What is asymmetric encryption?

What is assymetric encryption

If you are reading this article, you are certainly interested in the topic of cryptocurrencies such as Bitcoin (BTC) or Ethereum (ETH). In this connection, we want to ask you a question: have you ever wondered why the word “cryptocurrencies” contains the term “crypto”? Of course, it comes from another well-known word – “cryptography”. So what does cryptography and cryptocurrencies have in common? Read on to find out!

Are cryptocurrencies secure?

Cryptocurrencies operate on blockchain technology. This means that in order to make a transaction, such as sending a certain amount of money to a certain recipient, you need to register it on a publicly accessible blockchain. This transaction is authenticated by your electronic signature. This signature is a guarantee of the security of the transaction in question – it proves that the transaction was sent by a verified sender, and thus that it has not been forged. What makes it special and unique? The digital signature is created using a hash algorithm and asymmetric encryption. At this point, we move seamlessly into the concept of cryptography.

How does hashing and asymmetric encryption work?

Cryptography is a scientific discipline that explains how to transmit information while protecting it from unauthorised access. In other words, cryptography teaches how to encrypt messages. One way to encrypt information is through hashing, while another is through asymmetric encryption. In this paragraph, we will explain both of these concepts.

Let’s start with hashing using the example of the most popular cryptocurrency today, Bitcoin (BTC). Hashing involves applying an algorithm that irreversibly converts input data into unique output data. Bitcoin uses the SHA256 algorithm, which converts the input data into 256 binary digits, or combinations of zeros and ones.

The next concept we will explain is asymmetric encryption. Each cryptocurrency wallet is equipped with two keys: a public key and a private key. When you transfer funds to another user, your transaction is encrypted asymmetrically with the public key. Only the user who has the private key corresponding to the public key can decrypt it. This is what asymmetric encryption is all about. Let’s try to trace the whole process using a simple example.

Karolina would like to send 5 Bitcoins (BTC) to Paul. The message sent by Karolina contains the following information: input and output data, a link to previous transactions and an encrypted message with an electronic signature. Paul, on receiving the transaction, needs to authenticate it. He therefore performs two actions. First, he decrypts Karolina’s electronic signature using her public key. Paul possesses the first hash. Then, Paul uses a hash algorithm on the message coming from Karolina. In this way, he obtains the second hash. If the two hashes are the same, the transaction is authenticated. This way Paul knows that the 5 Bitcoins were really sent to him by Karolina and that no one interfered with the message she sent.

DisclaimerBlockbulletin does not take accountability of investments based on the information of the website. We highly advice readers to make extensive research prior to any invest

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

More Guides

What is Avalanche (AVAX)?

Avalanche (AVAX) is a blockchain, which conquers the hearts of programmers and at the same time is a great bargain…

What is Sandbox (SAND)?

In this material, we take a look at one of the fastest growing spaces in the metaverse family. We are…
All articles loaded
No more articles to load

Latest News

What lies ahead for Cardano in 2022

What lies ahead for Cardano in 2022?

Charles Hoskinson, the creator of Cardano, shared what lays ahead for the smart contract ecosystem during one of his regular appearances on YouTube. So what is in…

Crypto trends that may occur in 2022

The beginning of a new year is a time of speculation about the future of the cryptocurrency market. The trends in 2021 were pretty clear, but will…
All articles loaded
No more articles to load


Bitcoin Price on a Larger Scale

Bitcoin Price on a Larger Scale

Short-term analysis can often make you shudder. Daily news, both positive and negative, puts the Bitcoin price in dynamic upward as well as downward movements.…
All articles loaded
No more articles to load

Knowledge Base

What is Avalanche (AVAX)?

Avalanche (AVAX) is a blockchain, which conquers the hearts of programmers and at the same time is a great bargain for investors. What distinguishes the…

What are stablecoins and how can you use them?

In recent years, cryptocurrencies are experiencing a real “boom”! And not just for cryptocurrencies – the rise in popularity applies to blockchain technology in general.…

What is Sandbox (SAND)?

In this material, we take a look at one of the fastest growing spaces in the metaverse family. We are talking about Sandbox and SAND…

What is Polygon (MATIC)?

Another coin worth looking at is Polygon (MATIC). It is especially liked by many investors. So what makes its popularity constantly growing? Support for Ethereum…

What is Shiba Inu (SHIB)

Shiba Inu (SHIB) is one of the most sought-after coins on the market. This is evidenced by its dynamic rallies and global interest. But does…

Who is Satoshi Nakamoto?

The world’s biggest cryptographic mystery remains unsolved to this day. It is speculated whether Satoshi Nakamoto is a single person or perhaps the name of…
All articles loaded
No more articles to load