Gematmw Y10 Individual Project 1
Gematmw Y10 Individual Project 1
Gematmw Y10 Individual Project 1
In partial fulfillment
of the course
In GEMATMW Y10
Submitted by:
Submitted to:
Mr. Isagani Jos
May 4 , 2021
The Sudden Boom Of Cryptocurrency
Lately, there has been a sudden rise in the popularity of different cryptocurrencies.
Almost anywhere, from the dining tables to our social media feed; more often than not, there is
a person sharing about his/her cryptocurrency updates and how they are winning from them.
Some of the most popular ones include Bitcoin, Ethereum, and Litecoin but according to
Conway (2021), there are more than 4,000 cryptocurrencies as of January 2021. Despite only
gaining more attention recently, cryptocurrencies have existed since 2009. It was believed that
bitcoin is the original digital currency and it was founded by Satoshi Nakamoto (pseudonym)
(Rieff, 2021). This proves that many people are taking interest in these cryptocurrencies but for
some people, the idea of digital currencies remain unclear and vague. Do we really know how it
works? This paper aims to provide a simpler explanation of the relation of cryptocurrencies and
Cryptocurrency, Defined
Cryptocurrencies are known for their decentralized system that is composed of digital
assets that are usually in the form of coins or tokens. These currencies are intangible, meaning
they aren’t like the usual bills, coins, and cards we have that we can physically hold on. These
virtual currencies are stored in digital wallets with the use of hardware or website, and a person
can only access those digital assets and transact with it if he/she has the private keys.
their integrity and serves as an online ledger. Moreover, cryptocurrencies aren’t regulated by
1
the government allowing users to make transactions anonymously without the intervention of a
third party like banks. Though this can be used as an advantage with its capability to allow
people to conduct discrete transactions, the anonymity can also be a medium for illegal
it difficult to predict, therefore when investing, there are higher risks in exchange for the higher
return of investment. Through “mining” or selling the crypto at a higher price, investors can
Examples of Cryptocurrency
Bitcoin has jump-started the attention of investors towards cryptocurrency, but there are
also other cryptocurrencies besides BTC. Some of the famous ones include Ethereum, a
decentralized system like Bitcoin that doesn’t have a third party intervention like the
government. The goal of this cryptocurrency is to offer financial products to anyone regardless
of someone’s demographics. Through this, individuals with no identification can still have access
to financial products like loans. This can be a good thing, but on the other perspective, this can
Another one is Litecoin, which is similar to Bitcoin in the sense that they are both
decentralized but this has a faster block generation rate which means transactions can be done
quicker. It uses a different algorithm as well, called Scrypt while Bitcoin uses a SHA-256
algorithm. Again, there are more than 4,000 cryptocurrencies existing, but these are just some
2
Advantages of Cryptocurrency
applicants before they receive any financial products are strict. With cryptocurrencies, any
individual has access to financial products and also can skip out on the processing fees that are
usually given to third parties. In addition to that, the privacy of information is more defined in
crypto. Additionally, it is believed that by investing in cryptocurrencies, one can protect his or
her assets from natural economic occurrences like inflation and deflation, therefore keeping the
Downside of Cryptocurrency
The volatility of the prices of cryptocurrencies in the market makes it difficult for the
third party like the government, it is difficult to regulate the legality of the transactions. The
anonymity and secrecy that the currencies like Bitcoin have is also questionable.
The founder of Bitcoin whose alias we only know, further increases the doubt on the
who really controls the said asset. Moreover, without the capability of paying regular
transactions like purchasing food, like a normal monetary unit, the purpose of these digital
assets are suspected. Finally, the use of energy in maintaining constantly-running computers can
3
More on Cryptography
Figure 1.
the name crypto. According to Nocon R., and Nocon E. (2018), cryptography involves the
process of encryption and decryption where a regular message is first encrypted into a certain
key then sent to the receiver. The encrypted message then gets decrypted to send the original
message of the sender. When the original message or the plain text is encrypted, it becomes a
cipher text. This cryptosystem gives way for confidentiality, integrity, authenticity, and
non-repudiation throughout the process and in the case of cryptocurrencies, allows anonymity
in the transactions.
There are several methods of cryptography. The simplest one is the symmetric
encryption, where the sender and receiver use a certain key to decipher the message. Here,
numbers and letters are used in replacement of the other; a letter corresponds to a certain
number and vice versa. The public key is quite common which can hinder the security of the
4
message because someone else can decrypt the message as long as they know the method
used.
For example, the method agreed is that every letter refers to a number: letter A is
equivalent to 01, “B” is equal to 02, and so on. If the sender wishes to send a “Good Day”
message, the cipher text would be “07151504 040125”. A visual model is shown below to better
explain the method. This is only an example, there are other kinds of symmetric cryptography
Figure 2.
A B C D E F G H I J K L M N O P Q R S T
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20
U V W X Y Z
21 22 23 24 25 26
Figure 3.
Another method is the Asymmetric encryption. Compared to the former, this one
utilizes public and private keys. Plain text is first encrypted in public keys but it must be
5
decrypted in the private key by the receiver. This means that only the sender and receiver
knows the private keys making it more difficult to hack. It also ensures that the message is only
Through this method, the individual’s blockchain data and account address are being utilized to
verify the authenticity of the transactions. Digital signatures are also used in this encryption.
More importantly, this secures the information between the parties involved (Seth, 2020).
RSA Cryptosystem
The RSA or the Rivest–Shamir–Adleman algorithm makes use of both a public key and a
private key. The steps in key generation and encryption are as follows:
● First, we select two large prime numbers and denote it as our p and q.
n= 19*23 = 437
and integer.
6
d = [ 1 + 5 ( 19-1) (23 - 1)] / 7
d = [ 1 + 5 (396) ] / 7
d = [ 1+ 1980] / 7
d = 1981 / 7
d = 283
● The public key would be (n, e) while the private key would be (n, d)
In this example, the public key would be (437, 7) while the private key would be (437,
283).
(2) Encryption
● We then translate the message in the form of integers, and group the integers
together.
For this example, we would use the method in figure 3 to say “Hello”
● Next, we are going to change the initial integer M to the cipher text or the
7
Elliptic Curve Cryptography
The Elliptic curve cryptography is known for its horizontal symmetry, where if you
choose a point in the upper graph, that point will have a mirrored equivalent on the lower part
of the graph, and vice versa. Another key property of this is that when a non-vertical line is
drawn across the graph, the line will have an intersection in at least 3 points in the curve. In
addition to that, this graph also has a non-singularity characteristic, which means the curve will
not intersect on its own point. The equation for the elliptic curve is y2 = x3 + ax + b (Nocon, R.,
Compared to the RSA Cryptosystem, the Elliptic Curve Cryptography is more advanced
and secure. It also gives smaller key sizes which would be useful in terms of storage space in a
8
Other uses of Cryptography
Cryptography is not just used in cryptocurrencies. There are numerous situations around
Whenever we forget our password for our account, Facebook would ask us to input our email
address or mobile number, this is then used to send the verification code that they will provide.
If the person really owns the account, he/she most probably has access to that email address or
mobile number to get the verification code. After that person typed in the verification code sent
Although it is not a hundred percent free from hackers, this limits the chances of some
random person to hack your account and help ensure that the key to change the password of
the account is only accessible to those who genuinely own the account.
9
The HTTPS
The HTTP or the HyperText Transfer Protocol is very common on the internet. The http in
every website address serves as a plain text that helps disseminate information on the world
wide web. Knowing that there are tons of data on the internet, it is hard to eliminate every
suspicious website. Therefore, the https or the Secured HyperText Transfer Protocol is created
to keep information within websites safe. This is particularly important on business websites
where personal information and even credit card details are present (Ninel, n.d.)
Conclusion
With the high gains from cryptocurrencies, comes the higher risks that are brought in by
different factors but mainly the unpredictability of the market. As the fame grows, the number
of people trying to catch on benefits increases, but so do the security issues that can happen.
The methods such as RSA and ECC are known to be secure but time will only tell until when this
security will be intact hence, in every decision, one has to conduct a comprehensive research
and possibly consult professional opinions. Though this doesn’t eliminate the risks fully, it can
make someone create educated decisions which is essential in cryptocurrencies and even in
daily situations.
10
References
Bonheur, K. (2019, April 13). Advantages and Disadvantages of Cryptocurrency. Retrieved from
https://www.profolus.com/topics/advantages-and-disadvantages-of-cryptocurrency/
Conway, L. (2021). The 10 Most Important Cryptocurrencies Other Than Bitcoin. Retrieved from
https://www.investopedia.com/tech/most-important-cryptocurrencies-other-than-bitcoi
n/#:~:text=One%20reason%20for%20this%20is,communities%20of%20backers%20and%
20investors.
Nocon, R, and Nocon E. (2018). Essential Mathematics for the Modern World. Page 157. C&E
Publishing.
Reiff, N. (2021, April 23). Were There Cryptocurrencies Before Bitcoin?.Retrieved from
https://www.investopedia.com/tech/were-there-cryptocurrencies-bitcoin/#:~:text=Man
y%20investors%20consider%20bitcoin%20to,technology%20and%20decentralized%20di
gital%20currencies.
Seth, S. (2020, January 25). Explaining the Crypto in Cryptocurrency. Retrieved from
https://www.investopedia.com/tech/explaining-crypto-cryptocurrency/#:~:text=Cryptog
raphy%20is%20the%20mathematical%20and,the%20purpose%20of%20%22mining.%22
Disclaimer
This paper is only for academic purposes and should not be taken as a professional
advice.
11