Cryptography: the language of MMXN
An ancient technique resurfaces to encrypt your Stablecoins, do you already know it? We tell you all about it!
Millenary technology
The need to encrypt relevant information is an older technique than we could perhaps imagine. As a first step to understanding cryptography, we will take a brief look at its thousands of years of history.
Theological cryptography
The history of classical cryptography has its roots in one of the best known monotheistic Abrahamic religions: Judaism.
This cryptographic method is called Atbash and its first records are found in the Bible, specifically in the book of Jeremiah, which dates back to 600 BC.
The Atbash method consists of inverting the Hebrew alphabet when writing, so that the priests, prophets, and temple servants could communicate an encrypted message. Thus, if we were to apply the logic of this cryptographic method to English, the letter A would be Z, B would be Y, letter C would be X and so on.
Fun fact
MMXN in the Atbash method would be: NNCM.
From religion to war
In the last century, cryptography took a different path: it would stop serving theological-religious liturgy, to be used in warfare.
In World War II, the Nazi intelligence team commanded by the Führer, Adolf Hitler, began to develop a powerful encryption device known as the Enigma Machine, a fundamental tool for encrypting messages containing key information for their military strategy.
On the other side of the field, the British put all their efforts into dismantling Enigma. So, it created its own encryption system at the government school of coding and encryption.
This team remained hidden under the code name "Ultra", the same group from which comes one of the most exceptional minds on the planet, the mathematician and computer logician: Alan Turing.
Statue of Alan Turing at Bletchley Park, made by Stephen Ketlle in 2007. Richard Gillin.
Enigma
The Nazi operations team was in charge of changing Enigma's configuration every day, making the message impossible to encrypt.
The difficulty of the Nazi encryption was so complicated that Turing's team had to discover which of the 150 trillion possible combinations was the correct one in less than 18 hours. Otherwise, thousands of people would die.
As time went by, Turing realized something: the messages followed a pattern depending on the time of the broadcast. This is how he managed to decipher and find the real message from the Nazi army.
Curious fact
One of the many communications that Ultra intercepted was the "Zimmerman Telegram", in which the Nazis proposed to Mexico to invade the USA to recover the territory it had lost to them in the 19th century:
The beginning of a revolution
As we have seen above, this period was a watershed in the history of cryptography, which was a key piece to dynamite the beginning of a technological revolution.
But what is cryptography?
At the point of reading this article, I have not provided you with any definition of what Cryptography is, that is why I will allow myself to give you the definition of the DLE. According to the Dictionary of the Spanish language, cryptography is:
"The art of writing with a secret key or in an enigmatic way."
This is a definition that gives us an approach to the essence of its meaning since the prefix "Crypto" comes from Greek and means "Secret" or "hidden". and "Graphy" "To write".
In this sense, cryptography is the study and practice of sending secure, encrypted messages or data between two or more parties.
The sender "encrypts" the message to hide the content from a third party, while the receiver "decrypts" the message to make it readable again. Simple, don't you think? Ah, you still don't believe it? Don't worry.
Let me explain it to you in another way
Think of the radio signal reception in your car that allows you to listen to the broadcast.
This broadcast is in the public domain and is open to everyone. By contrast, think of defense-level communications, such as those between soldiers on a combat mission.
This communication will be secure and encrypted. It will only be received and known to the intended participants, rather than being open to everyone. This is how cryptography works.
In short, we can say that cryptography is a technique that allows you to:
- Encrypt
- Protect
- Hide
All your documents and data so that only you can have access to them.
Cryptography Use Cases
This technology is used to protect sensitive information, such as passwords and banking transactions. And it is the same technology used and supported by cryptocurrencies, which allows them to operate in a secure and completely anonymous way.
Cryptography use cases in Cryptocurrencies
Securing the various crypto transactions occurring on the network
Control the creation of new monetary units
Verify the transfer of digital assets and tokens.
Cryptography and MMXN
Cryptography plays a fundamental role in the operation of MMXN. All transactions are encrypted and can only be decrypted by those who possess the necessary key.
This guarantees the privacy of your MMXN and makes it impossible for them to be modified without detection.
Cryptography is, without a doubt, the language of MMXN. It is the basis on which they are built and guarantees their security and privacy.
Without it, neither transactions nor tokens would be possible, and, therefore, MMXN, as we know it today, would not exist.
That's all for today! We hope you enjoyed the article and learned something new. If you liked it, don't forget to subscribe to our social networks so you don't miss any of our new articles and surprises! See you next time.
Moneta Digital was designed to transform Mexico's digital economy through the first Stablecoin pegged to the Mexican Peso.