z-logo
open-access-imgOpen Access
Methods for encrypting text information using blockchain technologies
Author(s) -
A. V. Dzyma,
I. S. Shcherbyna,
A. M. Shtimmerman,
S. V. Prokopov
Publication year - 2020
Publication title -
zv'âzok
Language(s) - English
Resource type - Journals
ISSN - 2412-9070
DOI - 10.31673/2412-9070.2020.064243
Subject(s) - encryption , computer science , communication source , the internet , plain text , cryptography , blockchain , computer security , internet privacy , world wide web , computer network
The article analyzes the methods of blockchain technologies for encrypting text information as a modern tool for protecting the text data of users on the network. During the rapid development of the Internet, the question of the secure transfer of text information between users is increasingly raised. Sending text information over the Internet is a common situation, and the protection of such data plays a very important role in the functioning of a large number of companies. Currently, there are a number of options for the transmission of text information, which require an appropriate level of protection during transmission. Transmission and encryption methods depend on the general needs of the sender and receiver. Thanks to cryptography and blockchain, it is now possible to create technologies that will allow you to truly securely transmit textual information between users on the Internet. Methods of encrypting text information based on blockchain technologies make it possible to implement this. You need to consider what these methods consist of Encryption is a way to hide the original meaning of a message or other document that distorts its original content. Converting plain, clear content into code is called encoding. This implies that there is a mutual unambiguous correspondence between the symbols of the text and the code — this is the fundamental difference between encoding and encryption. Encryption and encryption are often mistaken for the same thing, forgetting that to recover an encrypted message, it is enough to know the replacement rule, while to decrypt an already encrypted message in addition to knowing the rules of encryption, you need a cipher key. The key in this case means a specific secret state of the parameters of encryption and decryption algorithms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here