fiat currencies.</p>\n<p>To do so, users must acquire, set up, and manage specialized equipment, as well as incur large electrical power costs, all of which cut into the profit generated from selling the mined coins. So, a hacker might choose to <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-mining/">mine cryptocurrency by hijacking the computational resources of other people, instead of participating in a fair competition.</p>\n<p>The two most popular types of cryptojacking:</p>\n<ul>\n<li><strong>File-based</strong></li>\n<li>Browser-based</li>\n</ul>\n<p>File-based cryptojacking occurs when hackers send perfectly authentic emails to their targets. When the user opens the attachment, the software runs, and the crypto mining script is installed on their machine. It can also be referred to as the &ldquo;drive-by&rdquo; cryptojacking.</p>\n<p>Browser-based cryptojacking happens when hackers inject harmful code into different websites. The crypto mining script is activated on the targeted computer as soon as he or she visits the infected websites. In other words, by using a <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-trojan/">trojan. The program keeps running on the host computer, consuming its resources.</p>\n<p>These cryptojacking tactics can go undetected for a long time, allowing hackers to mine with carelessness from unwary users' devices. Mining operations have expensive power charges, which hackers <strong>transfer to their victims in order for them to obtain token payouts without incurring financial hardship.</strong></p>\n<p>Cryptojacking scripts might lead to devices breaking due to wear and tear. Besides, a specific class of cryptojacking scripts has a worming ability that allows it to replicate fast, infecting multiple devices and servers within a network.</p>\n<p>Tesla Inc. was a subject of cryptojacking in February of 2018. Mining malware was operating on the company's Amazon Web Services cloud infrastructure. Although the data exposure was revealed to be minor in this example, cryptojacking offers a broad security danger to a firm in general.</p>\n<p>Furthermore, the distinctions between cryptojacking and \"genuine\" browser mining are often not evident.</p>","level":"medium","meta_title":"What is Cryptojacking? Definition & Meaning | Crypto Wiki","meta_description":"Cryptojacking meaning: Cryptojacking - The utilization of another side's computer to mine cryptocurrency without their permission is referred to as cryptojacking.","meta_keywords":null,"language":"en","created_at":"2022-02-28T14:12:20.000000Z","updated_at":"2022-05-13T14:32:23.000000Z","preview_url":"https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-cryptojacking"},"prevSection":{"id":217,"original_id":null,"author_id":40,"translator_id":null,"title":"What are Cryptocurrency Pairs?","slug":"what-are-cryptocurrency-pairs","section":"C","keyword":"Cryptocurrency Pairs","status":"published","definition":"Cryptocurrency pairings are assets that can be swapped for each other on an exchange.","content":"<p><strong>Cryptocurrency pairings are assets that may be traded in an exchange for one another.</strong> The most well-known cryptocurrency pair with regular price comparisons is ETH/BTC. To put things in perspective, trade pairings indicate how much of one token you can buy with a certain quantity of another token.</p>\n<p>It is critical for investors to understand trading pairs in order to diversify their cryptocurrency holdings beyond the most popular currencies. It creates the possibility of <strong>profiting from discrepancies in asset values between marketplaces.</strong></p>\n<p>To be more specific, investors can make wise decisions based on their understanding of trading pairs. Users may need to discover an exchange that handles the specific trading pair in order to properly swap one cryptocurrency token for another. In a different case, many transactions involving distinct pairings may be required to get the desired outcome.</p>\n<p>In regards to that, trading pairs showcase the availability of different trading options on a given exchange. For instance, if a trader wants to exchange BTC to ETH, but he is holding <strong>XRP</strong> he would first need to trade XRP/BTC to get some Bitcoin, and then he could perform the ETH/BTC trade to trade his Bitcoin to Ethereum.</p>\n<p>Because the user conducts two distinct transactions, he may be required to pay <strong>additional taxes and fees.</strong></p>\n<p>Crypto trading pairs assist in clearing each token&rsquo;s value, similarly to traditional currency trading. Back when cryptocurrencies were first revealed to the public as a new approach to finance, there were not a lot of trading pairs available.</p>\n<p>Most of the trades were dependent on <a href=https://www.bitdegree.org/"/crypto/buy-bitcoin-btc/">Bitcoin. However, nowadays, new trading pairs appear by the hour.</p>\n<p>Cryptocurrency trading pairs are a very important part of the crypto industry. <strong>They enable the possibility to exchange one token for another in a quite easy manner.</strong> Furthermore, crypto exchanges are coming to realize the need of providing as many crypto pairings as possible in order to suit the demands of traders.</p>\n<p>Likewise, some particular crypto trading pairs might provide better trading conditions in terms of fees and taxes.</p>\n<p>Despite the fact that unpopular trading pairs amongst cryptocurrencies often have lower trading taxes, the most popular crypto trading pairs have shown to be a better value. Nonetheless, correlations between various cryptocurrencies may lead to more successful trading pairings for <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-altcoin/">altcoins on occasions.</p>\n<p>As a result, traders must conduct thorough research on the costs connected with each trading pair of relevance. Besides, trading cryptocurrencies differs from trading traditional assets such as <strong>stocks or commodities.</strong></p>","level":"medium","meta_title":"What are Cryptocurrency Pairs? Definition & Meaning | Crypto Wiki","meta_description":"Cryptocurrency Pairs meaning: Cryptocurrency Pairs - Cryptocurrency pairings are assets that can be swapped for each other on an exchange.","meta_keywords":null,"language":"en","created_at":"2022-02-28T13:59:58.000000Z","updated_at":"2022-05-13T14:32:23.000000Z","preview_url":"https://www.bitdegree.org/crypto/learn/crypto-terms/what-are-cryptocurrency-pairs"},"currentChapter":"C","currentSection":"what-is-cryptography","chapterTitle":"C","readingLevel":"easy"},"url":"/crypto/learn/crypto-terms/what-is-cryptography","version":"cdd198d50cbe5c9c21c9329d7c096ffc"}" class="container-fluid d-flex crypto-book p-0">
Crypto Terms: Letter C

What is Cryptography?

Cryptography MEANING:
Cryptography - is an area of research and technique that secures data by prohibiting unauthorized third parties from accessing it.
Easy
1 minute

Let's find out Cryptography meaning, definition in crypto, what is Cryptography, and all other detailed facts.

The prefix “crypt” means “hidden” and the suffix “graphy” means “writing”.

Back in the day, cryptography mainly dealt with the method of ciphers. Ciphers are the algorithms utilized to convert regular messages or “plaintexts” into ostensible gibberish or “ciphertext”. Moreover, the messages could be sent as letters, the receiver would then use the key to decrypt the ciphertext back into readable plaintext. 

Without the knowledge of the key, the information conveyed in this manner was meaningless to any third-party adversary, even if the letter was physically received. That is, until the invention of cryptanalysis, the field that works with decoding encryption methods.

The first forms of ciphers, known as substitution and transposition ciphers and referred to collectively as classical ciphers, could be encrypted and decrypted manually. This meant that, at that time, they did not obscure the data sufficiently to withstand the cryptanalysis tools.

Three types of cryptography:

  • Symmetric key cryptography - a sender and receiver of a message employ a single common key to encrypt and decrypt the message.
  • Asymmetric key cryptography - a pair of keys is utilized to decrypt or encrypt data.
  • Hash functions - no need for any key. A hash value with a defined length is computed based on the plain text, making it difficult to reconstruct the plain text's contents.

The rise of radio and internet communications resulted in the requirement for strong encryption since messages are now broadcasted promiscuously and could be hijacked at will.