Cryptography is the process of communicating securely in an insecure environment – i.e. where other people can listen in and control the communication channel.
The message you wish to send is converted to a cipher text that appears to be gibberish unless you know the secret to unlocking it.
There are two main types of cryptography – symmetric and asymmetric.
Symmetric is the oldest form but not the most secure as it implies both the sender and the receiver are in control of the cipher – or the coding and decoding key. One of the most common & simplest forms of Cipher – similar to the one that Caesar used to communicate with his generals – is just shifting the message to be sent by a number of letters in the alphabet.
In the picture above the message, cryptocompare.com, is shifted by one letter in the alphabet – then sent across the insecure channel to the receiver who decrypts it using the same key – i.e. moving the letters one space to the start of the alphabet to decipher the text and reveal cryptocompare.com. These can be relatively easy to decode.
Symmetric cryptography has a problem - How to tell the other person what the code is? This has been dealt with somewhat by public key cryptography or essentially where the receiver generates a key pair and then sends the public key to the message sender. The sender then encrypts the message using the receivers public key and sends the encrypted message to the receiver. The receiver then takes the encrypted message and his private key and decrypts the message. This is asymmetric cryptography.
This method though can still be subject to the man in the middle attack unless there is some form of centralising authority who preside over keys and owners though certification – the most common uses of this are in SSL and TSL – Secure Socket Layer & Transport Security Layer.
Bitcoin and other crypto currencies use a form of digital signatures to take the process further by proving that the sender sent the message – i.e. non-repudiation – where the sender can’t deny that it was them who sent the message. The process is as shown here.
You may be asking how does the verification and signing algorithm work. Well this all has to do with elliptic curves and their properties and a mathematical trick– which basically means the Bitcoin Network can verify that a transaction was sent by the person who holds the private key without them revealing it!
- How do digital signatures in Bitcoin work?
- Who are the CypherPunks?
- What is a Bitcoin Vanity address and how do you get one?
- What is a Bitcoin Fork?
- How does a hashing algorithm work?
- Bitcoin Transactions – Scriptsig and Scriptpubkey – locking and unlocking a transaction?
- How does the Bitcoin Network actually work?
- Why Using a VPN is Important for Crypto
- Roobee IEO: A New Company Shaking Up the Investment Industry
- Bitcoin Casino Kings - Crypto Casino Review Website
- What Are Smart Contracts?
- Cryptocurrency Tokens vs Coins: What's the Difference?
- What’s the Difference Between Bitcoin (BTC) and Ethereum (ETH)?
- What Is A Blockchain?
- What Is An ICO And How Does It Work
- TREZOR Model T CryptoCompare Review
- What is ChainRift?