Homework on Public and Private Keys - Questions
- Describe the concept of public and private key with your own words.
- What 2 use-cases can public key cryptography be used for?
Homework on Public and Private Keys - Questions
Public key is the key you share with others and they use to encrypt data only you can decrypt. The private key is the key you keep private and use to unencrypt messages so you can read them. The private key can also be used to sign. When the private key is used to sign it shows something belongs to you a finger print of sorts.
Private key is your secret identity which belong to you and only you and it is a random number generated by computer.
Public key is the key which can be seen by everyone and it is generated by using your private key.
Public key is used to assure that you have signed the transaction in cryptocurrency and
Describe the concept of public and private key with your own words.
Privatekey is generated by a random number, with this private key a public key can be generated on a mathematical way
What 2 use-cases can public key cryptography be used for?
Proof you have written something. Check if you have the right sofware downloaded.
Computer generate a random numbers, these numbers are called private key.
Following certain function public key is generated through private key.
Private key is secret and very important, only the owner has it. In other words, who has the private key, who owns the assets.
Public key can be known by everyone in the entire network.
In encryption: The sender combine the public key of receiver with the secret message, encrypt it in the public network.
Digital signature: Sender’s digital signature (which is generated by private key of sender) and sender’s public key work together, in order to verify the transaction.
Public and private keys are cryptographic tools that can be used to for security and identification purposes. After creating a private key, a series of random values, you can hash it and use the results as your public key. The public key can be displayed publicly and is linked to your private key, proving a connection or ownership of assets or information connected to that private key, but there is no way to decipher your private with your public key alone.
Public key cryptography is currently used in Bitcoin transactions. The public key is the address you share so other people can send you Bitcoin to that address. The private key is what grants you access to the funds sent to the public key, which was derived from the private key. Public key cryptography can also be used to encrypt information and secure it from anyone except the intended recipient. The technology can be used in variety of ways. It’s probably used for claims on token offerings. It could also be used in video games for more secure in-game transactions. It could create a simpler, more secure way of proving your identity, although losing your private keys in that case could be equal to forever losing your identity if there are no safety nets in place.
A private key is a randomly generated large number which is then mathematically processed in to a public key. The private key cannot be derived from the public key, but anything encrypted by the public key can only be decrypted by the private key, and NOT the public key.
For encrypting data and digital signatures.
Public and private key pair is used in asymmetric key cryptography (Public Key Infrastructure - PKI). They are widely used nowadays in the Internet but another use case is crypto. They are mainly used either for encryption or digital signatures. The public key is open to anyone while the private key needs to be kept secret.
The two use-cases that public key cryptography can be used for is encryption and digital signatures. In encryption the sender encrypts the message with the recipient’s public key and transmit the ciphertext over an insecure channel. The receiver then gets the message and decrypts it with their private key.
In signing, the sender signs the message with their private key and transmit the message. The recipient is able to verify that the message was actually sent by the sender by taking the sender’s public key and verify the message.
Private key: Only you own a copy of the key
Public key: A public usable key generated with the private key, encryption can only be decoded (or signed) when you have access to the specific private key
Traffic encryption: (SSL, TLS, … ex. HTTPS)
Public Key is key that you can use to send messages or transactions. Private key is a digital fingerprint that shows who sent the message. Private Key is supposed to held close to you and not shared with anyone else or you the risk of getting your key stolen/hacked.
1. Describe the concept of public and private key with your own words.
The private key will never be revealed by an individual, a public key is derived from the private key and can be revealed to the public.
Someone else can use your public key to encrypt a message, but only you can decrypt the message by means of your own private key.
2. What 2 use-cases can public key cryptography be used for?
A public key can be shared with everyone (data, encryptions) and the private key is kept secret. Not available to the public.
The 2 use-cases public key cryptography can be used for are encryptions and digital signatures.