Cryptography Essentials

Data Encryption

Symmetric Encryption

Asymmetric Encryption

Step 1: Generate key pair

Step2: Encrypt with private key

Step3: Decrypt with public key

Signing Vs Encryption

Data Hashing

Data Encoding — base64

How do we relate these concepts with blockchain technology?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hasitha A

Hasitha A

A Software Architect based in Singapore.