Cointegrity

Cryptography

Web3 / blockchain technology

The mathematical science of securing information through encoding and decryption techniques, forming the foundational security layer for all blockchain and cryptocurrency systems. In crypto contexts, the most critical cryptographic primitives are: elliptic curve cryptography (used to generate public-private key pairs for wallet ownership), cryptographic hash functions (SHA-256 in Bitcoin, Keccak-256 in Ethereum) that create unique fixed-length fingerprints of arbitrary data, digital signatures that prove message authenticity without revealing private keys, and zero-knowledge proofs that allow one party to prove knowledge of a value without revealing it. Merkle trees, another cryptographic structure, efficiently summarize all transactions in a block. The security of Bitcoin, Ethereum, and virtually every blockchain is predicated on the computational infeasibility of reversing these cryptographic operations with current or near-future computing hardware. Example: When you sign a transaction with your wallet, you are using elliptic curve digital signature algorithm (ECDSA)—your private key mathematically signs the transaction data, and anyone can verify the signature using your public key without ever learning the private key. Why it matters for Web3: Cryptography is not a feature of blockchain—it is the reason blockchain works at all. Without cryptographic hash functions, public-key cryptography, and digital signatures, permissionless and trustless peer-to-peer value transfer would be impossible.

Category: blockchain technology, privacy technology, wallets security

Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.