-
public key is the box which anyone in the public can lock up a bit of data so that no one else can access it and then send back to the person who issued the public key, who will be able to privately unlock it
-
a) secure email b) blockchain records
A public key is used to send transactions or data that are encrypted. But this encrypted data can only be recovered by your private key they keys are connected and with such a huge number that it is infeasible to guess it.
2. For example if Mark were to send Carol a message he uses her public key and gives her a signature that indicates that it came from marks private key now Carol wants to be sure that it isnât a fake Mark so she verifies it.
Or if Carol now is in financial trouble Mark can send her a transaction of bitcoins through a public key.
-
Describe the concept of public and private key with your own words.
- Public Keys r algorithmically generated numbers derived from âPrivate Keysâ which is used for identification, n Security purposes.
- Private keys should be protected n kept secret at all costs
- There is no was to decipher a Private key from the public key.
-
What 2 use-cases can public key cryptography be used for?
- Encryption
- Digital Signatures
Homework on Public and Private Keys - Questions
-
Describe the concept of public and private key with your own words.
A private key is a large number, generated at random by the computer. That private key can then be used to generate a public key. However youâre going to use the keys, itâs important that you protect your private key, while itâs common to spread the public key freely on the internet or otherwise. -
What 2 use-cases can public key cryptography be used for?
First you have encryption, where anyone can use your public key to encrypt some information. The only why to decrypt that information will then be to use your private key. Or in general: Only the private key, used to generate the public key that encrypted specific information, can be used to decrypt that information.
Secondly you can sign some information with your private key, so that anyone can use your public key to verify that the information originated from you and not from someone else.
public keys are intended for the general public they can be shared with no risk to the key owner, you can receive money using public keys
private keys are intended only for the owner of the account, with private keys you can generate a public key, but you canât generate a private key with a public key, in the event a private key is lost this represent in the total loss of the owner money holding the account. bitcoin and blockchain work in the basis of a private key as it is the finger print of the main account.
- public key encrypts private key decrypts
2 a. digital signing, encryption
-
A private key is a random number generated by your computer. A public key is then derived from that private key using a formula. The private key should be kept safe at all times, while the public key can be shared everywhere. The public key can then be used to encrypt messages that can be unencrypted by the holder of the private key. As with hashing algorithms, private key to public key cryptography is a one way function. One can go from the private key to the public key, but not vice versus.
-
Two uses cases for public key cryptography are encrypted messaging, and it is used in bitcoin to create bitcoin addresses.
The concept of public and private key is as they describe. A private key is like my credit card number. exp date and cvv , A public key is like the credit card. Public key is used as digital signature and to encrypt
Describe the concept of public and private key with your own words. The Private Key is a randomly generated large number. The Public Key is derived from the Private Key based on a unique formula. It is impossible to derive the Private Key from the Public Key.
What 2 use-cases can public key cryptography be used for? Encryption is the ability to send out a transactions or message that is concealed from the public domain, but is only readable (or accepted) by the intended receiver. Digital Signature verifies the unique identity of the sender, thus allowing the receiver to verify the original sender.
1. Describe the concept of public and private key with your own words.
private key has to be kept secrete (its my âpasswordâ) while the public key is my âaddressâ which i can share with anyone. ie. my e-mail would be my public key and my password would be my private key
2. What 2 use-cases can public key cryptography be used for?
a) Encryption of messages
b) Digital Signature (ie. signing and transferring Bitcoins from one person to another transactions)
- Describe the concept of public and private key with your own words.
With a private key, the public key is generated. Data can then be encrypted with the public key and sent to the owner of the private key, then later decrypted with the private key.
A private key can generate a public key, but the public key cannot be reversed to expose the private key.
In this way only the holder of the private key owns the ability to decrypt the data, but anyone with access to the public key have the possibility to encrypt data.
Digital signatures: You can sign data, with a private key, it can then be verified by the public key.
- What 2 use-cases can public key cryptography be used for?
Encrypt messages
Digital signatures
Private key is everything. Itâs good to keep it secret, because with it you can make transactions and decode messages.
Public hey is visible to anyone, and it is generated from public key. You can share it for reciving messages. For decoding those messages you will need the private key, which is the origin of the public key.
Piblic keys are used for encryption messages and fingerprinting (signing identity of person who sent the message)
If Mark writes Carol a message he can encrypt it using her public key, so only she can decrypt it using the private key.
Mark can also write a message and sign it with his public key so other can verify that he is the one that wrote the message using his private key.
Bitcoin addresses are made by hashing the public key another use case is digital signatures.
- Private key is a secret generated random number. A public key is derived from this private key which creates a specific unique pair of numbers. A public key is known to a public and can be used to encrypt a message for a person holding the private key that is then used to decrypt the received message.
- Public key cryptography can be used either to encrypt data, or to generate digital signatures in order to identify the sender of the data.
Homework on public and private keys - Question July 18th 2020
-
Describe the concept of public and private key with your own words
The concept of public and private key is used to secure and access a message.
Private key: Is used to access a encrypted message.
Public key: Is used to allow other participants to validate the message. -
What 2 use-cases can public key cryptography be used for?
The two use case for public key are encryption and digital signature.
-Hector A. Martinez
- random number known as private key, generated by a computer. From this number we get our public key which can be share
- Encryption and Digital signatures
- A public key is generated from a private key. You can use a private key to go to a public key but the process doesnât work backward. a public key is something like an address, while a private key is like a signature.
- Public key cryptography is used for encryption and digitals signatures.
#1public key is a series of letters and # to be used to send messages publicly that can only be opened by one person the private key holder and a private key is made first to generate a public key then so on into a wallet
2 use-cases public key has
#1encryption
#2 digital signature
- Private key is a random number that you keep safe, a public key is generated from the private key and is for the public to use in transactions, messagesâŚ
- For encryption and public signatures to send and receive bitcoinâŚ