As you’ve already done the short and thick answer, I’ll do the long.
To understand the terms 'public key' and 'private key' you need to know a little about encryption algorithms.
Introduction to Encryption
Encryption algorithms aim to ensure that a emitter swap a message with a recipient without intermediaries obtaining it.
On the Internet, they are responsible for preventing strangers from reading your precious personal data. After all, you don’t want people snooping your email or worse, your credit card number!
There are two main ways to do this.
Symmetric algorithms use a single key, known beforehand by both the sender and the recipient. The workflow is simple: the sender encrypts the message using the key and sends the encrypted content over the internet. The receiver then receives the message and decrypts it using that same key.
As you may have noticed, this type of algorithm has a problem: both sides of the conversation need to know what the key is to decrypt the message! How to send secure messages to unknown recipients? Simple.
Asymmetric algorithms work not with one but two keys:
- One public key, available to all, is used to encrypt the message. This key cannot decrypt.
- One private key, known ONLY to the recipient, has the power to decrypt the messages.
Asymmetric algorithms work (almost) like mailboxes: Any sender can put (encrypt) a message in your box, but only you, the recipient, can read.
Regarding the topics of the question
what each of these two types of keys mean?
I hope the above explanation has responded.
Why they are used in SSL certificates
Certificates are a form of asymmetrical algorithm. When you want to send something important to a website, you first encrypt your data using the site’s public certificate. So you guarantee that only the owner of the site can read your information.
A private-key has some relationship (a dependency relationship, for example) with the public-key?
Well, to encrypt something you need public and to decrypt the toilet. It doesn’t make much sense to have one without the other.
They follow some pattern (because I always see these keys with a code similar to a Base64)?
There are several certificate standards. A very common example is X509. All the standards I know for certificates are binaries, because of performance.
What are the default file extensions to identify each of them?
There are several different extensions for certificates. If you understand English I suggest you take a look in this blog.
Other Questions
Both private and public key are coded in X509?
Yes.
Related: What are the benefits of using HTTPS?
– Wallace Maxters