Digital Nations
  • DIGITAL NATIONS BOOK
    • Get Your Free Copy
  • Web3 Overview
    • What is Web3?
    • The Problem with Centralized Economies
    • The Benefits of Decentralized Economies
    • How do Decentralized Economies Work?
      • Decentralized Ledgers
        • Blockchains
        • Digital Key Cryptography
        • Consensus Mining
        • How to Read a Decentralized Ledger
      • Smart Contracts
      • NFTs
    • The Web3 Ecosystem
      • Cryptocurrencies
        • What is a Cryptocurrency?
        • What is Money?
        • The Problems with Centralized Money
        • The Benefits of Decentralized Money
        • How do Cryptocurrencies Work?
          • What are Databases?
          • How are Cryptocurrencies Distributed?
          • How are Cryptocurrencies Decentralized?
            • What are Blockchains?
            • What is Digital Key Cryptography?
            • What is Consensus Mining?
        • Key Players
          • Bitcoin
          • Ether
          • Stablecoins
          • Other
        • Problems with Cryptocurrencies
          • High Fees
          • Volatility
          • Environmental Concerns
          • Tax Cheats & Criminals
          • MEV
        • The Long-Term Potential of Cryptocurrencies
      • DeFi
        • What is DeFi?
        • The Problems with Centralized Finance
        • The Solution - Decentralized Finance
        • What's Different about DeFi?
          • Decentralized Cash (aka "Stablecoins")
          • Decentralized Exchanges
          • Decentralized Lending and Borrowing
          • Decentralized Insurance
          • Decentralized Derivatives
        • What's New in DeFi?
          • Yield Farming
          • Flash Loans
          • Money Legos
        • DeFi Infrastructure
          • Smart Contract Platforms
          • Oracles
          • Data Aggregators
          • Storage Protocols
          • Interoperability Protocols
        • The Dark Side of DeFi
          • High Fees
          • User Error
          • Usage by Criminals and Terrorists
          • Exploits, Hacks and Attacks
          • Regulation
        • Why DeFi Will Eat Wall Street
      • NFTs
        • What are NFTs?
        • Problems with Centralized Asset Ownership
        • Benefits of Decentralized Asset Ownership
        • History of NFTs
        • How do NFTs work?
          • What is a Token?
          • What makes a token “Non-Fungible”?
          • What are Smart Contract Platforms?
        • NFT Ecosystem
          • Digital Art
            • Avatars
            • Collectibles
            • Art
          • Virtual Worlds
          • Gaming
          • Social
          • Music
          • Intellectual Property
          • Other NFT Applications
        • NFT Infrastructure
          • Smart Contract Platforms
          • Rollups
          • Decentralized Storage
          • NFT Marketplaces
          • Wallets
        • NFT Financialization
          • Borrowing and Lending
          • Licensing
          • Fractionalization
        • Criticisms of NFTs
          • Weak Arguments Against NFTs
            • Easily Copied
            • Centralized
            • Tacky
          • Legitimate Criticisms of NFTs
            • High Fees
            • Fraud and Theft
            • Poor User Experience
        • Why NFTs Will Eat Hollywood (and maybe the World…)
      • DAOs
        • What is a DAO?
        • The Problem with Traditional Corporations
        • The Benefits of a DAO
        • How Does a DAO Work?
        • DAO Ecosystem
          • Protocol DAOs
          • Investment DAOs
          • Charity DAOs
          • Collector DAOs
          • Media DAOs
          • Service DAOs
          • Social DAOs
        • DAO Tooling
          • Communications
          • Fundraising
          • Governance
          • Treasury Management
          • Compensation
          • DAO Frameworks
        • Problems with DAOs
          • Lack of Legal and Regulatory Clarity
          • Operational Inefficiencies
          • Gas Prices
          • Usage by Criminals and Terrorists
          • Hacks and Scams
        • Why DAOs will Eat Corporations
      • Smart Contract Platforms
        • What are Smart Contract Platforms?
        • The History of Smart Contract Platforms
        • Why are Smart Contract Platforms Important?
        • How do Smart Contract Platforms Work?
          • Whare are Blockchains?
          • What are Smart Contracts?
          • What is Consensus Mining?
        • What are the Problems with Smart Contract Platforms?
        • How do we Solve these Problems?
          • On-Chain Solutions
          • Off-Chain Solutions
        • Who are the Key Players?
          • Ethereum
          • BSC (formerly Binance Smart Chain
          • Cardano
          • Solana
          • Avalanche
          • Polkadot
          • Polygon
          • Tron
          • NEAR
          • Cosmos
        • What’s Next? The Multi-Chain World
    • Web3 Infrastructure
      • Virtual Worlds
      • Wallets
      • Decentralized Domain Name Servers
      • Decentralized Internet Service Providers
      • Node Providers
      • Smart Contract Platforms (Layer 1s)
      • Rollups (Layer 2s)
      • Decentralized Data Storage
      • Querying Tools
      • Oracles
      • Bridges
      • Decentralized Computers
    • Challenges
      • High Fees
      • Limited Traction
      • Volatility
      • Environmental Concerns
      • Limited Interoperability
      • Miner-Extractable Value (MEV)
      • Poor User Experience
      • Usage by Criminals and Terrorists
      • Hacks and Scams
        • Malware
        • Code Exploits
        • Scams
      • Lack of Legal and Regulatory Clarity
    • Why Web3 Will Eat the World
  • Resources
    • Web3 University
      • White Belt (<1 Hour)
      • Blue Belt (1 Day)
      • Purple Belt (1 Week)
      • Brown Belt (1 Month)
      • Black Belt (1 Year)
      • Red Belt (Lifetime)
    • Books, Articles & Videos
      • Books
      • Articles and Videos
      • Canons
    • Twitter Accounts
      • Favorite Accounts
      • DeFI
      • NFTs
      • Metaverse
      • DAOs
      • Web3
      • Developers
      • Investors
      • News & Research
      • Consolidated
    • Podcasts
    • Reddit
    • News & Research Sources
    • Courses
    • Data Sources
      • Favorites
      • General Market Information
      • Industry Information
      • On-Chain Analytics
      • Block Explorers
      • Social
      • Technical
      • Tokenomics
      • Other
  • My Journey Down the Web3 Rabbithole...
Powered by GitBook
On this page
  1. Web3 Overview
  2. How do Decentralized Economies Work?
  3. Decentralized Ledgers

Digital Key Cryptography

PreviousBlockchainsNextConsensus Mining

Last updated 2 years ago

Digital keys are the “debit cards” of the blockchain ecosystem in that they allow a user to prove ownership, access their account and control their assets.

In reality, digital keys are nothing more than long strings of numbers (256 bits long for Bitcoin) that always come in pairs – a public key and a private key:

  • Public Key: A public key is similar to a bank account number as it serves as your address on a cryptocurrency network. For example, instead of recording that “Alice owns 2 BTCs”, the Bitcoin blockchain would record that “1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2 owns 2 BTCs”

  • Private Key: A private key is similar to a secret PIN code that allows users to access and control this account

Every public key has only one private key, and – like a key and a lock – they are linked through cryptography. The important thing to note about this link is that it only flows one way. Although one can always access a public key with a private key, it’s mathematically impossible to do the reverse.

It’s Impossible to Decipher a Private Key from a Public Key

This one-way logic forms the basis of cryptocurrency transactions. For example:

  • To Receive Funds: In order to receive funds, a user would share his public key with the sender, who would deposit the money in that address. Because it’s impossible to decrypt a private key from the public key, this is completely safe (and necessary).

  • To Send Funds: In order to send funds, a user would use her private key to “unlock” her public key on the blockchain to authorize the transfer of the money. Again, because it’s mathematically impossible for anyone but the holder of the private key to do this, the blockchain can be sure that this person owns the funds.

In practice, users rarely see either their keys, as they are often stored inside digital wallets and managed by software (i.e. you just click buttons that say “send” and “sign” on a wallet such as Metamask and the application does the rest for you).

Source: Ledger