EconPapers    
Economics at your fingertips  
 

Cryptography, Mnemonic, Public and Private Keys

Yuxing Yan ()
Additional contact information
Yuxing Yan: Sinica Education

Chapter Chapter 5 in Introduction to FinTech using Excel, 2025, pp 107-133 from Springer

Abstract: Abstract EncryptionCryptography is the foundation of blockchain. In Chapter 3 : BlockchainBlockchain (II): ASCIIASCII and Sha256Sha256, we know that it is impossible to use so-called brute force to find a solution to a given hashHash generated by Sha256. This chapter will explain basic encryptionEncryption mechanisms, such as the letter-shift schemeLetter-shift scheme, keyword method, and 6-letter pairs. More importantly, we will explain public and private keysPrivate key and how to receive a message with a public keyPublic key while sending a message or money with a private keyPrivate key. In this chapter, the following topics will be covered:

Date: 2025
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sptchp:978-3-031-89779-5_5

Ordering information: This item can be ordered from
http://www.springer.com/9783031897795

DOI: 10.1007/978-3-031-89779-5_5

Access Statistics for this chapter

More chapters in Springer Texts in Business and Economics from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-07-21
Handle: RePEc:spr:sptchp:978-3-031-89779-5_5