-
The private key is a randomly generated number that allows you to transfer your coins. The public key, using mathematical equations is derived from the private key and can be used for receiving funds. The idea is that the private key generates the public key but with the public key it is almost impossible to generate the private key.
-
Public key cryptography can be used for encryption and digital signatures/ receiving funds.
-1. A public key is how others send to you account. A private key is one that you, and only you, know/hold. It is the digital signature for your account. A public key is used to encrypt information and the private key is used lo decrypt that information.
-2. encryption and digital signature
1.Describe the concept of public and private key with your own words.
private key is a unique randomly made sequence, that can be used to sign the transaction for example and public key is made based on private key that every body can know it.
2.What 2 use-cases can public key cryptography be used for?
for encryption and digital signature.
Both actually, But the more technical term would be to send an encrypted message that only you can read or to sign a transaction.
Both of these utilize digital signatures. The other use case is encryption
-
Describe the concept of public and private key with your own words.
A private key is a numerical number randomly generated from your computer. This is to be kept secret by the owner. From the private key, a Public key can be derived. The public key can be shared. -
What 2 use-cases can public key cryptography be used for?
A) For Encryption, to send messages encrypted with public keys. And have Private keys Decrypt the message.
B) Digital Signatures, To sigh a message with private key. Receiver verify private key of sender with senders public key.
1- a public key is where the message been sent between two or more people with encrypted.
the private key used to open the message once been received. also you private key used public key to send the message
2- encryption and digital signature.
- Public keys are generated from private keys. The public keys are then used to give the transaction a digital signature, so that it can be verified. But you can never figure out the private key from the public key.
- Encryption and digital signatures.
- I can generate my own, unique and encrypted private key, from which my public key can be generated for other people to use (open). When people send me message or money using my public key, only me with my only unique key to unencrypte the message or to receive cryptocurrencies. Private and public keys are random numbers. Only one private key can be used to read the message sent through public key. Public key can not generate private key.
Crypto currency transactions use digital signature. Only private key can generate digital signature. -
- one can use public key to send crypto currency to private key holder;
- legal documents can be sent using public key to the receiver designated to.
Homework on Public and Private Keys - Questions
1. Describe the concept of public and private key with your own words.
Privat key generates the public key from the public key no one can figure out the private key but from the private key you can figure out the public key without the private key you canât decrypt. But in crypto we use digital signatures
2. What 2 use-cases can public key cryptography be used for?
-Encryption
-Digital signatures indentification, integrity
-
Private keys are randomly generated then a public key is derived from that using a formula, this is a one way function. Public keys are used for people to send you encrypted data which only your private key can access.
-
- Encryption- send private messages
- Digital signatures- Verify identity integrity.
1. Describe the concept of public and private key with your own words.
Public and private keys are cryptographic tools used for security and identification purposes. Private key is a random number from 1 to 2^256, whereas public key is derived from private key using elliptic curve function and can be displayed publicly. Private key is used to generate signature that confirms the ownership of funds being transacted. Having the signature and public key, anyone can verify the ownership of transacted funds. Public key is derived from private key and this process is one way (i.e. you can not derive private key from a public key).
2. What 2 use-cases can public key cryptography be used for?
It can be used for encryption of a message or (in case of bitcoin) it can be used for signing data with digital signatures.
The concept of a public and private key are as following: the public key serves as a sort of address that holds the information of the private key without revealing the private keyâs sensitive information. Allowing for messages, transactions etc. to take place utilizing the security of the private key for encryption or to provide digital signatures.
2 use cases that cryptography are used for that we covered are message or data encryption and/or digital signatures
- Describe the concept of public and private key with your own words.
In bitcoin when you generate a wallet the computer generate a private key that it is a huge astronomical number. Them from the private key the computer generates the public key with a special formula that anyone can see in the network. - What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures.
Public keys are derived using the elliptic curve function, not sha
Right! Thanks for pointing that out
-
Private keys are randomly generated and the key that you keep to yourself and the public key is the key derived from the private key and you share the public key with everyone.
-
Encryption and digital signatures.
- Describe the concept of public and private key with your own words.
Private key is like the 12 words you get to back up your wallet and the public key is the âaddressâ you use for transactions, but now you have an independent address used for that.
- What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures.
- A public key is generated to match with only 1 private key to ensure the integrity of a message.
- It can be used for public key encryption in which a message is encrypted with a recipientâs public key. And for digital signature where a sender signs a message with his private key and the message is verified with the senderâs public key.
private key is your secret identity that belongs to you that is a random number and public key is seen by everyone and is generated using the private key
Encryption and digital signatures