-
Describe the concept of public and private key with your own words.
Public key is the key derived from the private key and can be provided to others to check your transaction. Private key is for yourself and should never be shared. -
What 2 use-cases can public key cryptography be used for?
To check your transaction and see what is in. Signing messages.
- Describe the concept of public and private key with your own words.
private key is a big random number (big enough so that it’s practically impossible to generate two of the same). With my private key I sign a message and I send it to my friend. By knowing only my public key he is able to be sure that it was me to send it.
- What 2 use-cases can public key cryptography be used for?
encryption: A encrypt a message with B’s public key so that only B with its private key can decrypt it
digital signature: A send a message to B. A sign that message with its private key. Now B can verify for sure it it was really A to send the message just knowing A’s public key
- the public key allows you to open messages rom other people while the private key is how you know that a specific individual actually sent that message to you.
- obviously number one being cryptocurrency and another could be digital documents that need to be signed. by using your private key whomever sent you the document can verify you actually signed it.
- Private keys are used to verify digital signatures and/or to encrypt a message, they are kept secret to only the owner and can be used to verify the public key which is available to anyone.
- Encrytption and digital signatures
-
Describe the concept of public and private key with your own words. Anything encrypted by the public key can only be decrypted by the private key.
-
What 2 use-cases can public key cryptography be used for? It can be used for digital signature and encryption.
Describe the concept of public and private key with your own words.
A public key is public facing and is generated from the private key in order to encrypt information. Private key is used to verify transactions and decrypt information.
What 2 use-cases can public key cryptography be used for?
Encryption and identification (digital signature)
-
A private key is a number your computer generated randomly which sign signature for a particular transaction recognized by public key. Its mathimatically impossible to guess a private key through public key.
-
For encrypting data and digital signatures.
- Private key is a random number generated only to be kept by owner. It is used to create a public key which is able to be shared with everyone.
- Encription and Digital Signature.
- Private key is the randon number , your computer generates for you, and public key is a key which you generate, using special formula from a private key. You must keep safe your private key, because if someone will know it, they can take your funds and sign messages for you.
- Public key can be used for encryption, when you want to encrypt some information, which you do not want any other people will see publicaly.
and Digital signatures, when you sign a message to identify yourself.
- Describe the concept of public and private key with your own words.
Private key is generated by a random number, with this private key a public key can be generated on a mathematical way - The 2 use cases are encryption and digital signatures.Digital signatures verify who sent the message since the private key derives the public key which creates the bitcoin address. You send bitcoin using your private key and receive bitcoin to your bitcoin address.Cryptography and the use of public and private keys solves the security issue when we use the internet.
-
Describe the concept of public and private key with your own words.
- Public keys are addresses that is made open to public, for the purpose of checking and verifying. used in digital signatures, sharing wallet address to receive money, to for Bitcoin to record to the blockchain to keep the system going.
- Private key is a large randomly generated number that only you know or have, and can be combine or fuse to generate a unique public key. A private key is ultimately is something you own as a possession (Real life wallet, or silver gold or ID). If you lost this, it means that you have lost that actual item in your possession. or if someone is able to hack they could steal that key and steal your identity.
-
What 2 use-cases can public key cryptography be used for?
- 1st use case of public key is to send or receive bitcoin or any crypto
- 2nd use is for the miners to verify the transactions in the blockchain
- Describe the concept of public and private key with your own words.
Public and private key forms the basis of public key cryptography. Public key is derived from private key in one-way only (but can’t use public key to derive the private key). Public key is like a business address, which is public and everyone can see, used to encrypt the message before sending it to the recipient, while private key is a secret key kept by the recipient which can be used to decrypt the message encrypted by the public key. meanwhile. Every public key comes with a unique private key. - What 2 use-cases can public key cryptography be used for?
2a. to encrypt and decrypt the message as mentioned above;
2b. to create a digital signature. A sender uses his private key to sign his message to a receiver, so that the receiver can verify that it’s really from the sender by using the sender’s public key when the receiver gets the message.
- Describe the concept of public and private key with your own words.
- What 2 use-cases can public key cryptography be used for?
- Public key is derived from private key through one way function. These keys can be used to encrypt, decipher or sign messages.
- Encription & digital signatures
Describe the concept of public and private key with your own words.
Private Key = random number that is known only be the key holder.
Public key is generated from the private key using a hashing algorithm. This is a one way process, the private key cannot be derived from the public key.
What 2 use-cases can public key cryptography be used for?
Encryption - MD5, SHA32 etc. Text is made unreadable by encrypting with the public key to anyone that does not have the private key for decrypting.
Digital signature, where the private key is used to sign a document. The signature is created in a similar way to a public key an verifies the sender.
-
Public key allows someone to send their public key in an open, insecure channel. A private key is used to decrypt messages encrypted to the owner of the key.
-
The 2 uses-cases can public key cryptography used for are:
- Encryption
- Digital Signature
- your public key can encrypt a message and the private key will decrypt that message
- encryption and digital signature
Public keys are like an address of a mailbox of someone. Everyone can deliver ‘encrypted’ messages on that mailbox using their own private key + public key of the mailbox of the receiver.
The owner of the mailbox can ‘decrypt’ messages on it with their private key. And they can know wich other mailbox public address is the sender. You don’t need to be afraid that others can read your messages. As long as your private key is kept secret.
-
Describe the concept of public and private key with your own words.
The keys are generated by random large numbers. From the privet key, public is generated.
The privet key is used when selling and should be kept really privet.
The public key is for buying and can be shared in open systems. -
What 2 use-cases can public key cryptography be used for?
True encryption and as a Digital signature.
In encryption is when you resieve a massage in open network and only you can read it (true having the privete key)
As a Digital signature.is when you want to verify the identification of the sender of the massage.
Public and private key can be used to encrypt a message that is beign send though an unsecured channel.
A public key is a key that is generated and is public. the publick and private key “work” together. The private key is needed in order to be able to read a message that has been send using a certain public key
- public key cryptography is used in
- Digital signatures
- Encruption
-
We can compare the public and private keys to our email and password. Our public key works as the email. Is like an ID that everybody can see and that can send us thing to. On the other hand the private key acts more like the password since we need the private key in order to enter our email and read the content. (decrypt)
Encryption: You can use the other person’s public key to encrypt a message for him/her. Then they can use their private key to decrypt it.
Digital Signatures: You sign a message with your private key and then the receiver uses your signature and your public key in order to identify the message was from you.