Explore tens of thousands of sets crafted by our community.
Cryptocurrency and Encryption
30
Flashcards
0/30
Symmetric-Key Algorithm
A type of encryption where the same key is used for both encryption and decryption of data. In cryptocurrencies, it is used less frequently due to the need for secure key distribution.
Elliptic Curve Cryptography (ECC)
A public key cryptography approach based on elliptic curves over finite fields. It is favored in cryptocurrencies due to its higher level of security with smaller key sizes, which makes it efficient and fast.
Asymmetric-Key Algorithm
A cryptographic algorithm that uses two separate keys for encryption and decryption: a public key and a private key. This method is fundamental to cryptocurrency transactions and digital signatures.
Nonce
A nonce is an arbitrary number used only once in a cryptographic communication. In the mining process, it's the number that blockchain miners are solving for to create a new block through proof of work.
Hash Function
A mathematical function that converts an input of any size into a fixed-size string of text. In cryptocurrency, it's used to maintain the integrity of the data and enable the proof of work system.
Digital Signature
A mathematical scheme for proving the authenticity of digital messages or documents. In cryptocurrencies, it provides proof of the ownership of the private key without revealing it, functioning as a secure digital fingerprint.
Blockchain
A distributed database that maintains a continuously growing list of ordered records called blocks, which contains a cryptographic hash of the previous block, a timestamp, and transaction data, making it secure and resistant to data tampering.
Public Key
A cryptographic code that allows a user to receive cryptocurrencies into their account and is derived from a private key. The public key is known to everyone and is used to ensure secure transactions.
Proof of Stake (PoS)
An alternative consensus algorithm to PoW that chooses the creator of a new block based on their wealth, or stake, eliminating the need for intense computational tasks and reducing energy consumption.
Merkle Tree
A data structure that uses hashing to efficiently summarize and verify the integrity of large sets of data. In cryptocurrencies, it's used to compactly represent the contents of blocks.
Private Key
A secret piece of data that proves the right of a user to spend their cryptocurrencies. It is essential for signing transactions and must be kept secure.
Proof of Work (PoW)
A consensus algorithm in which one party proves to others that a certain amount of computational effort has been expended. It's used in cryptocurrencies like Bitcoin to validate transactions and create new blocks.
Hash Rate
The measure of a miner's computational power in the cryptocurrency network, indicating the number of calculations that their hardware can perform every second. It impacts the chances of successfully mining a block.
Block Reward
The incentive a miner receives for successfully mining a block on the blockchain. It consists of newly created cryptocurrency and transaction fees from the transactions included in the block.
Consensus Mechanism
A system used on blockchain networks to achieve necessary agreement on a single data value or a single state of the network among distributed processes or multi-agent systems, like achieving agreement on the next block in the chain.
Cryptography
The science of encoding and decoding information to protect it from unauthorized access. In the context of cryptocurrencies, it's the foundation for ensuring that transactions are secure and cannot be tampered with.
Cryptocurrency Wallet
A software program or hardware device that stores private and public keys, interacts with various blockchain to enable users to send and receive digital currency and monitor their balance.
Sidechain
A separate blockchain that is attached to its parent through the use of a two-way peg, allowing assets to be interchangeable and move across chains without the need for third-party intermediaries.
Cryptographic Salt
Random data that is used as an additional input to a hash function to guarantee a unique output, thereby enhancing security by preventing dictionary and pre-computation rainbow table attacks.
Smart Contract
A self-executing contract with the terms of the agreement directly written into lines of code, which automatically enforces and executes the terms when predetermined conditions are met, without the need for intermediaries.
51% Attack
A situation where more than half of the computing power on a blockchain network is controlled by a single entity or a group of entities, potentially allowing them to disrupt the network by double-spending coins and preventing certain transactions from being confirmed.
Address
An alphanumeric string that represents a possible destination for a cryptocurrency payment, derived from public keys and used by the blockchain to uniquely identify participants' accounts.
HMAC (Hash-Based Message Authentication Code)
A specific construction for creating a message authentication code involving a cryptographic hash function in combination with a secret cryptographic key. It can be used to verify the data integrity and the authenticity of a message.
Multisignature (Multisig)
A digital signature scheme which allows a group of users to sign a single document. In a cryptocurrency context, a multisig address requires multiple signatures to authorize a transaction, increasing security.
Distributed Ledger
A consensus of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions. It's a foundation of blockchain technology used in cryptocurrencies.
SHA-256
A cryptographic hash function that generates a fixed 256-bit hash, which is a feature of blockchains like Bitcoin. It is designed to be a one-way function, effectively working as part of the mining process.
Transaction Fee
A fee that is paid to the miners to incentivize them to include a transaction in the block they are mining. This can result in faster confirmation times for the transaction.
Ciphertext
The result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is unreadable until it has been converted back into plaintext using a decryption key.
Zero Knowledge Proof
A cryptographic method by which one party can prove to another that a statement is true, without revealing any information beyond the validity of the statement itself.
Turing Completeness
A characteristic of a system, typically a programming language or a blockchain like Ethereum, that can perform any computation given enough time and resources, which means smart contracts can be written to perform complex functions.
© Hypatia.Tech. 2024 All rights reserved.