Close Menu
  • Coins
    • Bitcoin
    • Ethereum
    • Altcoins
    • NFT
  • Blockchain
  • DeFi
  • Metaverse
  • Regulation
  • Other
    • Exchanges
    • ICO
    • GameFi
    • Mining
    • Legal
  • MarketCap
What's Hot

Mantle and Aave cross $1b as DeFi TVL jumps 66% in a week, where do they go from here?

11/03/2026

Machi Big Brother’s $30M ETH Liquidation – When Conviction Meets 25x Leverage

11/03/2026

Bitcoin retakes $64,000, crypto miners rally, as AI-related software rout eases

11/03/2026
Facebook X (Twitter) Instagram
  • Back to NBTC homepage
  • Privacy Policy
  • Contact
X (Twitter) Telegram Facebook LinkedIn RSS
NBTC News
  • Coins
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. NFT
    5. View All

    Price Breaks All-Time High Record Again – Here’s What We Know

    04/08/2025

    Bitcoin Switzerland? El Salvador to Host First Fully Native Bitcoin Capital Markets

    04/08/2025

    Bitcoin Breaks $119K, but XLM and HBAR Aren’t Impressed by Its Meager Percentage Gain

    04/08/2025

    High-Stakes Consolidation Could Define Q3 Trend

    04/08/2025

    Machi Big Brother’s $30M ETH Liquidation – When Conviction Meets 25x Leverage

    11/03/2026

    Ethena and B2C2 Stun Market with $18.47M ETH Binance Deposit, Signaling Potential Sell-Off

    11/03/2026

    Ethereum scales for stablecoin usage on USDC expansion

    11/03/2026

    Ethereum Breakout Signals Short-Term Upside

    11/03/2026

    The Sui Ecosystem’s Top 3 Altcoin Performers

    29/07/2025

    Floki Launches $69000 Guerrilla Marketing Challenge With FlokiUltras3

    28/07/2025

    Crypto Beast denies role in Altcoin (ALT) crash rug pull, blames snipers

    28/07/2025

    $1.6 Billion XRP Surge: Here’s What’s Unfolding

    28/07/2025

    SpoonOS distributes first NFT rewards to Skill Capture Campaign participants

    11/03/2026

    Top NFT Sales of the Week, Flying Tulip Takes Top Spot

    09/03/2026

    McLaren F1 Debuts Hedera-Powered MCL/COLLECT Digital Collectibles for 2026 Race Weekends

    08/03/2026

    SuperRare Unveils Liquid Editions

    07/03/2026

    Mantle and Aave cross $1b as DeFi TVL jumps 66% in a week, where do they go from here?

    11/03/2026

    Machi Big Brother’s $30M ETH Liquidation – When Conviction Meets 25x Leverage

    11/03/2026

    Bitcoin retakes $64,000, crypto miners rally, as AI-related software rout eases

    11/03/2026

    Elon Musk says early access to X Money is coming next month

    11/03/2026
  • Blockchain

    R3E Network launches N3Index API, .matrix domain system for Neo N3

    11/03/2026

    Royaltiz Brings Athlete Tokenization to Solana With Eduardo Camavinga Launch

    11/03/2026

    Chainlink Expands Cross-Chain Adoption With 11 New Integrations Across Web3 Ecosystems

    10/03/2026

    Corastone and Zcash’s ZODL show blockchains growing up for real finance

    10/03/2026

    Real-time settlement is the missing infrastructure layer in distributed energy

    10/03/2026
  • DeFi

    Mantle and Aave cross $1b as DeFi TVL jumps 66% in a week, where do they go from here?

    11/03/2026

    Jito Foundation acquires SolanaFloor days after platform shutdown

    11/03/2026

    DeFi lending platform Aave sees a rare $27 million liquidations after a price glitch

    11/03/2026

    Pieverse Taps Bitget Wallet to Advance Agentic DeFi Market

    10/03/2026

    USDD’s Dramatic Supply Increase Defies Market Trends

    10/03/2026
  • Metaverse

    Meta expands AI agent push with Moltbook acquisition

    10/03/2026

    ‘The Sandbox’ Adds Web-Based Games in Season 7 Accessibility Push

    24/02/2026

    AMD jumps as Meta signs multiyear AI infrastructure partnership

    24/02/2026

    Corning shares surge over 16% after Meta signs $6B data center deal

    27/01/2026

    Mark Zuckerberg’s Meta signs $6B fiber deal with Corning to expand US data centers

    27/01/2026
  • Regulation

    Bitcoin retakes $64,000, crypto miners rally, as AI-related software rout eases

    11/03/2026

    JPMorgan CEO Spots Alarming Pre-2008 Financial Crisis Parallels

    11/03/2026

    Bitwise acquires Chorus One to expand institutional staking business

    11/03/2026

    Bitwise’s Hunter Horsley says AI Is ‘unstoppable freight train’ for crypto, while Haun’s Monica urges caution

    11/03/2026

    Payments giant Stripe reportedly mulling PayPal acquisition

    11/03/2026
  • Other
    1. Exchanges
    2. ICO
    3. GameFi
    4. Mining
    5. Legal
    6. View All

    Elon Musk says early access to X Money is coming next month

    11/03/2026

    Inside X Money, Elon Musk’s bid to fuse social media and banking

    11/03/2026

    Bitkub Exchange Joins Ripple to Bring $RLUSD Stablecoin to Thailand Users

    11/03/2026

    Ripple to acquire Australian financial services license as APAC payments volume doubles

    11/03/2026

    South Korea Poised to Lift Ban on Domestic ICOs After 7 Years

    19/12/2025

    Why 2025’s Token Boom Looks Both Familiar and Dangerous

    31/10/2025

    ICO for bitcoin yield farming chain Corn screams we’re so back

    22/01/2025

    Why 2025 Will See the Comeback of the ICO

    26/12/2024

    Pudgy Penguins launches its ‘Club Penguin’ moment, and the game doesn’t feel like crypto at all

    10/03/2026

    WORLD3 Partners PlaysOut to Bring AI Agents into Web3 Gaming

    10/03/2026

    Pudgy Penguins Launches ‘Pudgy World’ Browser Game

    10/03/2026

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    05/03/2026

    Canaan stacks Bitcoin, bucking rival miners’ rush to sell

    11/03/2026

    Public Bitcoin Miners are Dumping Bitcoin for AI, a Historic Mistake

    10/03/2026

    Trump-Linked American Bitcoin Adds 11,298 ASICs, Boosts Hashrate

    09/03/2026

    New model proves miners need Bitcoin above $74k to break even on power

    09/03/2026

    JPMorgan concedes it debanked Trump after Capitol attack

    10/03/2026

    Korea Targets Stablecoin Issuance With Banking Restrictions

    10/03/2026

    Central Bank of Brazil to Advance Institutional VASP Regulation by 2027

    10/03/2026

    South Korean FTC Launches Aggressive M&A Review in Digital Markets Amid Crucial Dunamu Deal

    10/03/2026

    Mantle and Aave cross $1b as DeFi TVL jumps 66% in a week, where do they go from here?

    11/03/2026

    Machi Big Brother’s $30M ETH Liquidation – When Conviction Meets 25x Leverage

    11/03/2026

    Bitcoin retakes $64,000, crypto miners rally, as AI-related software rout eases

    11/03/2026

    Elon Musk says early access to X Money is coming next month

    11/03/2026
  • MarketCap
NBTC News
Home»Blockchain»Encryption and encrypted passwords in the world of blockchain and crypto
Blockchain

Encryption and encrypted passwords in the world of blockchain and crypto

NBTCBy NBTC06/05/2024No Comments6 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


The storage and secure management of data and passwords is one of the most important aspects in the crypto and blockchain world, and more generally in all online environments.

Encryption, intense as the art of “hidden writings” capable of converting plain text into encrypted text and vice versa, comes to our aid making it difficult for hackers to allow unauthorized access to certain networks and transactions.

Let’s delve into the different methods through which encryption can protect valuable information and safeguard passwords.

  • Symmetric and asymmetric password encryption in the crypto sector
  • The most common formats of encrypted passwords
  • Hash functions and digital signatures

Symmetric and asymmetric password encryption in the crypto sector

Generally when talking about password protection in cryptography, reference is made to two encryption methods: symmetric and asymmetric.

That symmetric one refers to a type of text encryption that uses a single key to encrypt and decrypt information:

The encryption key is shared between sender and recipient and is usually agreed upon in advance: it represents the central element that in cryptocurrencies allows users to access and manage their digital resources.

Symmetric encryption with a single key is one of the most common means to protect passwords, transactions, and communication between operating nodes.

When performing, for example, a funds transfer from one wallet to another, it ensures that the information is read and shared only by two parties involved in the transaction, keeping the data safe from prying eyes.

However, despite the advantages it brings, symmetric encryption has limitations in terms of scalability and key management.

Indeed, the need for communication in pairs greatly limits the expansion of this practice in a system with many more users. At the same time, more users imply human errors in the management and conservation of the so-called “private key”, which if lost leads to the loss of crypto or data stored in the virtual wallet.

To overcome these limitations, asymmetric cryptography comes to our aid by providing a pair of separate keys (public and private) in the encoding and decoding of passwords.

This additional level of security instantly increases data protection: the public key can be shared with anyone on any network (like when we share our address to receive a payment in crypto), while the private key must be kept secret.

Both keys are generated by an algorithm that uses large prime numbers to create two unique and mathematically linked keys.

Anyway, whoever possesses the public key can encrypt a message, but only the holder of the private counterpart can decrypt the text. We can imagine this as if it were an email inbox: whoever holds the public key can send a message, but only the owner of the private key can open the email and read the messages.

Non-custodial software wallets like Trust Wallet or MetaMask use asymmetric cryptography to offer the highest possible security to their users.

Source: https://www.javaboss.it/crittografia-in-java/

The most common formats of encrypted passwords

Password encryption in the crypto and blockchain sector occurs according to different formats that can be used for different purposes and offer different levels of security:

  1. MD5 (Message Digest 5):

The MD5 algorithm, developed by Ronald Rivest in 1991, generates a 128-bit hash (32 hexadecimal characters) from a variable-length input.

It is no longer considered secure due to vulnerabilities discovered in its algorithm. However, it is still used in some legacy contexts, for example to verify the integrity of files.

  1. SHA-1 (Secure Hash Algorithm 1):

SHA-1 generates a 160-bit hash (40 hexadecimal characters).

It is no longer considered as secure as it once was, having shown several vulnerabilities: it is now generally replaced by more robust algorithms such as SHA-256 and SHA-3. However, it is still used in a wide range of systems and new applications.

  1. Salt:

The salt is a random sequence of bits that is added to the password before calculating the hash.

It solves the problem of collisions (two different passwords generating the same hash) in hashing methods.

By adding a salt, even identical passwords will have completely different hashes. This makes it harder for attackers to decrypt passwords through brute force attacks.

  1. Bcrypt:

Bcrypt is a hashing algorithm specifically designed for password encryption.

Use a salt and a number of iterations to slow down the hash calculation. It is widely used to protect user passwords in the field of databases.

The choice of encryption format depends on the specific needs of the reference system. Nowadays, it is advisable to use hashing algorithms such as bcrypt or SHA-2 to protect passwords and mitigate cyber attacks.

Hash functions and digital signatures

Another way to protect passwords and valuable information in cryptocurrencies is to rely on hash functions, that is algorithms that transform any form of data into a string of characters of fixed length.

By using robust hashing algorithms, we can effectively protect sensitive information and prevent cyber attacks.

Hash functions are irreversible: it is not possible to convert a hash back into its original data. They are essential in data management on the blockchain because they allow structuring information without compromising its initial integrity

Hashes can also act as fingerprints for all encrypted passwords, protecting the user against unauthorized actions on their account.

Indeed, any modification to the original data would result in a new hash, which would no longer correspond to the original source and therefore would not be verifiable on the blockchain.

Another method to ensure password security, and more specifically the authenticity and integrity of data in a message, is to use the so-called “digital signatures” (asymmetric cryptography technique).

This is simply a method to ensure that the owner of those specific data is approving the transaction. Generally, the sender creates the digital signature using a private key to encrypt the signature data, while the recipient obtains the signer’s public key to decrypt the data. This code represents irrefutable proof that a message has been created solely by the sender and has not been tampered with online.

When talking about digital signatures, one immediately thinks of signature devices like Ledger, Trezor, and Bitbox that allow to validate a transaction before it is broadcasted to the rest of a cryptographic network.

However, be careful not to consider these devices as wallets: they do not contain your cryptocurrencies but only allow you to approve the transactions necessary to spend them.

We often say, “my crypto is ON my Ledger”.

But your digital assets aren’t actually stored physically on your Ledger – they’re on the blockchain.

Your Ledger stores and protects your private keys and keeps them safe so you can fully own and manage your assets.@iancr explains: pic.twitter.com/PGrmQIvKpV

— Ledger (@Ledger) May 11, 2023


Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NBTC

Related Posts

R3E Network launches N3Index API, .matrix domain system for Neo N3

11/03/2026

Royaltiz Brings Athlete Tokenization to Solana With Eduardo Camavinga Launch

11/03/2026

Chainlink Expands Cross-Chain Adoption With 11 New Integrations Across Web3 Ecosystems

10/03/2026

Corastone and Zcash’s ZODL show blockchains growing up for real finance

10/03/2026
Add A Comment

Comments are closed.

Top Posts
Get Informed

Subscribe to Updates

Get the latest news from NBTC regarding crypto, blockchains and web3 related topics.

Your source for the serious news. This website is crafted specifically to for crazy and hot cryptonews. Visit our main page for more tons of news.

We're social. Connect with us:

Facebook X (Twitter) LinkedIn RSS
Top Insights

Mantle and Aave cross $1b as DeFi TVL jumps 66% in a week, where do they go from here?

11/03/2026

Machi Big Brother’s $30M ETH Liquidation – When Conviction Meets 25x Leverage

11/03/2026

Bitcoin retakes $64,000, crypto miners rally, as AI-related software rout eases

11/03/2026
Get Informed

Subscribe to Updates

Get the latest news from NBTC regarding crypto, blockchains and web3 related topics.

Type above and press Enter to search. Press Esc to cancel.