©  Daniel Drescher 2017

Daniel Drescher, Blockchain Basics, 10.1007/978-1-4842-2604-9_12

12. Identifying and Protecting User Accounts

A gentle introduction to cryptography

Daniel Drescher

(1)Frankfurt am Main, Germany

Besides hash functions, the blockchain uses another base technology extensively: asymmetric cryptography. It is the foundation for identifying users in the blockchain and protecting their property. Cryptography is often considered complicated and hard to understand. Hence, this step focuses on introducing cryptography in a gentle way that is easy to comprehend and sufficient for understanding the security concept of the blockchain.

The Metaphor

Long before e-mails, facsimiles, telephones, and chat apps were invented, people used conventional ...

Get Blockchain Basics: A Non-Technical Introduction in 25 Steps now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.