Blockchain, SSL certificates, HTTPS,
cryptocurrencies, public/private key pairs, VPNs, and many other
important technologies are all applications of two basic ideas from
cryptography: encryption and hash functions. Although they are
mathematically related, they are intended to do very different
Encryption: An encrypted file might be publicly available, but without a keyof some sort, the encryption cannot be reversed and the file is unreadable. Examples of encryption algorithms include AES, DES,Blowfish, and RSA.
» Read more about: Encryption, Hashing, PPK, and Blockchain: A Simple Introduction »