From cryptography to blockchain analysis

in #technology4 years ago (edited)

analytics-3088958_1280.jpgImage Source

The versatility is how technology has been of great support to humanity, from the beginning of the handling of the cryptomonas since its launch changed and gave a modernization of the management with new knowledge of the active in a digital way, which can be managed in a decentralized way. But I always wonder how the development of this type of technology for the development of this digital ecosystem really was, everything lies in cryptography.


The versatile and wonderful is when science is combined with the hand of technology, which together are unquestionable when used properly, because the objectives of cryptography to be the part of cryptology that deals with the study of algorithms, cryptographic protocols which in turn is ennmayor possible to develop systems that are used to protect information and provide security to communications and entities that communicate within the same digital ecosystem as part of a platform. One of the first models designed for this type of technology in history, the German encryption machine Lorenz, used in World War II for the encryption of messages destined to generals of very high security rank.


That is why thanks to the mathematical techniques that serve as tools to achieve their objectives, for the development of algorithms that give answers in a decentralized and reliable, in order to ensure that information is accessible only to authorized personnel. In such a way that it is about using codes and encryption techniques, until reaching the forefront of the integrity of this whole context the correction and completeness of information, based on cryptographic hash functions MDC, bit commitment protocols.


Now our reality in our present time the mathematical functions allowed us the development of cryptography, which allows the creation of digital secrets and digital signatures that cannot be falsified, where all the blockchains use practically the same cryptographic principles, in such a way is where the algorithms are present, which allows us the development of the call of the pair of keys consists of a private key and derived from this last one, where only a unique public key.


The importance of all this computer and mathematical language allows us to know the public key, this is used to receive transactions, and the private key is used to sign transactions and spend the funds associated with the account, that is why the development of this type of block chain is decentralized and secure, for the protection of these digital assets.


Continuing in this order of ideas the data is used public key cryptography, first the asymmetric cryptography and the secret key cryptography, as the second the symmetric cryptography, it should also be considered that the private key is similar to a PIN or password that we use to access different web pages or digital platforms within this type of technology.


2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvQi45MYNjhK74jhfEdPN6ZxjFj8M5Lm6GwrnoVpvUN72NVmwZTEyX1GhLhLat4L1YwZCgTnq6RontXPk.png

Sort:  

Thanks to cryptography and mathematical models in the application of algorithms served as the basis for the development of the blockchain ecosystem.