Homework on Public and Private Keys - Questions

  1. The public key is derived from the private key. This pertains to hash functions as there is no way to go from the public key to the private key; the public key is accessible to the public network and is the output. The input is the private key, inaccessible to the public network. Messages are encrypted with the public key and decrypted by the private key.

  2. Encryption and digital signatures.

1 Like
  1. the public key anyone can see . The private key is private and decrypts the message.
    2.you can use the private key to encrypt and sign
1 Like
  1. a public key is a code that allows limited access to a server on the blockchain, also known as a wallet, a private key is used as an administrator would be on windows
  2. they are used for holding storing and sharing data, many different types of data can be stored saved and sent such as bitcoin or credit history
  1. Private key generates the public key that is used for the encryption of information that only the private key can crack.
  2. It is used for encryption and as a digital signature.
  1. Your private key is a randomly generated number. The public key is derived from it. Used together, they are the cryptography for sending messages or making transactions (like Bitcoin).
    You cannot determine the private key from the public key. But you can eventually determine the public key from the private one.

  2. Two use-cases of public ;key cryptography:

    1. send and receive private encrypted messages - including sending bitcoin transactions to and from wallets
    2. digital signatures - proving identity

Public key is generated by the private key. The public key is shared to others to use for encryption that only the owner of the private key can decrypt with their private key. The private key can also be used as identification and to sign for transactions.

The two key system is an algorithm to transmit data with a ‘degree’ of security

The private key, sometimes known as the signature, is a mathematical function produced in order to secure data. It is also used to generate another unique key called the signature? It ascribes ownership of the data it was produced from in a given block?

The public key is generated from the private key for the purposes of transmitting the data in a secure fashion on the global blockchain.

1.Private key in my pocket and safe. public key available to public to to sign a transaction and verify.

2.Cryptocurrency and public key signing digital documents or encrypted email PGP.

  1. the private key is only known to yourself. the public key is derived from the private key. It is not possible to derive the private key from the public key. It is used to be able to check if the signing of a transaction is ligitimate.
  2. a) a message from a person to an other can be signed with a private key. The receiver can then verifiy if the private key of the sender is legitimate when calculating the private key and comparing with the known public key. b) To access crypto currency by the legitimate person.
  1. public is a shared key which is coming from the hashing of a private key. Private is your own one which should not be shared - once that is lost, there is no way to access to your account (e.g. bitcoin)
  2. 1 case is the encryption, the other one is the digital signature

1. Describe the concept of public and private key with your own words.
A private key is a large random number that is generated by a computer. It is then hashed to generate a public key.

2. What 2 use-cases can public key cryptography be used for?
Encryption: Person A can encrypt the message with Person B’s public key. Person B can only decrypt the message with their private key.
Digital Signatures: Person A can use their private key to sign a message. Person B can then check the public key against the signature and mathematically compare them and see if the signature corresponds to the public key to confirm an identity.

1 Like
  1. A public key is made widely available and is derived from a private key. The private key is generated from a series of random numbers. It is a one way operation: the private key can unlock a message encrypted in the public key but not the other way around.
  2. Encryption and digital signatures.
1 Like
  1. Public key - a padlock, private key - an actual key that unlocks the padlock.
  2. Encryption of data and digital signature/prove of the ownership.
1 Like
  1. Private keys are randomly generated large numbers that are then used to generate a public key that can be shared with others to allow for either a) encryption or b) verification and integrity of messages or transactions as a digital signature.

  2. Public key cryptography can be used for a) encryption or b) digital signatures.

My private key is my secret identity that only I know - a public key is my open address that others can contact or send me things

Crypto and public key signing of digital items

  1. Public key is derived from you private key and can be shared.It is basically a one way street, information can be sent to but not extracted. Private Key is only for you to see. Information can be moved in and out with the correct signature
    2.Encryption and digital signatures
  • Describe the concept of public and private key with your own words.
    A private key is for the owners eyes only and very secret and um, private. It is used to mathematically create public keys which are um, public. The public keys generated using the private key are unique to that private key and their provenance can be mathematically proven. No trust required!!

  • What 2 use-cases can public key cryptography be used for?

  1. Encryption. Eg. Secure and private digital communication.
  2. Digital signatures. Eg. Confirming the integrity of identification and removing trust.

1.) A private key is a random generated number that creates a public key. A public key is available for anyone to see yet it’s impossible to see ones private key. A public key is connected to your private key proving ownership of all information contained within the private key.

2.) Public key cryptography is used for digital signatures and encryption.

1)The public key encrypts the sensitive information and the private key decrypts the information that was encrypted.
2) Encrypt and digital signature.

  1. Describe the concept of public and private key with your own words.
  • Public key encrypts, private key opens. If somebody wants to send you a message, he encrypts it with your public key and only your private key can open it. In the same way, when somebody sends you bitcoin, he uses your public key and only with your private key you can spend it.
  1. What 2 use-cases can public key cryptography be used for?
  • Encryption - as explained above.
  • Digital signatures - to prove that the message or transaction was actually sent by you. From a private key, you can generate a public key and a signature. To verify your transaction, your signature is compared with your public key to check if they came from the same private key.