NaslovnicaKripto za napredneWhat is cryptography?

What is cryptography?

What is cryptography?

The study of secure communications techniques that allow only the sender and intended recipient of a message to read its contents is known as cryptography. The word kryptos comes from the Greek word meaning "hidden." It's closely linked to encryption, which is the process of scrambling plain text into ciphertext and then back again when it's received. In addition, cryptography includes techniques such as microdots and merging to obfuscate information in photographs. Ancient Egyptians were known to apply these techniques in complicated hieroglyphics, and one of the first modern ciphers is credited to Roman Emperor Julius Caesar.

Encrypting and decrypting email and other plain-text messages is the most prevalent usage of cryptography when transporting electronic data. The symmetric or "secret key" approach is the most basic method. Data is encrypted with a secret key, and the encoded message and secret key are then delivered to the recipient for decoding. What is the issue? A third party has all they need to decrypt and read the message if it is intercepted. Cryptologists invented the asymmetric or "public key" scheme to address this problem. Every user has two keys in this case: one public and one private. Senders encrypt the message and transmit it along after requesting the recipient's public key. When the message is delivered, only the private key of a recipient will decode it, which means, that theft is pointless without the corresponding private key.

In general, there are three types of cryptographic techniques used:

-        Symmetric-key cryptography

-        Hash functions

-        Public key cryptography

A symmetric-key cryptography is when a single key is shared by both the sender and the receiver. The sender encrypts plaintext and sends the cipher text to the receiver using this key. The receiver, on the other hand, uses the same key to decrypt the message and retrieve the plain text.

Hash functions are when algorithm does not use a key. The plain text is hashed with a fixed-length hash value that prevents the plain text's contents from being recovered. Many operating systems also employ hash algorithms to secure passwords.

Public key cryptography is the most revolutionary concept of the last 300 to 400 years. Two related keys (public and private key) are utilized in public-key cryptography. The public key can be freely transmitted, but the private key that goes with it must be kept secret. The public key is used for encryption, whereas the private key is utilized for decryption.

Bitcoin and many other cryptocurrencies are using a technology of public-private key encryption. This removes the necessity for a middleman.

Provjerite ostale razine

Koristimo kolačiće za pohranu, pristup i obradu osobnih podataka kako bismo vam pružili najbolje online iskustvo. Klikom na Prihvati kolačiće pristajete na pohranu svih kolačića i osiguravate najbolje moguće djelovanje internetske stranice. Možete promijeniti postavke kolačića ili povući privolu klikom na Postavke kolačića. Da biste saznali više o kolačićima i svrhama, pročitajte Politika kolačića and Politika privatnosti

Postavke kolačića


Kontrola kolačića


Što su kolačići?

Kolačići su male tekstualne datoteke koje omogućuju nama i našoj usluzi jedinstvenu identifikaciju vašeg preglednika ili uređaja. Kolačići obično rade tako da vašem uređaju dodijele jedinstveni broj i na vašem ih pregledniku pohranjuju internetske stranice koje posjećujete, kao i treći pružatelji usluga za te internetske stranice. Pod pojmom kolačići treba uzeti u obzir druge tehnologije kao što su SDK-ovi, pikseli i lokalno pohranjivanje.


Ako je omogućeno

Možemo vas prepoznati kao klijenta što omogućava prilagođene usluge, sadržaj i oglašavanje, učinkovitost usluga i prepoznavanje uređaja za veću sigurnost
Možemo poboljšati vaše iskustvo na temelju vaše prethodne sesije
Možemo pratiti vaše preferencije i personalizirati usluge
Možemo poboljšati performanse internetske stranice.


Ako je onemogućeno

Nećemo moći zapamtiti vaše prethodne sesije, što će nam onemogućiti da internetsku stranicu prilagodimo vašim željama
Neke značajke možda neće biti dostupne i korisničko iskustvo bez kolačića će biti lošije


Strogo nužno znači da se osnovne funkcije internetske stranice neće aktivirati bez njihove upotrebe. Budući da su ovi kolačići ključni za pravilan rad i sigurnost usluga internetskog mjesta, ne možete odustati od korištenja ovih tehnologija. I dalje ih možete blokirati u svom pregledniku, ali to može uzrokovati greške u djelovanju osnovnih funkcija internetske stranice.

  • Postavljanje zaštite privatnosti
  • Sigurna prijava
  • Sigurna veza tijekom korištenja usluga
  • Ispunjavanje obrazaca

Analitika i tehnologije praćenja performansi za analizu načina na koji koristite internetsku stranicu.

  • Najgledanije stranice
  • Interakcija sa sadržajem
  • Analiza grešaka
  • Ispitivanje i mjerenje različitih učinkovitosti dizajna

Internetska stranica može koristiti tehnologije trećih strana za oglašavanje i marketing.

  • Promoviranje naših usluga na drugim platformama i internetskim stranicama
  • Mjerenje učinkovitosti naših kampanja