Ecosystem Guides
Cypher Lexicon
Cypher Lexicon
  • 👋Introduction
    • 💜Welcome
    • 🔍Overview
    • 🌄Abstract
    • 📒Table of Contents
    • 🗄️Glossary
  • 1️⃣Beginner
    • 🔍Overview
    • 🗃️Lessons
      • 🧰Technology
      • 🕸️The Web
        • Overview
        • History
        • Uses
        • Web1
        • Web2
        • Web3
      • 🔐Cryptography
        • Overview
        • History
        • Uses
        • Cypherpunks
      • 📡Distributed Ledgers
        • Overview
        • Uses
        • Private Chain
        • Cryptocurrency
        • PoW Chains
        • PoS Chains
        • Public Chain
      • 📊Economics
        • TradFi
          • Modern Monetary Theory
            • Centralized Exchange
        • DeFi
          • Decentralized Exchange
          • Automated Market Makers
    • 📜Summary
  • 2️⃣Intermediate
    • 🔍Overview
    • 🧑‍🏫Tutorials and Guides
      • 🧭Navigating
      • 🧱Building
      • 🛡️Protecting
      • 🟠Bitcoin
        • Overview
        • Details
        • Resources
      • 🔷Ethereum
        • History
        • Details
        • Solidity
        • Lessons
          • Addresses
          • Smart Contracts
        • Resources
          • Courses
            • CryptoZombies
            • Ethernaut
      • 🔴Optimism
        • Details
        • Optimistic Rollups
        • Resources
      • 🌌Universe
        • NFT Protocol
        • Resources
      • 🏰Guild.xyz
      • 📑Methods
        • Coming Soon!
        • Proof of Work
    • 📜Summary
  • 3️⃣Advanced
    • 🔍Overview
    • 🛤️Final Track
      • 🧮Nakanomics
        • Cryptonomics
        • Automated Supply and Demand
        • Governance
      • ⛓️On Chain Entities
        • dApps
          • Creating dApps
        • DAOs
        • Courses
    • 📜Summary
  • 🏹Apprentice Track
    • 🔍Overview
    • 🔱The Three Ways
      • 🔮Third Gen Philosopher
      • 🕵️Chain Sleuth
      • 🥷Shadowy Super Coder
    • 📜Summary
  • 👑Master Track
    • 🔍Overview
    • ⚓The Last Voyage
      • 🐲Slay the Dragon
      • ⚔️House of Contributions
    • 📜Summary
  • 🌐Website
  • 🏛️Community Center
Powered by GitBook
On this page
  1. Beginner
  2. Lessons
  3. Cryptography

Overview

Cryptography uses mathematical algorithms to encode and decode data.

Cryptography uses algorithms to decode and encode data. Cryptographic algorithms are designed to be difficult or nearly impossible to break. Information secured with cryptography is incredibly hard for unauthorized parties to access.

The sender and receiver of the information must have the right cryptographic key in order to encode and decode the data.

Two main types of Cryptography:

A single key system: the same key is used to encode and decode data. This key must be kept secret, as anyone who has access to it can decode the data.

Also known as public-key cryptography, asymmetric cryptography uses two different keys: a public key and a private key. The public key can be shared with anyone, as it is used to encode the data. The private key is kept secret and is used to decode the data.

A key can be a number, a word, or a phrase.

PreviousCryptographyNextHistory

Last updated 2 years ago

1️⃣
🗃️
🔐