Homework on Public and Private Keys - Questions

  1. privat key is a random number known only to the “creater” of that number. The public key is derived from the private key via hash function and broadcasted to the public.

  2. encrypt entire messages and/or sign messages.

1 Like

Describe the concept of public and private key with your own words.

Private key is sort of a signature of an input (message, crypto-wallet, …) secured by encryption via SHA256 hash value generator function with highly secure methods…

Public key, as the name follows, is open to network, another hash value, useful at identifying the input like a transaction, a wallet address, simply a destination address. Public key gets generated inside of its private key with a special method called elliptic curve. Public keys are second layer to decrypt an input later by the reciever.

What 2 use-cases can public key cryptography be used for?

Best way to keep an information private between two person (transaction holders) and at the same time, keep the information able to track for later (public ledger) bitcoin uses asymmetrical encryption method.

1 Like
  1. Public Key is an identity to everyone to know it is you. Private key is the only real you if you lose it anyone can copy and be you.

  2. Public key cryptography is an address to allow people to send stuff to you (without being you). It also allows people to identify you without having your private key. (so they cant control your account)

Homework on Public & Private Keys

Describe the concept of public and private key with your own words.

  1. Public key and private keys can be used in two ways, Encryption and Digital Signature.
    With encryption for example a message being sent from person A to person B, person A has the computer generate random large numbers and create a private key. Through the private key a public key is generated. To encrypt the message person A would use Person B public key and encrypt the message that they want to send. Now the only person that can Encrypt that message is the person who has the private key of the public key.

They second is Digital signature which is how cryptocurrency use private and public keys.
When transactions are sent from 1 address to another, it use the private key to digitally sign the transaction. To verify that the person is the correct person that sent the transaction, mathematically you can verify the digital signature (private key) with there public key.

What 2 use-cases can public key cryptography be used for?

I believe that i answered with my examples above.
2 use case i showed are encrypting messages and Digital Signature.

1 Like
  1. A public key is derived from a private key. A private key cannot be derived from a public key. A public key can be used to encrypt a message that can only be decrypted using the private key. A public key can be used to verify a message that was signed by a private key. Private keys should be kept private. Public keys can be displayed to public safely.
    2.Encryption and Verification
1 Like
  1. Describe the concept of public and private key with your own words.

A. Private key is a computer random generated number, from which through a special formula is generated a public key. The public key can be shared anywhere. The private key is to remain private.

  1. What 2 use-cases can public key cryptography be used for?

A. Public and private key cryptography can be used for encryption and also as a digital signature.

1 Like

Correction Edit:

Describe the concept of public and private key with your own words.

They are key pairs and bring asymmetrical encryption method which is most secure way to communicate or transact. Public key as name follows is open to network like a mail box where the location is known. Before the transaction or messaging, users exhcange the public keys with each other, then message gets encrypted by sender with recipient’s public key then the recipient decrypts the message or transaction with its pair that called private key which never to be shared anywhere.

This method makes the secure-messaging-in-distance better than a symmetrical encryption that user had to send single encryption key to recipient which can be captured on the way.

What 2 use-cases can public key cryptography be used for?

Encrytion and Digital Signatures.

1 Like
  1. A public key is used to encrypt data when you can’t ensure privacy. The public key is generated by the private key. The private key decrypts data sent to the public key. Private key keep your anonymity.

  2. For your digital finger print for email or to confirm ownership. Also can be used in crypto currencies.

1 Like

Private key is randomly generated by computer. The public key is generated from the private key and is used to prove the ownership of an asset. There’s no way to decipher your private key from public key.

  • Encrypting messages
  • Digital signing
1 Like
  1. A public key allows encrypted data to be accessed publicly (in a pre-determined form that cannot be tampered with), while a private key will only allow permissioned users to access the data source as well as modify it if needed.

  2. A private key can be generated by the sender of a message in order to encrypt plain text format such as a signature, into a read only format for public key viewing. It helps to protect the identity and integrity of a message. Another example of using private key can happen for encrypting a personal wallet transaction, before deriving its public key from it for secure peer to peer communication.

1 Like
  • Describe the concept of public and private key with your own words.

Simply put, a public key is generated from a private key. A public key is what is shared with someone, like an email address, so that someone can send you a message or other transaction.

  • What 2 use-cases can public key cryptography be used for?

One example in which public key cryptography can be used for is to send a message in which the message itself is encrypted and sent. The message is then decrypted with the private key. Another case for its use is a digital signature. A digital signature can be attached to a transaction or message as a public key, which was generated with a private key.

1 Like
  1. Public Keys can sign a message or a transaction and it can be verified by public key also a public key can be used to encrypt a message to be decrypted later by private Key. With a private key you can generate a public key and with public key you can generate a btc-address
  2. Signature and en/decryption
1 Like
  1. A private key is a personal code that you have that is only visible to you. The private key can generate a public key that IS visible to others. The public key cannot be used to trace back to the private key.

  2. Encryption and Digital signiture

1 Like

Public key is an encrypted version on private key which is an encrypted version of a random number.

Everyone can know my public key to make sure that I am the one who signed the tax with my private key

But private key must be kept private!

Encryption
Digital signature

1 Like
  1. The concept of public and private keys is as follows:
    as a secure method of identification and/or sending a message, a person’s private key (a random string of numbers generated by a computer and held by the owner), conveys identity and/or the message through encryption by generating a related public key. The public key validates the identity of the private key owner and/or decrypts the information sent. While the public key is derived from the private key, the private key can not be derived from the public key.

  2. The two use-cases a public key can be used for are encryption and digital signatures.

1 Like

a public key is derived from a private key and can be signed in order to verify ownership.

securing messages and confirming apps are authentic and haven’t been tampered.

1 Like
  • Describe the concept of public and private key with your own words.
    -Private key is a random number generated by algorithm. Public key is a number derived from that private key. This cryptographic way of public and private key matching is one way function and collision resistant.
  • What 2 use-cases can public key cryptography be used for?
    -Cryptocurrency,digital signature
1 Like
  1. These are cryptographic tools. Private keys are extremely large and random numbers used to sign transactions and generate public keys. The public key is used to generate addresses.

  2. The two use cases for public and private key cryptography are encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Public and private key is an encryption/decryption system which can be used in either direction: Public-to-private to have others send you a secret message and private-to-public to confirm an identity.

  2. What 2 use-cases can public key cryptography be used for?
    Sending a private message and confirming identity.

1 Like
  1. Public and private keys are used to confirm transactions. A computer first generates a random number for a Private key and then a mathematical formula is used to generate a Public key from the Private key and then a Public address is also created. You cannot use a public address or public key to figure out the private key. Bitcoin does not keep track of addresses/wallets. It uses signatures from users’ private key to sign a transaction so that the nodes on the network can confirm that transaction is valid and add it to the block chain.

  2. Encryption and Digital Signatures

1 Like