Homework on Public and Private Keys - Questions

  1. The private key is used to decrypt data and must never be shared. Public key is used to convert the message to an unreadable form and can be shared with others.

2.digital signatures and encryption of multiple data types are 2 most common use cases

  1. The concept of the public and private key cryptography is message encryption. It helps to ensure that the information is exchanged only by the designated persons.
  2. Public key cryptography can be used for:
    a) message encryption (public key encrypts the message and private key decrypts it).
    b) digital signatures (sender signs a transaction with a private key and a receiver can verify if the public key of the sender was derived from the private key that signed transaction).
  1. private key is number generated by computer and on it public key is generated, you should not share private key, but you must share public key to recive messages/transactions
  2. 1 for decrypting messages 2 for assigning transactions with person who sent it
  1. The private key is generated by your device/computer and is large, random, and most likely unique. This is to be held secretly . The public key is generated by the private key and is shared. The public key can be decrypted only by the private key. The private key cannot be decrypted by the public key.
  2. Encryption. Digital signatures.
  1. Describe the concept of public and private key with your own words.
    A public key is visible publicly and available to be used by anyone to send a private message or transaction. A private key is not publicly available and it used to to confirm the origin of a transaction or message. This is why it is important to keep your private key safe.

  2. What 2 use-cases can public key cryptography be used for?
    a)Encryption; Sending a private message or transaction to a pubic key.
    b)Digital Signatures; The source of which being verifiable to show that the signature was generated from the persons private key which is associated to the Public key.

  1. Describe the concept of public and private key with your own words.
    Private key is a randomly generated key from your computer. The public key is then generated from your private key, but you can’t guess from reading your public key your private key.
  2. What 2 use-cases can public key cryptography be used for?
    They underpin various Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG.

Homework on Public and Private Keys - Answers

  1. Public key is encrypt data which you can decrypt. Private key you keep secret and safe.

  2. Two uses that public key can be used for is to encrypt and to digital sign.

  1. Describe the concept of public and private key with your own words.
    A private key is a large random number than when hashed will generate a public key. It’s not possible to hash the public key to get the private key. Private keys are meant to be secret.
    Data encrypted using the public key can be decrypted using the private key. This ensures only the intended person can read the data.

  2. What 2 use-cases can public key cryptography be used for?
    It’s used on encryption and digital signatures.

1- public key is used to encrypt data en private key to decrypt data
2- to encrypt and to digitally sign

  1. Describe the concept of public and private key with your own words.
    Public Key: Is meant to be distributed publicly to serve as an address to receive messages from other users.
    Private Key: Is meant to be kept secret and is used to digitally sign messages sent to other users

  2. What 2 use-cases can public key cryptography be used for?

  3. Encryption

  4. Digital Signatures

  • Identity and Integrity
  1. Public keys is a random large number that is seen by everyone on the network. Private keys on the other hand, need to remain secure and are used to sign the public key and transactions.
  2. They can be used encryption and digital stamping.

1-Public key is a random number/letter combination that has been derived via an algorithm from an algorithmic private key.
2-Cryptography can be used for:
A)Encryption which gives the ability to send document/message that cannot be seen by a third party.
B) Digital Signature which shows how you can identify yourself. It verifies who sent a particular message.

1. Describe the concept of public and private key with your own words.

Private key: Only I know it. It is generated by the wallet installed previously.

Public Key: Everyone can see it and it is my address where I received digital stuff.

2. What 2 use-cases can public key cryptography be used for?

Send and Receive money.

Digital signature.

  1. Describe the concept of public and private key with your own words.
    Public keys is what I share with others.
    Private keys I always keep secret. If I share it, I am giving that person access to take all of my funds from my wallet.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures.
  1. Public and private keys are random numbers which are generated by computer and encrypted by special programs. The public key is derivatived from the private key. The public key can be seen by everyone and used to send messages. The private key is used to sign message and only you know that numbers
  2. Encryption
    Crypto currencies. Used to sign messages and generate addresses

A private key is a random number generated by a user in which data or a signature is assigned to on a blockchain. A public key is derived from the private key which only harnesses the ability to encode a message but not decode a message, Or receive information or crypto currency but not send from it.

The two use cases for public key cryptography are information encryption transfer or Digital signatures.

  1. Private key is our own secret identification that shouldn’t be shared with noboby. The Public Key is the one generated from the private key and is accessible to the network in order for the other people to send transaction to us. The main characteristic of security is the fact that is impossible to get the private key just by knowing the public key.

  2. The public key can be used to encrypt messages or information and send to a specific person. Also can be used to make transactions like BTC transaction.

  1. Describe the concept of public and private key with your own words.

Public and private keys cryptography allow for information to be sent on an open network. The receiver uses the private key to generate a matching public key. The sender use the public key to encrypt his message and the receiver uses his private key to decrypt the message.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

  1. Private key is a large number generated on a computer that one creates, a public key is then derived from the private key (public key is shared everywhere whereas the private key is only known by the individual who created it). Only the private key that generates the public key can be used to decrypt messages. Hence it is important to ensure no one has access to your private key.

  2. Encryption (which i have explained above) and Digital Signatures which are sent for every bitcoin transaction thus using math to verify the integrity of the transactions.

  1. Describe the concept of public and private key with your own words.
    Private key is a random number that represent your identity. It is used to generate a public key which can be used to encrypt messages that then can be decrypted with the private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures