Ecosystem Guides
Cypher Lexicon
Cypher Lexicon
  • 👋Introduction
    • 💜Welcome
    • 🔍Overview
    • 🌄Abstract
    • 📒Table of Contents
    • 🗄️Glossary
  • 1️⃣Beginner
    • 🔍Overview
    • 🗃️Lessons
      • 🧰Technology
      • 🕸️The Web
        • Overview
        • History
        • Uses
        • Web1
        • Web2
        • Web3
      • 🔐Cryptography
        • Overview
        • History
        • Uses
        • Cypherpunks
      • 📡Distributed Ledgers
        • Overview
        • Uses
        • Private Chain
        • Cryptocurrency
        • PoW Chains
        • PoS Chains
        • Public Chain
      • 📊Economics
        • TradFi
          • Modern Monetary Theory
            • Centralized Exchange
        • DeFi
          • Decentralized Exchange
          • Automated Market Makers
    • 📜Summary
  • 2️⃣Intermediate
    • 🔍Overview
    • 🧑‍🏫Tutorials and Guides
      • 🧭Navigating
      • 🧱Building
      • 🛡️Protecting
      • 🟠Bitcoin
        • Overview
        • Details
        • Resources
      • 🔷Ethereum
        • History
        • Details
        • Solidity
        • Lessons
          • Addresses
          • Smart Contracts
        • Resources
          • Courses
            • CryptoZombies
            • Ethernaut
      • 🔴Optimism
        • Details
        • Optimistic Rollups
        • Resources
      • 🌌Universe
        • NFT Protocol
        • Resources
      • 🏰Guild.xyz
      • 📑Methods
        • Coming Soon!
        • Proof of Work
    • 📜Summary
  • 3️⃣Advanced
    • 🔍Overview
    • 🛤️Final Track
      • 🧮Nakanomics
        • Cryptonomics
        • Automated Supply and Demand
        • Governance
      • ⛓️On Chain Entities
        • dApps
          • Creating dApps
        • DAOs
        • Courses
    • 📜Summary
  • 🏹Apprentice Track
    • 🔍Overview
    • 🔱The Three Ways
      • 🔮Third Gen Philosopher
      • 🕵️Chain Sleuth
      • 🥷Shadowy Super Coder
    • 📜Summary
  • 👑Master Track
    • 🔍Overview
    • ⚓The Last Voyage
      • 🐲Slay the Dragon
      • ⚔️House of Contributions
    • 📜Summary
  • 🌐Website
  • 🏛️Community Center
Powered by GitBook
On this page
  • Email:
  • Secure communication:
  • File sharing:
  • Blockchain
  1. Beginner
  2. Lessons
  3. Cryptography

Uses

Cryptography is used in a variety of applications, including email, file sharing, blockchain, and secure communication.

Email:

Cryptography is used to secure email communications. Email messages are typically encrypted using a symmetric-key algorithm, such as the Advanced Encryption Standard (AES). This ensures that only the sender and receiver of the email can read the contents of the message.

Secure communication:

Communications are typically encrypted using a symmetric-key algorithm, such as the AES. This ensures that only the parties involved in the communication can read the contents of the message.

File sharing:

When a file is shared, it is typically encrypted using a public-key algorithm, such as the RSA algorithm. This ensures that only the intended recipient can decrypt and access the file.

Blockchain

A blockchain is a distributed ledger that is used to record transactions. Each transaction is encrypted using a public-key algorithm, such as the Elliptic Curve Digital Signature Algorithm (ECDSA). This ensures that the transaction can only be decrypted and accessed by the parties involved in the transaction.

PreviousHistoryNextCypherpunks

Last updated 2 years ago

1️⃣
🗃️
🔐