 Public key generated message that anyone can see but private key is only for me to see. If someone send me a message I can read it only if I have a private key from sender.
 First use case is encryption and second is digital signature.

A private key is a randomly generated large number known only by the owner, while a public key is generated from the private key and known by all the network. If a message is encrypted with someone’s public key, then the message can be decrypted with the private key belongs to the public key used for encryption. This is the encryption function (a message can be secured in this way). Also, a message can be encrypted with the sender’s private key, in this case with the public key belongs to the private key used for the encryption, the receiver can validate if the message came from the owner of the private key (digital signature).

a. Enryption b. Digital signature
 The PRIVATE KEY is a key generated by your pc from which a public key can be derived via a formula mathematically making the 2 keys relevant to one another.
Private key is exclusive to the owner unless it is stolen from/lost by the owner.
Private keys act as Digital John Hancocks, fingerprint, rubber stamp, wax seal, etc
Private keys are decrypters of messages encrypted using the public key derived from the particular private key.
Private key also facilitates identification verification of anything sent.
Private key leads to Public key
Public key CANNOT lead to the Private key.
Public keys lead to a private box which only the private key can open.
Public keys are available for anyone or to those whom it has been made available to see .
Public keys allow anyone with access to it, which is everyone, to encrypt a message for purposes of discretion.
Encryption
Digital Signatures
 A public key is generated from your private key. Others can see your public key and send money there (for example), but only you can access with your private key. Private key decrypts the encrypted message.

 encryption and 2. digital signatures
 The public/private key works by the user having a unique private key that decodes a corresponding public key. The public key is available to the public to encrypt a message which can only be decrypted by the private key. Two users could exchange encrypted messages by using each others public keys.
 The first case is data encryption where the sender encrypts data using someones public key and sends it to them to decrypt with their private key.
The second case is using public/private keys to verify the identity of the data sender. As a sender you can include your private key in a message to be cross referenced with your public key by the receiver.

Public & Private keys leverage the utility of hash functions by providing users a (private) key to access information and a (public) key to receive information on an open network. This way the information is secure and private on an open network.

Public key cryptography can be used to securely send and receive information on an open network and in case of bitcoin, it allows people to keep their monetary value secure on an open network during transactions and because of private keys it also allows people to keep their monetary value in their own possession instead of in a bank.
 The private key is a random number from which a public key is derived by a oneway cryptographic function. The public key can be shared every where because it cannot be used to deduce the private key.
 Digital signatures and encryption.
1)Private key is a secret that no one will know unless it is leaked to the community. Public key is a key that is visible for everyone to see.
2)1st use cases is for encryption.It is where the use of private and public key to decrypt a message. 2nd use case is digital signatures. When sending a message, the sender will use its private key to sign the message and the receiver can use the sender’s public key to verify.
1 Describe the concept of public and private key with your own words.
A private key is your unique digital signature whereas the public key, which is generated from the private key, is your public address
2 What 2 usecases can public key cryptography be used for?
Verifiable digital signature
Encryption
Homework on Public and Private Keys  Questions
 Describe the concept of public and private key with your own words.
 Your public key is generated by your private key and can be used publicly to link back to your private key.
 What 2 usecases can public key cryptography be used for?
 2 usecases for public keys are for encrypting and for use as digital signatures.

The private key signs transactions and holds the crypto. The public key is generated from the private key to encrypt it so people cannot see the private key. The public key can be seen by anyone and can receive transaction on behalf of the private key.

encryption: Hiding the message being sent so others cannot see it
Digital signature: a way to identify that its you

One analogy of public and private keys in cryptography can be compared to a physical home address that anybody can look up and find but the key to unlock that home is held by the property owner and only that person. If the private “key” was compromised your property is also compromised. You can not derive the private key from the public key just as you can not feasibly reconstruct a physical key to unlock the physical home by utilizing the physical home address.

Two use cases of public key cryptography are for Encryption and digital signatures.
 Private key is only known to me, public key is seen publicly to anyone. Public key is mathematically processed from Private key, and cannot be done the other way. An encrypted message can be seen and proven to be from the right sender by comparing them and ensuring that this Public key is owned by this Private key.
 Encryption and digital signature. Sending a digital asset and

Describe the concept of public and private key with your own words.
Public key is derived from private key. The formen is visible to everyone, the later is only known to its owne, or equivalent to password. And for obvious reason, if private key is shared or loss, the owner also loses her cryptocurrencies. 
What 2 usecases can public key cryptography be used for?
Use for encryption and digital signature.
 Describe the concept of public and private key with your own words.
Private key is comes from a random number by the computer, a public key is derived from the private key using a mathematical formula, public key is out on the open anyone can use it to encrypt and send you messages.
The private is only for the owner of the key, should be kept away from everyone, and is used to decrypt a message
Also private is what you use to digital sign a message, showing that the message came from the real person
 What 2 usecases can public key cryptography be used for?
Encryption and digital signatures

The private key is a randomly generated number. Using the private key a mathematical formula generates a public key. This public key can be shared with anyone. It is the private key that needs to be kept secure.

The public key can be used to encrypt messages that can only be decrypted with the subsequent private key. These key pairs can also be used to sign and verify messages.
Describe the concept of public and private key with your own words.
Private key is generated by a random number, with a length of 256bits (in bitcoin), and acts as the password to unlock your account and make transactions.
The public key is generated mathematically through the private key (by elliptic Curve secp256k1). Acts as an account number to receive transactions from other users
Private and public key and are related, but the private key cannot be derived from the public key.
What 2 usecases can public key cryptography be used for?
 Information encryption
 Digital signature (identity, integrity) (usage in bitcoin blockchain)

A private and public key are a random number and a hash of that random number.

Two use cases are for sending encrypted messages and digitally signing a message/transaction.
 Public and private key pairs are used to encrypt and decrypt a transaction for security purposes.
 Cryptography is used when transmitting sensitive information through a network. It is also used when you are using a public network like the internet forums, etc but you need to ensure that the message is sent/received by the intended receiver and vice versa (digital signature)

Describe the concept of public and private key with your own words.
The Public key can derived from the private key the private key is used to create the public key which is then used to create the bitcoin address. 
What 2 usecases can public key cryptography be used for?
It can be used for 1. encrypting and decrytping messages. 2. sending and receiving crypto currencies between people.