This Cryptocurrency FAQ consists of Frequently Asked Questions related to cryptography ("crypto") and encryption technologies and their practical applications.
For a general overview of cryptography and the practical application of encryption techniques to cryptocurrencies, see the following FAQs:
Cryptographic techniques tend to be multi-disciplinary, as they encompasses various branches of mathematics (algebra, probability, statistics, game theory), computer science (algorithms, complexity theory), electrical engineering (hardware design, FPGA, ASICs), digital signal processing (DSP), physics, and others.
Common applications of cryptography include computer passwords, ATM cards, smart credit cards, cryptocurrencies, electronic commerce transactions, and military communications.
Usage Semantics: The term cryptography is sometimes conflated with the term cryptology, where the former is the practical application of secure communication techniques, whereas the latter is the formal study of these techniques.
Strong cryptography refers to cryptographic techniques based on industry-tested standard algorithms that use robust encryption key lengths. At the time of this writing, examples of industry-tested standards algorithms for minimum encryption strength include AES (128 bits and higher), TDES (minimum triple-length keys), RSA (2048 bits and higher), ECC (160 bits and higher), and ElGamal (2048 bits and higher).
Compare: cryptology
Contrast: plaintext (cleartext)
References:
* Understanding Cryptography: A Textbook for Students and Practitioners, C. Paar et al., 2010.
For a more comprehensive explanation of cryptocurrency, see the source FAQ: What is cryptocurrency and how does it work? on fhe CryptoCurrencyWorks.com web.
encode (plaintext: String; cryptokey: String): ciphertext: String
decode (ciphertext: String; cryptokey: String): plaintext: String
The input and output parameters for encode and decode functions are described below:
Public-key encryption is an asymmetrical cryptographic system which uses a pair of mathematically related cryptographic keys:
The cryptographic key pair is mathematically related in the sense that whatever is encrypted via a public key can only be decrypted via a private key, and vice versa. For example, if Alice wants to send a confidential message to Bob, and wants to ensure that only Bob can read it, Alice can encrypt the message with Bob's public key. Only Bob, or someone with access to his corresponding private key, will be capable of decrypting the encrypted message back into its original unencrypted form. Even if someone intercepts Bob's encrypted message druing transmission, its contents will remain confidential if the interceptor lacks access to Bob's private key, which is essential for decryption.
To explicate further, consider the following pseudocode for the complementary cryptographic algorithm functions encode and decode with parameters plaintext, ciphertext, publickey, and privatekey, where the last two parameters represent a complementary public-private cryptographic key pair:
encode (plaintext: String; publickey: String): ciphertext: String
decode (ciphertext: String; privatekey: String): plaintext: String
The input and output parameters for encode and decode functions are described below:
Cryptoeconomics is a cross-disciplinary approach to the study of digital economies and decentralized finance (DeFi) applications. In addition to traditional economic concepts and principles (production, distribution, and consumption of goods and services), cryptoeconomics synergistically integrates concepts and principles from cryptography, computer science, and mathematical game theory disciplines.
— [Source: FAQ: What is cryptoeconomics and how does it work?]
For a more comprehensive explanation of cryptoeconomics see the source FAQ: What is cryptoeconomics and how does it work? on fhe CryptoEconWorks.com web.
CRYPTOGRAPHY WORKS and Cryptographyworks.com are trademarks of PivotPoint Technology Corporation. All other product and service names mentioned are the trademarks of their respective companies.