Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Cryptography

Pronunciation
[krip-tog-ruh-fee]
Analogy
Cryptography is like having a special lockbox that only certain keys can open. You can share the locked box publicly, but only those with the correct key can access what's inside.
Definition
The science of secure communication and data protection using mathematical techniques to encrypt and decrypt information, verify authenticity, and ensure confidentiality.
Key Points Intro
Modern cryptography enables secure digital interactions between untrusted parties.
Key Points

Public key cryptography uses paired keys – one public and one private.

Hash functions create unique, fixed-length outputs from any input data.

Digital signatures verify authenticity without revealing private keys.

Blockchain security relies heavily on cryptographic principles.

Example
When you send Bitcoin, you use your private key to create a digital signature that proves ownership without revealing the key itself. Others can verify this signature using your public key.
Technical Deep Dive
Blockchain networks typically use several cryptographic primitives: elliptic curve digital signature algorithm (ECDSA) for creating and verifying signatures, SHA-256 for creating fixed-length hashes of data, and Merkle trees for efficiently organizing and verifying large sets of transactions.
Caveat
While current cryptographic methods are secure against today's computing power, quantum computing advancements may eventually threaten some commonly used algorithms.

Cryptography - Related Articles

No related articles for this term.