The Good Tech Companies - Educational Byte: Cryptography and Its Connection to Cryptocurrencies
Episode Date: August 18, 2024This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-cryptography-and-its-connection-to-cryptocurrencies. Cryptography is the sc...ience of securing digital information through complex mathematical techniques. It's also the reason why cryptocurrencies exist at all. Check more stories related to science at: https://hackernoon.com/c/science. You can also check exclusive content about #cryptography, #public-key-cryptography, #textcoins, #private-keys, #cryptocurrency-wallets, #asymmetric-cryptography, #obyte, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. Cryptography is the science of securing digital information and communications through complex mathematical techniques. It ensures that data (often digital data) remains confidential, authentic, and unaltered. Public key cryptography plays a vital role in ensuring the security and integrity of transactions for cryptocurrencies. In cryptocurrencies, private keys are used to sign transactions, and public keys to verify the signatures.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Educational Byte. Cryptography and its connection to cryptocurrencies, by Obite.
Cryptography comes from ancient Greek, and it means something like a secret or hidden writing.
That's how this discipline started. Someone would write a message for another party but
use various techniques to keep it secret from others. For instance, they might change the usual
order of letters or words, with the correct order known only to the recipient. Things have evolved
a lot from that point, but that's the gist. In more modern times, we can define cryptography
as the science of securing digital information and communications through complex mathematical
techniques, but it's also an intersection with computer science, information security, physics, and even more. It ensures that data, often digital data, remains confidential,
authentic, and unaltered. Practical uses of cryptography in our era include protecting
personal information on devices, ensuring the privacy of emails and messages, safeguarding
sensitive material, enabling secure access to online accounts,
and securing online transactions. As you may imagine, that's where cryptocurrencies enter
this topic. The crypto bit comes from cryptography, because cryptocurrencies are,
basically, digital coins made of pure cryptography, complex mathematics. Beyond what we can or need
to see, their inner workings are full of algorithms and long alphanumeric strings, sometimes only readable and understandable by machines.
In the end, this is the reason why they exist at all.
Public Key Cryptography
There are numerous existing cryptographic techniques, and even new ones being developed right now.
Cryptocurrencies use several of those techniques already, but maybe the main one for the absolute majority is public key cryptography or asymmetric cryptography.
This method involves a pair of keys, a public key, which can be shared with anyone, and a private key, which is kept secret.
By keys, here, we mean long strings of characters typically represented as sequences of bits, binary digits. In cryptocurrencies,
private keys are used to sign transactions, and public keys are used to verify the signatures.
This ensures that only the owner of a cryptocurrency address can authorize
transactions from that address. Public key cryptography plays a vital role in ensuring
the security and integrity of transactions for cryptocurrencies. For instance, when Alice wants to send five coins to Bob, she signs the transaction with
her private key, generating a unique digital signature that proves she authorized it.
She then broadcasts the signed transaction to the cryptocurrency network.
Nodes in the network receive the transaction and use Alice's public key to verify the signature.
Once verified, the transaction is added to the
chain, reducing Alice's balance by 5 coins and increasing Bob's balance by the same amount.
This process prevents unauthorized access and tampering, ensuring the transaction's security.
All of this happens in the background, though. Final users see public keys as crypto addresses,
shareable with anyone, and private keys in the
form of private seeds, strings of random words to keep private and recover wallets.
Beneath what we can see in our apps, they both look like long and barely legible alphanumeric
strings. Crypto addresses are, let's say, the shorter version, even if they still are sort of
long and complex. Simplifying cryptos. Obite simplifies cryptography in cryptocurrencies with textcoins,
making digital currency accessible without a steep learning curve.
Textcoins allow users to send and receive funds through familiar methods like email,
instant messaging, or even on paper. A textcoin is essentially a string of 12
random words or ailing that contains cryptocurrency.
This means someone can carry a piece of paper with these words and redeem the funds later when they have access to the internet and an Obite wallet. Textcoins work seamlessly for
people without the use of any crypto address, even if they don't have a wallet yet. For example,
Bob can create a textcoin in his Obite wallet, which generates a string like TOGETHER ORANGE PELICAN TOOTH FOX LUCKY HALF CUP WINDOW COIL RADAR PEN, or ALINK.
He can then send this text coin via email or chat to Alice.
Alice, upon receiving it, can claim the funds by clicking the link or entering the words into
her Obite wallet once she has internet access. This simplicity allows Evanthos unfamiliar with
cryptocurrency to use it easily.
Moreover, text coins are refundable, adding a layer of security. If Alice doesn't claim the
text coin for any reason, Bob can reclaim the funds by accessing the text coin details in his
Obite wallet's history. This feature ensures that funds aren't lost if the recipient fails to claim
them, providing both flexibility and security.
Obite's text coins effectively bridge the gap between the digital and physical worlds,
making cryptocurrency transactions straightforward and accessible for everyone.
Featured vector image by Freepik and thank you for listening to this HackerNoon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.