Private and Public Keys… What’s the Difference?

Written By
Jesse
First Published
July 28, 2022
Last Updated
April 19, 2023
Estimated Reading Time
3 minutes
private and public key
In this article...

There are a number of good reasons that we refer to these as “private” and “public” keys. By the end of reading this, you’ll understand why. Learning about one coincides with learning about the other and It can be a bit confusing at first when distinguishing between the two. One thing that can be overwhelming at first is when you hear that one is to be safely guarded with every ounce of ingenuity you have inside of you (Private Key). While the other you can freely share wherever and whenever you like (Public Key). Calling them Keys only helps at first to understand what they are. But, it also says a large part about the function they serve. 

The Private and Public Key Relationship

Keys are required for wallets on every network to operate. Private keys exist solely as a function of creating a new wallet on a network. When this new wallet is created the network issues a unique 12 to 24-word private key or 12-24 word passphrase. 

public keys

This private key can then be used to create public keys commonly referred to as “Public Addresses”. Public keys are the process of generating a new public address using the private key. Calling them public keys is just the technical term for creating a new address on the blockchain. Even if an address has never been used, you can continue to create an infinite amount of public addresses to receive Bitcoin or other cryptocurrencies. 

To give an example, most people are familiar with keycards and NFC technology. This is used for touchless pay with most credit cards that have a microchip embedded in them. These are sometimes used for work to access a certain area of the building, commonly used in badges and other keycard methods. In reference to the subject, let’s say that all employees of a building accessing the elevator, and other areas of the building have public access keys. These can be swapped, lost, and replaced easily and without much concern. They’re what everyone would consider to be “replaceable”. They are unique in that each one is randomly numbered 1 too ∞ .  But, they all serve the exact same function.

In order to Issue all those keycards, you need an administrator with ultimate privileges to issue each key. When a new public key is created, the admin and their private key authorize it to do so. The public key can’t be used to issue other public keys. Only the private has that privilege. Now, since it’s no problem that public keys can be freely discarded, reused, and new ones created infinitely, what happens if the administrator loses the unique private key? Well, then the most obvious thing is that no other public keys can be issued. But, what if all the public key cards in use only allowed entry into the building, and in order to leave, the admin needs the private key to verify every exit. A complete disaster as everyone is now stuck inside the building. This one-way-only path is exactly how private keys function. You’re the admin, your wallets are the building, and the people in it are your crypto assets. 

Importance of Private Keys

Now that you understand more about private and public keys. You understand the importance of the private key as it functions on any blockchain network. While creating a new public address is considered a good habit for every time you share one, it depends on the circumstances of its use. Those concerned with higher anonymity can freely create a new private key after using the only private key it ever generated. The choice is a personal one for each individual. As long as you understand that you need the private key to send any assets out of a wallet then you understand its importance. The private key can always be backed up from the wallet being used. But if the wallet being used is lost you will need the private key to recover it, because when you do go and download the wallet again, it creates a new private key unless you enter an existing one. Your passphrase or private key is the only way to access your property on a network.

Hardware devices like “Ledger” and Trezor store these private keys on their devices, while other wallets store the private key in the application itself. For this reason, you should always be careful not to leave access to your wallet anywhere you don’t trust. Otherwise, anyone could walk up, open your wallet, and access your private key. Whenever you want to accept payment for goods or services you can always share your public address and receive funds without concern of giving anyone access to your wallet. If you want to learn more about public addresses head over and check out How to Send & Receive Crypto.

Head of Research Jesse is a passionate seeker of truth who enjoys educating others about Bitcoin. As a free thinker and 2nd amendment advocate, Jesse believes each individual has the right to monetary freedom. “The swarm is headed towards us” -Satoshi Nakamoto

Discussion on "Private and Public Keys… What’s the Difference?"
You must Subscribe or Login to post a comment.
Additional Resources
Subscribe Today!
Join Thousands Getting Free Insights

Join 190,000+ Investors Getting Free Insights

Privacy Policy

Who we are

Our website address is: https://larkdavis.org.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Boom! You're on the shortlist.

You just took the first step toward getting your project in front of one of the most engaged communities in crypto.
We're already diving into your details to see how we can best showcase your vision to our audience. You should hear from us within 2 business days to discuss strategy, availability, and next steps.
Let's build something legendary.

Join 190,000+ Investors Getting Free Insights