Homework on Public and Private Keys - Questions

1 - The public key used to encrypt a secret message to somebody and the private key is used to decrypt the message we receive , was encrypt with the public key.

2 - we use them on encryption and digital signatures ,

  1. A private key is a 256 bit hash of a randomly generated sequence of characters. A public key is derived from the private key but it is almost impossible to derive the private key from the public key. Public keys can be shared and any information sent to the public address can be accessed with the private key. Therefore the private key must not be shared.
  2. Public key cryptography can be used for encrypting data and also for signing/verifying digital signatures.

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Your private key allows you to decrypt an encrypted message someone sent you using your public key. No one can back track from your public key to private key. Your private key is for your eyes only and public key is for everyone else.
  2. What 2 use-cases can public key cryptography be used for?
    To encrypt messages and to send funds to someone using your private key to their public key. (Hope that makes sense, lol)
1 Like
  1. A public key is the private key but hashed, and the private key is the wallet or something like your fingerprint.
  2. a) to sign encrypted messages, so who recieves the message know it is yours
    b) to send money (cryptocurrencies)
  1. Describe the concept of public and private key with your own words.
    Private key is a sequence of random numbers that you use to create a public key. You need both to access to your Bitcoin.

  2. What 2 use-cases can public key cryptography be used for?
    To sign and encrypt messages

  1. Describe the concept of public and private key with your own words?
    A random personalized number = Private key.
    Public key is generated from a private key in order to send transactions amongst different Private keys ā€œits like a masquerade partyā€.
  2. What two use cases can public key cryptography be used for?
    Encryption: encrypted transaction are send from private keys to others using public keys
    Digital Signature: Senders digital signature (Private key)
  1. Describe the concept of public and private key with your own words.
    Public key is on the open ledger for everyone to see. Used to sign a transaction and verify.
    Private key is a longer character number/letter, that is used to access funds. To be kept secret, preferable offline in an hardware wallet.
  2. What 2 use-cases can public key cryptography be used for?
    Digital signature and encryption
  1. Your public key can be used to encrypt data that is intended for you and can be decrypted using your private key they are normally used to send messages over a unsecure connection or You can turn your private key into a digital signature and then the person who receives the message or transaction can then verify if it is you or not.
  2. The 2 use cases are Digital signatures and Encrypting data.

Your Private key is a random number generated by computer that is your secret combination that, using a complicated hash algorithm will in turn generate your Public Key.
Your Public key is the key which can be seen by everyone and it is used to validate your digital signature.

  1. The private key is your own and you don’t share it. Instead you use the public key which is generated from the private one.
  2. For encryption and digital signatures.
  1. private key = random generated large number wich is mathematically conversed into a public key, private key can’t be derrived from public key, anything encrypted can only be decrypted with private key.

  2. sending message, sending fund / transaction of values

Describe the concept of public and private key with your own words.

Public and private keys are a key pair, they are cryptographically linked to each other.

The Public key is for the public to scrutinize, where the Private key is private.

Public keys are used to encrypt data, the private key decrypts that data.

Asymmetric encryption is what secures the whole system.

What 2 use-cases can public key cryptography be used for?

  1. Encrypting data- apply encrypted data to someone’s public key as they can decrypt it using their private key.

  2. Digital signature- by singing/sending a message via the private key, the public key shows that a message was sent by the private key, thus proving you own the private key.

  1. A private key is for you and no one else, it is used to create a public key which may be seen by anyone so people know when a message or transaction with your private key is signed, the private key = public key.
  2. To be able to know it is you that has sent the transaction or message (signature)
    To be able to securely send a message to another person without people that are spying on the network gek t to know what the message meant.
  1. A privet key is a random number generated uniquely to each user that can be used to decrypt messages or to sing on non decrypted massages and confirm the address they came from.
    A public key will be generated from your private key and can be used to encrypt a massage or to confirm with the signature that the source is from a certain private key.

  2. It my be used for old fashion encrypting or as digital signatures to confirm the source behind the order.

1 - Describe the concept of public and private key with your own words.
A public key is a very large random number that is used to sign or decrypt messages. The public key is derived from this using a one-way function in such a way that it is safe to broadcast this publicly while not revealing anything about the private key.

2 - What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used to either encrypt a messages or to sign a message (encrypted or not).

With encryption, the recipient’s public key is used by the sender to encrypt the message. The recipient can then use their private key to decrypt this message.

With digital signatures, the private key is used to sign the message in such a way that the recipient can use the sender’s public key to confirm that the message was indeed signed by the sender.

  • The concept of Private and Public keys has been around for a while. The idea is that your computer generates a Private Key that is really just a very large number. Really BIG! And is kept secret. Using a formula and this number, you can generate a public key. Other users or people can use your public key and the formula for encryption of messages to you and only your private/secret key can open it.

  • Through this concept the main 2 use-cases are Integrity and Verification of data and sender.

  1. With a private key you create a public key and from a public key you create a Bitcoin address. A private key is a random large number generated on your computer (this key you must keep for yourself). With this private key and a special formular a public key is generated. Only public key is for sharing! You need a private key to be able to sign a transaction. If someone steal you private key, they can also steal your Bitcoins! Private and public keys can be used in 2 major use cases. USE CASE 1) If encryption is used (not so much used with crypto currency) and someone wants to send you a message, they need your public key. They send the message encrypted and only the one with this private key can open and read this message.
    USE CASE 2) If digital signature is used (used with crypto currencies to verifying who send a message) then the private key is used for signing this message (it doesn’t need to be encrypted). With this signature and public key the receiver can then mathematically verify that both of these where generated from the same private key.

  2. It can be used for encryption and for digital signatures.

Describe the concept of public and private key with your own words.
Bob’s computer generates a private key and a public key which is derived from the private key.
The private key must be kept secret by the owner.
The public key can be shared at will.
Alice wants to send Bob a secret message: Alice uses Bob’s public key to encrypt the message.
This encrypted message will appear as gibberish until it is decrypted using Bob’s private key.
Therefore Alice’s original message can only be read by Bob because Bob is the only one who has the private key to decrypt the message.

What 2 use-cases can public key cryptography be used for?
Encryption: sending something secretly
Digital signature: identifying the sender of a message and verifying the integrity of the message

Describe the concept of public and private key with your own words.

A persons computer creates a public and private key (random number). The public key
is for the public to see. When a message is sent it is encrypted with
the public key. The only way to decrypt the message is with the private key.

What 2 use-cases can public key cryptography be used for?

Public key cryptophography uses encryption- sending a message on
an open network secretly, or encrypted.

Digital signatures identify yourself as the message sender and insure the integrity of
messages sent on an open network. You sign a transaction sent with the private key. The
only way to see the transaction is to compare it with the senders public key. Digital
signatures are mostly used in Bitcoin.

  1. Describe the concept of public and private key with your own words.
    Both are numbers that are used in the transaction process. Public is used to encrypt and direct messages. Private keys are used to decrpyt and sign transactions.

  2. What 2 use-cases can public key cryptography be used for?
    Public keys can be used to encrypt messages so that only the receiver decrpyts it. They are also used as a digital signature since the public key derives from the private, the receiver can make the connection of both and verify.