A Beginner’s Guide: Private and Public Key Cryptography Deciphered

Chris Coverdale
Feb 26, 2018 · 5 min read

Why?

We are going to make this simple to understand

What is a Private Key?

Generated Private Key

What is a Public Key?

Public Key shown as hexadecimal representation of bytes

How are Public Keys generated?

Elliptic Curve

G is a publicly known point

“Pin Ball” Effect, Point G is bounced around the curve

How does this provide security?

Let’s do an Experiment

Our starting position G

Our final position, the Public Key point

Cue ball bouncing around example

The Discrete Log Problem

Trap-door function

Conclusion



Interested in going further down the rabbit hole?

Coinmonks

Coinmonks is a technology-focused publication embracing decentralize technologies. We are Non-profit and education is our core value. Learn, Build and thrive. Our other project— https://coinmonks.com, https://cryptofi.co, https://coincodecap.com

Chris Coverdale

Written by

Blockchain Developer - Founder - Pale Fire Technologies, working on Bitcoin and LND

Coinmonks

Coinmonks

Coinmonks is a technology-focused publication embracing decentralize technologies. We are Non-profit and education is our core value. Learn, Build and thrive. Our other project— https://coinmonks.com, https://cryptofi.co, https://coincodecap.com