(Very) Basic Intro To Elliptic Curve Cryptography

Very Basic Intro to Elliptic Curve Cryptography

Elliptic curve cryptography is an efficient modern approach to public-key cryptosystems. In this introduction, our goal will be to focus on the high-level principles of what makes ECC work. We will omit implementation details and mathematical proofs, we can save those for another article. What It’s For? A common use of ECC is to encrypt data … Read more

Shamir’s Secret Sharing Step-By-Step

Shamir's Secret Sharing Step By Step Library

Adi Shamir’s Secret Sharing is an algorithm that allows participants to share ownership of a secret by distributing shares, which can be thought of as parts of a secret key. In order for someone to gain access to the original secret, a minimum number of shares (the threshold) must be used together. Example Problem To … Read more

How SHA-2 Works Step-By-Step (SHA-256)

child looking at stair steps

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. In this article, we are going to break down each step of the algorithm as simple as we can and work through a real-life example by hand. SHA-2 is known for its security (it … Read more

Achieving Data Integrity Using Cryptography

photo 1542185400 f1c993ecbea2

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn’t tampered with. For example, the SSL signature of Qvault provides confidence that the webpage and data coming from our servers are really … Read more

Base64 vs Base58 Encoding

Capture

By Lane Wagner – @wagslane on Twitter Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. When it comes … Read more

Top 10 Online Crypto Communities 2020

5a521fa72f93c7a8d5137fcf

Crypto is still rapidly growing in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the fundamentals and technology that support decentralized money. These communities can certainly help tremendously. #1 BITCOINTALK https://bitcointalk.org/ Bitcointalk is undoubtedly … Read more

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

photo 1550565227 a6144af19c78

DEPRECATED NOTICE This article will remain live for historic purposes, but the Qvault password manager is a deprecated project. Qvault and Samourai’s Sentinel are a match made in heaven for anyone wanting a secure and easy solution for Bitcoin savings. Why? A watch-only wallet is perfect for users who want a high-security savings account. It … Read more

Bitcoin Doesn’t Care About Your Identity, Only Your Knowledge

photo 1559757175 5700dde675bc

When you make a withdrawal at a bank, pay taxes, or get a license you must prove who you are. The process of proving who you are is a very “human” process. The authority checks your ID and ensures the picture looks like you, which allows them to trust that you are the person who’s … Read more

How to Securely Backup a Seed Phrase

photo 1523348837708 15d4a09cfac2

Many newcomers to the Bitcoin and cryptocurrency space seem interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wallet. Likewise, an attacker only needs … Read more