A Study on Digital Currency : the Safety of Future Money

Authors

  • T.Syahrul Reza Associate Professor (Lektor Kepala) Institut Ilmu Sosial dan Manajemen STIAMI

DOI:

https://doi.org/10.31334/trans.v1i1.145

Keywords:

Cryptoanalysis, Cryptography, Information Security, Bitcoin, Cryptocurrencies.

Abstract

Cryptography, as the most critical aspect of the never-ending evolving information technology era, is being criticized in its privacy aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. this study present professional countermeasures and attempts to define how the existing cryptology functioned being used worldwide by using Bitcoin as the prime. By understanding the current world phenomenon, it would be easier to answer the question of how secure and reliable cryptology actually is.

References

Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A., Handbook of Applied Cryptography ISBN 0-8493-8523-7

Garret, J. Making, Breaking Codes: An Introduction to Cryptology. Prentic-Hall, Inc. The United States of America. 2001.

Davis, J. "The Crypto-Currency". The New Yorker, November 2013.

Brito, J., Castillo, A. Bitcoin: A Primer for Policymakers. Mercatus Center. George Mason University, October 2013.

Dorit, R., Shamir, A. "Quantitative Analysis of the Full Bitcoin Transaction Graph". Cryptology ePrint Archive, October 2012.

Forrester, D., Solomon, M. Bitcoin Explained: Today's Complete Guide to Tomorrow's Currency, Kindle, 2013.

Reid, F.; Harrigan, M., "An Analysis of Anonymity in the Bitcoin System," Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom) , vol., no., pp.1318,1326, 9-11 Oct. 2011 doi: 10.1109/PASSAT/SocialCom.2011.79

Pentago, C. NSA Supercomputers Crack a Variety of Common Encryption Technologies, October 2013 retrieved from http://www.news24.com/MyNews24/NSA-Supercomputers-Crack-a- Variety-of-Common-Encryption-Technologies-20130930

Warren, P., Streeter, M. "Cyber Crime & Warfare: All That Matters", McGraw-Hill, US, 2013

Schneier, B. Schneier on Security: A blog covering security and security technology. Retrieved from: https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html Sept., 2013.

Downloads

Published

2018-07-31

Issue

Section

Articles