Daten aus dem Cache geladen. What is Crypto and Cryptography? | Webyourself Social Media Platform

What is Crypto and Cryptography?

0
466

In this article, you can learn about cryptography and you can easily understand how it works through simple examples in this article.

 

Crypto is called cryptocurrency, Crypto is a word that comes from cryptography. Now everyone can invest and purchase cryptocurrency in Global cryptocurrency exchange platforms.

 

But understand the word crypto that comes from and know about cryptography by reading the following content.

 

Cryptography:

 

Cryptography means to transfer a text or SMS to someone secretly by using encryption and decryption methods. Crypto is a word that comes from Cryptography. 

 

The purpose of using encryption and decryption methods is to keep transfer data safe and secure. To avoid hackers stealing data, and sending a text secretly and privately we use cryptography. 

 

What is Encryption and Decryption?

 

Encryption means converting an original text into a mixing of letters and numbers to avoid the original text publicizing and transferring secretly. 

 

For example, User A needs to send an SMS like “I have 50 Parkcoins” to User B. 

But A wants to send this SMS to B secretly without leaking or showing it to Everyone. 

 

So A Encrypts his text by converting “I have 50 Parkcoins” to “wht4vd8njdy654” by using his Keys.

 

Now B receives a text from A like “wht4vd8njdy654” then B also has a Key, B uses his key to decrypt a text from A.

 

Decrypts means converting back an improper text to proper text like mixing of letters and numbers to Original text.

 

Finally, B receives a mix of letters and numbers words from A, then B decrypts by using his key and gets back an Original SMS that “I have 50 Parkcoins”.

 

Keys in Encryption and Decryption:

 

There are two keys: Public keys and Private keys, also called Key pairs. 

 

Both users A and B have both keys, public and private keys. If User A public key encrypts a text that text can only be decrypted by User A's private key.

 

Public keys can be seen and used by anyone, but private keys are only for personal use and must be kept secret. 

 

Now see the scenario: User A encrypts his text by using User B's public key and sends it to B. Now User B receives an encrypted text from A then B can decrypt a Text by using his secret private key.

 

For know more information click here: https://www.koinpark.com/blog/cryptobasics/what-is-cryptography

 

Pesquisar
Categorias
Leia Mais
Outro
Digging Deeper: Exploring The Benefits Of Premium Potting Soils
Gardening enthusiasts understand the importance of using high-quality soil to nurture healthy and...
Por Raj Kumar Dhote 2024-05-10 13:30:12 0 958
Outro
Levittown Roofing Contractor: Your Guide to Roofing Solutions in Levittown, NY
When it comes to maintaining the structural integrity of your home, few components are as crucial...
Por Mak Digital 2025-01-30 13:29:37 0 64
Outro
Global Computer Software Assurance (CSA) Market Is Estimated To Witness High Growth Owing To Increasing Adoption Of Cloud-Based Solutions And Rising Cybersecurity Concerns
Market Overview: The Computer Software Assurance (CSA) market refers to the process of ensuring...
Por Sushil Sushil 2023-10-05 11:59:31 0 2KB
Health
What is Frec 3 courses London?
Are you looking for a course that will teach you the skills necessary to provide first response...
Por True Medic 2023-03-07 05:06:22 0 2KB
Outro
Online Video Platform Market Demand Surge Linked to Rise in Digital Content Consumption
The global online video platform market size is expected to reach USD 35.15 billion by 2030,...
Por Karls Scott 2025-01-24 05:36:54 0 20