Menu Home

A Gentle Introduction to Bitcoin with some ideas


Let is consider the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result – well. This action of mixing the molecules of the egg is encryption. Since the molecules are mixed-up, we say the egg has achieved a higher state of entropy. To return the scrambled egg to its original form (such as uncracking the shell) is decryption. But if we substitute the word egg and replace it with number, molecules with digits, it is Possible. This, my friend, is the exciting world of cryptography (crypto for short). It is a new field dominated by gifted mathematicians who utilizes language like non-linear polynomial relations, over defined systems of multivariate polynomial equations, Galois fields, etc. All these cryptographers uses language that mere mortals like us cannot pretend to understand.

bitcoin price

Everything saved are numbers. Your file is a number. Your text message is quite a few. Your address book is an amount that is longer. The number 65 represents the characterA, 97 for the littlea, etc. For individuals, we recognize numbers with the digits from 0 to 9, where else, the computer can only recognize 1 or 0. This is. To convert bits to digits, simply multiply the amount of pieces by 0.3 to get a great estimation.  The hexadecimal (base 16) system utilizes the ten digits from 0 to 9, and the six symbols from A to F. This bitcoin price set has three distinct digits, thus the hexadecimal name. This notation is useful for computer employees to peek into the real contents saved by the computer. Treat these different number systems be it Euro, Swiss Franc, British Pound and such. Exactly like a thing can be costly with various values using these currencies, a number may also be priced in these different number systems also.

To digress a bit, have you ever why you had to study numbers wondered? I am certain that this answer is not known by mathematics teachers. Response: A subbranch known as public-key cryptography that uses numbers that are prime specifically. When we want to encrypt something, we need to use a cipher. There is a cipher very similar to a recipe for baking a cake. It is precise actions. To execute the encryption procedure, you want a key (some called it passphrase). A practice in cryptography requires the key has to be to work. Data Encryption Standard (DES), Introduced as a standard in the 1970’s, was the cipher in early 1990’s and the 1980’s. It utilizes a key. It had been broken with computers in the 1990’s. With today’s (2005) hardware, it is likely to crack within a single day.

Categories: Finance

Rex Stout