decrypt101
SocialOpen ProjectsSupport me My Resumes
  • Preface
    • Motivation
    • Roadmap’s
  • Introduction to Blockchain
    • A Brief History
    • Growth of Blockchain
    • Structure of Blockchain
    • Types of Blockchain
    • Key Technologies of Blockchain
    • Features of Blockchain
    • How Blockchain Works ?
    • Implementation of Blockchain
    • Summary
  • Components of Blockchain Architecture
    • Distributed Ledger
    • Blocks
    • Transaction
    • Chain
    • Peer-to-Peer Network
    • Blockchain Layers
    • Off-Chain & On-Chain
    • Wallet
    • Mining
    • Tokens
    • Assets
    • State Channels
    • Sidechains
    • Oracles on Blockchain
    • Atomic Swaps
    • Decentralized Identity (DID)
    • Blockchain Data Storage
    • Interoperability
    • Data structures for Scaling Blockchain
    • Maximal Extractable Value (MEV)
  • Consensus Mechanisms
    • Proof of Work (PoW)
      • Implemation Using Rust
    • Proof of Stake (PoS)
    • Proof of Burn (PoB)
    • Proof of Capacity (PoC)
    • Proof of Activity (PoAc)
    • Proof of Weight (PoWe)
    • Proof of Luck (PoL)
    • Proof of Ownership (PoO)
    • Proof of Existence (PoE)
    • Proof of Believability (PoBe)
    • Proof of History (PoH)
    • Proof of Authority (PoA)
    • Proof of Elapsed Time (PoET)
  • Cryptographics
    • Encryption & Decryption
      • Symmetric Encryption
      • Asymmetric Encryption
      • Key Management and Exchange
      • Implementation
    • Cryptographic Hashing
      • Secure Hash Algorithms (SHA)
      • Message Digest Algorithms
      • Ethash
      • Blake2
      • SCrypt
      • RIPEMD-160
    • Digital Signature
      • Digital Signature Algorithms
      • Digital Signature in Blockchain
    • Zero-Knowledge Proofs (ZKPs)
      • Types of Zero-Knowledge Proof and Protocols
      • A Case Study of Polygon Platform
    • Multi-Party Computation (MPC)
    • Cryptanalysis
    • Practical Implementation
  • Decentralized Application (DApp)
    • Design and UX in Web3
  • Smart Contract
    • Development Tools
    • Solidity
    • Testing Smart Contract
    • Developing Smart Contract
    • Interacting & Deploying with Smart Contract
    • Verifying Smart Contracts
    • Upgrading Smart Contracts
    • Securing Smart Contract
    • Smart Contract Composability
    • Testnet and Mainnet
    • Blockchain Platform Using Smart Contract
    • Application of Smart Contract
    • Practical Implementation
  • Blockchain Platforms
    • Ethereum
      • Ethereum Virtual Machine (EVM)
      • ETHER and GAS
      • Ethereum transaction
      • Ethereum Accounts
      • Ethereum Stacking
      • Ethereum Network
      • Ethereum Scaling Solutions
      • Ethereum Use-Cases
      • Getting Started with Ethereum
      • Ethereum Ecosystem and Support
    • Solana
      • Solana Architecture
        • Solana Account Model
        • Solana Wallet
        • Transactions and Instructions
        • Solana Programs
        • Program Derived Address (PDA)
        • Cross Program Invocation (CPI)
        • Tokens on Solana
        • Clusters and Public RPC Endpoints
        • Transaction Confirmation & Expiration
        • Retrying Transactions
        • Versioned Transactions
        • Address Lookup Tables
        • State Compression
        • Actions and Blinks
      • Solana Developments
      • Solana Client
      • Advanced Solana
      • Solana Scaling and Performance Architecture
      • Solana Solutions and cases
      • Practical Implemenation
    • Binance Smart Chain (BSC)
      • Create a BEP20 Token
    • Hyperledger Fabric
    • Cosmos
    • Polkadot
    • Quorum
    • Polygon
    • Algorand
    • Corda
    • Avalanche
    • TRON
    • Summary
  • Decentralized Finance (DeFi)
    • DeFi Components
    • DeFi Protocols
    • DeFi Platforms
    • DeFi Risk Classification
      • Infrastructure-layer Attacks
      • Smart Contract Layer-attacks
      • Application Layer-attacks
      • DeFi Risks
    • DeFi and Blockchain
    • DeFi Impact
  • Decentralized Ecosystem and Digital Innovation
    • Layer 2 Scaling Fundamental
    • Tokenomics
    • Cryptocurrency
    • Quantative Trading
    • NFTs
    • GameFi
    • Metaverse
  • Blockchain as a Service (BaaS)
    • Building Fullstack Blockchain Platform
    • Decentralized Digital Identity
    • Build a Cryptocurrencies Exchange
    • Play-to-Earn Gaming
    • Solana Token Airdrop Manager
    • Smart Contract Development on Solana with Rust
    • Quantitative Trading Platform
    • Insurances protocols
    • Flash Loans
    • Asset Management
    • Tokenized Derivatives
    • Automated Market Makers (AMMs)
    • Staking
    • Lending and Borrowing Platforms
    • Yield Farming
    • Stablecoin System
    • Security Token Offerings (STOs)
    • Initial Coin Offerings (ICOs)
    • On-Chain Voting Systems
    • Decentralized Autonomous Organizations (DAOs)
    • NFT Marketplaces
    • Provenance Verification
    • Supply Chain Tracking
    • Commodities Tokenization
    • Real Estate Tokenization
    • Digital Certificates
    • KYC (Know Your Customer)
  • Blockchain Development Across Languages
    • Blockchain using Go(Golang)
    • Blockchain using Rust
    • Blockchain using Python
    • Blockchain using Cairo
  • Distributed Systems & Infrastructure Technology
    • Classification of Distributed Systems
    • Networked systems versus Distributed systems
    • Parallel systems vs Distributed systems
    • Distributed versus Decentralized systems
    • Processes of Distributed Systems
    • Architecture of Distributed systems
    • Infrastructure Technologies
  • Distributed System Patterns
    • Distributed Agreements Algorithms
      • HoneyBadgerBFT
    • Data Replications
    • Data Partition
    • Consistency
    • Distributed Time
    • Cluster Management
    • Communication between Nodes
    • Fault Tolerance and Resilience
      • How to design better fault tolerance systems
      • Resilience Patterns
    • Coordination systems
      • Clock synchronization
    • Security
      • Trust in distributed systems
      • Design of Principal Security
      • Security threats, policies, and mechanisms
      • Authentication and Authorizations
      • Cryptography
      • Monitoring in Security
  • Distributed System Design
    • Page 1
    • Distributed Shared Memory
    • Distributed Data Management
    • Distributed Knowledge Management
    • Distributed Ledger
  • FAQs
  • Support and Community
Powered by GitBook
On this page
  • Introduction
  • Core Cryptographic Concepts
  • Encryption and Decryption
  • Symmetric and Asymmetric Cryptography
  • Hash Functions Algorithms
  • Digital Signatures

Cryptographics

Cryptographic algorithms are the basic building blocks of a secure system and protocols.

A security protocol is a set of measures to accomplish required security objectives by employing suitable security mechanisms. Security mechanisms are generally referred to as cryptographic functions, which have the fundamental property of representing the data in another form. Diverse kinds of security protocols are in practice, such as authentication, non-repudiation, and key management protocols. As one of the crypto-intensive technologies, Blockchain has become a scorching topic.

Many security and privacy issues have been addressed for Blockchain supported by cryptographic primitives. Basic cryptographic primitives include hash primitives, digital signature, and encryption primitives which are incorporated in Blockchain.

Introduction

Generally, the cryptographic primitives are essential in applications with an open nature, i.e., available to all for using and joining applications. These applications can easily be forged or targeted by malicious users or entities, making more robust secrity mechanisms.

Security mechanisms are generally referred to as cryptographic functions, which have the fundamental property of representing the data in another form. While transmitting the data or even in the store, the data cannot be easily understood or stolen by malicious entities or users. Basic cryptographic primitives include the hash functions, digital signature, implementation of hash pointers in various applications, hashchain mechanism, and many other concepts.

They are required in a computer security system to construct cryptographic protocols. The concepts mentioned above are applied to a specific application to gain the maximum security from malicious users or entities. These concepts are widely used in many different fields and widely accepted as concrete mechanisms for security and thus not easily be forged by malicious users. Blockchain is an open environment. The kind of application blockchain is open, distributed, and decentralized. In this case, the data can be transmitted from any node to another node in the system. We cannot track the data transmission until some transaction has been committed. So, we need to ensure that while transmitting the data, the data must be flowing securely. Thus, we apply some security measures to ensure the integrity of the data.

We apply cryptographic hash primitives here and other properties of the blockchain that cannot easily modify the blockchain’s block. This property strongly supports the hashchain mechanism, which is applied using a basic concept of hash pointers and hashing. Although it can apply these concepts in any application, the application’s kind of applicability and nature modify the basic structure of the basic cryptographic primitives and use it in a way that can be helpful in that particular application. In this chapter, we have presented some of the most used basic cryptographic primitives from the perspective of blockchain. Blockchain is considered the most full-proof, secure, and unmodifiable system for digital currency and other applications. The primary concept behind these properties is the application of the basic cryptographic hash primitives.

Core Cryptographic Concepts

Cryptography is the science of securing communication and data through the use of mathematical techniques. Core cryptographic concepts include:

Encryption and Decryption

  • Encryption is the process of converting plaintext (readable data) into ciphertext (encoded data) to prevent unauthorized access.

  • Decryption is the reverse process, converting ciphertext back into plaintext using a key.

Symmetric and Asymmetric Cryptography

  • Symmetric Key Encryption uses the same key for both encryption and decryption. It is efficient and fast but requires secure key distribution. Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard), and 3DES.

  • Asymmetric Key Encryption (or Public-Key Cryptography) uses a pair of keys: a public key for encryption and a private key for decryption. It provides secure key exchange and digital signatures. Examples: RSA, ECC (Elliptic Curve Cryptography), and DH (Diffie-Hellman).

Hash Functions Algorithms

  • A hash function takes an input (or message) and returns a fixed-size string of bytes. The output, called the hash value, is typically a digest that uniquely represents the input data.

  • Hash functions are designed to be fast, deterministic, and collision-resistant (i.e., different inputs should not produce the same output).

  • Examples: SHA-256 (Secure Hash Algorithm), MD5 (Message Digest Algorithm 5).

Digital Signatures

  • A digital signature is a mathematical scheme for verifying the authenticity and integrity of a message, software, or digital document.

  • It uses a combination of hashing and asymmetric cryptography.

  • The signer generates a signature using their private key, and the verifier uses the signer's public key to validate it.

  • Examples: RSA signatures, ECDSA (Elliptic Curve Digital Signature Algorithm).

and many Others ....

PreviousProof of Elapsed Time (PoET)NextEncryption & Decryption

Last updated 7 months ago

Page cover image