Cryptography Flashcards
What does the private key of an account act as?
The private key of an account acts as the password for that account.
What can a person do if they have access to the private key of an account?
- Send/sign transactions
- Access the funds associated with that account
Should private keys be shared online or with other people?
No, private keys should never be shared online or with other people.
Where should private keys be stored?
- Private keys should be stored in a secure location
- Private keys should be stored in multiple secure locations
Can you retrieve your funds if your private key is lost or stolen?
- No, if your private key is lost or stolen, you cannot retrieve your funds as the private key acts as the password to your account.
- The public key is also needed
Can you change your private key if it is compromised?
No, you cannot change your private key. If it is compromised, you would have to move your funds to a new account with a new private key.
What is a public key in the context of a blockchain account?
- A blockchain account’s public key acts as the identifier for an account.
- Public keys and addresses are derived from private keys using algorithms like elliptic curve multiplication or RSA
What role do nodes on a network play in relation to a public key?
Nodes on a network can validate transactions that were signed properly using an account’s public key.
Is it safe to share your public key?
Yes, it is safe to share your public key.
How is a public key derived?
A public key is derived from a private key.
How is a public key different from an address?
- A public key is a longer form of an address.
- Less convenient form of an address.
An Ethereum address is how many bytes?
20 bytes (160 bits or 40 hex characters)
How is a address different from an public key?
- A address is a shorter and
- More convenient form of an address
What are hash functions in the context of internet security and cryptography?
- Hash functions are “one-way” functions that have no known inverse.
- They are the foundation of modern internet security and cryptography.
How is the speed of computing hash functions?
Hash functions are fast to compute.