User:Angel volk/sandbox



Encryption

How does encryption work?
 * Scramble the data to “encrypt” it
 * Use key to unscramble data (decrypt)
 * Plaintext is what you would call the message within the encryption.
 * Cipher text is what you would call the encrypted message (unreadable).
 * Encrypted messages can be hacked throughout time with the right technology

How does encryption protect privacy?
 * Turns you data into “your eyes only” messages
 * For example, emails you send, the plaintext can only be read by you and the recipient.
 * The purpose of encryption is to provide data confidentiality
 * Encryption and privacy work together

How does cryptocurrency use encryption?


 * Relying on modern asymmetrical encryption methods
 * Blockchain's/hashing techniques
 * Private keys for cryptocurrency owners to verify they are the owners

Question Citations
 * STILL NEED TO ADD INFO ABOUT BLOCKCHAIN/HASHING AND ABOUT DARK WEB, ALSO ABOUT KEYS.


 * Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344.


 * Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., & Kumari, S. (2021). Supervised learning model for identifying illegal activities in Bitcoin. Applied Intelligence, 51(6), 3824-3843.


 * Liggett, R., Lee, J. R., Roddy, A. L., & Wallin, M. A. (2020). The dark web as a platform for crime: An exploration of illicit drug, firearm, CSAM, and cybercrime markets. The Palgrave handbook of international cybercrime and cyberdeviance, 91-116.