Private and Public Keys | NYDIG (2024)

Private and Public Keys

The Bitcoin network has no intermediaries. There aren’t banks standing in the middle of transactions to verify the sender’s identity or that the funds are going to the intended recipient. Instead of relying on go-betweens, Bitcoin uses public key cryptography to establish ownership.

You might be unfamiliar with the term “public key cryptography.” Still, if you use messaging services like Signal or WhatsApp, it’s already part of your life. Unfortunately, truly understanding how public key cryptography works means grappling with a particularly forbidding branch of mathematics. But fortunately for Bitcoin users, there are just a few simple concepts that need to be understood.

The first is that a private key has a single associated public key. As the names make clear, users should keep private keys secret. In contrast, you can share a public key without compromising your security. Second, private keys create public keys. That means that all you need to remember is the private key since it can undergo a mathematical transformation to produce its public counterpart. The third point is that private keys hold asymmetric information relative to public keys. Knowing a private key means knowing the public key. But knowing a public key tells you nothing about the associated private key. That trick is thanks to the magic that is the mathematical trapdoor function used to derive public keys. Finally, you can distinguish the two types of keys by what they do: private keys are for spending bitcoin, and public keys are for receiving it.

That’s all you need to understand about private and public keys. But if you’re curious about the nuts and bolts of how they work in tandem to secure bitcoin, you can learn more below.

Private Keys

Private keys are just a random number. Really. There’s nothing more to them than that.

Understandably, that notion probably sounds crazy. How can a random number secure millions or billions of dollars in value? Why couldn’t someone make wild guesses to potentially unlock untold riches?

Well, they certainly could try, but the set of numbers that could make up a private key is astonishingly large. Specifically, a Bitcoin private key can be any positive number up to about two raised to the 256th power.

For a sense of scale, consider the following. People often compare the amount of private key combinations to the number of atoms in the universe.1 The comparison isn't to galaxies, stars, or grains of sand, but atoms, the building blocks of all matter. And therein lies the trick. Bitcoin’s security hinges on how many possible private keys there are. In a world of supercomputers, you might think it’d be possible to have a machine start at one and work its way up until it hit the jackpot. But physics makes such an act prohibitively expensive. Anyone who wanted to try that gambit would be better off, economically speaking at least, using all of that raw energy and processing power to just mine bitcoin.

The incomprehensibly low probability of randomly guessing a private key is the crux of why the Bitcoin network is as safe as it is. Anyone who would choose to attack the Bitcoin network would have to do so for reasons other than economic gain.

Now you understand why you should never share your private keys. That number being practically impossible to guess is what keeps your bitcoin safe. Bitcoin investors must safeguard their private keys because recovering a lost key is just as tricky as trying to guess a random one that controls a funded account. Unlike a forgotten ATM pin or email password, no service provider can recover it for you. Anyone who says they can do so is most certainly lying. The Bitcoin network doesn’t even store the key itself. A little-known fact is that Bitcoin doesn’t create the private key for your account. Wallet software does. So, the point bears repeating: private keys should be stored in an offline device or with a trusted custodian who holds them offline on the user’s behalf.

Private keys send bitcoin. They do this by signing transactions much like you would endorse a check. But, as already mentioned, you should never share your private key. So how do you sign a transaction without divulging your private key?

Cryptographic Signatures

Here’s where cryptography comes into play. Despite the cryptocurrency moniker, Bitcoin hardly employs encryption. The network itself is open and transparent. It’s pseudonymous, not anonymous. But the one actual deployment of cryptographic science is creating a digital signature from a private key. A signature is an obscured, single-use version of a private key.

In brief, a signature is the product of a private key multiplied by a random number plus transaction data. The protocol requires transaction data to ensure that no one can reuse the signature to falsify future transactions. To get the random number, Bitcoin historically used the Elliptic Curve Digital Signature Algorithm (ECDSA). However, with the adoption of the Bitcoin network's Taproot upgrade, the Schnorr Signature Algorithm is now also supported.

Again, understanding how all of this works is inconsequential to your ability to interact with Bitcoin. Just know that digital signatures remove the need for private keys in Bitcoin transactions. Instead, the signature proves that the sender holds the private key for the account sending bitcoin. And just as public keys can’t be reverse engineered to reveal their private companion, neither can a signature.

Public Keys

But signing a transaction is just one-half of the equation. You also need somewhere to send that bitcoin. Public keys serve two roles, one each for the sender and the recipient. The sender includes the public key so that anyone on the network can verify the digital signature since it’s the only number that will solve the equation. The recipient uses the public key to create the address where they want bitcoin sent.

The relationship between private and public keys is much like a private key and a digital signature. Public keys are also the product of running a private key through ECDSA. But again, it’s a one-way function. Knowing the private key allows you to calculate the public key. But no one can use the public key to uncover the private key because of the trapdoor property of the algorithm. This fact is why you can share public keys.

Ignoring the high-level math that underpins the process, all you need to keep in mind is that the network can only verify a transaction with the sender’s public key. No other number will work. Sending the wrong public key means the exchange will be ruled invalid. Providing the correct public key proves that the sender holds the private key that controls those funds.

Bitcoin Addresses

Addresses stem from the recipient’s public key. Some wallet software can create unique addresses from a public key for each transaction to maintain data hygiene. You still only have a single public key, but it can yield multiple addresses through math and clever coding.

To receive bitcoin, the recipient shares one of these addresses with the sender. The sender then can direct the payment to that address. Because the address correlates to a specific public key, only the receiver’s private key can use the bitcoin sent in that transaction.

Disclosures

This report has been prepared solely for informational purposes and does not represent investment advice or provide an opinion regarding the fairness of any transaction to any and all parties nor does it constitute an offer, solicitation or a recommendation to buy or sell any particular security or instrument or to adopt any investment strategy. This report does not represent valuation judgments with respect to any financial instrument, issuer, security or sector that may be described or referenced herein and does not represent a formal or official view of New York Digital Investment Group or its affiliates (collectively, “NYDIG”).

It should not be assumed that NYDIG will make investment recommendations in the future that are consistent with the views expressed herein, or use any or all of the techniques or methods of analysis described herein in managing client accounts. NYDIG may have positions (long or short) or engage in securities transactions that are not consistent with the information and views expressed in this report.

The information provided herein is valid only for the purpose stated herein and as of the date hereof (or such other date as may be indicated herein) and no undertaking has been made to update the information, which may be superseded by subsequent market events or for other reasons.

Information furnished by others, upon which all or portions of this report are based, are from sources believed to be reliable. However, NYDIG makes no representation as to the accuracy, adequacy or completeness of such information and has accepted the information without further verification. No warranty is given as to the accuracy, adequacy or completeness of such information. No responsibility is taken for changes in market conditions or laws or regulations and no obligation is assumed to revise this report to reflect changes, events or conditions that occur subsequent to the date hereof.

Nothing contained herein constitutes investment, legal, tax or other advice nor is it to be relied on in making an investment or other decision. Legal advice can only be provided by legal counsel. NYDIG shall have no liability to any third party in respect of this report or any actions taken or decisions made as a consequence of the information set forth herein. By accepting this report, the recipient acknowledges its understanding and acceptance of the foregoing terms.

Private and Public Keys | NYDIG (2024)

FAQs

What is the difference between a public key and a private key? ›

The public key is available to anyone who wants to send an encrypted message to the owner of the private key. It is used to encrypt the data and can be shared freely. The private key, conversely, is kept secret and is used to decrypt the encrypted message.

What are examples of private and public keys? ›

Here's an example of how these keys work together. Bob wants to send Alice an encrypted email. To do this, Bob takes Alice's public key and encrypts his message to her. When Alice receives the message, she uses the matching private key that is known only to her in order to decrypt the message from Bob.

What is the difference between secret key and public key? ›

Public key encryption requires a pair of public and private keys to encode and decode data, whereas private key encryption requires only one key for both encryption and decryption. The public key is also known as asymmetric encryption, as different keys are used for both encoding and decoding.

What is the difference between an open and a private key? ›

Conclusion. To conclude, private keys can be used for both encryption and decryption, while Public keys are used only for the purpose of encrypting the sensitive data. Private keys are shared between the sender and the receiver, whereas public keys can be freely circulated among multiple users.

What are public and private keys for dummies? ›

Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

What is a public key example? ›

Assume that Bob wants to send a secret message to Alice using public-key cryptography. Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice's public key.

How to identify public and private key? ›

The private key is Symmetrical because there is only one key that is called a secret key. The public key is Asymmetrical because there are two types of keys: private and public keys. In this cryptography, the sender and receiver need to share the same key.

What is the purpose of the private key? ›

A private key is a cryptographic variable that is used in conjunction with an algorithm to encrypt and decrypt data. Private keys should be shared only with the key's generator or parties authorized to decrypt the data. They are crucial in symmetric cryptography, asymmetric cryptography and cryptocurrencies.

How to generate a public key? ›

To generate an SSH private/public key pair for your use, you can use the ssh-keygen command-line utility. You can run the ssh-keygen command from the command line to generate an SSH private/public key pair. If you are using Windows, by default you may not have access to the ssh-keygen command.

Do public keys need to be kept secret? ›

Public key encryption requires only two keys per participant. The need for secrecy is more easily met: only the private key needs to be kept secret, and because it does not need to be shared, it is less vulnerable to theft in transmission than the shared key in a symmetric key system.

Is public key more secure? ›

Using public key pairs to ensure both security and identity

The message can be transmitted openly over the Internet, and since only the recipient can decrypt the message with the appropriate private key, secure transmission is ensured. The order of using the key pairs can also flip to ensure the identity of the sender.

Is a private key a secret? ›

So there's no danger of the private key being discovered by an eavesdropper - it never gets sent anywhere. It is known only to its owner. As for the public key, there's no need to keep it secret. On the contrary, it can safely be made available to anyone who requests it.

What is an example of a private key? ›

Private key encryption is often used to encrypt data stored or transmitted between two parties. For example, when you log in to a website using a username and password, the password is often encrypted using a private key before it is transmitted to the web server.

Do private keys have passwords? ›

Certificate private keys and private key passwords. Certificate private keys are used to decrypt messages encrypted using the Certificate Public Key contained in a digital certificate. The Private Key is generally password protected using the Private Key Password to prevent unauthorized use of the Private Key.

What do I need private keys for? ›

It is used to authorize transactions and prove ownership of a blockchain asset. A private key is an integral part of cryptocurrency, and its encrypted properties help protect users from thieves and unauthorized access to their funds.

What is a private key best used for? ›

The private key is used to decrypt, as well as to encrypt, so using it for symmetric encryption requires a key exchange to share that key securely with trusted parties authorized to exchange secured data. Cryptographic software is usually used to automate this process.

Can a private key have multiple public keys? ›

It's actually possible to generate several public keys from the same private key. However, you'll only ever have one private key. And while it's theoretically possible to guess or calculate the public key from the private key, the reverse would take hundreds of years to crack.

What is a private key in simple terms? ›

A private key is a cryptographic variable that is used in conjunction with an algorithm to encrypt and decrypt data. Private keys should be shared only with the key's generator or parties authorized to decrypt the data. They are crucial in symmetric cryptography, asymmetric cryptography and cryptocurrencies.

What is the difference between a public key and a private key quizlet? ›

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message.

Top Articles
​Why do water companies pump raw sewage into our rivers and seas?
Certificates Authenticity
Joliet Patch Arrests Today
Lifewitceee
Fort Carson Cif Phone Number
Ds Cuts Saugus
Insidious 5 Showtimes Near Cinemark Tinseltown 290 And Xd
Eric Rohan Justin Obituary
Doby's Funeral Home Obituaries
Over70Dating Login
William Spencer Funeral Home Portland Indiana
Aita Autism
Cincinnati Bearcats roll to 66-13 win over Eastern Kentucky in season-opener
The Binding of Isaac
Saw X | Rotten Tomatoes
2016 Hyundai Sonata Price, Value, Depreciation & Reviews | Kelley Blue Book
7 Fly Traps For Effective Pest Control
Telegram Scat
Dallas Cowboys On Sirius Xm Radio
Zalog Forum
PowerXL Smokeless Grill- Elektrische Grill - Rookloos & geurloos grillplezier - met... | bol
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Craigslist Prescott Az Free Stuff
Busted Newspaper Fauquier County Va
Craigslist Personals Jonesboro
Soulstone Survivors Igg
A Person That Creates Movie Basis Figgerits
Low Tide In Twilight Ch 52
Jackie Knust Wendel
Marilyn Seipt Obituary
Gen 50 Kjv
Spirited Showtimes Near Marcus Twin Creek Cinema
Parent Management Training (PMT) Worksheet | HappierTHERAPY
Best New England Boarding Schools
Moonrise Time Tonight Near Me
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
Clark County Ky Busted Newspaper
D3 Boards
Craigslist Summersville West Virginia
Evil Dead Rise (2023) | Film, Trailer, Kritik
Telugu Moviez Wap Org
Free Crossword Puzzles | BestCrosswords.com
Strange World Showtimes Near Century Stadium 25 And Xd
Paperlessemployee/Dollartree
Houston Primary Care Byron Ga
Costco Tire Promo Code Michelin 2022
Glowforge Forum
Tenichtop
Land of Samurai: One Piece’s Wano Kuni Arc Explained
Wayward Carbuncle Location
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 6109

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.