A Study on Digital Currency : the Safety of Future Money
DOI:
https://doi.org/10.31334/trans.v1i1.145Keywords:
Cryptoanalysis, Cryptography, Information Security, Bitcoin, Cryptocurrencies.Abstract
Cryptography, as the most critical aspect of the never-ending evolving information technology era, is being criticized in its privacy aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. this study present professional countermeasures and attempts to define how the existing cryptology functioned being used worldwide by using Bitcoin as the prime. By understanding the current world phenomenon, it would be easier to answer the question of how secure and reliable cryptology actually is.References
Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A., Handbook of Applied Cryptography ISBN 0-8493-8523-7
Garret, J. Making, Breaking Codes: An Introduction to Cryptology. Prentic-Hall, Inc. The United States of America. 2001.
Davis, J. "The Crypto-Currency". The New Yorker, November 2013.
Brito, J., Castillo, A. Bitcoin: A Primer for Policymakers. Mercatus Center. George Mason University, October 2013.
Dorit, R., Shamir, A. "Quantitative Analysis of the Full Bitcoin Transaction Graph". Cryptology ePrint Archive, October 2012.
Forrester, D., Solomon, M. Bitcoin Explained: Today's Complete Guide to Tomorrow's Currency, Kindle, 2013.
Reid, F.; Harrigan, M., "An Analysis of Anonymity in the Bitcoin System," Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) , vol., no., pp.1318,1326, 9-11 Oct. 2011 doi: 10.1109/PASSAT/SocialCom.2011.79
Pentago, C. NSA Supercomputers Crack a Variety of Common Encryption Technologies, October 2013 retrieved from http://www.news24.com/MyNews24/NSA-Supercomputers-Crack-a- Variety-of-Common-Encryption-Technologies-20130930
Warren, P., Streeter, M. "Cyber Crime & Warfare: All That Matters", McGraw-Hill, US, 2013
Schneier, B. Schneier on Security: A blog covering security and security technology. Retrieved from: https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html Sept., 2013.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
Please find the rights and licenses in Transparansi : Jurnal Ilmiah Ilmu Administrasi By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
- License
The commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User Rights
Transparansi : Jurnal Ilmiah Ilmu Administrasi spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Transparansi : Jurnal Ilmiah Ilmu Administrasi permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Transparansi : Jurnal Ilmiah Ilmu Administrasi on distributing works in the journal and other media of publications.
4. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Transparansi : Jurnal Ilmiah Ilmu Administrasi will not be held liable for anything that may arise due to the author(s) internal dispute. Transparansi : Jurnal Ilmiah Ilmu Administrasi will only communicate with the corresponding author.
5. Miscellaneous
Transparansi : Jurnal Ilmiah Ilmu Administrasi will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Transparansi : Jurnal Ilmiah Ilmu Administrasi editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.
Every accepted manuscript should be accompanied by "Copyright Transfer Agreement"prior to the article publication.