Eightcap Logos_WEB.svg

What Is Cryptography?

10 November 2021

Cryptic messages have been around for centuries. After all, cryptography, which means hidden writing, is technically the study and practice of secure communication techniques. 

However, what do they really mean in today’s world of digital communication and economics? In order to understand cryptography, we should first clear up who it pertains to. In the past where technology was not around, when people of importance wanted to send a hidden message without anyone catching the meaning, what would they do? Sometimes, a messenger would be sent, dressed as a regular person, and would try to blend in as much as possible before reaching the targeted recipient (though this is closer to steganography because if found, the message could be read).

In other words, whenever the sender attempts to reach the recipient, they make its contents extremely complex. That way, any third party trying to grab the precious information would be unable to understand what’s hidden, except for the intended recipient who has the “key” – usually a string of characters. This can be in the form of text, image, audio, or even video. As long as the content cannot be cracked, the information is safe. This is fundamentally how cryptocurrency and other transactions work as well, though much more complex. 

Types of systems

Generally, there are two kinds of cryptosystems – symmetric and asymmetric. Symmetric systems have a single key to encrypt and decrypt information. Data manipulation is faster but less secure this way. 

Conversely, asymmetric systems require more time to source out the data, but they are also more secure. The reason for this is that there are two keys – a public key and a private key. Private keys are used to encrypt and decrypt the message, so they are known only by the sender and the recipient. Public keys, on the other hand, act like a cloak that allows the information to travel and be intercepted without running a high risk of being cracked.

Normally, for the sender and recipient to be on the same page, this require the use of a codebook where all the codes would be input. Cracking, on the other hand, is at the base of cryptanalysis – the study of methods for decrypting encrypted information without the required key.

A view of cryptography through the centuries

Although uncertain, the earliest potential form of ciphertext is said to come from Egypt around 1900 BC where non-standard hieroglyphs were carved into a wall of a tomb. Clay tablets from Mesopotamia dated a bit later, near 1500 BC, show a method meant to protect the recipe for pottery glaze that would have been considered commercially valuable at the time.

A number of different ancient cryptography examples include the Atbash cipher where the alphabet was simply reversed; one of the 64 arts in the Kamasutra from India; presumably Greece’s scytale transposition cipher utilized by the Spartans; the well-known Caesar cipher where a shift of a certain number of letters down the alphabet was performed, and others.

This continued until about the mid-15th century when the first combination of ciphers was used to hide various parts of a message. By way of frequency analysis, first discovered around the 8th century, most ciphertexts until then are thought to have been fairly vulnerable.

Modern-day cryptography

Computers came around in the early 20th century around that time linguistics gave way to mathematics in the field of cryptography. First, there were sequences, groups or blocks of binary code utilizing a 2-digit system of 0s and 1s. Then, with the advent of World War II and ciphers being used daily, the first decryption machine was constructed. However, the secret key was still unsecured – visible to the public – and that’s also partially considered one of the reasons why the British managed to overturn German forces by cracking the Enigma machine.

Symmetric systems remained the only ones until 1976, but they are still used today for basic encryption such as that of ATMs, e-mails, and secure remote access. Multiuser networks require complex key management schemes to have and keep each public key known only to sender and recipient – a downside fixed by the creation of a public key.

With public keys, a new level of ciphertext was reached and asymmetric systems became possible. Public-key cryptosystems take two keys – a public and a private key – that are mathematically related and pair them internally. The public key is freely distributed and used for encryption while the private key is kept secret and used for decryption. The two would usually communicate via a shared encryption key or hash functions (kinds of algorithms) and utilize certificates for authorization.

Cryptocurrencies and cryptography

Today, we know cryptography has various applications. Here are some examples of the most well-known products that rely on cryptography in our day-to-day life:

  • Chip-based payment cards
  • Computer passwords
  • Electronic commerce
  • Digital currencies

Regarding virtual currencies in particular, perhaps the most complex use of cryptography from the examples above, they rely on chaining together several components to keep data safe. Those are digital signatures of each asset that can be transferred, peer-to-peer networking to make communication between parties possible, and decentralization so that the process is delegated away from any central entities. 

Algorithms used by cryptocurrencies include asymmetric encryption and hashing. Through wallets, we have access to private keys that allows us to sign transactions on the network. Doing so, we leave a footprint of who transferred what amount of a cryptocurrency to whom that is made visible by the public key. Hashing is the second level of security on the blockchain and it comes in different forms – we know those as protocols. 

This happens by solving difficult calculations and playing a sort of “hashing lottery” so that whoever solves a block first receives the reward.

More energy-efficient options have come around that do not require as much energy, but instead function on the basis of taking a stake and being responsible for completing a block. Such are called proof-of-stake models and its most popular representative currently is Cardano. 

Company information

Eightcap is a brand of Eightcap Pty Ltd (ABN 73 139 495 944) regulated by the Australian Securities and Investments Commission (AFSL 391441).

Eightcap Pty Ltd is located at Level 37, Rialto South Tower, 525 Collins Street, Melbourne, VIC, 3000, Australia.

Important Risk Warning

Risk warning: Margin trading involves a high level of risk and may not be suitable for all investors. You should carefully consider your objectives, financial situation, needs and level of experience before entering into any margined transactions with Eightcap, and seek independent advice if necessary. Forex and CFDs are highly leveraged products which means both gains and losses are magnified. You should only trade in these products if you fully understand the risks involved and can afford losses without adversely affecting your lifestyle (including the risk of losing the entirety of your initial investment). For Australian retail clients, a Product Disclosure Statement (PDS), a Financial Services Guide (FSG) and Target Market Determinations (TMDs) for our products are available to download from our Legal Documentation page. You must assess and consider them carefully before making any decision about using our products or services.

The information on this website is general in nature and doesn't take into account your personal objectives, financial circumstances, or needs. It is not targeted at the general public of any specific country and is not intended for distribution to residents in any jurisdiction where that distribution would be unlawful or contravene regulatory requirements. Eightcap Pty Ltd makes reasonable efforts to provide accurate translations of the website in other languages for your convenience. Where content is missing, inaccurate or incomplete, the English version prevails.

@Eightcap 2026