Crypto Glossary - Common Terms & Acronyms

The following is a Crypto Glossary of Common Terms & Acronyms associated with cryptocurrencies, cryptoeconomics, and cryptography. Mastery of these terms will allow you to more efficiently learn more about crypto concepts and principles, and will help you to become a crypto cognoscenti.

Items in this glossary are, with the symbols shown in the table to the right, marked as relating to one or more of the following categories: computer science, cryptocurrency, cryptography, game theory, and traditional finance.

To nominate a term or acronym for inclusion in the Glossary, please contact us.

SYMBOL USAGE
Computer Science Term
Cryptocurrency Term
Cryptography Term
Game Theory Term
Traditional Finance Term

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

V

W

Z

#

A

Adaptive State Sharding

A form of blockchain sharding that combines aspects of network, transaction, and state sharding into one system to enable parallel processing, improve inter-shard communication, and enhance blockchain performance and scalability.

Algorithmic Stablecoin

Stablecoins that are not generally collateralized. Instead, their peg is maintained with algorithms, which are used in two main ways:
First, as a rebase algorithmic stablecoin, in which the supply of the stablecoin is manipulated in proportion to the coin's difference in price from its peg: if the price is higher than its peg, coins are "burned", or removed from coin holders' wallets; if the price is lower, coins are "minted", or added into them;
Second, as a seigniorage algorithmic stablecoin, in which multiple coins are used to maintain a peg. One coin's price is designed to be stable, while the others are designed to maintain that coin's stability, generally through a combination of rebase algorithms and through incentivizing market participants to buy or sell the non-stablecoin(s) to adjust the stablecoin's price towards its peg.
A notable example is TerraUSD (UST), which lost its tether to the US Dollar in May 2022 and fell to less than 10 cents.

All-Time High (ATH)

Refers to the highest price ever reached by a particular asset.

All-Time Low (ATL)

Refers to the lowest price ever reached by a particular asset.

Altcoin

Any cryptocurrency that isn't Bitcoin. Notable examples include Ethereum, the second largest cryptocurrency after Bitcoin by market cap.

Anti Money Laundering (AML)

A set of regulations and laws intended to prevent the illegal movement of money, such as through money laundering. In the context of cryptocurrency, this usually involves the monitoring of individuals who buy or sell cryptocurrency to ensure they don't launder money from a cryptocurrencyinto a fiat currency.

B

Bitcoin

A cryptocurrency and global payment system that operates on a peer-to-peer distributed network without a central bank, and as such is the first decentralized digital currency. Bitcoin was invented in late 2008 by an unknown person or group under the pseudonym Satoshi Nakamoto, and was publicly released in 2009.

Block

A set of records of transactions grouped together on a blockchain, containing a timestamp for transactions occurring within the block, transaction data, and a cryptographic hash of the block preceding it.

Blockchain

A type of distributed ledger that contains records of transactions, grouped together into what are commonly referred to as blocks, that are securely linked together using cryptography. Each block in a blockchain contains information from the previous block, including a cryptographic hash of the previous block, and timestamps for transactions occurring within the block itself. As a result, blockchain transactions are effectively irreversible, as the data in any given block is also stored in the rest of the blocks that follow it; in other words, to change the information in any given block, all of the blocks that follow it would also need to be changed.
Blockchains are decentralized, and are managed by a peer-to-peer computer network as a public distributed ledger, in which there is a particular consensus algorithm used to add and validate new blocks.

Blockchain Sharding

The process of splitting data on a blockchain into smaller pieces (or "shards") that can be stored on different nodes to allow for horizontal scaling, an increase in the number of nodes on a network. There are three main types of blockchain sharding:
- Network sharding groups nodes into shards, which can be used to optimize communication between these nodes, as communication within a shard can occur faster than communication between the entire network;
- Transaction sharding: groups transactions into shards, the way in which this is done depending on the type of system. For example, in an account-based system, transactions could be grouped based on the sender's address;
- State sharding: groups the state of the blockchain into shards, allowing for more transactions to be processed at the same time.
However, sharding a network also leaves it vulnerable to single-shard takeover attacks. In a blockchain that hasn't been sharded, an attack would need 51% of the hash-power in order to attack the network (see 51% attack). In a sharded blockchain, however, a much smaller percentage is needed. For example, if a sharded blockchain has been split into 100 shards, each shard will contain 1% of the network; if an attacker gets just 1% of the total hash-power, they will be able to attack the network, even if that means only 1% of the network will be affected.
The likelihood of attacks, however, can be addressed, such as by reshuffling a portion of the shards from time to time or by using a Proof-of-Stake consensus algorithm instead of a Proof-of-Work algorithm.
For more information on blockchain sharding, see adaptive state sharding.

Bollinger Bands

A type of statistical chart that shows the prices and volatility of a commodity or financial instrument over time, using a method proposed by financial analyst John Bollinger.

Bonding Curve

A graph that models the the relationship between the price and supply of an asset: that the price of an asset with a limited supply will increase if the supply of the asset increases (and vice versa). Conversely, the opposite is also true: the price of an asset will drop if its supply drops, and vice versa.

Bounty

Tokenized incentives utilized by blockchains to reward users for performing certain actions. One of the main focuses of bounties is bug fixes, in which users receive rewards for searching for and identifying bugs in a blockchain's protocol.

BUIDL

Mispelling of "Build"; a cryptocurrency investment strategy that involves "building" and otherwise contributing to the blockchain instead of holding (a.k.a. HODLing). Can also involve simply using the cryptocurrency for its intended purposes or any other use of it that could help expand or evolve the blockchain.

Byzantine Fault Tolerance (BFT)

The ability of a system to act as a solution to the Byzantine Generals' Problem, meaning it is able to continue operating even if some of its nodes are malicious or otherwise unreliable.

Byzantine Generals Problem

A game theory problem that describes the difficulty faced by decentralized systems in achieving consensus. In the analogy, several generals have surrounded the city of Byzantium and must decide when to attack; they will win if they attack together, but will lose if they attack separately. Furthermore, secure communication between generals is not possible due to the risk of intereception and deception by the city's defenders, and some of the generals may be facetious themselves. While this issue is not possible for centralized systems due to these systems having an authority that can publish true and verified information and prevent false information from being distributed, decentralized systems such as the blockchain face this risk.

C

Central Bank

An institution of a country (or nation / state) or group of countries that provides financial and banking services for and manages the currency of its government.

Central Bank Digital Currency (CBDC)

A type of digital currency that is issued by a Central Bank. Since a CBDC is generally tethered to the fiat currency of the country that issues it, it can also be considered a digital version of a country's fiat currency. CBDCs are centralized, meaning that the Central Bank in question would have full control over of the amount of money in any particular account.

Centralized Finance (CeFi)

A financial system that is built around a central institution, in which money is managed by said central institution and outside of users' control.

Chain Reorganization

A type of blockchain fork that can occur due to a block conflict, in which two (or more) blocks are published at about or at the same time, causing a fork. The current solution to this is having the longer of the two blocks (and the subsequent chain on its side of the fork) treated as valid, after which subsequent blocks on the other side of the fork are restructured into new blocks; this is what is referred to as chain reorganization.

Chain Split

Occurs when a single cryptocurrency coin splits into two or more independently-managed projects. An example of this is Litecoin (LTC), which split off of Bitcoin (BTC) to lower Litecoin's block generation time. Litecoin itself also experienced a chain split, as Dogecoin (DOGE), a coin inspired by an internet meme, split off of Litecoin.

Circulating Supply

The total amount of cryptourrency coins or token that are publicly usable and being used in the market / general public. Generally significantly less than the amount of the coin or token's total supply.

Cold Wallet

A physical device that stores a person's cryptocurrency public and private keys completely offline. Commonly resemble USB drives. Since this type of wallet is a physical device, misplacing or losing one would mean losing access to the data stored within it.

Collateralized Stablecoin

A type of stablecoin that is mostly or entirely backed by some form of collateral (such as USD, other fiat currencies, and commodities) held in reserve. This way, tokens can be redeemed for the collateral as desired. This, however, means that a collateralized stablecoin requires a large amount of the asset backing it in order to remain collateralized and trustworthy among investors. Additionally, the stability of the stablecoin itself would also be dependent on the stability of its underlying collateral; the more instability a particular asset experiences, the more over-collateralized a stablecoin backed by that asset would have to be.

Commodity

A raw material or other physical product that is fungible, meaning it can be traded for other instances of the same product.

Consensus Algorithm

In the context of computer science, a consensus algorithm is a mechanism that proves distributed entities agree upon the correctness of one or more data values. In the context of cryptocurrency, a consensus algorithm is a procedure through which all of the nodes of a blockchain network reach a common agreement about its current state. The two most common consensus algorithms are Proof-of-Work (PoW) and Proof-of-Stake (PoS), though others, such as distributed Proof-of-Security (dPoSec) and Proof-of-Authority (PoA) exist as well.

Cryptocurrency

A decentralized form of digital currency that uses cryptography (e.g. blockchains with cryptographic hash functions) and distributed peer-to-peer networks to securely regulate currency generation and transactions without the need for a Central Bank.

Cryptoeconomics

An approach to the study of digital economies that integrates concepts and principles from cryptography, computer science, and game theory, as well as traditional economics.

Cryptography

The study and practice of techniques for secure communication in the presence of third parties which may be adversarial.

Crypto Winter

Essentially the cryptocurrency version of a bear market, in which prices follow a general downward trend over an extended period of time.

Essentially the cryptocurrency version of a bear market, in which prices follow a general downward trend over an extended period of time.

Currency

Money in any form that is used as a medium of exchange, including banknotes and coins. Types of currencies include fiat currency based on government decree, precious-metal-based currencies, commodity-based currencies, and digital currency.

D

Dead Cat Bounce

A temporary recovery in the price of an asset after a prolonged period of decline, followed by a return to a downward trend.

Decentralized Finance (DeFi)

A financial system that is not built around a centralized institution (such as the Federal Reserve), meaning that transactions can be done without the involvement of any intermediaries or third parties. Generally, DeFi is done through blockchain-based smart contracts.

Decentralized Application (dApp)

A digital application or program that runs on a blockchain or peer-to-peer network, meaning it runs on multiple computers (or nodes) instead of a single, centralized computer. Because of this, it is out of the control of a central authority, and generally runs on smart contracts to complete processes such as transaction validation (in the case of DeFi dApps). Because dApps are decentralized, users do not need to provide their personal information to use the application, meaning there is more user privacy associated with dApps compared to centralized apps. However, due to their decentralization, dApps are potentially difficult to scale and update (in the case of bug fixes or other changes to the application’s code).

Common uses of dApps include social media, gaming, and decentralized finance.

Decentralized Autonomous Organization (DAO)

A company that is governed by algorithms or blockchain-based smart contracts and is therefore decentralized, allowing large groups of people to be able to participate in governing the company. Just as cryptocurrency blockchains need a certain percentage of participants to be in consensus for transactions to be accepted, a certain percentage of participants in a DAO needs to be in consensus for decisions to be accepted.

Decentralized Database

Stores information across a network of distributed computers instead of on a single, centralized server. Information is verified only when a majority of computers on the network are in consensus that the information is accurately represented.

Decentralized Exchange (DEX)

A type of cryptocurrency exchange system that is peer-to-peer, meaning that crypto trades are done directly between two parties and no third party is involved.

Decryption

The inverse process of encryption, in which encoded messages are decoded into plaintext (i.e. the original message), so that their original, unencrypted content can be read.

Digital Commodity

A good or product with the same aspects of a commodity, except that it exists in a digital form. Notable examples of a digital commodity are Bitcoin, and, arguably, Ethereum.

Digital Currency

A form of currency that has the same aspects as a physical currency, but only exists in digital form. They can generally operate in a decentralized manner without intermediaries, but there are forms of digital currencies, including Central Bank Digital Currencies (CBDCs), that are centralized regardless.

Directed Acyclic Graph (DAG)

A directed graph in which none of the arcs form a closed loop. DAG models have diverse scientific and computational applications as data modeling and structuring tools; for cryptocurrencies, transactions are recorded as vertices (rather than blocks, as in blockchains) and recorded on top of one another. Seen as a possible solution for crypto's decentralization issue, as it eliminates competition between miners to add new blocks to the chain.

Distributed Ledger

An umbrella term for the collection of digital data representing financial records (also known as "ledgers") that are shared or "distributed" across multiple sites. Distributed ledgers are typically enabled by peer-to-peer networks or consensus algorithms, in which there is no centralized point-of-failure. Transactions on a network using a distributed ledger technology (or DLT) do not require validation by a centralized system administrator. Examples of a distributed ledger include blockchains and directed acyclic graphs (DAGs).

Distributed Proof of Security (dPoSec)

A consensus algorithm designed to ensure that the blockchain it runs on will continue to function even if a third of its nodes are unreliable.
Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

Dolphin

In the context of cryptocurrency, a wallet that contains a moderate amount of a particular cryptocurrency coin or token.

Double Spending

An attack on a blockchain in which the same single cryptocurrency coin or token is spent more than once, after modifying the block in which the coin(s) was first spent and reclaiming it for reuse.

Do Your Own Research (DYOR)

An aspect of cryptocurrency investing popularized due to the amount of scamcoins and pump-and-dump schemes (among other scams) in the cryptocurrency market. It is often used as a disclaimer or advice to buyers of cryptocurrency to properly investigate any potential investment before buying into it.

E

Encryption

The inverse process of decryption, in which a message (referred to as "plaintext") is encoded into "ciphertext" so that only the encoder and authorized parties can convert the ciphertext back into the original plaintext.

End-to-End Encryption (E2EE)

A communication system in which only the sender (or the origin end) and the receiver (or the destination end) of a message can read the content of the message, as, theoretically, only the sender and receiver possess the cryptographic keys needed to decrypt the message.

F

Fear of Missing Out (FOMO)

In the context of cryptocurrency, refers to a psychological state in which one feels pressured to buy into an already-high-priced market because many others have benefitted and they believe prices will continue to increase. Also commonly used outside of the context of cryptocurrency.

Fear, Uncertainty, and Doubt (FUD)

In the context of cryptocurrency, refers to a psychological method of manipulating others into buying less of or even selling a particular cryptocurrency through inspiring a negative sentiment (i.e. fear, uncertainty, and doubt) about that cryptocurrency.

Fiat Currency

A currency that has no intrinsic value on its own and is backed by a Central Bank instead of by some sort of asset or commodity.

Fish

In the context of cryptocurrency, refers to a wallet with a small or negligible amount of a particular cryptocurrency coin or token. Also sometimes referred to as a crypto "minnow".

Foreign Exchange (Forex)

A portmanteau of "foreign currency" and "exchange"; a process that converts one currency into another.

G

Game Theory

Originally referred to two-person zero-sum games with balanced gains and losses between participants; now refers to the science of strategical and logical decision-making in humans, other animals, and computers. The blockchain circumvents issues with decentralization (especially cheating) by keeping miners honest using a self-enforcing Nash equilibrium, a component of game theory. As a recursive punishment system, invalid blocks (which have lower scores than valid blocks) will not be mined on top of, as these new blocks will also be deemed invalid.

H

Hard Cap

In the context of cryptocurrency, refers to the maximum number of tokens that a developer team makes available for sale during an Initial Coin Offering for a project. It is essentially a fundraising goal for that ICO; once it is reached, the developer team will no longer receive additional fundraising funds and instead begin work on their project. Also sometimes used to refer to the maximum supply of a particular token or coin, but this generally referred to as the "maximum supply" rather than a "hard cap".

Hard Fork

Refers to a radical change to a blockchain protocol that invalidates previously-valid blocks, or vice versa. Unlike a soft fork, which is backwards-compatible, a hard fork requires all nodes to upgrade to the latest version of the protocol software.

Hash Function

A one-way mathematical function that maps an input of arbitrary length into an encrypted output (or hash) of a fixed size, which cannot be "reverse-engineered" to obtain the original input from the output. However, the same input will always produce the same output, and the same output hash cannot occur from two different inputs. Hash functions are used in cryptocurrency blockchains to, for example, encrypt transaction information. Also known as a cryptographic hash function.

HODL

Mispelling of "Hold", retrofitted to stand for "Hold On for Dear Life"; An investment strategy that involves passively holding onto cryptocurrency instead of trading it (or "building" the blockchain, also known as "BUIDL").

Howey Test

Derived from the 1946 U.S. Supreme Court case SEC v. W. J. Howey Co., which established that a transaction could be considered a security, and therefore subject to U.S. security laws, if it qualified as an "investment contract". An investment contract exists if there is 1) an investment of money 2) in a common enterprise 3) with a reasonable expectation of profits 4) to be derived from the effort of others (all four criteria must be met). Whether a cryptocurrency is to be subject to security regulations or not is dependent on whether it passes or fails the Howey Test; tokens such as Bitcoin do not pass the test, whereas tokens used in an ICO do.

I

Initial Coin Offering (ICO)

Essentially the cryptocurrency version of an Initial Public Offering (IPO), which a company or developer team aiming to create a new coin, app, or service can use as a fundraising method. Investors in an ICO purchase tokens as their investment, which generally has some utility in the context of the project in question, or may represent some amount of stake in the project or the company itself.

K

Know Your Customer (KYC)

A form of identity verification requiring that background checks are run on buyers of cryptocurrency and a record of each account is kept in an effort to prevent illicit activity; a form of Anti-Money Laundering (AML).

L

Layer-1 Protocol

The foundation layer of a blockchain, such as Bitcoin and Ethereum, on which transactions are validated and finalized through the use of a consensus algorithm. However, as outlined in the blockchain trilemma, a consensus algorithm will generally only have two of the three of the following attributes: scalability, security, and decentralization (although it is not impossible, it is generally difficult to implement a consensus algorithm will all three sides of the blockchain trilemma because each combination of two attributes undermines the efficacy of the third). For example, Bitcoin's blockchain has both security and decentralization, but lacks scalability in that its block generation time and transactions per second (TPS) are considerably slow.
To solve this issue, blockchains may use an additional layer on top of the Layer-1 protocol, aptly named a Layer-2 protocol.

Layer-2 Protocol

Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

Layer-3 Protocol

Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

M

Market Capitalization

Refers to an asset's total value as determined by the stock market, calculated by multiplying the total number of shares by the value of one share.

Mining

A process of creating new cryptocurrency coins or tokens utilizing a Proof-of-Stake (PoS) consensus algorithm.

Minting

A process of creating new cryptocurrency coins or tokens utilizing a Proof-of-Work (PoW) consensus algorithm.

N

Node

A physical node is an electronic device connected to a network that is capable of creating, receiving, and transmitting information over a communication channel. In the context of distributed systems, a node refers to participants on a network, including servers, clients, and peers. These participants carry out the same functions as a physical node would.

Non-Fungible Token (NFT)

A cryptographic asset representing a real-world object (most commonly art and other forms of media) that can be bought and sold online. NFTs are indivisible, unlike cryptocurrencies, and can't be bought with other NFTs (i.e. they are not fungible, hence their name).
The original creator of an NFT keeps the copyright to it when an NFT is sold, though the buyer does receive some sort of proof of ownership of the works they purchase.

O

Off-chain

Transactions that occur on a cryptocurrency network outside of the actual blockchain. In doing so, transactions are typically cheaper (as there is usually no transaction fee) and faster rather than when done on the blockchain, as transactions don't need to be verified by the rest of the network. Programs such as the Bitcoin Lightning Network utilize off-chain transactions to increase Bitcoin's TPS (transactions per second) for this reason.

P

Peer-to-Peer (P2P)

A network of computers in which each individual computer can act as a server for others, allowing for the transfer of information between each computer without the need for a central server.

Proof-of-Stake (PoS)

A consensus algorithm in which instead of mining, participants in a blockchain are simply required to own and "stake" tokens as collateral to validate blocks in a chain. Block validation (and cryptocurrency minting) is much less energy-intensive than PoW block mining and is generally less expensive and more scalable, but can be less secure as control over the blockchain can be bought (as long as a participant has 51+% stake of that cryptocurrency, which is unlikely to occur but more likely to occur on a PoS network than a PoW one).

Proof-of-Work (PoW)

A consensus algorithm in which transactions are validated and new blocks are created in a blockchain through solving computationally-intensive mathematical problems (also known as crypto mining). Generally more secure than a Proof-of-Stake consensus algorithm, but also considerably more energy-intensive and costly.

Pump & Dump Scam (P&D)

A cryptocurrency scam in which investors hype up and/or inflate the price of a coin or token and then sell their share once others buy into it (i.e. they "pump" large amounts of money into a cryptocurrency and then "dump" all of their coins before the prices drop).

Public Key

In the context of cryptocurrency, essentially refers to the public address of a wallet.
In the context of cryptography, refers to asymmetric encryption, in which the sender of a message encrypts it with the receiver's public key, and the receiver decrypts the message with their private key. In this way, the sender only needs access to the receiver's public key, but the receiver needs access to both their public and private key.

Private Key

In the context of cryptocurrency, essentially refers to the password for a wallet, of which only the owner of the wallet should have access to.
In the context of cryptography, refers to symmetric encryption, in which the sender and receiver of a message use the same private key to encrypt (in the case of the sender) and decrypt (in the case of the receiver) a message.

R

Rug Pull Scam

A type of exit scam in which a developer pumps up the price of a cryptocurrency project to attract investors before abandoning the project and taking as much of the value with them as possible while doing so, leaving investors with a worthless asset.

S

Satoshi Nakamoto

The presumed-pseudonymous creator (or creators) of Bitcoin and the implementor of the first blockchain. Several people have claimed or have been rumored to be Nakamoto, but none of these claims have yet been confirmed.

Satoshis (SATs)

The smallest unit of the cryptocurrency Bitcoin, named after its developer, Satoshi Nakamoto. It is equal to a hundred millionth of one BTC.

Securities & Exchange Commission (SEC)

Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

Security

A tradable financial asset, generally referring to any type of financial instrument, though this depends on the legal definition used by the jurisdiction in question.

Smart Contract

In the context of cryptocurrency, refers to a computer algorithm on a cryptocurrency blockchain that runs when predetermined conditions are met, utilizing "if... then..." statements that are written into the code of the blockchain. They are often used to automate the execution of agreements without the need for a third party's involvement.

SHA-256

Part of the SHA-2 (Secure Hash Algorithm) set of cryptographic hash functions designed by the United States National Security Agency, which was first published in 2001. SHA-256 is computed with 8 32-bit words, and, among other usages, is used for verifying transactions for several cryptocurrencies, including Bitcoin.

Soft Fork

A change to a blockchain's software protocol that only invalidates previously-made blocks. New blocks will still be recognized by old nodes as valid, meaning a soft fork is backwards-compatible.
In contrast, another kind of blockchain fork, known as a hard fork, is not backwards-compatible and requires all nodes to upgrade to the latest version of the software protocol.

Stablecoin

Cryptocurrencies designed to hold a certain value (or peg) relative to a currency or commodity (referred to as its tether). Therefore, there is generally very low volatility associated with the price of stablecoins. Most stablecoins maintain their peg using some sort of collateral, meaning they are backed by an asset (sometimes the same asset that the stablecoin is tethered to) whose value should mitigate any losses that occur should the stablecoin lose its peg and drop in value.
Algorithmic stablecoins are an exception, being completely uncollateralized in their purest form.

T

Token

Generally used to refer to a cryptocurrency that runs on top of a pre-existing blockchain.
In other usages, however, the term "token" refers to any cryptocurrency, including Bitcoin and Ethereum.

Tokenomics

A portmanteau of "token" and "economics"; studies the economic characteristics (e.g. supply and demand) of a particular cryptocurrency.

V

Volume

The amount of an asset or security that is traded over some period of time, most often the period of a day.

W

Wallet

In the case of cryptocurrency, refers to an application that functions as the cryptocurrency version of a wallet used for physical money. Instead of holding physical items, it stores the cryptocurrency keys (both the public key, or the wallet address, and the private key needed to sign for transactions) needed for a person to access their coins.
There are two main types of wallets: custodial wallets, which are wallets owned (and cryptocurrency keys are stored) by a third party; and noncustodial, in which wallets are managed by the person who owns the keys. Within these, there are two subcategories of wallets: hot wallets, which have a connection to the internet in some form; and cold wallets, which don't have a connection to the internet.

Whale

A cryptocurrency holder who has an abnormally large amount of a particular coin or token. Because of this, whales can potentially significantly influence the price of that cryptocurrency if they move around large amounts at one time.

Whitepaper

Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

Z

Zero-Knowledge Privacy

Refers to qualities servers must possess to ensure confidentiality while transmitting or storing client data. In general, a server with zero-knowledge privacy must never read or write client data as plaintext (i.e. unencrypted data), including authentication information, cryptographic keys, and file metadata. Therefore, theoretically, the confidentiality of client data on the server cannot be compromised either from internal mismanagement or external agents (such as hackers).
The mathematical basis for ensuring zero-knowledge privacy is referred to as a zero-knowledge proof (a.k.a. ZK proofs).

ZK-SNARKs

Work-in-Progress: Please contact us if you are eager about information regarding this page's future content.

#

21 million

The maximum amount of Bitcoins that can be in circulation; after this number is reached (which will occur around 2140 at the current rate at which Bitcoin is mined), no new Bitcoins will be created.

51% attack

Occurs when a group of miners who control more than 50% of the blockchain's computing (or mining) power use their control over the blockchain to alter the recording of blocks in some way. This includes preventing new transactions from being confirmed and reversing transactions completed while the group was in control of the network, the latter of which could allow them to double spend coins. Although a 51% attack is theoretically possible on any blockchain using a Proof-of-Work consensus algorithm, there are a few limitations and drawbacks to doing so:
- Blocks that had been recorded prior to the attack are increasingly difficult to alter the further back that they were originally recorded. Additionally, on the Bitcoin blockchain, for example, blocks become hard-coded into the blockchain software past a certain point in time, meaning that these blocks are impossible to alter;
- A successful attack on Bitcoin or Ethereum, the two largest cryptocurrency blockchains by market cap, is unlikely, considering their size; essentially, the higher the total computing power a particular blockchain has, the harder it is to launch a 51% attack;
- The cost of launching a 51% attack is high, with the group needing at least half of the total mining power on a blockchain and the cost of mining is already high to begin with. In the case of major cryptocurrencies, this makes carrying out a 51% attack impractical just with the cost of acquiring the hashing power alone; and
- The altered blockchain must be introduced by the group attacking the blockchain at a precise time, meaning that if the block creation rate is high enough, they may not be able to insert their altered blocks in the correct location on the blockchain before more blocks are added.

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

V

W

Z

#


CRYPTOGRAPHY WORKS and Cryptographyworks.com are trademarks of PivotPoint Technology Corporation. All other product and service names mentioned are the trademarks of their respective companies.