OKX Blockchain 60 Lectures | Episode 12: Cryptography in Blockchain (Part 2)

OKX Blockchain 60 Lectures | Episode 12: Cryptography in Blockchain (Part 2)

OKX Tutorial Team

OKX Blockchain 60 Lectures | Episode 12: Cryptography in Blockchain (Part 2)

"OKX Blockchain 60 Lectures" is a blockchain educational animation series jointly produced by OKX and Sina Tech. Designed for users with zero knowledge of blockchain, it uses articles and animated videos to vividly explain blockchain concepts through 5 major sections and 60 key points, covering concepts, technology, and applications. The content of this episode was guided by Lou Jiyue, founder of Token Mania.

Hello everyone, I'm Xiao K. Today we're going to talk about: "Cryptography in Blockchain (Part 2)".

As we mentioned before, blockchain mainly relies on two cryptographic algorithms: hash algorithms and asymmetric encryption. Today, we'll explain what "asymmetric encryption" is in blockchain cryptography.

Simply put, asymmetric encryption is a special method used to encrypt content. But before explaining asymmetric encryption specifically, we need to cover some other fundamentals of cryptography:

Currently, encryption and decryption methods in cryptography can be mainly divided into two categories: symmetric encryption and asymmetric encryption. Both encryption systems have the same components: encryption algorithm, encryption key, and decryption key.

For example, in our daily lives, we constantly use keys and locks. The key we use to open doors is what we call a secret key in cryptography, while the lock is the encryption/decryption algorithm.

format,webp

In an encryption/decryption system, the algorithm itself is fixed and generally publicly known, while the key is something more private. During encryption, we use the encryption algorithm and encryption key to encrypt the plaintext (the content to be encrypted) to obtain ciphertext (the encrypted content). The decryption process is the opposite: we use the decryption algorithm and decryption key to decrypt the ciphertext and recover the plaintext.

Methods that use just one key for both encryption and decryption, like a lock and key, are called symmetric encryption.

format,webp

Conversely, when encryption and decryption use different keys, this method is called asymmetric encryption. Asymmetric encryption is special—it generates two keys. The core one is called the private key, which we keep ourselves. The other is made public, called the public key.

They have a unique property: content encrypted with the private key can be decrypted and read using the public key, and vice versa—content encrypted with the public key can also be decrypted and read with the private key, much like a twin's telepathy.

format,webp

The main purpose of asymmetric encryption in blockchain is not to protect content privacy, but to prevent identity impersonation.

For example, when we conduct a transaction on a blockchain network, I have no way to confirm whether it is really you conducting the transaction. At this point, I can ask you to send your digital signature (a piece of content encrypted with your private key), and then I can decrypt it using the publicly available public key.

format,webp

Since the private key is held only by you, if I can successfully decrypt it with the corresponding public key, it confirms that you are the one performing the operation. If it cannot be decrypted, it means someone else has stolen your identity. This solves the problem of proving "I am me, and this is my transaction."

Overall, cryptography is the most fundamental element in blockchain networks. It not only protects the entire network's security but also solves many proof-related problems in transactions. Perhaps with the emergence of new technologies like quantum computing, some may question its security. However, it's important to note that cryptography also evolves with the times. If the day truly comes when quantum computing becomes commercially viable, blockchain cryptography will undoubtedly become an even more secure solution.

Special thanks to Teacher Lou Jiyue for her assistance and guidance on the content of this episode.

Disclaimer

This article may contain product-related content not applicable to your region. This article is dedicated to providing general information and does not accept responsibility for any factual errors or omissions. This article represents the author's personal views only and does not constitute the views of OKX. This article is not intended to provide any advice, including but not limited to: (i) investment advice or investment recommendations; (ii) offers or solicitations to buy, sell, or hold digital assets; or (iii) financial, accounting, legal, or tax advice. Holdings in digital assets (including stablecoins) involve high risk and may fluctuate significantly, or even become worthless. You should carefully consider whether trading or holding digital assets is appropriate for you based on your financial situation. For questions about your specific circumstances, please consult your legal/tax/investment professional. The information contained in this article (including market data and statistics, if any) is for general reference purposes only. Although we have taken all reasonable precautions in preparing this data and these charts, we do not accept any responsibility for any factual errors or omissions expressed herein. © 2025 OKX. This article may be reproduced or distributed in full, or excerpts of 100 words or less may be used, provided that such use is non-commercial. Any reproduction or distribution of the full article must also prominently state: "This article is copyrighted © 2025 OKX, used by permission." Permitted excerpts must cite the article name and include attribution, for example, "Article name, [author name (if applicable)], © 2025 OKX." Some content may have been generated or assisted by artificial intelligence (AI) tools. Derivative works and other uses of this article are not permitted.

Show More

Recommended Reading

thumbnail:ok-blockchain-lecture-60-episode-43-cn

OKX Blockchain 60 Lectures | Episode 43: The Rise of the Mining Circle (Part 2) — The Rise of Bitmain

Hello everyone, I'm Xiao K. Today we're going to talk about: "The Rise of the Mining Circle (Part 2) — The Rise of Bitmain." In the previous lesson, we discussed that two people opened the door to capitalization and commercialization of the mining circle: Pumpkin Zhang (Zhang Nan-geng) and烤猫 (Jiang Xinyu). Although they jointly initiated the golden era of the mining circle, it was someone else who truly brought the mining industry to its peak—and that person's name is Wu Jihan.

2025年9月18日

thumbnail:ok-blockchain-lecture-60-episode-2-why-is-blockchain-called-blockchain-cn

OKX Blockchain 60 Lectures | Episode 2: Why Is Blockchain Called Blockchain?

"OKX Blockchain 60 Lectures" is a blockchain educational animation series jointly produced by OKX and Sina Tech. Designed for users with zero knowledge of blockchain, it uses articles and animated videos to vividly explain blockchain concepts through 5 major sections and 60 key points, covering concepts, technology, and applications. The content of this episode was guided by Meng Yan, Deputy Dean of the Digital Assets Research Institute. In 2008, a global financial crisis erupted. On October 31st, "

2025年9月18日

thumbnail:ok-blockchain-lecture-60-episode-16-what-is-the-pow-consensus-mechanism-cn

OKX Blockchain 60 Lectures | Episode 16: What Is the PoW Consensus Mechanism

"OKX Blockchain 60 Lectures" is a blockchain educational animation series jointly produced by OKX and Sina Tech. Designed for users with zero knowledge of blockchain, it uses articles and animated videos to vividly explain blockchain concepts through 5 major sections and 60 key points, covering concepts, technology, and applications. The content of this episode was guided by Huang Fangyu, Co-founder of Wanyou Computing Power. Hello everyone, I'm Xiao K. Today we're going to talk about:

2025年9月18日

thumbnail:ok-blockchain-lecture-60-episode-51-cnpng

OKX Blockchain 60 Lectures | Episode 51: 2019, Giants Enter the Scene — Facebook's Cryptocurrency Dream

As we discussed previously, in 2018, as blockchain was hyped beyond realistic expectations, a dramatic de-bubbling process began, and the entire industry entered a winter. However, where there is danger, there is also opportunity. This cyclical downturn恰好 also gave international giants their best window to enter the market. In February 2019, Wall Street financial giant JPMorgan Chase sounded the trumpet for international giants entering the blockchain field, followed by Goldman Sachs, UBS, Citigroup, Microsoft, and other giants.

2025年9月18日

thumbnail:ok-blockchain-lecture-60-episode-7-what-does-the-fork-in-the-blockchain-mean-cn

OKX Blockchain 60 Lectures | Episode 7: What Does a Fork in Blockchain Mean?

"OKX Blockchain 60 Lectures" is a blockchain educational animation series jointly produced by OKX and Sina Tech. Designed for users with zero knowledge of blockchain, it uses articles and animated videos to vividly explain blockchain concepts through 5 major sections and 60 key points, covering concepts, technology, and applications. The content of this episode was guided by Boolean Fee Ink, an Austrian School economist.所谓区块链的分叉, can可以说是区块链网络中独有的一种现象.

2025年9月18日

25-什么是闪电网络png

OKX Blockchain 60 Lectures | Episode 25: What Is the Lightning Network?

Hello everyone, I'm Xiao K. Today we're going to talk about: "What Is the Lightning Network"? The Lightning Network is a technology first proposed in 2015 by Joseph Poon and Thaddeus Dryja in a whitepaper to solve Bitcoin transaction congestion. This technology originated from a problem left over from Bitcoin's early days. Because when Bitcoin was initially designed, each

2025年9月18日

Related Articles