1.- Private key: Its a random number generated by computer. Public key: It
s a code generated from private key.
2.- Cryptocurrencies and encrypted message.
Thank you very much.
I appreciate your compliment.
You can encrypt with 7zip, 7zip using method AES-256, thx for sharing another great encrypt software!
1. Describe the concept of public and private key with your own words.
Private key is kept secret and public key is derived from private key but it is not possible to work out the private key from it .
Public key can be shared with anyone
2. What 2 use-cases can public key cryptography be used for?
To encrpyt a message with someones public key so that only that person can read it by decrypting with the private key.
To sign a message with your private key so that other parties can decrypt with your public key , that way they know for sure that the message is coming from you.
Oooh, I did forget it.
Yes, I can! Digital signatures is a way for the reciever to know that the message comes from you. It’s like a fingerprint that you sign your message/transaction with. And you can be sure that nobody else but the reciever can read your message.
- Describe the concept of public and private key with your own words.
- What 2 use-cases can public key cryptography be used for?
answers:-
-
Your private key is generated by a computer that you should never share to others and keep it safe as it is the key to prove you are the lawful owner of the asset or information. You then create the public key from the private key by hashing it therefore there is a link between your private and public key. You then can share your public key with the public or anyone you wish to deal with. These people with deal with via your public key.
-
Public key cryptography can be used to encrypt a message or information that you can send in a network but only the person you send to would understand it. Also it can be used as digital signature which is an electronic form of signature that can be used to authenticate the identity of the sender of a message or a document and also to ensure that it has not been tampered.
The public key is not exactly a hash of the private key it is derived using another function called the elliptic curve
- Describe the concept of public and private key with your own words.
There is no concept in Bitcoin of a central authority tracking all existing accounts or wallets. Therefore, each wallet will contain a private and public key. The private key should only be known to the owner of the wallet - otherwise people can steal from you.
Whilst the public key - a derivative of the private key - can be used by anyone to send messages / TX to.
- What 2 use-cases can public key cryptography be used for?
a) encryption. Messages that are sent from A to B via an unsecure network need to be encrypted in order for only the recipient to receive the comprehendible message
b) digital signatures.
- Your private key is a random number generated by your computer, with this you can generate a public key which can be seen online.
2.The 2 use-cases are
1.) Encryption, where you encrypt your message with the recipients public key, so only the person with with the right private key can open it.
2.) Digital signatures. These are being used on the bitcoin network for verification. The sender generates a private and a public key, and then uses the private key to sign the message. The receiver can identify the private key of the sender from the public key.
-
Public and Private keys are used as a verification/identification mechanism and is mostly used for encrypting or creating digital signatures. Through the use of a mathematical formula, the private key derives a public key and its purpose is to be compared against the private key or any signature derived from this private key in order to verify if there is any relationship between the two.
-
Public key cryptography is mostly used in encryption and the digital signatures used in the transactions of the BitCoin Blockchain.
-
Describe the concept of public and private key with your own words.
Your computer generates a randomly huge number to create your private key. Your private key must be kept secret. From your private key, your computer generates your public key. This key is known throughout the entire internet ecosystem. There is no way to go from your public key to your private key. In bitcoin, your private key creates a public key and your public key creates your bitcoin wallet address. Private keys are used to digitally sign your transactions and are verified by your public key. -
What 2 use-cases can public key cryptography be used for?
Use case number one is encryption and Use case number two is digital signature.
-
Public key is encrypted information that is shared between private keys or numbers. Private keys keep the information safe. Public keys bundle the message and make it safe to transfer and only be opened by one recipient.
-
Signing digital documents and transferring coins or money.
You can send a message to the receiver that is encrypted and therefore private. Appreciate your review!
Sending an encrypted message to a receiver, which is therefore private.
The private key is generated by the CPU/Wallet/Hardware device which then derives your public key and BTC address. That is a one way street and can not go from address to public and private key route.
2. The two use case scenarios for public key cryptography are encryption (blogs, twitter, and not crypto) and digital signatures such as for crypto.
- Describe the concept of public and private key with your own words.
The computer generates a random number called a private key that must always kept safe and secret. The private key will then generate a public key that can be used and can be seen from everyone.
In bitcoin the private key will be used to sign transactions. - What 2 use-cases can public key cryptography be used for?
A public key can be used for (a)encryption and (b) in digital signatures.
- Describe the concept of public and private key with your own words.
Im not sure how a private numbers originates but its random and unique by a huge factor of non collission for you, this in turn through a hash system generates a public key and is one way and cannot be calculated backwards.
- What 2 use-cases can public key cryptography be used for? The first is sending a message, if you send them your private key they can calculate that you were the original sender of the message. also secondly its use in Bitcoin allows you to be recognised as the owner of the BTC and allowed to spend it not a great answer but im new LOL.
Public and Private Keys
- Describe the concept of public and private keys in your own words.
Public key is derived from private key, but the private key can’t be derived from public key. The private key, a large random number we want to keep private, decrypts info encrypted with the public key. - Two use cases for public keys are digital signatures and encryption.
-
Private key is generated and kept by the original owner. A public key is generated from the private key and this is shared anywhere with anyone (example. online accounts twitter/facebook). People are able to use this public key in order to send the original owner a message that becomes encrypted and only able to be opened by the private key.
-
Encryption and Message signatures.
Not exactly, public keys are derived using an elliptic curve which is a different kind of non reversible function.
What you describe are both digital signatures you can sign a message or a transaction. Can you figure out another use case for public key cryptography?