🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter P

What is Public-Key Cryptography?

Meaning:
Public-Key Cryptography - algorithm-based cryptographic procedures that are used to randomize and encrypt data.
medium
3 minutes

Let's find out Public-Key Cryptography meaning, definition in crypto, what is Public-Key Cryptography, and all other detailed facts.

Public-key cryptography entails algorithm-based cryptographic procedures that are used to randomize and encrypt data. Public key cryptography requires two public and private keys which contain information that is used to randomize data. The scrambled data can only be decrypted using the correct key.

If a user has a plaintext message like “Blockchain”, it can be encrypted using a key “146fhsj77bq10l5g” to appear as ciphertext “dz59YAUB9WNcTu0y7ZBEXg==”. The cipher can then be decrypted using the same key to appear in plaintext.

The protocol prevents any unauthorized attempts to access data by using a pair of keys to encrypt and decrypt the information. The network users receive public and private keys from a network’s certification authorities.

Users that want to encrypt data can obtain the recipient’s public key from a public directory. They can use the key to encrypt the message and forward it to the intended recipient. The recipient can use their private key to decrypt the message. The private key can only be accessed by the recipient.

One of the most commonly used cryptographic systems is the Rivest-Shamir-Adleman (RSA) algorithm. It is used to securely send sensitive data over insecure networks. With the RSA algorithm, both the public and private keys can encrypt messages without sacrificing their authenticity and integrity.

There are numerous advantages to using the RSA algorithm as a cryptographic tool, including:

  • Excellent data security. It’s impossible to determine the decryption key by only using the cryptographic algorithm and the encryption key;
  • It is considered to be one of the most secure protocols. Unlike private key cryptography, users are not required to reveal their private keys. This reduces the risk of the private key being intercepted during transmission and used with malicious intent;
  • Users take responsibility for keeping their private keys secure, meaning that the keys can be used as non-repudiable digital signatures. This is not possible in private-key systems where users have to share their secret keys for decryption.

However, there are also some downsides to public-key cryptography and the utility of the RSA algorithm, such as:

  • Public-key cryptography is slow compared to private key cryptographic methods. However, public-key cryptographic methods can be used in tandem with secret-key systems, maintaining the security of the transmission while improving its speed;
  • Public-key cryptographic tools can be vulnerable to attacks coming from compromised accreditation entities. Criminals use the public key certificate from a vulnerable authority to imitate them;
  • If the user loses their private key, the encryption system becomes susceptible to malicious attacks from criminal entities.
encryption, ensuring the security of data transported over the internet. All recent web browsers have PKI, which assists in the protection of network users' web traffic.<\/p>\n<p>Many businesses use it to protect private communications, and it is frequently used to assure the safety of linked equipment.<\/p>\n<p>The <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-public-key/">public key<\/strong><\/a> is completely accessible to anyone and is <strong>utilized to<\/strong> encrypt messages sent to the user. After getting the message, users utilize a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-private-key-secret-key/">private key<\/strong><\/a> to decrypt it.<\/p>\n<p>Furthermore, a complicated mathematical calculation is carried out in order to link the keys. Although the private and public keys are connected, this complicated calculation assists the connection. In regards to that, defining the private key by utilizing data from the public key is <strong>incredibly difficult.<\/strong><\/p>\n<p>Certificates authorize the individual or device the user wants to interact with. When the needed certificate is linked with a device, it is indicated as valid. The authenticity of the certificate can be verified by utilizing a framework that determines if it is legitimate or not.<\/p>\n<p>So, PKI works by using two main systems, either certificates or keys.&nbsp;<\/p>\n<p>A key is essentially a sequence of numbers that is utilized to encrypt data. The key formula is utilized for each element of a message.<\/p>\n<p>For example, imagine a plaintext message &ldquo;Hello&rdquo;, is encrypted with this key, and now reads &rdquo;G34kJCDEldrt77,\" which seems to be just random numbers and letters. If someone gets this key, they will get to decrypt it and see the true meaning.<\/p>\n<p>Additionally, PKI technology is also linked to cryptographic keys, which encrypt and serve authorized users and devices in a digital realm. <strong>To ensure that a certain key belongs to a person or device, the PKI enlists the help of another trusted intermediary to validate the identification using digital signatures<\/strong>. The key then serves as the user's digital identity on the network.<\/p>\n<p>The majority of web browsers and computers trust many certificate authorities by default.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-digital-signature/">Digital signature<\/strong><\/a> technology is the core of the public key infrastructure since it uses public-key cryptography to generate each entity's secret key, which is only established to that entity and is used for signing.&nbsp;<\/p>\n<p>Aside from a user or device, it might be a program, process, supplier, element, or anything else that can be connected to a key that acts as an entity's identity.<\/p>\n<p>PKI is significant since it entails encryption and proof of identity, allowing for reliable and safe internet interaction. For instance, at a company, PKI can find an intruder attempting to get network access through a linked device, which helps to keep a serious threat at bay.<\/p>\n<p>Additionally, the public key, which is derived from a private key, is made public and is extensively included in the certificate document. A certificate authority is a reputable third party that authenticates the document that connects the key to the device.<\/p>\n<p>Besides, it possesses a cryptographic key that is utilized to sign these particular records. These are referred to as certificates.<\/p>","definition":"is a system that includes tools for generating public keys for encryption, therefore assuring the security of data transmitted over the internet.","status":"published","meta_title":"What is Public-key Infrastructure? Definition & Meaning | Crypto Wiki","meta_description":"Public-key Infrastructure meaning: Public-key Infrastructure - is a system that includes tools for generating public keys for encryption, therefore assuring the security of data transmitted over the internet.","meta_keywords":null}" :prev-section="{"id":632,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Public_sale","level":"hard","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-11-27T00:06:35.000000Z","slug":"what-is-public-sale","title":"What is Public Sale?","section":"P","keyword":"Public Sale","content":"<p><strong>A Public Sale<\/strong>, also referred to as a crowd sale, is a term used in the crypto sector which refers to the process of introducing a new coin or token to the public prior to listing it on a cryptocurrency exchange. It&rsquo;s the last phase of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-initial-coin-offering-ico/">initial coin offering (ICO)<\/strong><\/a> which is a popular method of raising funds for crypto projects where the blockchain companies sell coins or tokens, sometimes at lower prices, and use the crowdfunded capital to launch the project.&nbsp;<\/p>\n<p>ICOs are becoming increasingly popular within the crypto sector and can be considered the next-generation method of fundraising.&nbsp;<\/p>\n<p>In order to fully understand what a public sale is, let&rsquo;s take a look at how an initial coin offering progresses.&nbsp;<\/p>\n<p>Before delving deeper, it&rsquo;s important to keep in mind that the majority of ICO sales have been happening on the Ethereum blockchain that&rsquo;s based on a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-peer-to-peer-p2p/">P2P standard. This platform makes use of smart contracts to collect ETH and give out the project&rsquo;s new coin or token.&nbsp;<\/p>\n<p>An ICO starts with a private sale. In order to participate in it, you have to be chosen by the project&rsquo;s management. The criteria can vary from project to project, but, in general, the participants must align with the project&rsquo;s vision and goals. Remember that a private sale is when you&rsquo;ll be able to get the best price for the new cryptocurrency.&nbsp;<\/p>\n<p>The next step is the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-pre-sale/">pre-sale. It&rsquo;s a sort of middle-ground since the buyers will be able to get a better price for the cryptocurrency than the public sale without the private sale&rsquo;s risks. It&rsquo;s especially successful when the management is trying to raise funds for the project&rsquo;s marketing efforts before officially launching it.&nbsp;<\/p>\n<p>Last but not least is the public sale. It&rsquo;s often considered to be the most important stage. Therefore, the funds from the previous steps are usually used to initiate marketing campaigns in order to attract a large number of investors. <strong>Some of the benefits of a public sale are higher liquidity due to a smaller trading time window and lower volatility that could possibly influence the price of the cryptocurrency<\/strong>. Also, it&rsquo;s easier to predict the outcome based on the two previous sales.<\/p>\n<p>The private sale and the pre-sale come out on top in regards to higher discounts as well as further and larger bonus rewards. While there are the least amount of risks attached to the public sale, the number of discounts and bonuses is also the smallest.&nbsp;<\/p>\n<p>There are a few downsides to partaking only in the public sale including a lower maximum cap per investor or a token dump. Additionally, <strong>the crowd sale could be canceled if all of the coins or tokens are sold<\/strong>.&nbsp;<\/p>\n<p>If you&rsquo;d like to acquire a new coin or token by participating in one of these phases, follow these steps:<\/p>\n<ul>\n<li>Simply trade your fiat currency into a cryptocurrency of your choice (Bitcoin or Ethereum are generally a good option);<\/li>\n<li>Send the cryptocurrency to your blockchain wallet;<\/li>\n<li>Partake in either ICO&rsquo;s pre-sale or public sale.&nbsp;<\/li>\n<\/ul>\n<p>After following these simple steps, the new cryptocurrency should be in your hands.<\/p>\n<p>Please keep in mind that, in this case, the private sale is not included as the participants are determined by the project&rsquo;s management.<\/p>","definition":"is when a large discount is announced for a new coin or token that hasn\u2019t been traded on the cryptocurrency exchange. It\u2019s considered to be the last phase of an initial coin offering (ICO).","status":"published","meta_title":"What is Public Sale? Definition & Meaning | Crypto Wiki","meta_description":"Public Sale meaning: Public Sale - is when a large discount is announced for a new coin or token that hasn\u2019t been traded on the cryptocurrency exchange. It\u2019s considered to be the last phase of an initial coin offering (ICO).","meta_keywords":null}" :model="{"id":619,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-10-08T12:40:02.000000Z","slug":"what-is-public-key-cryptography","title":"What is Public-Key Cryptography?","section":"P","keyword":"Public-Key Cryptography","content":"<p><strong>Public-key cryptography<\/strong> entails algorithm-based <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptography/">cryptographic procedures that are used to randomize and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-encryption/">encrypt data. Public key cryptography requires two <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-public-key/">public and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-private-key-secret-key/">private keys which contain information that is used to randomize data. The scrambled data can only be <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-decryption/">decrypted using the correct key.<\/p>\n<p>If a user has a <strong>plaintext<\/strong> message like &ldquo;Blockchain&rdquo;, it can be encrypted using a key &ldquo;146fhsj77bq10l5g&rdquo; to appear as <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-ciphertext/">ciphertext &ldquo;dz59YAUB9WNcTu0y7ZBEXg==&rdquo;. The cipher can then be decrypted using the same key to appear in plaintext.<\/p>\n<p>The protocol prevents any unauthorized attempts to access data by using a pair of keys to encrypt and decrypt the information. The network users receive public and private keys from a network&rsquo;s certification authorities.<\/p>\n<p>Users that want to encrypt data can obtain the recipient&rsquo;s public key from a public directory. They can use the key to encrypt the message and forward it to the intended recipient. The recipient can use their private key to decrypt the message. The private key can only be accessed by the recipient.<\/p>\n<p>One of the most commonly used cryptographic systems is the Rivest-Shamir-Adleman (RSA) algorithm. It is used to securely send sensitive data over insecure networks. With the RSA algorithm, both the public and private keys can encrypt messages without sacrificing their authenticity and integrity.<\/p>\n<p>There are numerous <strong>advantages to using the RSA algorithm<\/strong> as a cryptographic tool, including:<\/p>\n<ul>\n<li>Excellent data security. It&rsquo;s impossible to determine the decryption key by only using the cryptographic algorithm and the encryption key;<\/li>\n<li>It is considered to be one of the most secure protocols. Unlike private key cryptography, users are not required to reveal their private keys. This reduces the risk of the private key being intercepted during transmission and used with malicious intent;<\/li>\n<li>Users take responsibility for keeping their private keys secure, meaning that the keys can be used as non-repudiable <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-digital-signature/">digital signatures<\/strong><\/a>. This is not possible in private-key systems where users have to share their secret keys for decryption.<\/li>\n<\/ul>\n<p>However, there are also some downsides to public-key cryptography and the utility of the RSA algorithm, such as:<\/p>\n<ul>\n<li>Public-key cryptography is <strong>slow<\/strong> compared to private key cryptographic methods. However, public-key cryptographic methods can be used in tandem with secret-key systems, maintaining the security of the transmission while improving its speed;<\/li>\n<li>Public-key cryptographic tools can be vulnerable to attacks coming from compromised accreditation entities. Criminals use the public key certificate from a vulnerable authority to imitate them;<\/li>\n<li>If the user loses their private key, the encryption system becomes susceptible to malicious attacks from criminal entities.<\/li>\n<\/ul>","definition":"algorithm-based cryptographic procedures that are used to randomize and encrypt data.","status":"published","meta_title":"What is Public-Key Cryptography? Definition & Meaning | Crypto Wiki","meta_description":"Public-Key Cryptography meaning: Public-Key Cryptography - algorithm-based cryptographic procedures that are used to randomize and encrypt data.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="P" current-section="what-is-public-key-cryptography">