- In bitcoin, a public key (address) can only receive funds. The private key allows us to spend them.
- We use public keys to encrypt a message so that only the private key owner can decrypt them. And we use them alongside with digital signatures to verify that something has been signed with a private key, without actually ever knowing the private key.
A private key is a randomized number unique to your account specifically. This private key is the “codex” for any future encryptions used for public keys; making secure knowledge/storage of the private key mandatory. The public key is derived from the private key allowing for secure communication and/or transactions.
- Describe the concept of public and private key with your own words.
- Public key can be seen by everyone and a private key is secret and is used to decrypt or digitally sign.
- What 2 use-cases can public key cryptography be used for?
- Encryption and digital signatures.
-
Describe the concept of public and private key with your own words.
Randomized number for security and encryption. This will give you the opportunity to generate a
public representation of that number for verification and transference -
What 2 use-cases can public key cryptography be used for?
Digital signatures and encrypting data
- Public key is a key that is visible for everyone and everyone can use it to communicate with me, or whatever. Private key is a key that is only known to me. Public key is derivative of the private key and this is the verification point. So if I sign some message with private key, with my public key this person will know if the message was really sent by me.
- 2 use cases are - encryption or digital signature
The concept of public and private keys are that private keys are a one way function used to create the public key. The public key plus the digital signature can be used to correspond to the private key. Important to note that the private key should be kept very private and not shared as this can result in loss of funds and the public key can be sahred publicly.
The 2 use cases of public key cryptography are encrypting messages and digital signatures.
-
Private key is the original generated big number that only you as the owner should know of. Public key is then derived from it and can be shared with others. Those keypairs can then be used in message encryption and signatures. Anyone can use a public key to encrypt a message, but only its private key is able to decrypt it. A private key can also create a signature against a message which everyone with its public key can verify that the signature does indeed originate from that private key, without actually knowing it.
-
As already described in 1. answer, keys can be used to initiate a secure communication between two parties (encrypting messages) and providing digital signatures to prove the authenticity of the message (signatures).
A1. They are used in cryptography to encrypt data. The public key is shared “publically” and the private key is “privately” stored on the “encryptors” device.
A2. encrypting data and digitally signing the data so the origin/author can be verified by their public key
A private key is a random number that is your key for encrypting data. A hashing algorithim is used to create a public key to be shared. If someone encrypts data with your public key then you may use the private key to decrypt.
Public key cryptography can be used for encrypting data and secured signatures.
-
Private key is a random # that a computer can generate. User keeps private key and never shares it. User generates a public key from their private key. Anyone who has a public key can view/access messages that were encrypted via the private key. This way you can decide who you can share data/messages with securely.
-
What 2 use-cases can public key cryptography be used for?
a. Encrypt/decrypt messages for privacy purposes
b. Create digital signatures such as bitcoin address to uniquely identify sender/owner
- Describe the concept of public and private key with your own words?
Each user has a public (which anyone has visibility of) and a private key (which only the user has access too). When a user 1 sends a message to user 2 they encrypt it with the the public key of user 2. User 2 can then use their private key to decrypt the message using their private key. As the public key is derived from the private key only user 2 can decrypt the message. This ensures that only the receiver and sender can view the message. This is useful when sent over a public network.
- What 2 use-cases can public key cryptography be used for?
Encryption
Digital signature
- Private key is a random number (kept private), the public key is made from the private one, for everyone to see. They can use this to send encrypted messages and transactions to the privet key holder.
- Encryption, digital signature
- Describe the concept of public and private key with your own words.
A private key is a long random number generated by computer. A public key can be generated from that private key by performing some functions but cannot be reversed.
the private key is to be kept safe and secure.
The public key can be shared with the whole network This can be linked with your private key proving ownership of the data connected to that private key.
- What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used for encryption or like in bitcoin as a digital signature.
a public key is publicly used to encrypt receiving correspondence.
the recipient is able to decrypt messages by it’s secret private key.
(like digests it is not possible to derive a private key from a public key)
the holder of a private key is able to sign messages, the recipient
of the signed message is able to clearly identify the sender by the combination of signature and public key.
digital signature (verification)
encryption
- A public key is used for generating a wallet address which is used for sending or receiving crypto currencies like bitcoin. The Private key is a random number generated by your computer which can not be seen by anyone else.
- The two use-cases are encryption for sending secure information like email and digital signatures for the verification of parties sending money to each other.
-
Public keys are used to encrypt information you do not want anyone other than the recipient to see.
Private keys are used to decrypt the information sent from the public keys. Private keys can also be used to create a digital signatures like in Bitcoin. -
The 2 use cases public key cryptography can be used for is to:
A) Encrypt a message
B) Create a Digital Signature
Homework on public and private keys -
Questions Describe the concept of public and private key in your own words.
It is an encryption scheme in which each person has two keys.
One public and one private. For sending messages, the public key may be known by some people. But the private key should only be known by the owner of that key.
what the public and private key system does is encrypt the content of the message, that is, make it unreadable and virtually impossible to break the encryption.
The only person who can decrypt the message is the person who owns the private key that corresponds to the public key.
To initiate communication, all that is required is that, before initiating secret communication, each must obtain the public key from the other and each take care of his private key.
For what 2 use cases can public key cryptography be used?
Public key algorithms are the fundamental ingredients of security, encryption of the key or public key and digital signatures are performed.
[quote=“ivan, post:1, topic:8431”]
-
Describe the concept of public and private key with your own words.
A public key is a code made from the private key. They work together in the sense that information that is sent to the public is then verified by the private key accessing it. -
What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures.
1 The private key is the one that you generate and you keep it private. The private key encrypts the message you send and it decrypts messages you receive. Private key does digital signatures.
The public key is generated from the private key. You give this to other people as your address. You can send msg’s or coins through your public key.
2 crypto coins and digital signing
- public key is the output function and private key is the input function. It only goes from input to output (One way function).
- sending encrypted messages to another person without anyone being able to guess or interfere with the message. Byzantine General Problem. Byzantine Fault. Money, information or any data that you dont want other people to see.