Skip to main content
LCX Exchange
购买加密货币市场交易
产品
AI 交易
使用AI助手交易加密货币
NEW
代币化
现实世界资产框架
代币销售
独家数字资产产品
奖励中心
轻松获得数字激励
Trading Competition
争夺独家奖品
为什么 LCX?
关于
您的可信加密网关
LCX 代币
用于无缝交易的实用代币
合作伙伴
值得信赖的合作者网络
更多
功能
VIP
顶级用户的高级福利
可持续发展影响报告
代币碳足迹指标
赚钱
7% 固定收益率
附属机构
合作并共同获利
促销
推荐
推荐并赚大钱
代币信息
详情、价格和效用
Campaigns
每周赢大奖!
见解
新闻和公告
资源
API 文档
参考文档
常见问题与支持
快速简便地解决查询
教程
逐步学习
DEFI 和代币化合作伙伴
Toto Finance
Tokenizing Real-World Assets
MasterDEX
去中心化交易所
探索自由链
登录
注册
vip-icon
VIP 俱乐部
登录
← 见解
Learning Center

What Is Cryptography?

通过 LCX Team · June 30, 2022

What is Cryptography?

Everyone nowadays is aware of cryptocurrencies in one way or another, but are you aware of the technique behind it? 

This technique is known as Cryptography. It is made of two words: “crypt” meaning hidden and “graphy” meaning writing. It is a study of sending and receiving encrypted and secure data between two or more parties. Cryptography is used in cryptocurrencies to make the transactions secure, anonymous and “trustless”, meaning no need to identify the person in order to have a transaction with them. And this technique is not only limited to cryptocurrencies, but whenever it comes to encrypting and decrypting data over a computer network, cryptography is used

History Of Cryptography

Although cryptography has been in the spotlight only recently due to its use in cryptocurrency, this concept has been around for a long time. It originated around 2000 B.C under the Egyptian practice of hieroglyphics. At that time, it consisted of very complex pictograms that were really difficult to decipher. 

The first known use of this technique was made by Julian Caesar who did not trust his messengers to communicate with the higher authorities. So he invented a system in which each character was replaced by a character three steps ahead in the Roman alphabet. Recently, the technique has been known to be used by computer scientists and mathematicians for securing data.  

How Does It Work?

Cryptography uses mathematical concepts and sum rule based calculations to secure the information over a network. These rules are called algorithms and they are used to convert the messages in a way that it is hard to decode them.  The algorithms are now further used for digital signing, cryptographic key generation, web browsing, verification for data privacy and to secure private transactions such as debit or credit card transactions. 

Four Main Objectives Of Cryptography

  • Integrity: Any information cannot be modified in transition or storage between an intended receiver and sender without the modifications being detected. 
  • Confidentiality: All the information that runs on cryptography is accessible only to the intended recipient and no other person can access it.
  • Authentication: Cryptography takes care of the authentication of your transaction by confirming the identity of both sender and receiver, Also, the origin and destination of the information are also confirmed here. 
  • Non-repudiation: The sender of the information cannot take a backfoot and deny their intention of sending the information later on.

Types Of Cryptography

  • Symmetric key cryptography: In such encryption systems, a single common key is used by both the sender and receiver to decrypt or encrypt the message. Although this system is quite simple and faster , the exchange of the key should be done in a very careful and secure manner.
  • Asymmetric key cryptography: Also known as public key cryptography, a pair of keys are involved. Here, a public key is used to encrypt the information and then a private key is used to decrypt the same message. Public and private keys are both very different as is clear from their name. But, even if anyone is aware of the public key, the information can be decoded only after using the private key. 
  • Hash function: No kind of key is used in this type of algorithm. In this system, a hash value is calculated based on the plain text. This makes the content of the plain text impossible to recover. Hash functions are used by many functions to encrypt their passwords. 

Conclusion:

Cryptocurrency would not have been possible without cryptography. It is the essence of digital money but not limited to it. It covers all the areas that include encryption or decryption of data on any kind of network. Cryptography offers security, integrity and confidentiality to your information, without it, no private data could be transferred online let alone any type of transactions.

LCX

关于 LCX 的更多信息

  • 关于我们
  • 职业生涯
  • 联系我们
  • 见解
  • Crypto Prices
  • 自由链
  • LCX 漏洞赏金计划

产品

  • LCX 代币
  • LCX 费用
  • Apply for Listing
  • 申请代币销售
  • 反馈表

合法

  • 费用
  • 文件
  • 品牌和商标
  • 隐私政策
  • 服务条款
  • 许可证和版本说明

买入指南

  • 购买 BTC
  • 购买 ETH
  • 购买 XRP
  • 购买 SOL
  • 购买 ADA
  • All Buying Guides >>
  • Crypto Prices >>

支持

  • 常见问题与支持
  • 支持中心

联系我们

hello@lcx.com

LCX AG
Herrengasse 6
9490 Vaduz
Liechtenstein

使用 LCX 进行交易

扫描下载 LCX 应用程序

FMA Liechtenstein

注册的可信技术服务提供商编号:288159

LCX AG成立于2018年,是一家在列支敦士登公国的注册公司,注册号为FL-0002.580.678-2。LCX AG受列支敦士登金融市场管理局监管,注册号为288159,是一家值得信赖的技术服务提供商。交易比特币等数字资产涉及重大风险。

LCX AG © 2018 - 2026. All Rights Reserved

Telegram
X (Twitter)
Instagram
LinkedIn
YouTube
Facebook