Homework on Public and Private Keys - Questions

[quote=“ivan, post:1, topic:8431”]

  1. Describe the concept of public and private key with your own words.
    A public key can be freely shared allowing users a easy way of encrypting content and verifying digital signatures where as a private key is kept secret and is used to decrypt content and create digital signatures
  2. What 2 use-cases can public key cryptography be used for? encrypting content and verifying digital signatures
1 Like
  1. THE PRIVAT KEY IS A RANDOM NUMBER GENERATED BY OUR WALLET
    THE PUBLIC KEY IS GENERATED AFTER E SPECIAL MATHEMATICAL FORMULA BY OUR PRIVATE KEY , YOU CAN ALWAYS GENERATE A PUBLIC KEY FROM A PRIVATE KET BUT NOT VICE VERSA

  2. Cryptography can be used like in the case of cryptocurrency to transfer value in a secure way , or to sign encrypted messages

1 Like

Thank you for the hep sir :slightly_smiling_face:

-Private key is a computer generated random numbers. Following certain function public key is generated through private key. Private key is secret and very important, AND only the owner has it. Public key can be shared and known by everyone in the entire network.

2 FUNCTIONS:
-FOR ENCRYPTION: The sender combine the public key of receiver with the secret message, encrypt it in the public network.
-AS DIGITAL SIGNATURE : Sender’s digital signature (which is generated by private key of sender) and sender’s public key work together, in order to verify the transaction.

1 Like
  1. A private key is generated by your own computer which is then used to generate a public key. The public key can then be used as your address for sending you encrypted messages which only you can read using the original private key.

  2. Sending encrypted messages and digital signatures.

1 Like

1.The private key is the your personal key and the public key is the key that everyone can see to send you information or to know who sent you something. From the private key, you can mathematically deduce the public key, but not vice-versa.

  1. Encryption and digital signatures.
1 Like

1- Private key is created first, it’s a unique large number almost impossible to guess by other person, after that the public key it’s created, which it’s used to decipher encrypted message or to know who sign a message.
2- Encryption and Digital signatures.

1 Like

Hmmm :thinking: not exactly sure, but digital identity also mostly relies on signatures. The second use case for public key cryptography is encryption :slight_smile:

2 Likes
  1. Describe the concept of public and private key with your own words.
  • Others can use the public key to verify that the person or service signed a transaction/input or message with the corresponding private key.
  1. What 2 use-cases can public key cryptography be used for?
  • It can be used for encryption. I can encrypt messages or data by using your public key. These will only be readable by your having and decrypting with your private key.

  • It can be used for signing digital documents or transactions. In BTC that would be signing an transaction from a address that key control.

1 Like
  1. Describe the concept of public and private key with your own words.

Public key is used for Encryptions, while private key is used for decryption and for digital signature.
Public key is derived from private key, public key is open to public while private key must be hiden and kept away from anyone.

  1. What 2 use-cases can public key cryptography be used for?

A. Sending funds transactions.
B. Sending different types of data files.

1 Like

private keys are a randomly generated number calculated by ones own computer.This key is a string of basically unrepeatable characters uniquely generated to create my own digital signature.
Public keys are a further iteration of the private key, which is generated from the private key, using a complex mathematical formula. The public key is the “virtual id” i would send out to the public as a channel of communication or sending messages or transactions to me. >essages sent to the public key can only be translated by the private key, and furthermore, when I send verified messages, my private key acts as a signature to verify that i , in fact, sent the messageor transaction.
The two use cases formpublic/private keys are first as a means to encrypt a message that could be exposed to many spectators, and the second is to act as a digital signature, certifying that I authorized and or sent this message.

1 Like

Cryptography is used to generate a private key (a computer-generated random number) which should always be kept secret and should never be shared with anyone else. The public key is derived from the private key and is shared with the public. Any data that is encrypted with a public key can only be decrypted by the private key from which the public key is derived.

A private key can be used to generate a digital signature which is used to digitally sign a transaction.
The resulting digital signature can then be examined by looking at the public key that was derived
from the private key to verify that the signed transaction indeed came from the private key / private key holder

Two use-cases of public key cryptography are Encryption and digital signatures

1 Like
  1. Public key is like the address you send snail mail to. Private key is like the key to the mailbox.
  2. They are one-way cryptographic functions for encryption and verification of data.
1 Like

1 Describe the concept of public and private key with your own words.

There is no central authority that keeps track of your account but rather you have a public and private key pair. The private key is a random number generated by your computer and is not to be shared. A public key is created from the private key and can be shared and then from the public key you create an address. When you make a transaction, your private key signs that transaction.

2 What 2 use-cases can public key cryptography be used for?

Public key cryptography can be used for:

1 Encryption when you want to send a message over an open or unsecure network

2 Digital Signatures to verify your identify

1 Like
  1. public keys are long strings of numbers that can be shared publicly and a private key is what allows the receiving to encrypt what is sent thru the public key
  2. The two use cases for public key cryptography is encryption and digital signatures
2 Likes
  1. Private key is a random generated number with which a public key can be generated (not vice versa)
  2. encryption and digital signature
1 Like

An encrypted message can only be read by the owner of the private key :slight_smile:

1 Like
  1. Private keys are randomly created and the Public keys are mathematically created from the private keys.
    You cannot get the private key from a public key but you can unencrypte message encrypted by the public key usind the private key.
  2. Encrypted messages and digital signature
1 Like
  1. They are components for cryptography. A public key can be shared via encryption use case to anyone on the internet. Via encryption and the public key + private key you can send a message.
    1. encryption and 2) bitcoin transactions.
1 Like
  1. Public and private keys are used to encrypt messages or data sent from one address to another. The public key is visible to everyone and can only be decrypted with the use of the private key.

  2. 2 use-cases for public key cryptography are determining who has access to a particular bit of data such as bitcoin and for cryptographic signatures to verify the sender of some data.

1 Like