1 - The public key used to encrypt a secret message to somebody and the private key is used to decrypt the message we receive , was encrypt with the public key.
2 - we use them on encryption and digital signatures ,
1 - The public key used to encrypt a secret message to somebody and the private key is used to decrypt the message we receive , was encrypt with the public key.
2 - we use them on encryption and digital signatures ,
Homework on Public and Private Keys - Questions
Describe the concept of public and private key with your own words.
Private key is a sequence of random numbers that you use to create a public key. You need both to access to your Bitcoin.
What 2 use-cases can public key cryptography be used for?
To sign and encrypt messages
Your Private key is a random number generated by computer that is your secret combination that, using a complicated hash algorithm will in turn generate your Public Key.
Your Public key is the key which can be seen by everyone and it is used to validate your digital signature.
private key = random generated large number wich is mathematically conversed into a public key, private key canāt be derrived from public key, anything encrypted can only be decrypted with private key.
sending message, sending fund / transaction of values
Describe the concept of public and private key with your own words.
Public and private keys are a key pair, they are cryptographically linked to each other.
The Public key is for the public to scrutinize, where the Private key is private.
Public keys are used to encrypt data, the private key decrypts that data.
Asymmetric encryption is what secures the whole system.
What 2 use-cases can public key cryptography be used for?
Encrypting data- apply encrypted data to someoneās public key as they can decrypt it using their private key.
Digital signature- by singing/sending a message via the private key, the public key shows that a message was sent by the private key, thus proving you own the private key.
A privet key is a random number generated uniquely to each user that can be used to decrypt messages or to sing on non decrypted massages and confirm the address they came from.
A public key will be generated from your private key and can be used to encrypt a massage or to confirm with the signature that the source is from a certain private key.
It my be used for old fashion encrypting or as digital signatures to confirm the source behind the order.
1 - Describe the concept of public and private key with your own words.
A public key is a very large random number that is used to sign or decrypt messages. The public key is derived from this using a one-way function in such a way that it is safe to broadcast this publicly while not revealing anything about the private key.
2 - What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used to either encrypt a messages or to sign a message (encrypted or not).
With encryption, the recipientās public key is used by the sender to encrypt the message. The recipient can then use their private key to decrypt this message.
With digital signatures, the private key is used to sign the message in such a way that the recipient can use the senderās public key to confirm that the message was indeed signed by the sender.
The concept of Private and Public keys has been around for a while. The idea is that your computer generates a Private Key that is really just a very large number. Really BIG! And is kept secret. Using a formula and this number, you can generate a public key. Other users or people can use your public key and the formula for encryption of messages to you and only your private/secret key can open it.
Through this concept the main 2 use-cases are Integrity and Verification of data and sender.
With a private key you create a public key and from a public key you create a Bitcoin address. A private key is a random large number generated on your computer (this key you must keep for yourself). With this private key and a special formular a public key is generated. Only public key is for sharing! You need a private key to be able to sign a transaction. If someone steal you private key, they can also steal your Bitcoins! Private and public keys can be used in 2 major use cases. USE CASE 1) If encryption is used (not so much used with crypto currency) and someone wants to send you a message, they need your public key. They send the message encrypted and only the one with this private key can open and read this message.
USE CASE 2) If digital signature is used (used with crypto currencies to verifying who send a message) then the private key is used for signing this message (it doesnāt need to be encrypted). With this signature and public key the receiver can then mathematically verify that both of these where generated from the same private key.
It can be used for encryption and for digital signatures.
Describe the concept of public and private key with your own words.
Bobās computer generates a private key and a public key which is derived from the private key.
The private key must be kept secret by the owner.
The public key can be shared at will.
Alice wants to send Bob a secret message: Alice uses Bobās public key to encrypt the message.
This encrypted message will appear as gibberish until it is decrypted using Bobās private key.
Therefore Aliceās original message can only be read by Bob because Bob is the only one who has the private key to decrypt the message.
What 2 use-cases can public key cryptography be used for?
Encryption: sending something secretly
Digital signature: identifying the sender of a message and verifying the integrity of the message
Describe the concept of public and private key with your own words.
A persons computer creates a public and private key (random number). The public key
is for the public to see. When a message is sent it is encrypted with
the public key. The only way to decrypt the message is with the private key.
What 2 use-cases can public key cryptography be used for?
Public key cryptophography uses encryption- sending a message on
an open network secretly, or encrypted.
Digital signatures identify yourself as the message sender and insure the integrity of
messages sent on an open network. You sign a transaction sent with the private key. The
only way to see the transaction is to compare it with the senders public key. Digital
signatures are mostly used in Bitcoin.
Describe the concept of public and private key with your own words.
Both are numbers that are used in the transaction process. Public is used to encrypt and direct messages. Private keys are used to decrpyt and sign transactions.
What 2 use-cases can public key cryptography be used for?
Public keys can be used to encrypt messages so that only the receiver decrpyts it. They are also used as a digital signature since the public key derives from the private, the receiver can make the connection of both and verify.