Homework on Public and Private Keys - Questions

1, Public key is shared on the network everyone has access to it and private key is like your signature it identifies that that action/command was completed by you.
2. Encrypt and sing message or transaction

*Public key was generated from private key through maths method
*To communicate securely without having a previously agreed upon secret key
*Digital certificates are a way to verify identities through a CA using public key cryptography

Describe the concept of public and private key with your own words.
A public key is a hash that references a balance in the blockchain. It is available to everyone. A private key is used to access and modify the balance connected to a public key.

What 2 use-cases can public key cryptography be used for?
Public key cryptography means anyone can encrypt messages using a public key but only the holder of the paired private can can decrypt them. Two use-cases are for messaging and for transferring funds.

  1. A public key is generated from a private key by way of a cryptographic formula. Therefore, the public key is a cryptographic representation of the private key.
    The private key is a random number generated by your computer, which remains secret for security. It is practically impossible for two people to have the same private key, so it is collision resistant and therefore a unique identifier.
    Because the public key is derived from the private key using a one-way function, it can be shared with others and used to identify you and transact with you. But it can’t be used to discover your actual private key, steal your identity and transact as you.

  2. Public key cryptography can be used in message encryption and for digital signatures.
    (i) Message encryption: The sender encrypts their message using the recipient’s public key. The message can then only be decrypted and read by the recipient with their private key.
    (ii) Digital signatures: The sender signs their message or transaction using their private key, in order to prove their identity, the authenticity of the message, or that they own the funds they are spending. This digital signature can then be verified by the recipient using the sender’s public key.

3 Likes
  1. Using random number generation within parameters we can generate a private key. We can take this number or key and then hash it in such a way to generate a public key that is intrinsically attached or related to the private key. We can use this public/private key relationship to ensure security and utility.

  2. 2 use-cases public key cryptography can be used for are private information and value transfers.

  1. Public and Private Keys are used to encrypt messages or data. Basically from a Private key which must be stored safely is generate a Public Key that may be sent to any target. The Public Key is used to encrypt the data and the Private Key is used to decrypt it .

  2. A Public key may be used to encrypt data and to generate public addresses.

1 - Describe the concept of public and private key with your own words
Private key in cryptography is a random number generated to decrypt messages. This random number also creates a public key which is displayed for everyone to use and message / send transactions. To send a message / transaction we use someone’s public key only. Only the owner of the private key can see it and if lost can not be recovered. This private key also signs transactions and that’s how we can see who sent the transaction.

2 - What 2 use-cases can public key cryptography be used for?
Encryption: A certain message encrypted with a public key can only be decrypted with the corresponding private key.
Digital Signatures: When we send a Bitcoin transaction, our private key signs that transaction. With the public key we can see who sent the transaction.

1 Like
  1. A private key is a random number generated by yourself or your computer. This number has to be secret and from this number ( using a formula ) a public key is generated. This step is irreversible and people cannot guess your private key using just your public key ( that can be made available ). The private key is also used for signing transaction in order to make sure that you are the person who indeed made this transaction.

  2. Case 1. Encryption of data and communication. 2. Signing transactions in order to assure validity of your transactions.

  1. Encryption: Private key is generated privately by the receiver. This key is used to generate a public key which the sender uses to encrypt the message. The receiver then uses their private key to decrypt this message.
    Digital signatures: The sender digitally signs a message with their private key. The receiver then uses this signature to verify the identity of the sender by comparing it to the sender’s public key.

  2. encryption and digital signatures

  1. Public keys are mathematical deviations from private keys. Private keys for any wallet are randomly numbers generated by your computer and the chance of the same private key being generated twice is nearly null.

  2. They can be used for encryption and digital signatures. In encryption message can be encrypted with public keys and decrypted with private keys of the receiver. For digital signatures private keys are used to sign and the receiver can check the authencity of the signature with the public key of the signer.

Private key is a key from which you can generate the public key (which is public) and can be given to people, services, sites, applications etc. the public key can be used to send a protected message. So message is encrypted with the public key and sent to the receiver who is the ONLY one that has the private key that can be used to decrypt the message.
Example is how HTTPS works. Data on a site using https is encrypted using the public key which the browsers use to encrypt the message that is sent to the server. In turn, the server has the private key stamped securely which is then able to decrypt the message.

https - Secure web browsing, data encryption, Crtypocurrencies, Same concept is used for system wide service security - example in http the secure version is https. in sip the secure version is tls or secure sip. ftp - sftp etc etc

  1. the private key is a huge random number which is intended for private use only. The public key is derived from the private key. you can send the private key to everyone you want. nobody can derive the private key from your public key.

  2. encryption: with the private key you can encrypt a message which you send to someone. the recipient can decrypt the message with the public key. The recipient can reply and encrypt the message with the public key which only can decrypt with the private key

signatur: with the private key a message can be signed. the signature can be verified with the public key

  • Describe the concept of public and private key with your own words.
  • a private key is created in your private environment. By using a hash function a public key is created to enhance security and enable transactions.
  • What 2 use-cases can public key cryptography be used for?
  • to create digital signature and enhance security ( see above )

A private key is a very large random number that is kept secret by a message sender. It is used to generate a public key (which is also a number) through a hashing process. The public key can be issued anywhere, while the private key must not be shared. They are both used in the process of PGP cryptography.

Public key cryptography can be used for transmitting
Finish later…

  1. A private key is a random number, generated by your computer. Out of that number by a mathematical syntax, a private key is generated. The private key is a “digital signature” that you use for signing transaction on the block, and the public key is how you recive transaction to your wallet.

  2. Encryption: As for encrypt private messengers and Digital signature: As used in crypto currencies.

1
public = can be seen by others. needed to make transaction
private = like a password only I know and that should never be seen by others

one cannot guess the private key by knowing the public key.

2
digital signatures
encryption
transaction proofs

In private key, the same key (secret key) is used for encryption and decryption.
In public key, two keys are used one key is used for encryption and another key is used for decryption.

Crypto and signing digital documents

  1. The private key is randomly generated by the program and then the public key is generated from the private key. The idea is to create a large random number then with a hashing program generate a public key that can be shared and used to encrypt a file or as a signature for proof of sender/holder of the private key. It gives a one way key set for use, one in the open and one kept by the private key holder.

  2. encryption of data/information

[quote=“ivan, post:1, topic:8431”]
Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    -Private key is key to your information and no one should know except you
    -Public key is for everybody to see and needed for making encryption or digital signatures.
    -Its all about identifying the person who makes transactions or sends messages. Its laso making sure who did the transaction or who sent the message.
    sending message example:
    Private key is generated by the sender
    Public key is derivated from the private key
    Sender signs a message
    Receiver now takes the public key and signature of the sender
    Receiver can verify that the signature is created by the private key that generated the public key.
    Receiver can now be sure who the sender is.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption
    Digital signature

Describe the concept of public and private key with your own words.:

Both keys are like your identity keys. One is your private key. That one you keep really safe. The other is your public key and it is intended to send encrypted messages over a public insecure network to a particular recipient.

What 2 use-cases can public key cryptography be used for?

Encrypting and digital signatures, in a public environment, are two use causes used with the public key.
Sending a message or sending funds.