 Like
  1. Private and public keys allow people to transfer information or value in a secure, trustworthy and private way even when using open channels using to the power of math.
  2. Encryption and Digital signatures
1 Like
  1. A private key is secret. A public key gets generated from the private key, and published. The public allows to encrypt a message such that only the holder of the private key can read it.

  2. Encryption and signatures.

1 Like
  1. Private keys are randomly generated values that, via a one way cryptographic function, can be used to produce a unique public key. It is not possible for someone to derive a private key from a public key.
  2. Two use cases for public key cryptography are encryption and digital signatures.
1 Like
  1. It is a value pair where the public value was calculated out of the private value, the public key can be shared with everyone and be used for example to “encrypt” information, where only the owner of the private key could use it to “decrypt” it.
  2. Data encryption and digital signature.
1 Like
  1. Private key is random number created by your computer. The public key is extracted with a formula from the private key. You are the only one who knows the private key.
    U can use the private key for digital signatures and the public key is used for sending funds or encrypted messages.

  2. Encryption and digital signatures

1 Like
  1. The public key is created in junction with the private key for any crypto wallet. The private key can be used to gain access to the wallet to send and the public key you can give out to receive. These are created using the hashing algorithm and every randomly created private key has only one random public key.
  2. The public key can be used for encrypting data or as a digital signature.
1 Like
  1. Private and public keys pairs are two large cryptographic numbers. The public key is visible to everyone. The private key is secret. A public key encrypts data in a message or a transaction and the matching private key decrypts it. A private key cannot be derived from a public key.

  2. Encryption and Digital signatures.

1 Like