Private Keys, Public Keys and Addresses

8 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€93.47
List Price:  €130.87
You save:  €37.39
£79.12
List Price:  £110.77
You save:  £31.65
CA$136.80
List Price:  CA$191.52
You save:  CA$54.72
A$153.03
List Price:  A$214.24
You save:  A$61.21
S$136.24
List Price:  S$190.75
You save:  S$54.50
HK$782.75
List Price:  HK$1,095.89
You save:  HK$313.13
CHF 90.39
List Price:  CHF 126.55
You save:  CHF 36.16
NOK kr1,103.76
List Price:  NOK kr1,545.32
You save:  NOK kr441.55
DKK kr697.01
List Price:  DKK kr975.84
You save:  DKK kr278.83
NZ$168.36
List Price:  NZ$235.71
You save:  NZ$67.35
د.إ367.25
List Price:  د.إ514.16
You save:  د.إ146.91
৳11,001.09
List Price:  ৳15,401.97
You save:  ৳4,400.87
₹8,339.41
List Price:  ₹11,675.50
You save:  ₹3,336.09
RM476.70
List Price:  RM667.40
You save:  RM190.70
₦132,134.22
List Price:  ₦184,993.20
You save:  ₦52,858.97
₨27,905.82
List Price:  ₨39,069.27
You save:  ₨11,163.44
฿3,697.97
List Price:  ฿5,177.30
You save:  ฿1,479.33
₺3,250.47
List Price:  ₺4,550.79
You save:  ₺1,300.31
B$511.57
List Price:  B$716.23
You save:  B$204.65
R1,877.82
List Price:  R2,629.02
You save:  R751.20
Лв182.79
List Price:  Лв255.92
You save:  Лв73.12
₩137,795.03
List Price:  ₩192,918.56
You save:  ₩55,123.52
₪381.78
List Price:  ₪534.51
You save:  ₪152.73
₱5,764.02
List Price:  ₱8,069.86
You save:  ₱2,305.84
¥15,807.91
List Price:  ¥22,131.71
You save:  ¥6,323.80
MX$1,715.83
List Price:  MX$2,402.24
You save:  MX$686.40
QR365.49
List Price:  QR511.70
You save:  QR146.21
P1,379.76
List Price:  P1,931.72
You save:  P551.96
KSh13,280.92
List Price:  KSh18,593.82
You save:  KSh5,312.90
E£4,785.67
List Price:  E£6,700.13
You save:  E£1,914.46
ብር5,752.60
List Price:  ብር8,053.87
You save:  ብር2,301.27
Kz83,397.65
List Price:  Kz116,760.05
You save:  Kz33,362.40
CLP$95,187.41
List Price:  CLP$133,266.18
You save:  CLP$38,078.77
CN¥724.48
List Price:  CN¥1,014.31
You save:  CN¥289.82
RD$5,876.15
List Price:  RD$8,226.85
You save:  RD$2,350.69
DA13,419.92
List Price:  DA18,788.43
You save:  DA5,368.50
FJ$226.22
List Price:  FJ$316.72
You save:  FJ$90.50
Q779.62
List Price:  Q1,091.50
You save:  Q311.88
GY$20,970.66
List Price:  GY$29,359.76
You save:  GY$8,389.10
ISK kr14,012.52
List Price:  ISK kr19,618.09
You save:  ISK kr5,605.56
DH1,012.51
List Price:  DH1,417.55
You save:  DH405.04
L1,776.81
List Price:  L2,487.61
You save:  L710.79
ден5,750.48
List Price:  ден8,050.91
You save:  ден2,300.42
MOP$808.27
List Price:  MOP$1,131.61
You save:  MOP$323.34
N$1,891.23
List Price:  N$2,647.80
You save:  N$756.57
C$3,688.83
List Price:  C$5,164.51
You save:  C$1,475.68
रु13,363.42
List Price:  रु18,709.33
You save:  रु5,345.90
S/376.55
List Price:  S/527.19
You save:  S/150.63
K386.91
List Price:  K541.69
You save:  K154.78
SAR375
List Price:  SAR525.02
You save:  SAR150.01
ZK2,656.27
List Price:  ZK3,718.89
You save:  ZK1,062.61
L465.65
List Price:  L651.93
You save:  L186.28
Kč2,349.23
List Price:  Kč3,289.02
You save:  Kč939.78
Ft36,664.08
List Price:  Ft51,331.18
You save:  Ft14,667.09
SEK kr1,088.81
List Price:  SEK kr1,524.39
You save:  SEK kr435.57
ARS$87,581.58
List Price:  ARS$122,617.72
You save:  ARS$35,036.13
Bs695.16
List Price:  Bs973.25
You save:  Bs278.09
COP$396,484.19
List Price:  COP$555,093.74
You save:  COP$158,609.54
₡50,931.67
List Price:  ₡71,306.37
You save:  ₡20,374.70
L2,475.19
List Price:  L3,465.37
You save:  L990.17
₲746,363.69
List Price:  ₲1,044,939.03
You save:  ₲298,575.33
$U3,863.50
List Price:  $U5,409.05
You save:  $U1,545.55
zł402.98
List Price:  zł564.19
You save:  zł161.21
Already have an account? Log In

Transcript

Hey everyone. Welcome back to the course. Now after going through what blockchain is and learning about the history of the blockchain, let's check out some of the key concepts of the block chain which define the functionality and interaction capabilities of the blockchain. The most critical of all the concepts are the keys. A key in a cryptographic world is a string of secure alphanumeric characters, which help you to secure your data by encrypting the data. There are two types of key generation algorithms symmetric and asymmetric.

Symmetric cryptography algorithms generate only one key which is shared between the users. users use the same key to encrypt and decrypt the data. symmetric algorithms are faster than the symmetric algorithms, but the initial key distribution is always a problem with symmetric algorithms. Examples of symmetric cryptography algorithms are Yes algorithm used in TLS services, and the RC four algorithm used in wireless encryption services. The second type of key generation cryptographic algorithms is symmetric algorithms. These algorithms have a key pair where a private key is generated through a logic computation.

And a public key is derived from the private key. users who are sending the data can encrypt the data using their private key, and the users receiving the data can view the data using the sender's public key. As the name suggests, a public key can be made public and available to all a symmetric algorithms are one way algorithm where you can derive the public key from the private key, but vice versa is not possible. A symmetric algorithms are slower compared to symmetric algorithms. Moreover, generating a larger key size further affects the performance. You always need to balance out the performance and Security with key generation algorithms.

Examples of symmetric algorithms are RSA algorithm, which is used with access of servers in cloud computing and ECC algorithm which is used with the world of the blockchain. In blockchain, we use ECC algorithm for key generations. It is a type of symmetric algorithm and more secure than others. We don't directly use the private key and the public key ECC algorithm. We apply certain transformations and base conversions to make it suitable for blockchain. when importing ECC, private keys, a shorter format known as wallet import format, is often used, which offers a few advantages over the standard formats.

The wallet import format is more concise and includes built in error checking codes, so that typos can be automatically be detected and corrected. Moreover, it also includes special bits indicating how it is intended. To be used, the private key is used to generate a blockchain address from the public key hash values and checksum data are converted to an alphanumeric representation using a custom scheme to generate an accepted address for blockchain. blockchain addresses are like email addresses. You can send cryptocurrency to a person by sending coins to one of their addresses. Let's now understand how these three different entities work and why do we need them.

Private keys, private keys are required in the blockchain to generate a unique signature for the transaction. The generated signature can then be used for verification and validation of the transaction and showcase the ownership of a specific user. By checking the transaction signature, we can also verify that nobody has altered it. In simple words, private keys are used to sign the transactions containing cryptocurrencies which you want to transact with with other users, this signature for a transaction provides proof of ownership to other participants over the blockchain. private keys are like secret keys for your accounts. If someone opted in to your private key, then he or she can easily take out your cryptocurrencies.

This has happened with numerous hacks over exchanges throughout the world. Some exchanges store private keys on a secure centralized server, hackers were able to access and hack these central servers. This gave them the access to all the private keys of the users registered with the crypto exchange, and they were able to transfer the cryptocurrencies out of the user accounts by using the hacked private keys. A simple example of a private key is shown on the screen, where you can see that it is an alphanumeric string of a certain fixed length with different correctors. public keys are generated from the private keys and they are irreversible. You can generate rate of public key from a private key but vice versa is not possible.

Even a supercomputer may take millions of years to derive a private key from a given public key. public keys are named as such because they can be distributed to anyone in public. They are open for public viewing, and help the receiving party to verify the data. A person sending a transaction can encrypt the data using his private key, and on the other end, the receiver can verify the data using the public key provided to him by the same person. You can see an example of public key on the screen. This is also an alphanumeric string similar to a private key.

The example public key is generated from the ACC algorithm. Every public key is 256 bits long in blockchain, and the final hash, which is also your wallet address, derived from the public key is 160 bits long. ECC uses the coordinate system for cryptography Test the generated public key has both x and y coordinates. addresses are generated from the public key, where it represents a possible destination for and cryptocurrency payment or data upload. an address is also an alphanumeric string of fixed length, which is generated by transforming public keys through hash functions and encodings. Several correctors inside an address are used as a checksum so that typographical errors can be automatically found and rejected.

For example, in Bitcoin addresses are 34 characters. They consist of random digits, an uppercase and lowercase letter, with the exception that the uppercase letter or uppercase letter I, lowercase letter L, and the number zero are never used. This is to prevent visual ambiguity. addresses always appear between a transaction where to parties are sending some data or currency. A simple example of address can be seen on the screen. This image shows the generation hierarchy for keys and addresses.

A private key is a large, randomly generated number. different algorithms have different parameters for the generation of private keys. For example, in the RSA algorithm, a private key is a large random prime number. A public key is generated from a private key and distributed to everyone. This is a one way algorithm where you can easily generate a public key from a private key, but the reverse is not possible. A person sending a transaction or data can encrypt the data using the private key and the others who want to view the data can use the sender's public key to access the data.

And address is generated from the public key by putting the key through different transformations and encodings. an address is used to receive the transaction in blockchain We have already discussed a bit about addresses and keys. To know more. You can also go through the wiki pages containing the research papers on the blockchain. Apart from the keys, another central concept of blockchain is transactions. Now let's go and learn about transactions.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.