Homework on Public and Private Keys - Questions

Describe the concept of public and private key with your own words.

The concept is to send encrypted messages over an unsecured network. Tryout free software 7zip to try public and private key method.

What 2 use-cases can public key cryptography be used for?

Sending encrypted messages or digital signatures (for sending funds).

1 Like

A public key is used to encrypt messages, and is published so that anyone can send a secure message to a particular receiver. A private key can be used to decrypt messages encrypted with a matching public key. In cryptocurrency, the private key is a sophisticated form of cryptography that allows a user to access his or her cryptocurrency, and its programmed security helps to protect a user from theft and unauthorized access to funds.

The public key can be used to encrypt messages (decrypted using a private key) . Public key cryptography is also used as digital signatures.

1 Like

You forgot to mention digital signatures. They are quite important. Do you think you could explain why? :smiley:

1 Like

1, A public key is derived from a private key. You can generate a private key , which is a random number that only you know. The public key can be viewed by anyone, and in the case of sending an encrypted message the sender will use the public key, which was derived from the private key. There for when a message is sent via the public key, You will receive it through the private key. With the private key only you will be able to read the message.

2.Encryption and digital signatures.

1 Like
  1. The computer generates a large random number which becomes the private key. The private key is used in a mathematical operation to generate the public key. The public key may be shared with everyone and it is impossible to determine the private key from the public key.
  2. The two use cases are encryption and signature.
1 Like

You get the public key as soon as you get it out of the elliptic curve function :slight_smile: This number is then hashed using SHA256 and RIPEMD160 so you get the address. They indeed also contain a checksum and are prefixed with a number to identify them.
The base58 however is just an encoding which is like decimal or hexadecimal (or base 16) which means that instead of 10 or 16 characters uses 58 of them to make them shorter and easier to read :slight_smile:

2 Likes

The public key is derived from the private key which means its not really random, the private key however is :slight_smile: and the transaction is signed with a private key and can be verified using the public key :slight_smile:
You can also encrypt messages using the public key which can then be decrypted using the private key.

1 Like

7zip is for compressing files, don’t know if you can encrypt them as well. If you really want to play with encrypting messages using public and private key, you should try out GPG :slight_smile: if you’re using windows, try Gpg4win.

1 Like
  1. Describe the concept of public and private key with your own words.
    R:The private key is a randomly generated number while the public key is generated from the private key. You can always go from the private key to the public key but never other way around.

  2. What 2 use-cases can public key cryptography be used for?
    R: Encryption and digital signature

1 Like
  1. The public key is what everyone can see. The public key is mathematically derived from the private key. Initially, the private key is a random number. You can get a public key out of a private key, but you can’t get a private key out of a public key.
  2. It’s used for encryption and digital signatures.
1 Like
  • 1 the public key is a number generated from a private key, an a private key is just a randomly generated big number that is not feasible to guess.
  • 2 Sign messages or encrypt messages.
1 Like
  1. A private key is an exceptionally large random number. A mathematical formula is used and with the private key as input the public key is generated. It is important to store the private key safe and to not lose it.
    The private key is used to sign messages or transactions. Together with the public key it can be verified that the transaction was sent from the right person.
  2. The two major use cases are encryption and digital signatures.
    For encryption other people use your public key. Thereafter only you can decrypt the message with your private key.
    For digital signature you use the private key and other people can check the signature with your public key.
1 Like
  1. Describe the concept of public and private key with your own words. - The concept is high level of security based on the generation of random numbers. The random number Private key is a set of random numbers generated from your computer. The public key is then a random set of numbers that are generated using your private key. You go from private key to public key but you cannot go from public key to private.
  2. What 2 use-cases can public key cryptography be used for? - Signing a smart contract and sending your wallet receive address to receive Bitcoin.
1 Like

Describe the concept of public and private key with your own words.

Private key is a random number.
Public key is generated from private key.
Public keys are used to encrypt messages and to verify signatures.
Private keys are used to decrypt messages and to sign messages.

What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures.

1 Like
  1. Public and private key pairs enable encrypted messages to be sent between two people (or two addresses). Public keys are generated from private keys. Public keys are required to send messages from one address to another, while private keys are required to open those messages. This is a form of cryptography and it is how bitcoins are sent from one wallet to another.

  2. Public key cryptography can be used to send encrypted messages or to enable digital signatures.

1 Like

1 Public and private keys are used to encrypt and decrypt messages or transactions in bitcoin. A private key is for you and only you and it is a random number generated by a mathematical function. A public key can be derived from a private key and the public key is viewable by the public. Private to decrypt and public to encrypt.
2 encryption and digital signatures are two most used cases.

1 Like
  1. For me in my own words,
    My Public key - is my official publicize set of characters that is visible
    to the public. This public key was actually derived from my private key,
    While my Private Key is a set of random numbers generated from my computer. This
    will serve as my ultimate secret or hidden gem, hidden
    treasure that I will kept exclusively to myself and actually guard it with my whole life.

  2. For Encryption and for Digital signatures.

1 Like

These two are both examples of digital signatures. Can you find another example? :wink:

1 Like

Good, very good! :smiley:

2 Likes
  1. Describe the concept of public and private key with your own words.
A private key is a set of unique numbers generated for your own personal use when sending data.

A public key is generated by the private key for public use.
  1. What 2 use-cases can public key cryptography be used for?

Sending sums of money and sending private messages
1 Like