Tutorials:Public and Private Key Cryptography: Difference between revisions
Jump to navigation
Jump to search
BeginnersGuide>Marin No edit summary |
m (Move page script moved page Tutorials:51a2 to Tutorials:Public and Private Key Cryptography) |
| (One intermediate revision by one other user not shown) | |
(No difference)
| |
Latest revision as of 01:41, 4 November 2025
Public and Private Key Cryptography
Public key cryptography involves a pair of keys:
- A Private Key, which is meant to be kept secret.
- A Public Key, which can be shared openly.
Key Properties
- Information encrypted with the Public Key can only be decrypted with the corresponding Private Key.
- Information encrypted with the Private Key can only be decrypted with the corresponding Public Key.
- This system is also used to create digital signatures.
Applications of Public Key Cryptography
- Encrypt Messages.
- Create Digital Signatures to authenticate a file.
- Data Integrity. Making sure data is not changed during transmission.
- Non-Repudiation: The author of a file can't deny the authorship.
All these features are used in cryptocurrency.
Relation to Bitcoin
In Bitcoin:
* Your Private Key is related to your wallet seed (They are equivalent). * The Private Key can generate multiple Public Keys associated with your Bitcoin addresses. * These keys enable secure transactions and ownership verification on the blockchain.