Homework on Public and Private Keys - Questions

1 Describe the concept of public and private key with your own words.
a public key comes from a private key, basically a random very large number is hashed and makes a public key. From this public key it is impossible to go back to the private key.
a public key can be shared, a private key should never be shared.
a private key can also be used to sign a document
2 What 2 use-cases can public key cryptography be used for?
-public keys can be used to crypt any message that than can only be uncrypted by the private key.
-a public key can be used to create a bitcoin address

  1. A private key serves as a unique digital signature that is known only to the person who generates it. The private key is then sent through a formula that produces a public key that can be used on a public network.

  2. Encryption and Digital Signature

  1. Describe the concept of public and private key with your own words. A private key an extremely large random number. A public key is then derived from the private key using a one way function. In Bitcoin an address is derived from the public key using another one way function.
  2. What 2 use-cases can public key cryptography be used for? Public key cryptography can be used for encryption and digital signatures.

1. Describe the concept of public and private key with your own words

The main difference between public key and private key in cryptography is that the public key is used for data encryption while the private key is used for data decryption.

The public key and private key are two locking mechanisms used in asymmetric encryption of cryptography. Public key is a type of lock used with an encryption algorithm to convert the message to an unreadable form. Private key is a type of lock used with a decryption algorithm to convert the received message back to the original message. Both these keys help to ensure the security of the exchanged data. In brief, a message encrypted with the public key cannot be decrypted without using the corresponding private key.

2. What 2 use-cases can public key cryptography be used for?

  • Encryption
  • Digital Signatures

1. Describe the concept of public and private key with your own words.
In encryption, a random, computer-generated number is created which is a private key. Another number is then derived from that private key, resulting in a public key. It is “public” because third parties are privy to it.

2. What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used for messages and for bitcoin transactions.

  1. The Private Key is a randomly generated secret number. Through a special formula, a Public Key can be generated from that. The Public Key can be shared to receive messages. Those messages can then be opened with the Private Key.
    One can also send a message that is digitally signed with the Private Key and the receiver can verify that it was you who sent it by checking the Public Key.

  2. See answer one

  1. The private key is a random number generated that should be keep in secret. From this private key, through an alghorithm, a public key is derived. This key identify you and works as an adress.
  2. Encryption and digital signature. The last is most used in blockchain technlogy.
  1. Describe the concept of public and private key with your own words.
    Private keys are randomly generated strings or derived from a set of seed words that are sent through sha-256. Public keys are generated from the private keys, but they cannot be used in reverse to generate the private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption of data or messages or for digital signatures to sign a transaction using the private key.

1, A public key is open for others to see and enables data to be transferred using it but the private key is not visible to others and secures the data. The public key is derived from the private key.

2, use cases are encryption and digital signatures.

Public key and private key are used in pair in public-key cryptography. This pair is used for encryption and digital signature.

If Alice wants to send an encrypted message to Bob, she needs to use Bob’s public key, which is open to the public (on his website, on his Twitter account, or elsewhere), and encrypt the message with it. To generate his public key, Bob had to take his private key (which is a randomly generated number), that he must keep secret, and convert it to a public key through an algorithmic function . Bob’s public key is derived from his private key. However, it is unfeasible for anyone to reverse the function and to get to the private key from the public key (this is why this is called as well asymetric cryptography).

Now, when Bob needs to decrypt Alice’s message and read it, he uses his private key (that only him knows) to do so. His private key is paired with his public key.

Public-key cryptography is used for digital signatures as well, and in particular in blockchain.

A blockchain transaction is digitally signed with one’s private key. Let’s say that Bob signs a transaction with his private key. Everyone who knows Bob’s public key can verify with his public key that he is the author of the transaction (he digitally signed it), again through public/private key pairing, without knowing Bob’s private key of course, but knowing his public key.

Two use cases:

  1. Digital signatures in Bitcoin
  2. HTTPS (when I connect to a secure site) is using public key cryptography to encrypt data while the connection is established.
  1. public and private keys is a form of encryption where a person would generate a large number which would be their private key and then would hash that to create their public so that their public key can be used to create encrypted messages that only the private key can decrypt.

  2. sending encrypted messages to a person with the private key to ensure privacy and to verify your identity.

  1. Public and private keys are paired. A private key cannot be derived from a public key but a public key can be derived from a private key. A message can be encrypted with a public key and then read using a private key. If the private key is lost the message cannot be decrypted. The public key can be used to verify the private key of a message. When you send a BTC transaction, the private key signs that transaction.
  2. Public key cryptography can be used for encryption and digital signatures.
  1. Describe the concept of public and private key with your own words.

A public key is cryptographically generated from a private key so it can be used to represent key/address linked to the user in possession of private key. Private key on the other hand is randomly generated unique sequence of characters by cryptographic algorithm and it should be kept in secret for security. Generation of public key is one way function and it is practically impossible to derive the private key from it. It is safe to share your public key with others for transaction purposes but if you do the same with your private key you risk losing control over your assets. Not your (private) keys, not your coins. :slight_smile:

  1. What 2 use-cases can public key cryptography be used for?

a) Message encryption

b) Digital Signatures

Public key is a random number derived from the private key.
A private key is a number generated from your computer. A private key cannot be figured out through your public key.

Public key can be used to send encrypted messages. Also a public key can be shared to receive digital money like bitcoin

  • Describe the concept of public and private key with your own words.
    • A private key, which is a very large random number, is used to generate is public key. The public key is shared and there is no way to get the private key from the public key, as probability is so low.
  • What 2 use-cases can public key cryptography be used for?
    • A) Encryption of a message – so only the holder of the private key can decrypt.
    • B) Digital Signatures – so that the receiver knows that the information came from the creator of a private key.
  1. To get started with private key cryptography first your computer will create a string of numbers, this string will then be used as your private key and nobody else should be able to see it but you. The public key derives from your private key and is directly connected to it, because if you use a digital signature made by the private key and use the public key you can verify that the message is correctly correlated to the encrypted private key.

  2. Public key cryptography can be used in any usecase where the identity and ownership needs to be verified, for instance if you want to sell your car, you could directly connect the identity numbers on the car to your name and prove that the car has never been stolen.

Or if you where in Africa volunteering in the medical field and you wanted to send any confidental documents about a new disease to your country of origin but you do not want it to be leaked for the world to see and panic, you could encrypt the document, sign it and this will only allow the recipients to see it.

  1. The computer generates a private key and this is used to create the Public Key. The Private key is your PIN number, the public key is your account number.
  2. Encryption. Used to verify it is you on a public network, and Digital Signatures, which is what Bitcoin uses.

Alice sends out pk and encrypts all messages with sk so that people can use pk and know it’s from her. Message encryption and identification (digital sign)

  1. Public key and private key are used in cryptography to encrypt and decrypt messages. Private key is a random number from which a public key is derived.
  2. Encryption and Digital signature are the two use cases.

Private key: enables you to sign and be identified by someone who receives something from you. Also lets only you read encrypted messages that you receive from someone who use your public key to encrypt their messages.
Public key: Other people can use it to verfiy that the sign on a message comes really from you. You can use the public keys from someone else to encrypt a message by urself.

1st usecase: Encryption - Let’s you use someone elses public key to encrypt a message so that only the person whom public key you used can understand it.
2nd usecase: Digital signature - If you want to make sure that a message from Person A really comes from person A and not person B, you can take person A’s public key and compare it with the sign that comes along with the message you receive. This is very important for bitcoin, because you do not have a central Entity who keeps track with all accounts.