Swipe to navigate through the chapters of this book
Besides hash functions, the blockchain uses another base technology extensively: asymmetric cryptography. It is the foundation for identifying users in the blockchain and protecting their property. Cryptography is often considered complicated and hard to understand. Hence, this step focuses on introducing cryptography in a gentle way that is easy to comprehend and sufficient for understanding the security concept of the blockchain.
Please log in to get access to this content
To get access to this content you need the following product:
- Identifying and Protecting User Accounts
- Sequence number
- Chapter number
- Step 12