I shared my thoughts about Encryption.
I shared what encryption is and how to use it in real life.
Some Takeaway
Encryption is a way to hide information that you want to share with only people you want to. In the technical term, you turn plaintext into ciphertext that disguises its original intent and information into some incomprehensible text that no one knows.
To become encryption, the text has to be as random as possible. Unfortunately, a human comes up with the idea in a logical and predictable way that it is easy for another human being to break into the message and steal the information. By that means, one can create as random as possible but he or she has to be able to apply this randomness to decrypt the code which makes it more difficult.
Ancient Way of Randomness
Dated back to ancient Egyptian time, to become random is to replace text with symbols. Without a computer, one has to try as much of a combination of as many types of language as possible to crack the code which seems a daunting task until the computer was introduced. That cipher technique becomes obsolete under the computer’s power.
Enigma Machine - Machine of Randomness
During World War II, Enigma Machine had been used for Nazi communication until it was cracked by British codebreakers including Alan Turing and Gordon Welchman. Enigma Machine was known as unbreakable because of its complex combination of letters. The idea of the key was introduced which makes the decryption harder with significantly increasing the combination of possible outcomes. However, because of the combination of human errors in the operation and the machine's fundamentally design flaw to reveal its initial position, allies decoding teams could easily guess the encrypted message which helped them to win World War II.
Modern Internet
Nowadays, encryption is widely used on the internet. The speed of computers has been dramatically increased ever since which makes many encryption algorithms possible to break. New ways of encryption with more advanced technology have been introduced.
Future Encryption
However, nuclear development of encryption is underway. Quantum computing is a new technology that will dramatically make the computer speed into quantum speed. It will make all existing encryption obsolete. The theory describes the computer speed to increase from the 2 to the possible numbers of power which catch-all combinations of existing encryption and drastically shorten the decryption time.
In conclusion
Encryption is a way to hide your message that only want to share with specific people. It is a core technology embedded in cryptocurrency.
Photo by Mauro Sbicego Unsplash
Note: the post was shared on multiple platformsYou can refer my previous article lists
Digital Commodities- the Unlimited Resources of Commodities Has Born
Universal Income in Crypto Way
DeFi 1.0 is Officially Dead - Welcome to DeFi 2.0
How Many Ads Are Too Much - Floki Inu Ads Got Backfire
Bitcoin ATM Adoption and Its Potential Security Vulnerabilities
When Corporations Are Running By Everyone
The Fundamental Value Is Irrelevant
Coinbase At Huge Reputation Crisis
Regulations Start Hitting Crypto Exchanges
From Bitcoin Standard To Zero-Knowledge Proofs - Decentralization 2.0
Shiba Hits 1 Million Users (Army) Milestone: What is Next?
How To Avoid Crypto Scammers
Shiba Game - When Meme Meets Metaverse
Twitter CEO Steps Down - A Full-Time Bitcoiner
Change of Macroeconomy Landscape
CBDC Is Losing The Game
Brief History of Ethereum and How Ethereum 2.0 May Over Promise
Who Cares If Craig Wright Is The Real Satoshi
Institutional Investors vs. Whales
A Proposal To Move Bitcoin Mining PoW Away
IMF Keep Crying Out, Crypto Adoption Keep Accelerating
Dogecoin Is Back to Top 10 But The Moon Shot Is Looming
How to Avoid The New Wallet Scam
Defi Enters To Crypto Bond Phase
What Types of Metaverse You Want
Global Regulations Are Coming Or Can They
IMF Did Have A Plan to Run Global Regulations
A New Malware Will Steal From Telegram
Smart Money Is Out, Institutional Money Is In
Airdrop?! Not So Lucky Anymore!
2022 Prediction #1: L1 Scalability
2022 Prediction #2: L2 Bridges
2022 Prediction #3: Zero-Knowledge Proofs or ZKPs
2022 Prediction #4: Regulated Defi On-Chain KYC
2022 Prediction #5: Institutional Crypto Adoption
2022 Prediction #6: Defi Insurance
2022 Prediction #7: NFTs-Based Communities - DAO 1.5
2022 Prediction #8: Metaverse and NFTs
2022 Prediction #9: Web2 Companies’ FOMO
2022 Prediction #10: Time for DAO 2.0
Crypto.com Backfire - When Centralized Crypto Service Panic
Coinbase Customer Service Alive
When You Want Someone Forget About What You Did, Just Change You Name
When YouTube Enters Into NFTs
Facebook Just Did the Rug Pull
Bridging Between Web2 to Web3 Through NFTs
Who Is The Winner of The Crypto Adoption
What You May Expect NFTs After 6 Months and Beyond
Wormhole Hack - It May Not Be a Bad Thing
Lessons Learned From Wonderland DAO
Crypto Comics - Who is Satoshi
Crypto Comics - What is Wallet
Crypto Comics - What is Coinbase
Crypto Comics - What is A Block
Crypto Comics - What is DeFi-2
Crypto Comics - What is Yearn Finance
Crypto Comics - What is Cold Wallet
Crypto Comics - What is Hot Wallet
Crypto Comics - What is Airdrop
Crypto Comics - What is Bagholder
Crypto Comics - What is Decentralization
Crypto Comics - What is Wallet Address
-------------------------------------------------------------------------------------Disclosure: The article was written by a delusional author who is possibly a nut job without any questions whatsoever about expertise in the subject matters. You should not believe any words this author wrote or you may experience similar symptoms or even possibly become a nut job.