Grassroot Crypto Education (Vol.4) - Cryptography: Private-Key Encryption, Public-Key Encryption and Hash Functions | 10% payout to @steemkidss by @chimeoselam

in Steem Kids & Parents2 years ago

20220212_072640.jpg

Greetings beautiful friends in #steemkids community.
Here is another week of our crypto grassroots education by our prof @fredquantum
It's my delight to share in the.vume four of the classes on cryptography and it's elements.

Homework Task

1 (a). What Is Cryptography

This is the type of communication in which the interaction is based only between the sender and the recipient. It is a secured communication that hides the conversation or message (data) to be shared among only the sender and the receiver without the knowledge of others.
Fir instance, Ada was sitting with her friends and sent a message to Daniel without her friends seeing the content if the conversation.

20220212_054654.jpg

Edited by @chimeroselam in Pixellab


Cryptography is subdivided into 3 types which are ; private-key, public-key and hash function encryption.

1 (b). What Is Private-key Encryption

Private-key Encryption can be defined as the use of private-key to Encrypt or decrypt a Data. It is the coding of an information and changing it from the original form (plaintext) to a mixture of letters and numbers and also requires the private-key before decription (that is uncoding.

20220212_054505.jpg

Edited by @chimeroselam in Pixellab

1 (c). What Is Public-key Encryption

This is the use of two separate keys to Encrypt and decrypt an information so as to hide it from others. Here, Ada uses a Public-key encrypt an information in the presence of her friends and sends it to Daniel, and Daniel uses a Private-key to decrypt it.

20220212_054418.jpg

Edited by @chimeroselam in Pixellab

1 (d). Differences Between Private-key Encryption And Public-key Encryption

The differences Between Private-key Encryption And Public-key Encryption are:

  • In private-key encryption, the same private-key is used to encrypt and decrypt an information.

  • In public-key encryption, the public-key is used to encrypt by the sender but the reciever uses the private-key to decrypt as seen in the illustrations above.

2 (a). What happens to outsiders if a message is encrypted? Give a brief example?
When a message is encrypted the outsiders or people that are not associated in the conversation does not see the message that is sent. Only the sender and the receiver sees the message.

20220212_064942.jpg

Edited by @chimeroselam in Pixellab

2 (b). Screenshot of Different inputs And Observations

The following are some examples of my inputs and the observations I found out

Screenshot_20220212-001904.png

Screenshot_20220212-065328.png


  • For the screenshot on the left, it has an input "the Police men used the elevator to get at room 275 quickly" and it has the encryption e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 which is different from the second input on the right.

  • The screenshot on the right has an input "the man ran into room 275 whith an Encryption b258051e1b304aad88f314acfde753f3a35c139e03141e47c543b4cce679b380, which is also different from the first one.

According to our prof @fredquantum, there are 64 alphanumerics and the encryption can never be the same. The sample above also proves it to be true.

Conclusion

The class is very interesting class. Learning from the Grassroot is very exciting. I'll like @bossj23, @chiomzy810 and @fortwis09 to also be a part of this lesson for there are so much benefits.

Cc;

@steemkidss
@ngoenyi
@fredquantum
@ijelady
@mariajruizb
@madilyn02
📝
Introductory Post

thank you😁

JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH7yWNVuchcTuW15B1cmEHdr7uYxdAMsDMCimbq8oh752ChtPEsW1tNqGv3qxXFAwxuLBwbQuUCAy5qxqiKCG7qgFvABQmmg (1).jpeg

Sort:  
 2 years ago 

Thank you for the invite but am no longer among the kids..Am a member dear.

 2 years ago 

Oh my! You have graduated. Congratulations 💥 dear
New year brings new updates. Thanks for being here for me. Many hugs💗

 2 years ago 

Thanks dear

 2 years ago 

You are welcome. I'll miss you o among our kids here
Tell: 09130529277

Keep up the learning it will help you now and in the future

 2 years ago 

Yes mom
I'll our earnest efforts

 2 years ago 

Amazing participation

 2 years ago 

Thank you dear

Loading...

Hi dear, I knew it that you will make a beautiful writeup as you always do. You have explained these things in detail and shown your understanding of the lecture. Kudos to you.

Evaluationresults
DelegationYes
Steemexclusiveyes
Plagiarismno
Voting botno
Club status5050
Curation trailYes
Beneficiary10% to steemkidss

Thank you for being part of steemkids Community and for delegating your steempower. Will you consider increasing your delegation..? That will be very nice and that will mean that the amount of delegation reward will be increased. Think about it...🤔...🤗.

I wish you success and many blessings...🌹

 2 years ago 

Thank you very much
I have considered it. Planning towards it. It's about time

Your post has been successfully curated by our team through @fredquantum. Thank you for your committed efforts, we invite you to do more and continue to post high-quality posts for a chance to win a valuable upvote from our curating team and why not be selected for an additional upvote later this week in our Top Seven.

Note: Always use the tag #fbcrypto to quickly access your post.

received_495607172074545.jpeg

 2 years ago 

Thanks for the kind support

Hola cariño, felicidades por esta publicación, muchas gracias por participar en las actividades de la comunidad y contribuir con ella. Te deseo mucho éxito, me encanta ver que aprendes mucho con estos temas de cryptografía.

 2 years ago 

Thank you very much ma
You are putting smiles on my face

Coin Marketplace

STEEM 0.20
TRX 0.12
JST 0.028
BTC 64453.36
ETH 3507.44
USDT 1.00
SBD 2.56