Identifying and Protecting User Accounts

A gentle introduction to cryptography
  • Daniel Drescher


Besides hash functions, the blockchain uses another base technology extensively: asymmetric cryptography. It is the foundation for identifying users in the blockchain and protecting their property. Cryptography is often considered complicated and hard to understand. Hence, this step focuses on introducing cryptography in a gentle way that is easy to comprehend and sufficient for understanding the security concept of the blockchain.


Transaction Data User Account Cypher Text Security Concept Symmetric Cryptography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

©  Daniel Drescher 2017

Authors and Affiliations

  • Daniel Drescher
    • 1
  1. 1.Frankfurt am MainGermany

Personalised recommendations