BETA Solana Wizard โ€” Theory in Academy, Practice in Workshop. Non-custodial, always. View fees
Level 1 ยท Module 1.4

Cryptography: The Secret Behind Everything

You don't need to become a mathematician. But three concepts โ€” hashes, key pairs, and digital signatures โ€” are the invisible machinery behind every crypto transaction you'll ever make.

โฑ 9 min read ๐ŸŸข Beginner ๐Ÿ“– 5 sections

01 Hash Functions: Digital Fingerprints

A hash function takes any input โ€” a word, a document, a transaction โ€” and produces a fixed-length string of characters. Bitcoin uses SHA-256, which always outputs exactly 64 characters.

Try hashing the word "hello" with SHA-256 and you always get: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824

Now hash "Hello" (capital H) and you get a completely different 64-character string. This is called the avalanche effect โ€” a tiny change produces a totally different output.

DETERMINISTIC
The same input always produces the same hash. Every node on the network can verify independently.
IRREVERSIBLE
You cannot reverse-engineer the original data from the hash. It's a one-way street.
AVALANCHE EFFECT
Change one bit of input and the output changes completely. No pattern, no clue, no shortcut.
COLLISION-RESISTANT
It is practically impossible to find two different inputs that produce the same hash. The universe would end first.

02 Public and Private Keys

Your identity on any blockchain is defined by two mathematically linked numbers. They're called a key pair, and they work on a clever asymmetry: what one encrypts, only the other can decrypt.

PRIVATE KEY
A randomly generated 256-bit number. Your absolute secret. Anyone who knows it can spend every asset associated with it. Never write it digitally. Never share it with anyone.
PUBLIC KEY
Derived from the private key through one-way mathematics. Safe to share with anyone. It is computationally infeasible to reverse-engineer a private key from a public key.
WALLET ADDRESS
A compressed, human-readable version of your public key. This is what you give people so they can send you funds โ€” think of it like your blockchain IBAN.
Analogy โ€” A Letterbox with a Special Lock

Your public key is like the slot of a letterbox: anyone can drop a letter in (send you crypto) without any key at all. Your private key is the key that opens the box: only you can retrieve the mail (spend your funds). You share your slot address freely. You protect your key with your life.

03 Digital Signatures

So how does the network know a transaction actually came from you? You sign it with your private key. Here's the process step by step:

  1. 1You create the transaction message: "Send 1 SOL from my address to Mario's address."
  2. 2Your wallet uses your private key to generate a unique cryptographic signature for this exact message. Nobody else can produce this signature.
  3. 3All nodes on the network verify the signature against your public key. If it matches โ†’ the transaction is valid.
  4. 4Even if someone intercepts the transaction, they cannot alter a single character โ€” any modification invalidates the signature instantly.

04 The Seed Phrase

Your private key is a 256-bit number โ€” impossible for a human to memorise. So the industry invented the seed phrase: a list of 12 or 24 common English words from which your private key is mathematically derived (BIP-39 standard).

The same seed phrase on any wallet app, on any device, in any country, will always recreate the same private key โ€” and therefore the same wallet with all its funds.

HOW TO STORE IT
Write it on paper (or better: stamp it on stainless steel). Keep it in a physically secure location. Do not photograph it. Do not type it into any app or website. Do not store it in the cloud.
WHAT YOU CAN DO
Recover your entire wallet on any device, even if your phone is stolen or your computer dies.
WHAT A THIEF CAN DO
Take all your assets, immediately, irreversibly. There is no "undo". There is no customer service. There is no refund.
โ›”
Absolute Golden Rule No legitimate application, no technical support team, no DeFi project, no wallet, no exchange will EVER ask for your seed phrase. The moment someone asks for it โ€” whether in a Discord DM, a support ticket, a website, or a phone call โ€” you are being targeted for theft. No exceptions.
In blockchain there is no "forgot password". The seed phrase is the only path back to your funds if you lose access. Protecting it is not optional โ€” it is the single most important responsibility of every crypto user.
โ† 1.3 Types of Blockchain 2.1 Bitcoin โ€” Digital Gold โ†’