A Study on Digital Currency : the Safety of Future Money

T.Syahrul Reza


Cryptography, as the most critical aspect of the never-ending evolving information technology era, is being criticized in its privacy aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. this study present professional countermeasures and attempts to define how the existing cryptology functioned being used worldwide by using Bitcoin as the prime. By understanding the current world phenomenon, it would be easier to answer the question of how secure and reliable cryptology actually is.


Cryptoanalysis; Cryptography; Information Security;Bitcoin; Cryptocurrencies.

Full Text:



Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A., Handbook of Applied Cryptography ISBN 0-8493-8523-7

Garret, J. Making, Breaking Codes: An Introduction to Cryptology. Prentic-Hall, Inc. The United States of America. 2001.

Davis, J. "The Crypto-Currency". The New Yorker, November 2013.

Brito, J., Castillo, A. Bitcoin: A Primer for Policymakers. Mercatus Center. George Mason University, October 2013.

Dorit, R., Shamir, A. "Quantitative Analysis of the Full Bitcoin Transaction Graph". Cryptology ePrint Archive, October 2012.

Forrester, D., Solomon, M. Bitcoin Explained: Today's Complete Guide to Tomorrow's Currency, Kindle, 2013.

Reid, F.; Harrigan, M., "An Analysis of Anonymity in the Bitcoin System," Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) , vol., no., pp.1318,1326, 9-11 Oct. 2011 doi: 10.1109/PASSAT/SocialCom.2011.79

Pentago, C. NSA Supercomputers Crack a Variety of Common Encryption Technologies, October 2013 retrieved from http://www.news24.com/MyNews24/NSA-Supercomputers-Crack-a- Variety-of-Common-Encryption-Technologies-20130930

Warren, P., Streeter, M. "Cyber Crime & Warfare: All That Matters", McGraw-Hill, US, 2013

Schneier, B. Schneier on Security: A blog covering security and security technology. Retrieved from: https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html Sept., 2013.

DOI: https://doi.org/10.31334/trans.v1i1.145

Copyright (c) 2018 Transparansi : Jurnal Ilmiah Ilmu Administrasi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


View My Stats

Transparansi : Jurnal Ilmiah Ilmu Administrasi

ISSN Media cetak2085-1162

ISSN Media online2622-0253

Email :[email protected]