Cryptographic techniques used in cryptocurrency

Some examples of cryptographic techniques used in cryptocurrency are:

Hash functions: These are mathematical functions that map any input to a fixed-length output, such that it is easy to compute the output from the input, but hard to find the input from the output or to find two inputs that produce the same output. Hash functions are used to create digital fingerprints of data, to verify the integrity and authenticity of transactions, and to generate random numbers for public-private key pairs

Digital signatures: These are schemes that use public-private key pairs to sign and verify data. Digital signatures are used to prove the ownership and authorization of transactions, and to prevent tampering and forgery.

Encryption algorithms: These are schemes that use public-private key pairs or shared secrets to encrypt and decrypt data. Encryption algorithms are used to protect the confidentiality and privacy of transactions, and to enable secure communication between participants243.