The Good Tech Companies - Educational Byte: Cryptography and Its Connection to Cryptocurrencies

Episode Date: August 18, 2024

This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-cryptography-and-its-connection-to-cryptocurrencies. Cryptography is the sc...ience of securing digital information through complex mathematical techniques. It's also the reason why cryptocurrencies exist at all. Check more stories related to science at: https://hackernoon.com/c/science. You can also check exclusive content about #cryptography, #public-key-cryptography, #textcoins, #private-keys, #cryptocurrency-wallets, #asymmetric-cryptography, #obyte, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. Cryptography is the science of securing digital information and communications through complex mathematical techniques. It ensures that data (often digital data) remains confidential, authentic, and unaltered. Public key cryptography plays a vital role in ensuring the security and integrity of transactions for cryptocurrencies. In cryptocurrencies, private keys are used to sign transactions, and public keys to verify the signatures.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. Educational Byte. Cryptography and its connection to cryptocurrencies, by Obite. Cryptography comes from ancient Greek, and it means something like a secret or hidden writing. That's how this discipline started. Someone would write a message for another party but use various techniques to keep it secret from others. For instance, they might change the usual order of letters or words, with the correct order known only to the recipient. Things have evolved a lot from that point, but that's the gist. In more modern times, we can define cryptography as the science of securing digital information and communications through complex mathematical
Starting point is 00:00:40 techniques, but it's also an intersection with computer science, information security, physics, and even more. It ensures that data, often digital data, remains confidential, authentic, and unaltered. Practical uses of cryptography in our era include protecting personal information on devices, ensuring the privacy of emails and messages, safeguarding sensitive material, enabling secure access to online accounts, and securing online transactions. As you may imagine, that's where cryptocurrencies enter this topic. The crypto bit comes from cryptography, because cryptocurrencies are, basically, digital coins made of pure cryptography, complex mathematics. Beyond what we can or need to see, their inner workings are full of algorithms and long alphanumeric strings, sometimes only readable and understandable by machines.
Starting point is 00:01:30 In the end, this is the reason why they exist at all. Public Key Cryptography There are numerous existing cryptographic techniques, and even new ones being developed right now. Cryptocurrencies use several of those techniques already, but maybe the main one for the absolute majority is public key cryptography or asymmetric cryptography. This method involves a pair of keys, a public key, which can be shared with anyone, and a private key, which is kept secret. By keys, here, we mean long strings of characters typically represented as sequences of bits, binary digits. In cryptocurrencies, private keys are used to sign transactions, and public keys are used to verify the signatures. This ensures that only the owner of a cryptocurrency address can authorize
Starting point is 00:02:15 transactions from that address. Public key cryptography plays a vital role in ensuring the security and integrity of transactions for cryptocurrencies. For instance, when Alice wants to send five coins to Bob, she signs the transaction with her private key, generating a unique digital signature that proves she authorized it. She then broadcasts the signed transaction to the cryptocurrency network. Nodes in the network receive the transaction and use Alice's public key to verify the signature. Once verified, the transaction is added to the chain, reducing Alice's balance by 5 coins and increasing Bob's balance by the same amount. This process prevents unauthorized access and tampering, ensuring the transaction's security.
Starting point is 00:02:57 All of this happens in the background, though. Final users see public keys as crypto addresses, shareable with anyone, and private keys in the form of private seeds, strings of random words to keep private and recover wallets. Beneath what we can see in our apps, they both look like long and barely legible alphanumeric strings. Crypto addresses are, let's say, the shorter version, even if they still are sort of long and complex. Simplifying cryptos. Obite simplifies cryptography in cryptocurrencies with textcoins, making digital currency accessible without a steep learning curve. Textcoins allow users to send and receive funds through familiar methods like email,
Starting point is 00:03:37 instant messaging, or even on paper. A textcoin is essentially a string of 12 random words or ailing that contains cryptocurrency. This means someone can carry a piece of paper with these words and redeem the funds later when they have access to the internet and an Obite wallet. Textcoins work seamlessly for people without the use of any crypto address, even if they don't have a wallet yet. For example, Bob can create a textcoin in his Obite wallet, which generates a string like TOGETHER ORANGE PELICAN TOOTH FOX LUCKY HALF CUP WINDOW COIL RADAR PEN, or ALINK. He can then send this text coin via email or chat to Alice. Alice, upon receiving it, can claim the funds by clicking the link or entering the words into her Obite wallet once she has internet access. This simplicity allows Evanthos unfamiliar with
Starting point is 00:04:23 cryptocurrency to use it easily. Moreover, text coins are refundable, adding a layer of security. If Alice doesn't claim the text coin for any reason, Bob can reclaim the funds by accessing the text coin details in his Obite wallet's history. This feature ensures that funds aren't lost if the recipient fails to claim them, providing both flexibility and security. Obite's text coins effectively bridge the gap between the digital and physical worlds, making cryptocurrency transactions straightforward and accessible for everyone. Featured vector image by Freepik and thank you for listening to this HackerNoon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.