More Languages
🇲🇽 Español
🇧🇷 Português
⭐️ 中文
An ancient technique resurfaces to encrypt your Stablecoins, do you already know it? We tell you all about it!
The need to encrypt relevant information is an older technique than we could perhaps imagine. As a first step to understanding cryptography, we will take a brief look at its thousands of years of history.
The history of classical cryptography has its roots in one of the best known monotheistic Abrahamic religions: Judaism.
This cryptographic method is called Atbash and its first records are found in the Bible, specifically in the book of Jeremiah, which dates back to 600 BC.
The Atbash method consists of inverting the Hebrew alphabet when writing, so that the priests, prophets, and temple servants could communicate an encrypted message. Thus, if we were to apply the logic of this cryptographic method to English, the letter A would be Z, B would be Y, letter C would be X and so on.
MMXN in the Atbash method would be: NNCM.
In the last century, cryptography took a different path: it would stop serving theological-religious liturgy, to be used in warfare.
In World War II, the Nazi intelligence team commanded by the Führer, Adolf Hitler, began to develop a powerful encryption device known as the Enigma Machine, a fundamental tool for encrypting messages containing key information for their military strategy.
On the other side of the field, the British put all their efforts into dismantling Enigma. So, it created its own encryption system at the government school of coding and encryption.
This team remained hidden under the code name "Ultra", the same group from which comes one of the most exceptional minds on the planet, the mathematician and computer logician: Alan Turing.
Statue of Alan Turing at Bletchley Park, made by Stephen Ketlle in 2007. Richard Gillin.
The Nazi operations team was in charge of changing Enigma's configuration every day, making the message impossible to encrypt.
The difficulty of the Nazi encryption was so complicated that Turing's team had to discover which of the 150 trillion possible combinations was the correct one in less than 18 hours. Otherwise, thousands of people would die.
As time went by, Turing realized something: the messages followed a pattern depending on the time of the broadcast. This is how he managed to decipher and find the real message from the Nazi army.
One of the many communications that Ultra intercepted was the "Zimmerman Telegram", in which the Nazis proposed to Mexico to invade the USA to recover the territory it had lost to them in the 19th century:
As we have seen above, this period was a watershed in the history of cryptography, which was a key piece to dynamite the beginning of a technological revolution.
At the point of reading this article, I have not provided you with any definition of what Cryptography is, that is why I will allow myself to give you the definition of the DLE. According to the Dictionary of the Spanish language, cryptography is:
"The art of writing with a secret key or in an enigmatic way."
This is a definition that gives us an approach to the essence of its meaning since the prefix "Crypto" comes from Greek and means "Secret" or "hidden". and "Graphy" "To write".
In this sense, cryptography is the study and practice of sending secure, encrypted messages or data between two or more parties.
The sender "encrypts" the message to hide the content from a third party, while the receiver "decrypts" the message to make it readable again. Simple, don't you think? Ah, you still don't believe it? Don't worry.
Think of the radio signal reception in your car that allows you to listen to the broadcast.
This broadcast is in the public domain and is open to everyone. By contrast, think of defense-level communications, such as those between soldiers on a combat mission.
This communication will be secure and encrypted. It will only be received and known to the intended participants, rather than being open to everyone. This is how cryptography works.
In short, we can say that cryptography is a technique that allows you to:
All your documents and data so that only you can have access to them.
This technology is used to protect sensitive information, such as passwords and banking transactions. And it is the same technology used and supported by cryptocurrencies, which allows them to operate in a secure and completely anonymous way.
Securing the various crypto transactions occurring on the network
Control the creation of new monetary units
Verify the transfer of digital assets and tokens.
Cryptography plays a fundamental role in the operation of MMXN. All transactions are encrypted and can only be decrypted by those who possess the necessary key.
This guarantees the privacy of your MMXN and makes it impossible for them to be modified without detection.
Cryptography is, without a doubt, the language of MMXN. It is the basis on which they are built and guarantees their security and privacy.
Without it, neither transactions nor tokens would be possible, and, therefore, MMXN, as we know it today, would not exist.
That's all for today! We hope you enjoyed the article and learned something new. If you liked it, don't forget to subscribe to our social networks so you don't miss any of our new articles and surprises! See you next time.
Moneta Digital was designed to transform Mexico's digital economy through the first Stablecoin pegged to the Mexican Peso.