Homework on Public and Private Keys - Questions

Describe the concept of public and private key with your own words.

    A private key and pulic key are mathmatically linked. The public key can be used

to encrypt data that only the private key can open. It is impossible to determine the private key from the public key.

What 2 use-cases can public key cryptography be used for?

   Some public key cryptograhpy use cases are, private messaging, HTTPS, Bitcoin
1 Like

Hi Lukasz! And what is the relationship between the public and private key?

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A private key is generated by your computer that is meant to keep private, and a public key is derived from it that is shared with the world.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures.
1 Like
  • Describe the concept of public and private key with your own words.
    It is used for encryption and digital signatures. A random number is generated for the private key and the public key is then derived from the private key. The public key is used to encrypt while the private key is used to decrypt, whomever holds the private key. The random number used for the private and public key are huge numbers so that it is impossible to generate the same private and public key. You cannot find the private key with just the public key, but you can find the public key with the private key.

  • What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures

1 Like
  1. public key is used to encrypt data to be sent to someone else, private key is used to decrypt data sent to you

  2. cryptocurrency transactions and digital signatures

1 Like
  1. a) Private key - is your unique ID created by your pc *not possible to recreate if lost. (used for decrypting)
    b) Public key - is your unique ID created depending on your Private key, for being able to send/receive information/transactions *not possible to trace back to your Private key. (used for encrypting)
  2. To encrypt messages and to create digital signatures.
1 Like

Hi @wafflemakr. Private key is used to encrypt sensitive data, as a signature(digital finger print). It can be used also to generate Public key with can be displayed publicly and decrypted using only your private key never other way round.

1 Like
  1. Public and private keys have a mathematical relationship allowing encryption of code in exchange of messages.

  2. Public key cryptography use cases:

  • Encryption (key use case in public cryptography)
  • Digital Signatures (key use case for transactions of Bitcoin)

:slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.

A private key gives you access to your bitcoin and is used to sign transactions and a public key is derived from a private key by hash cryptography. The public key can be seen by everyone and is your address for receiving messages or deposits.

  1. What 2 use-cases can public key cryptography be used for?
    One could be to receive messages and another could be to receive bitcoin. the public key can also be used to encrypt messages only readable to the intended recipient.
1 Like
  1. The public is a random potentially unique number that encrypts data it also can be shared publicly . On another hand the private key is the origin of the public key it is also encrypted and unique and stands for the digital signature of the holder. Its is possible to get the public key from a private one an not the other way around.
  2. Public keys can be used in crypto to share encrypted messages with the network they are also used for identity veryfication through signature.
1 Like
  • Describe the concept of public and private key with your own words.
    Public key and private keys are used to encrypt and decrypt the data. In Bitcoin space public key is used to receive the value over the blockchain network and private key is use to sign the transaction to send the value to someone else.
  • What 2 use-cases can public key cryptography be used for?
    It is used of encrypting a message and used for digital signature
1 Like
  1. A system that uses public and private keys will generate a unique number for each participant, this is the private key. A participant can now input the private key into the systems hashing function to generate a public key. The hashing function guarantees that the public key is now securely separated from the private key enabling transactions to occur without fear of discovery of the private key.
  2. Encryption and digital signatures are two use cases of public and private keys.
1 Like
  • Private keys are randomly generated, huge numbers that are used for security. The public key is generated using a specific formula similar to a hashing algorithm, so that a private key cannot be guessed using the public key.
  • The two main uses for public key cryptography are encryption and digital signatures. Encryption uses a public key from a public-private key pair to obscure data into a random looking string of gibberish that can only be read by using the private key to decode what it says. Digital signatures are unique identifiers created by private keys, and verified using the public keys of the senders of this digitally signed data. Bitcoin addresses are derived from the public keys of users, which are in turn derived from the private keys of those users. It is possible to send money to any public wallet address, but in order to digitally sign an outgoing transaction, you must have the private key. Because of the one-way nature of creating public keys from private, it is not possible to derive someone’s digital signature or private key from their public wallet address.
1 Like
  1. The way to send private message throw unencrypted channel. Private key is a random number. Public key is derived from private key. Anyone can use my public key to send me a message, but in order to open the message is my private key needed. There’s no other chance to open the message.

  2. Encryption - secure the message. Digital signatures - proof of identity of sender.

1 Like
  1. The private key is generated randomly by your computer which is then used to derive the public key. Basically, the private is the key that unlocks messages encrypted using the public key, whereas the public key is the key that is used to encrypt messages for the purposes of being decrypted by the private key.
  2. Encryption and Digital signatures
1 Like
  1. Private key- randomly generated number that you must keep secret, else you cannot sign off on transactions or prevent your coins from being stolen. Public key- number derived from private key, can share as if other people know it, you can decrypt messages they send to you or others can verify whether your signature and public key match up.
  2. Encryption and digital signatures
1 Like

Describe the concept of public and private key with your own words.

what I’ve come to understand is that concept of public and private keys is that the private key generates the public key. the public key is used to encrypt a message to the holder of the private key. only the holder of the private key can decode the message/s sent to him/her.

What 2 use-cases can public key cryptography be used for?

The 1st case used for is the encrypting of messages to send over a public network to communicate with a private key holder that generates a public key for anyone to use to get in touch with the private key holder.

The 2nd case use, typically in cryptocurrencies is called digital signatures. when bob receives a message from Alice, he can verify that Alice sent the message by seeing the digital signature and checking the public key and verify mathematically that it originated from the private key that created the public key. the signature is created with the private key.

1 Like

1.) A private key is a randomly generated number that you use to generate public keys, a public key can then be used to generate another key but any key generated can only be accessed by with the private key.

2.) Encrypting data and Digital Signatures

1 Like
  1. A public key derives from a private key, and it’s for everyone to see (as the name ‘public’ suggests). The private key, on the other hand, is to stay secret (yes, not ‘private’), your kept secret. It is generated, by the computer, from a very large and random number. The likelihood of the same private key being generated more than once is as good as impossible. The private key and the public key work in pair. The mathematical relationship between this pair is: anyone can use the public key to encrypt a message, but only the paired private key can decrypt the message.

  2. Public key cryptography can be used to encrypt messages, i.e. to add privacy to a communication line going on in a public environment, and to sign messages (encrypted or not) to establish the authenticity of the sender, i.e. one can mathematically verify that the private key that generated the public key and the signature (added to the message), matches.

1 Like
  1. A public key is shared with public. Private key is not available to the public.
  2. Encryption and digital signatures.
1 Like