Homework on Public and Private Keys - Questions

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
  2. What 2 use-cases can public key cryptography be used for?
64 Likes

60 Likes
  1. Describe the concept of public and private key with your own words.
    Private key in my pocket and safe. public key available to public to to sign a transaction and verify.
    if bali send and encrypted to Ivan. I will sign message with bali’s private key and ivans public key and send the encrypted message to Ivan. He will unencrypte with his public key and then his private key to make message in a readable form, in the hope, I have sent him the winning lottery numbers.!!! Encryption, cryptotcurrency (prime random number generation) and lottery are all about numbers.
  2. What 2 use-cases can public key cryptography be used for?
    Cryptocurrency and public key signing digital documents or encrypted email PGP.
16 Likes
  1. The public key is used to enrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.
  2. The 2 use cases are encryption and digital signatures.Digital signatures verify who sent the message since the private key derives the public key which creates the bitcoin address. You send bitcoin using your private key and receive bitcoin to your bitcoin address.Cryptography and the use of public and private keys solves the security issue when we use the internet.
64 Likes
  1. Public key is the key you share with others and they use to encrypt data only you can decrypt. The private key is the key you keep private and use to unencrypt messages so you can read them. The private key can also be used to sign. When the private key is used to sign it shows something belongs to you a finger print of sorts.

  2. see 1

18 Likes

Private key is your secret identity which belong to you and only you and it is a random number generated by computer.
Public key is the key which can be seen by everyone and it is generated by using your private key.
Public key is used to assure that you have signed the transaction in cryptocurrency and

2 Likes
  1. Intended for sending encrypted messages over an unsecure connection.
  2. Sending a message or sending funds.
22 Likes
  1. Describe the concept of public and private key with your own words.
    Privatekey is generated by a random number, with this private key a public key can be generated on a mathematical way

  2. What 2 use-cases can public key cryptography be used for?
    Proof you have written something. Check if you have the right sofware downloaded.

2 Likes
  1. Public key and private key are used in cryptography to encrypt and decrypt messages. Private key is a random number using which a public key is derived. If a person wants to send a message over unsecured network he can encrypt message using a public key published by recipient which is actually derived from the private key. The encrypted message can only be decrypted by the recipient who has the private key. Also it can be used to digitally sign a message.
  2. Encryption and Digital signature are two use cases used.
7 Likes
  1. Describe the concept of public and private key with your own words.

Computer generate a random numbers, these numbers are called private key.

Following certain function public key is generated through private key.

Private key is secret and very important, only the owner has it. In other words, who has the private key, who owns the assets.

Public key can be known by everyone in the entire network.

  1. What 2 use-cases can public key cryptography be used for?
  1. In encryption: The sender combine the public key of receiver with the secret message, encrypt it in the public network.

  2. Digital signature: Sender’s digital signature (which is generated by private key of sender) and sender’s public key work together, in order to verify the transaction.

4 Likes
  1. Public and private keys are cryptographic tools that can be used to for security and identification purposes. After creating a private key, a series of random values, you can hash it and use the results as your public key. The public key can be displayed publicly and is linked to your private key, proving a connection or ownership of assets or information connected to that private key, but there is no way to decipher your private with your public key alone.

  2. Public key cryptography is currently used in Bitcoin transactions. The public key is the address you share so other people can send you Bitcoin to that address. The private key is what grants you access to the funds sent to the public key, which was derived from the private key. Public key cryptography can also be used to encrypt information and secure it from anyone except the intended recipient. The technology can be used in variety of ways. It’s probably used for claims on token offerings. It could also be used in video games for more secure in-game transactions. It could create a simpler, more secure way of proving your identity, although losing your private keys in that case could be equal to forever losing your identity if there are no safety nets in place.

25 Likes
  1. A private key is a randomly generated large number which is then mathematically processed in to a public key. The private key cannot be derived from the public key, but anything encrypted by the public key can only be decrypted by the private key, and NOT the public key.

  2. For encrypting data and digital signatures.

8 Likes
  1. Public and private key pair is used in asymmetric key cryptography (Public Key Infrastructure - PKI). They are widely used nowadays in the Internet but another use case is crypto. They are mainly used either for encryption or digital signatures. The public key is open to anyone while the private key needs to be kept secret.

  2. The two use-cases that public key cryptography can be used for is encryption and digital signatures. In encryption the sender encrypts the message with the recipient’s public key and transmit the ciphertext over an insecure channel. The receiver then gets the message and decrypts it with their private key.
    In signing, the sender signs the message with their private key and transmit the message. The recipient is able to verify that the message was actually sent by the sender by taking the sender’s public key and verify the message.

  1. Describe the concept of public and private key with your own words.

Private key: Only you own a copy of the key
Public key: A public usable key generated with the private key, encryption can only be decoded (or signed) when you have access to the specific private key

  1. What 2 use-cases can public key cryptography be used for?

Traffic encryption: (SSL, TLS, … ex. HTTPS)
Digital signatures

2 Likes
  1. The public and private keys are like your identity cards on blockchain, it can be used in multiple situation on the internet like transferring data over public channels
  2. It is mainly using for Encryption and Digital signature.
1 Like
  1. Private key is a random number that is generated by my computer. We use a one-way cryptographic function to generate a public key, which can be open to public. Bitcoin adds one more layer of security and generates bitcoin address.
  2. Encyption and Digital Signatures
4 Likes
  1. Describe the concept of public and private key with your own words.

Public Key is key that you can use to send messages or transactions. Private key is a digital fingerprint that shows who sent the message. Private Key is supposed to held close to you and not shared with anyone else or you the risk of getting your key stolen/hacked.

  1. What 2 use-cases can public key cryptography be used for?
    Encryption-Sending/Receiving messages
    Digital Signature-Sending/Receiving transactions
1 Like

1. Describe the concept of public and private key with your own words.
The private key will never be revealed by an individual, a public key is derived from the private key and can be revealed to the public.
Someone else can use your public key to encrypt a message, but only you can decrypt the message by means of your own private key.

2. What 2 use-cases can public key cryptography be used for?

  • encrypting messages
  • digital signing
  1. A public key can be shared with everyone (data, encryptions) and the private key is kept secret. Not available to the public.

  2. The 2 use-cases public key cryptography can be used for are encryptions and digital signatures.

  1. Public and private keys have a couple of use cases. One of those is encryption, so encryption is used to send messages peer to peer on the internet, the sender uses a private key generated by their computer and then that private key generates a public key, now their public key is shared with the world. The sender uses his private key to send an encrypted message to the public key of the person receiving the message, in order to decrypt the message that person uses their private key.

  2. One used cased is encryption as I just explained above. The other use case is used in bitcoin, the private key becomes a digital signature that represents the senders transaction so the receiver can verify the transaction is valid.