User:Angel volk/sandbox
Appearance
Encryption
How does encryption work?
- Scramble the data to “encrypt” it
- Use key to unscramble data (decrypt)
- Plaintext is what you would call the message within the encryption.
- Cipher text is what you would call the encrypted message (unreadable).
- Encrypted messages can be hacked throughout time with the right technology
How does encryption protect privacy?
- Turns you data into “your eyes only” messages
- For example, emails you send, the plaintext can only be read by you and the recipient.
- The purpose of encryption is to provide data confidentiality
- Encryption and privacy work together
How does cryptocurrency use encryption?
- Relying on modern asymmetrical encryption methods
- Blockchain's/hashing techniques
- Private keys for cryptocurrency owners to verify they are the owners
Question
- STILL NEED TO ADD INFO ABOUT BLOCKCHAIN/HASHING AND ABOUT DARK WEB, ALSO ABOUT KEYS.
Citations
- Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344.
- Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., & Kumari, S. (2021). Supervised learning model for identifying illegal activities in Bitcoin. Applied Intelligence, 51(6), 3824-3843.
- Liggett, R., Lee, J. R., Roddy, A. L., & Wallin, M. A. (2020). The dark web as a platform for crime: An exploration of illicit drug, firearm, CSAM, and cybercrime markets. The Palgrave handbook of international cybercrime and cyberdeviance, 91-116.