Homework on Public and Private Keys - Questions

  1. a. Digital signatures are more commonly used in cryptocurrencies. The receiver in this case wants to verify the message (which could be unencrypted) is coming from the desired sender. In this case the sender uses a private key (large random number) to sign the message. The sender also generates a public key from the private key and shares openly, in particular with the receiver. The receiver uses the public key to determine the message came from the sender who generated the private key. In the case of Bitcoin for example, an extra step is used and that is the public key for added security is used to generate the address.
    b. For encryption, the receiver generates a private key (large random number) to generate a public key using a mathematical formula. This public key is shared openly, in particular with the sender. The sender uses the public key to encrypt the message. The encrypted message is not readable by the general public. However the encrypted message can be read by the receiver using the private key.
  2. encryption and digital signatures
1 Like
  1. Public key is generated from a private key. A public key can be use to send message to someone who will decrypt it using his/her own private key.
    You can use a private key to access a public key but cannot access a private key using a public key.

  2. The 2 use cases are
    a. Encryption when sending message using a public key.
    b. Digital signature that identifies where the message is coming from as it is signed by the sender.

1 Like
  • Describe the concept of public and private key with your own words.
    the public key is used as an encryption layer and the private key is a digital signature used to verify a transaction and accept transactions

  • What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures

1 Like
  1. The private key is your personal digital signature ,a fingerprint used for controlling digital assets, decrypt messages and data . It is important to keep this key private and secure.
    The public key can be shared with everyone and is used to send encrypted messages or for people to send cryptocurrency to you. The public key is generated from the private key.

  2. Two cases public key cryptography can be used for are encryption and digital signatures .

1 Like

A Private Key is like a personal safety deposit box key, which you would never share with anyone (unless you wanted them to steal your money!). However, you can use a private key to generate a public key. This public key can be safely shared, and it will allow others to deposit money directly into your safety deposit box J

When ‘others’, send a message or transaction by using a public key it becomes encrypted and only the person with the corresponding private key has the ability to decode the message and/or receive the transaction.

The two use cases of the public key are firstly encryption. A sender can encrypt a message or transaction by using the public key of the recipient.

Second use case is as a digital signature. It enables a recipient to verify the source of a message (or transaction) by cross-checking the digital signature with the public key of the sender.

1 Like
  1. Describe the concept of public and private key with your own words.
    a public key and a private key are character sequences where when one is used to encrypt a data only the other can decrypt thus assuring origin and confidenciality.

  2. What 2 use-cases can public key cryptography be used for?
    1 - the whole data is crytographed.
    2 - you run the hash the data and encrypt it and send, certifying the origin and content, the other part can run decypher and compare the hash.

1 Like

Describe the concept of public and private key with your own words.
A private key is a random, typically very long, generated number and must always remain secret. The public key is generated using complex cryptography from the private key (used as a scalar) and is the result of a one-way function, and can be observed publicly. These two numbers are then known as a private/public pair.
Then the two numbers can be used together in a related process known as “signing” or “signature” recognition to validate identity and ensure legitimacy and privacy of a transfer of information or value.

What 2 use-cases can public key cryptography be used for?
To validate the ownership and secure status of a website to a reasonable degree when visiting it with a browser, and to securely transmit and store data or value on a distributed ledger.

1 Like
  1. Public key is a random number which is created with the private key. Its used to send message / transactions in a save way on an open public network.
  2. Puplic key is used to encript messages or transactions and that noone can decript the information inside. Only the private key can be used to decript the message / transaction. Private key is also used to sign transactions / messages.
1 Like

Homework on Public and Private Keys - Questions

1. Describe the concept of the public and private key with your own words.
The public key is generated out of the private key which makes it a pair. The public key is known by the public while the private key is kept secret from others. Those keys are used to sign, encrypt, and decypher cryptography.

2. What 2 use-cases can public-key cryptography be used for?

  1. The public key can be used for cryptography to encrypt messages.
  2. The public key is used in cryptocurrency to receive coins. Signatures from the private key are made to transactions to verify these with the public key to see if the right person actually sends those coins.
1 Like
  1. Describe the concept of public and private key with your own words.
    the public key is generated by the private key to send over funds encrypted and can be seen on the block chain where as a public key is private and only the end user can see the data sent

  2. What 2 use-cases can public key cryptography be used for?
    the use cases are the encryption and digital signiture

1 Like

1. Describe the concept of public and private key with your own words.

The private key is a random number put together by your computer. It is so big that the probability of someone having the same are like cero. With the Private Key you can generate a Public Key that is for you to share with others in order to receive transactions or messages. Others can use your Public Key to encrypt messages for you, that only you can unlock with your Private Key. The Private key will also able you to send and recive transactions, and that is why it is private and not at any time must be shared.

2. What 2 use-cases can public key cryptography be used for?

Encryption of messages and to recive messages and cryptocurrency

1 Like
  1. public and private key, serve as a tool for encrypting and decrypting transactions. any legit private and public key pair, is automatically a legit BTC address.

  2. Encryption and Digital Signatures

1 Like

1.- Public keys allow the transfer of data in the blockchain. Private keys allow for the signing and spending of crypto funds.

2,. a) for the encryption of data and for b) adding digital signatures

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

A private key is randomly generated and you can produce a public key from this. A public key can be seen by anyone however a private key should be kept to yourself. If someone gains access to you private key, they can access you messages if they are encrypted or gain access to your crypto wallet.

  1. What 2 use-cases can public key cryptography be used for?

Encryption - sending encoded messages on a public network intended for specific recipients.

Digital Signatures - verifying the identity of someone making a transaction or sending information.

1 Like
  1. It’s like a transformation tool for your data. If you have a friends public key, encrypt it with your private key and send it to them, then they can transform it back with your private key.

  2. E-mail encryption and Bitcoin transactions

1 Like

1 The private key is a random number generated by the computer and also generate a public key based on the private key, Then you used the public key to encrypt a message you want to send to someone special and then that person with his private key can decrypt the message and read it.
2 for encryption and for digital signatures the second one is the most used in Bitcoin to verify a message or a sender

1 Like
  1. private key is personal and used to generate public key. public key is used to encrypt data. private key is used to decrypt same data

  2. encrypt data sent over public internet
    encrypt bitcoin addresses.

1 Like

Describe the concept of public and private key with your own words.
The main difference between a public key vs private key is that one encrypts while the other decrypts. Private key can generate a public key but not vice versa.

What 2 use-cases can public key cryptography be used for?
Encryption and Verify digital identity.

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is like a digital identity record which, if stolen, can be very costly! The public key is like a safe way of doing transactions without someone seeing, like your CC pin number for example.

  2. What 2 use-cases can public key cryptography be used for?
    It can be used to encrypt transactions and to digitally sign for verification purposes.

2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is a randomly selected number by a user. A public key is derived from inputting the private key through a cryptographic function as the output. The private key should be kept secret and safe by the user because it is the only feasible way to decrypt or digitally sign a public key.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used for encryption and digital signatures.

1 Like