Homework on Public and Private Keys - Questions

The two use cases are encryption and digital signatures.

1. If I wanted to receive a message or a form of cryptocurrency from another person or entity without my business being tampered with by nosey Nelsons, I would create a private key, and from that private key I would then create a public key, the person sending the message or transaction would be able to use the public key to encrypt the message or transaction, and the private key would used by me to read or receive the message. A private key can read a message encrypted by use of the the public key, but a public key cannot open information in the private key, because the information goes one way only.
2. Two use cases of a public key are for uses of identification or digital signatures, and for the creation of an address to make a wallet and receive crypto, or domains from unstoppable or the like.

2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is a random number taken from the public key and is used to encrypt a message. The encrypted message can only be decrypted by the recipient who has the private key. However, the public key is the only visible portion for the rest of the network while the private key is hidden away using encryption.

  2. What 2 use-cases can public key cryptography be used for?
    For encryption and digital signatures.

1 Like
  1. Public keys are what you share with others when exchanging data for the destination of that data, and the private key is what you hold as your safe keeping for access to that various data and transactions.

  2. It is encryption and digital autographs.

1 Like
  1. A Private key is a personally secure address that is only known to user. The private key produces a public key which is an address accessible by the public. The public key produces the crypto address that allows users to send messages through to that user.
  2. A public key can be used to create crypto wallet addresses and also secures the private key by making it impossible to retrieve the private from knowledge of the public key.
1 Like

These are both digital signatures, another use case would be encryption.

2 Likes

What can you do with these keys?

2 Likes

A private key is a string of random numbers that can be used to generate a public key creating a unique keypair. The public key can be used to encrypt data that can only be decrypted with the private key.
The private key can be used to create digital signatures of data/messages/transactions that can be validated by a public key.

  • Encryption
  • Digital signatures
2 Likes
  1. private keys are randomly generated by the computer and from the private key the public key is generated. You can only go one way from private to public key, but not the other way. You can also verify someone’s digital signature from their public key by being able to tell if the public key is related to the private key.

  2. The 2 cases are:

  3. to encrypt a message in a public space

  4. for digital signatures

2 Likes

1 - Public and private keys are used as encryption or signing methods when sending data (as a comparison with the physical world you need to sign a cheque with your real and unique signature for the bank to validate it / when a delivery truck is sent with valuable goods, the keys are sent separately to the addressee, so ‘basically’ no one should be able to open the truck container except the receiver)

2 - To encrypt and sign messages

2 Likes
  1. There are two different kinds of keys used in public key cryptography. Privacy-conscious individuals use their private keys to generate public keys. Public keys are made public and are used to encrypt messages while private keys are closely-guarded secrets used to decrypt and sign messages.

  2. Public key cryptography may be used for encryption and digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.

A private key is a randomly generated key and the public key is a derived key from the private key.

the public key is used to encrypt information and the private key is used to decrypt the information.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and validation

2 Likes

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A private key is a randomly generated number and should never be given to anyone. The public key is generated by the private key and can be shared with anyone. If you were using it to encrypt a message then you would give the sender of the message your public key and they can encrypt the message with that, and the only way to decrypt the message is with the initial private key. If you were utilizing the keys for digital signatures then the sender would generate a private key, and derive a public key from that. Then the sender would send the message or transaction using the private key. Now the receiver can mathematically verify the message came from the private key of the sender with the public key and the signature that is produced. The concept overall is that you can use public and private keys to both encrypt information and as a digital signature to verify the message or transaction is coming from the correct individual

  2. What 2 use-cases can public key cryptography be used for?

  3. Encrypting a message over an insecure connection

  4. Digital signature- To verify that the transaction is coming from the correct private key. Can be used in transaction or in messages to verify identity of sender

1 Like
  1. Public key is used to encrypt the message and Private key is used to decrypt the message.

  2. Encryption and Digital signature are two use cases used

1 Like
  1. A private key derives a public key and is a one way function. The public key is open for everyone while the private is only known to the person it was created for. The private key can create a digital signature and certify this transaction came from that person.

  2. A bitcoin address can be derived from a public key and from that public key can be used to verify that the digital signature coming from the original source.

1 Like

There is one more usecase, can you figure it out? :wink:

2 Likes
  1. The private key is a random number meant to only be seen by its owner. The chance of someone having the same private key as you is so astronomical it is considered to be essentially impossible. The private key is used to generate a public key. The public key can be seen by anyone and can only be used to send you things (such as bitcoin or messages, etc.). Your private key can be used to decode any message sent to you by someone who was using your public key. Your public key can be used by someone to authenticate that something you have sent was truly sent by you.
  2. Sending message or transacting money (or signing something you have sent).
1 Like
  1. Describe the concept of public and private key with your own words.

Private and public keys are created to encrypt and/or authenticate messages on an open network.

  1. What 2 use-cases can public key cryptography be used for?

Encrypting a message to someone on an open network.

To verify bitcoin transaction.

1 Like

1 - A private key is a number generated by your computer, which in turn is used to generate a public key which can then be used to generate your BTC address. Private keys control your funds, public keys are used to receive. They are both linked such that a receiver will know that a message was sent by the private keyholder of the public address.

2- Can receive messages, and funds (which are just a form a message anyways) Public keys can receive funds/messages and be used to generate BTC addresses.

1 Like
  1. Describe the concept of public and private key with your own words.
    Answer: In cryptography, public and private keys are used to identify and verify the recipient and/or sender of a transaction through digital signatures. When an individual wants to perform a transaction, they need to computationally generate a random number to be designated as a private key. Then a public key is produced through a special formula based on the private key. From the public key, a bitcoin address can be generated specifically in bitcoin use cases. This can only be performed in one direction where everything derives from the private key. It is mathematically impossible to generate a private key from a bitcoin address or a public key.

  2. What 2 use-cases can public key cryptography be used for?
    Answer: Public key cryptography can be used for encryption in order to send secret messages to an individual on a public network. In addition, public key cryptography is used to identify the digital signature of a particular transaction.

1 Like