1/28
Create and explore cryptographic key pairs used in Bitcoin.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hierarchical Deterministic Wallet (HD Wallet)
Understand how wallets generate many keys from a single seed
Bitcoin Block Parser
Analyze the contents of Bitcoin blocks
Shamir's Secret Sharing Scheme
Learn how secrets (like private keys) can be split and shared securely
BIP Schnorr Signatures
Experiment with Schnorr signature schemes for Bitcoin.
MuSig: Key Aggregation for Schnorr Signatures
Combine multiple public keys into one aggregated key.
Transaction Creator
Build Bitcoin transactions manually
Aezeed Cipher Seed Scheme
Explore a seed encryption format.
Macaroons
Study a flexible authorization credential system.
Wallet Import Helper
Assist in importing wallets
Confidentiality
Ensures only authorized parties can read the information.
Implemented through encryption (stream ciphers, block ciphers, public key encryption).
Data Integrity
Ensures data has not been altered accidentally or maliciously. Tools: Hash functions, MACs, Digital Signatures. Example: A hash function can detect changes in data.
Data Origin Authentication
Confirms who sent the data. Stronger than just integrity: proves both unchanged data and authentic sender. Example: Message Authentication Codes (MACs).
Non-Repudiation
Prevents the sender from denying they sent the message.
Tool: Digital Signatures (like a legal contract, but stronger because they can't be forged without the private key).
Entity Authentication
Answers the question: "Who are you?" Verifies the identity of a user or system (e.g., passwords, biometrics, cryptographic tokens). Different from message authentication-this is about authenticating a person or device.
Cryptographic Algorithms
The mathematical rules for encryption and decryption (e.g., AES, RSA, SHA-256).
Keys
Secret values used to encrypt/decrypt data. Security depends on key length and secrecy.
Key Management
Generating, distributing, storing, and revoking keys properly.
Performance
Choosing between symmetric (fast) and asymmetric (secure but slower) methods depending on the scenario.
Trust
Using strong, tested cryptographic methods (not outdated like MD5 or DES).
Data Protection
Encrypts sensitive information (files, databases, cloud storage).
Secure Communication
Protects emails, chats, and online transactions (SSL/TLS).
Authentication & Identity
Used in login systems, certificates, and digital IDs.
Network Security
Protects against eavesdropping and man-in-the-middle attacks (VPNs, Wi-Fi security).
Compliance
Required by laws and standards (e.g., GDPR, HIPAA) for sensitive data.
AES (Advanced Encryption Standard)
is a fast, symmetric encryption algorithm that uses one key for both encryption and decryption, making it ideal for encrypting large amounts of data.
. RSA (Rivest-Shamir-Adleman)
is a slower, asymmetric encryption algorithm that uses a pair of keys (a public key for encryption and a private key for decryption), which is excellent for secure key exchange and digital signatures over insecure networks.
Algorithm
to provide a precise, step-by-step set of instructions to perform a task or solve a problem in a consistent and repeatable manner, ensuring a predictable outcome from a given input. Think of it as a recipe for computers or humans to follow, guiding actions to achieve a specific goal, whether it's sorting numbers, finding directions, or processing data on social media.