From cryptography to blockchain analysis

avatar
(Edited)

analytics-3088958_1280.jpgImage Source

The versatility is how technology has been of great support to humanity, from the beginning of the handling of the cryptomonas since its launch changed and gave a modernization of the management with new knowledge of the active in a digital way, which can be managed in a decentralized way. But I always wonder how the development of this type of technology for the development of this digital ecosystem really was, everything lies in cryptography.


The versatile and wonderful is when science is combined with the hand of technology, which together are unquestionable when used properly, because the objectives of cryptography to be the part of cryptology that deals with the study of algorithms, cryptographic protocols which in turn is ennmayor possible to develop systems that are used to protect information and provide security to communications and entities that communicate within the same digital ecosystem as part of a platform. One of the first models designed for this type of technology in history, the German encryption machine Lorenz, used in World War II for the encryption of messages destined to generals of very high security rank.


That is why thanks to the mathematical techniques that serve as tools to achieve their objectives, for the development of algorithms that give answers in a decentralized and reliable, in order to ensure that information is accessible only to authorized personnel. In such a way that it is about using codes and encryption techniques, until reaching the forefront of the integrity of this whole context the correction and completeness of information, based on cryptographic hash functions MDC, bit commitment protocols.


Now our reality in our present time the mathematical functions allowed us the development of cryptography, which allows the creation of digital secrets and digital signatures that cannot be falsified, where all the blockchains use practically the same cryptographic principles, in such a way is where the algorithms are present, which allows us the development of the call of the pair of keys consists of a private key and derived from this last one, where only a unique public key.


The importance of all this computer and mathematical language allows us to know the public key, this is used to receive transactions, and the private key is used to sign transactions and spend the funds associated with the account, that is why the development of this type of block chain is decentralized and secure, for the protection of these digital assets.


Continuing in this order of ideas the data is used public key cryptography, first the asymmetric cryptography and the secret key cryptography, as the second the symmetric cryptography, it should also be considered that the private key is similar to a PIN or password that we use to access different web pages or digital platforms within this type of technology.


2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvQi45MYNjhK74jhfEdPN6ZxjFj8M5Lm6GwrnoVpvUN72NVmwZTEyX1GhLhLat4L1YwZCgTnq6RontXPk.png



0
0
0.000
7 comments
avatar

Dear @coolxxx

I've tried to read and understand your publication. And I'm failing. Did you translate it from other language to English? It's just so difficult to read and understand anything.

0
0
0.000
avatar

ok I will improve the grammar better and try to make my content better.

0
0
0.000
avatar

This post has been manually curated by @bala41288 from Indiaunited community. Join us on our Discord Server.

Do you know that you can earn a passive income by delegating to @indiaunited. We share 80 % of the curation rewards with the delegators.

Here are some handy links for delegations: 100HP, 250HP, 500HP, 1000HP.

Read our latest announcement post to get more information.

image.png

Please contribute to the community by upvoting this comment and posts made by @indiaunited.

0
0
0.000
avatar

Thanks to cryptography and mathematical models in the application of algorithms served as the basis for the development of the blockchain ecosystem.

0
0
0.000
avatar

Source of plagiarism

Direct translation without giving credit to the original author is Plagiarism.

Repeated plagiarism is considered fraud. Fraud is discouraged by the community and may result in the account being Blacklisted.

If you believe this comment is in error, please contact us in #appeals in Discord.

Please note that direct translations including attribution or source with no original content are considered spam.

0
0
0.000