What is Crypto and Cryptography?

0
450

In this article, you can learn about cryptography and you can easily understand how it works through simple examples in this article.

 

Crypto is called cryptocurrency, Crypto is a word that comes from cryptography. Now everyone can invest and purchase cryptocurrency in Global cryptocurrency exchange platforms.

 

But understand the word crypto that comes from and know about cryptography by reading the following content.

 

Cryptography:

 

Cryptography means to transfer a text or SMS to someone secretly by using encryption and decryption methods. Crypto is a word that comes from Cryptography. 

 

The purpose of using encryption and decryption methods is to keep transfer data safe and secure. To avoid hackers stealing data, and sending a text secretly and privately we use cryptography. 

 

What is Encryption and Decryption?

 

Encryption means converting an original text into a mixing of letters and numbers to avoid the original text publicizing and transferring secretly. 

 

For example, User A needs to send an SMS like “I have 50 Parkcoins” to User B. 

But A wants to send this SMS to B secretly without leaking or showing it to Everyone. 

 

So A Encrypts his text by converting “I have 50 Parkcoins” to “wht4vd8njdy654” by using his Keys.

 

Now B receives a text from A like “wht4vd8njdy654” then B also has a Key, B uses his key to decrypt a text from A.

 

Decrypts means converting back an improper text to proper text like mixing of letters and numbers to Original text.

 

Finally, B receives a mix of letters and numbers words from A, then B decrypts by using his key and gets back an Original SMS that “I have 50 Parkcoins”.

 

Keys in Encryption and Decryption:

 

There are two keys: Public keys and Private keys, also called Key pairs. 

 

Both users A and B have both keys, public and private keys. If User A public key encrypts a text that text can only be decrypted by User A's private key.

 

Public keys can be seen and used by anyone, but private keys are only for personal use and must be kept secret. 

 

Now see the scenario: User A encrypts his text by using User B's public key and sends it to B. Now User B receives an encrypted text from A then B can decrypt a Text by using his secret private key.

 

For know more information click here: https://www.koinpark.com/blog/cryptobasics/what-is-cryptography

 

البحث
الأقسام
إقرأ المزيد
Party
Umzugsunternehmen: Ihr Schlüssel zu einem stressfreien Umzug
Ein Umzug ist oft eine aufregende, umzugsunternehmen auch stressige Erfahrung. Die Planung, das...
بواسطة Yem Oje 2024-10-09 05:17:08 0 234
أخرى
Independent Call Girl Dubai +971502006322
Dubai is known as a city of luxury, glamour, and vibrant nightlife. It stands out as a hub for...
بواسطة Indiancallgirls Calllgirls 2024-11-19 09:53:18 0 68
أخرى
Wide Band Gap (WBG) Power Devices Market Benefits, Opportunities, Segmentation, Industry trends, Competitive Analysis, Report Studies and Development to 2030
Wide Band Gap (WBG) Power Devices Market Overview The global WBG power devices market size is...
بواسطة Kushal Sawarkar 2024-05-14 13:21:40 0 717
أخرى
"The Enchanted Lagoon: A Place of Legends"
Situated heavy within the center of a historical forest, the Enchanted Lagoon is just a position...
بواسطة Bens Tock2t 2024-07-27 15:55:11 0 498
أخرى
Pressure Sensitive Adhesives Market Size, Share, Development Status, Top Manufacturers, And Forecasts 2030
The Pressure Sensitive Adhesives Market size was valued at USD 1.57 Bn. in 2023 and the...
بواسطة Kadambari Jedhe 2024-12-16 10:03:11 0 56