CryptoStage
A simple tool to play and learn basic concepts of cryptography!
Basic Concepts
Learn cryptography step by step - click each section to expand
Using mathematics to decide who can read data and to detect tampering on untrusted networks
Why it matters
- • Keep data safe even on untrusted storage
- • Send messages safely across open networks
- • Limit access to authorized parties only
Plaintext
Human‑readable original
Ciphertext
Encrypted output, unreadable without the key

How it's used in blockchains
- Cryptography underpins blockchains: it protects data integrity, identities, and network messages.
- Ownership in crypto is key-based — your private key controls funds; there are no on-chain passwords.
- Consensus protocols rely on cryptographic proofs to agree on a single, tamper-evident history.
Blockchain-focused Glossary
Hash
A one-way fingerprint of data. Used to link blocks and build Merkle trees.
Merkle tree
A tree of hashes summarizing many items; enables light clients to verify inclusion with short proofs.
Private key
A secret number that controls funds and signs transactions. Keep offline and back up safely.
Public key
Derived from the private key; others use it to verify your signatures or encrypt to you.
Address
A short representation derived from a public key, used as a destination for funds.
Digital signature
A proof that a specific private key authorized data, without revealing the key.
Nonce
A number used once. Prevents replay; in PoW it's the field miners vary.
Block
A batch of transactions with metadata, linked by hashes into a chain.
Consensus
The protocol nodes follow to agree on the chain's state (e.g., PoW, PoS).
Proof of Work (PoW)
A puzzle that requires compute to solve; the solution proves effort and secures ordering.
Proof of Stake (PoS)
Validators stake funds and are selected to produce/attest blocks; misbehavior can be penalized.
Zero-knowledge proof (ZK)
Prove a statement without revealing the secret, used in privacy and scalability.