Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Your computer is generating by number, that is the private key. This private key is only known to yourself. But because you want to go in interaction with others you need an adresse for public. The public adresse is created from the private key. You are public now, but you are protected because nobody can revers from the output to the input, it means nobody can translate your public key into your private key. You have full responsibility for your private key. I f you losse it your protection and your access to the blockchain is lost.

  2. What 2 use-cases can public key cryptography be used for?
    Encryptography and digital signature

1 Like
  1. Private key is my private password to my bitcoins and I have to keep them save and secure and ensure no one has access to it
  2. public key can be used to encrypt a message that i want to send to someone or as a digital signature or for bitcoin
1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is used to encrypt a message, Private key can be used to decrypt messages encrypted with matching public key

  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signature

1 Like

Digital Signatures and Encryption. Both of these use cases use private and public keys. Do you think you could find more about how digital signature and encryption work?

1 Like

1.Private key is for me only, Public key is is known, when a message is sent via use of public key ,only the specific private key can unlock the answer or message.
2.transactions and digital signatures

1 Like

a private key is a random number that is generated by a user’s computer. It’s used for generating public keys and creating digital signatures. It’s used to send and receive transactions and must be kept secret. Public keys are derived from private keys through a function. They are meant for the world to see. People can use your public key to send encrypted messages to you. You can always derive. a public key to derive a public key but you can never derive a private key from a public key.

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is used to encrypt sensitive information which you can share with the world, the private key is used to decrypt this sensitive information.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures.

1 Like

1- The private key is first generated at random and a formula used to go from this to generate a public key. While the public key is generated from the private key, it is not possible to generate the private key from the public key. The public key can be used for encryption and the private key for decryption.

2- The two main uses are message encryption: using somebody’s public key to encrypt your message - meaning only they can read it through use of their public key. And digital signatures (verifying who sent the message): private keys are used to sign messages. The recipient is able to verify the sender’s identity (i.e. as owner of the unique private key) by comparing the signature and public key.

1 Like
  1. Describe the concept of public and private key with your own words. The private key is a random sequence of characters generated by your wallet. The public key is derived from the private key through a cryptographic process , but unlike the private key which you keep secret, the public key is visible to everyone (hence public).
  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures
1 Like

A digital signature is the sender’s personal signature that is created using their private key ; when a receiver gets a message they can mathematically prove that the signature came from the private key that is attached to the sender’s public key.

  1. Is a method of enncrypt wich allows codify and decodify a private message on a public network without interference, keeping safe and secret the message.

  2. Encryption: To send private messages based on correspondent private and public keys to code and decode.

    Digital Signature: Based on private key wich allow sign transactions
1 Like
  1. A public key is an encryption process that encrypts a message on the blockchain into a set of codes that everybody can see. A private key is a a set of codes that can decrypt the message to the original issuer. Public Keys are generated by private keys and only the holders of the private keys can decrypt the messages. The recipients of the messages on the public key can also respond on the public key.

  2. A) Encrypting messages
    B) Issuing digital signatures for designated authorized users

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a secret number that only you know.
    Public key is generated (one-way) from your private key and it can be used to decrypt messages you sent encrypted with your private key.
    You can’t get the private key from your public key.
    Private key must be kept secret.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption of a message
    Digital signature

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    -the public/private keys are a pair of keys that can be used for cryptografic encription. Public key is shared with the public, the private key is held secret and neer shared.
  2. What 2 use-cases can public key cryptography be used for?
    -in case of internet security, a client shares the public key so that the other party can encrypt the content using this key. The only one that can decript the content is the holder of the private key.
    -in the case of bitcoin, a private key(derivative) is used to relese bitcoin, by signing the transaction, and then making the reansaction public on the bitcoin network. The public key (the bitcoin address) is used by the public to verify transactions, balance, and send more bitcoin.
1 Like
  1. Describe the concept of public and private key with your own words.
  • A private key is one used to decrypt an encrypted message while a public key is a key shared by the public to encrypt a message before sending it to the recipient.
  1. What 2 use-cases can public key cryptography be used for?
  • With a Public Key, a system can verify the users authenticity when they log into a system.
    -Messages can be encrypted with a public key before sending the message to the recipient.
1 Like

This is actually true, you can store the public key on the server and then login to that server without using a password :slight_smile: do you know what is the method that makes this work called?

2 Likes

Is it Encryption and Decryption.

  1. In public key cryptography, a key generator produces a pair of keys, one public and one private for each participant. An owner’s private key is to be kept secret and is used to decrypt messages as well as digitally sign them. An owner’s public key is derived from his private key through a one-way function. Public keys are meant to be distributed by the owner, and allows others to encrypt messages directed to the owner. A receiver can also use a sender’s public key to verify the sender’s identity.

  2. 2 use cases of public key cryptography are encyption and digital signatures. These can be observed in crypto wallets and in bitcoin transactions.

1 Like
  1. Private key is like the secret pass code for the bank account. Public key is the bank account number.
  2. it is used for encryption and digital signature.
1 Like
  1. Public key is derived from the private key which is randomly generated, and used in cryptography to encrypt and decrypt messages.
  2. Encryption and digital signatures are two use-cases.
1 Like