We have covered all the concepts of cryptography that will be required in order to understand the keys, addresses, and wallets used in cryptocurrency. In this section, we will get a thorough grounding of how keys and addresses are used to control the ownership of funds through cryptographic primitives.
We have covered how asymmetric cryptography is used to create public/private keys, which identify the user accounts in the blockchain network. Bitcoin generates public/private key pairs that identify users and help them to claim ownership of funds through digital signatures. The private key is also called the secret key in cryptocurrency because it is kept secret from the public. Digital signatures are a prevalent concept in cryptography that allows the owner of the secret key to create a signature for a transaction and allow anyone to verify a transaction. Secret...