-
The private key is a long random number and the public key is derived from the private key. It is one way from Private to public, it does not work the other way around.
-
Encryption and digital signatures.
-
Private keys are generated so that you can also generate a public key, the public keys is available to everyone and the private keys is kept secret to decrypt public key messages .
-
Encryption of messages and digital signatures
1.Public keys= accessible to every to for you to receive anything in a encrypted format.
Private keys= your digital signatures to unlock an encrypted transaction or valuable data.
2.Public keys can be used to receive encrypted messages or transactions 7
1.- Private key is a random number generated by the computer that you must keep privately safe, and public key is derived from the private key and it can be public shared. There is no way to go from public to private key.
2. Encryption and digital signature
-
A public key is a convoluted string of alphabets and numbers generated from a private key, why a private key is a convoluted string which is generated by a computer using a mathematical formulae. A public can be seen by everyone, why a private key remains private to the owner.
-
a) Encryption
b) Digital signature
-
Describe the concept of public and private key with your own words.
the public key is a number/string/whatever that everyone can see, but it is generated through a mathematical function from the private key. }but the magic thing is that, that mathematical function doesnt have an inverse function (or there is no way another user in another time can build or guess the inverse function), because you cannot generate the private key based on the public key -
What 2 use-cases can public key cryptography be used for?
it can be used to secure messages in a public unsecured network of communications, or they can be used as generatiors of bitcoin wallet addresses!!!
- Private keys are derived by your computer and are used to derive public keys. These public keys are posted on open, unsecure networks where they are taken and encrypted. The private keys are then used to decrypt these messages.
- Public key cryptography can be used for encryption and digital signatures.
-
the public key is generated from my private key (I guess by hashing). The public key is used to decrypt messages that have been encrypted with the private key. However, the p]rivate key can not be found when knowing just the public key. In the other application, I can sign a document, information or transaction with my private key, and other can verify my signature using the public key.
-
for encrypting messages and for electronic signature
So, Bob and Alice are friends Bob wants to send Alice a love letter. In order for Bob to do this, Bob and Alice must exchange their public keys. Their public keys are generated by their private keys. They are mathematically linked to each other.
Bob now encrypts his love letter with Alices public key and sends it to her. Alice can decrypt the letter with her private key and read it.
Bitcoin and websites (SSL)
Bitcoin address is a hash of the public key (historically it was just the public key though). You can use the private key to sign transactions though
Actually using the elliptic curve
Awwwh
How is it used in Bitcoin?
- Public key cryptography can be identified as core to the blockchain and cryptocurrency industries where it is possible to generate a private encryption through a generated random number which can shut out your conversation from the public. This random number becomes your private key through which you can generate a public key to share communication with the world. The private key is your signature identification.
- The 2-use cases for which public key cryptography can be used are digital signature and encryption.
-
Private key holders computer generates a random number, then that number is hashed into another unique number that is used for the public key, finally getting how mind-blowing all of this really is.
-
Encryption and Digital Signatures
send btc’s instead of love letters
The public key is derived using the elliptic curve, not hash functions
- Public and Private keys are random numbers generated by your computer. With the pair of keys you can send private messages and you can identify yourself.
-
- Encryption -the public key can be shared with everyone. If you wan to send someone a private message you encrypt the message with the public key while the person receiving the message has the private key to decrypt the message.
- Digital Signature - This is how you can identify yourself or the integrity of a message. When someone signs a message with the private key and you want to verify who sent the message, you can compare the public key with the signature of the message since the public key is derived from the private key.
- Public key is generated by the private key, Public is key is opened to anyone to see, but the private one can’t.
- To receive information or as wallet?
1.The private key is a long, random generated number that is your private address, with this you can verify that you are the owner of that specific crypto address so if someone knows your private key, they can steal your data on it.
The public key is a (encrypted) generated number that’s derived from the private key, that you can share publicly so you may receive crypto/data on it from others.
- For transferring cryptocurrency and signing digital documents/data to verify that this is the correct address number, like a new kind of bank account number where someone can deposit certain specific crypto’s on. So you can only transfer the crypto’s that are compatible with that address. So that your private key stays safe but you can interact and transfer/receive your data or crypto’s anywhere, publicly.
-
Describe the concept of public and private key with your own words.
A: The concept of public and private key is the idea where your holdings or assets and in some ways your digital blockchain identity are stored. They are addresses that confirm you as a holder. The private key is used to create a public key through which your transactions can be identified and verified. The public key protects you and your private key and everything that is stored by the private key/address. -
What 2 use-cases can public key cryptography be used for?
A: The two major use-cases for public key cryptography are encryption and digital signatures.