Daten aus dem Cache geladen. What is Crypto and Cryptography? | Webyourself Social Media Platform

What is Crypto and Cryptography?

0
451

In this article, you can learn about cryptography and you can easily understand how it works through simple examples in this article.

 

Crypto is called cryptocurrency, Crypto is a word that comes from cryptography. Now everyone can invest and purchase cryptocurrency in Global cryptocurrency exchange platforms.

 

But understand the word crypto that comes from and know about cryptography by reading the following content.

 

Cryptography:

 

Cryptography means to transfer a text or SMS to someone secretly by using encryption and decryption methods. Crypto is a word that comes from Cryptography. 

 

The purpose of using encryption and decryption methods is to keep transfer data safe and secure. To avoid hackers stealing data, and sending a text secretly and privately we use cryptography. 

 

What is Encryption and Decryption?

 

Encryption means converting an original text into a mixing of letters and numbers to avoid the original text publicizing and transferring secretly. 

 

For example, User A needs to send an SMS like “I have 50 Parkcoins” to User B. 

But A wants to send this SMS to B secretly without leaking or showing it to Everyone. 

 

So A Encrypts his text by converting “I have 50 Parkcoins” to “wht4vd8njdy654” by using his Keys.

 

Now B receives a text from A like “wht4vd8njdy654” then B also has a Key, B uses his key to decrypt a text from A.

 

Decrypts means converting back an improper text to proper text like mixing of letters and numbers to Original text.

 

Finally, B receives a mix of letters and numbers words from A, then B decrypts by using his key and gets back an Original SMS that “I have 50 Parkcoins”.

 

Keys in Encryption and Decryption:

 

There are two keys: Public keys and Private keys, also called Key pairs. 

 

Both users A and B have both keys, public and private keys. If User A public key encrypts a text that text can only be decrypted by User A's private key.

 

Public keys can be seen and used by anyone, but private keys are only for personal use and must be kept secret. 

 

Now see the scenario: User A encrypts his text by using User B's public key and sends it to B. Now User B receives an encrypted text from A then B can decrypt a Text by using his secret private key.

 

For know more information click here: https://www.koinpark.com/blog/cryptobasics/what-is-cryptography

 

Zoeken
Categorieën
Read More
Other
Europe Exterior Doors Market 2024: Applications with latest Trends & Forecast 2032
The Europe Exterior Doors Market stands at the intersection of functionality,...
By Allen Walter 2024-07-17 09:19:56 0 450
Other
노래방: 카라오케의 매력과 재미
노래방은 세계적으로 사랑받고 있는 인기 있는 문화적 엔터테인먼트 형태로, 카라오케라고도 불립니다. 이 매력적인 현상은 한국에서도 큰 인기를 누리며, 사람들이 친구들과 함께...
By Fasih Ali123 2024-01-31 06:53:13 0 859
Other
Laundry Detergent Market Size, Share, Trends, Key Drivers, Growth Opportunities and Competitive Outlook
"Laundry Detergent Market – Industry Trends and Forecast to 2031 Global Laundry Detergent...
By Kirti Narayankar 2024-11-12 09:51:21 0 112
Drinks
Anti hangover cure
Each convenient shot is packed with a powerful blend of vitamins, antioxidants, and natural...
By Julian RAHUL 2024-04-22 12:31:13 0 788
Spellen
NCAA Football 25 Revealed: Exciting Return!
NCAA Football's Exciting Return At long last, the wait is over. After a lengthy...
By Xtameem Xtameem 2024-09-15 23:58:30 0 291