Cryptographic Primitive: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 6: Line 6:


(https://en.wikipedia.org/wiki/Cryptographic_primitive)
(https://en.wikipedia.org/wiki/Cryptographic_primitive)
[[Category:Crypto_Technology]]


[[Category:Crypto_Governance]]
[[Category:Crypto_Governance]]
[[Category:Cryptoledger_Applications]]
[[Category:Cryptoledger_Applications]]
[[Category:Technology]]
[[Category:Technology]]

Latest revision as of 14:29, 18 September 2024

Description

From the Wikipedia:

"Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems These routines include, but are not limited to, one-way hash functions and encryption functions. When creating cryptographic systems, designers use cryptographic primitives as their most basic building blocks. Because of this, cryptographic primitives are designed to do one very specific task in a precisely defined and highly reliable fashion. Since cryptographic primitives are used as building blocks, they must be very reliable, i.e. perform according to their specification."

(https://en.wikipedia.org/wiki/Cryptographic_primitive)