Cryptography, Mnemonic, Public and Private Keys
Yuxing Yan ()
Additional contact information
Yuxing Yan: Sinica Education
Chapter Chapter 5 in Introduction to FinTech using Excel, 2025, pp 107-133 from Springer
Abstract:
Abstract EncryptionCryptography is the foundation of blockchain. In Chapter 3 : BlockchainBlockchain (II): ASCIIASCII and Sha256Sha256, we know that it is impossible to use so-called brute force to find a solution to a given hashHash generated by Sha256. This chapter will explain basic encryptionEncryption mechanisms, such as the letter-shift schemeLetter-shift scheme, keyword method, and 6-letter pairs. More importantly, we will explain public and private keysPrivate key and how to receive a message with a public keyPublic key while sending a message or money with a private keyPrivate key. In this chapter, the following topics will be covered:
Date: 2025
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sptchp:978-3-031-89779-5_5
Ordering information: This item can be ordered from
http://www.springer.com/9783031897795
DOI: 10.1007/978-3-031-89779-5_5
Access Statistics for this chapter
More chapters in Springer Texts in Business and Economics from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().