Shared node infrastructure for top blockchains using JSON-RPC.
Dedicated nodes infrastructure for leading blockchains using JSON-RPC
Test EVM transactions, optimize gas fees and identify security flaws
Unified data from a single point using REST APIs. Execution time of 25ms.
Real-time notifications for events on top blockchains. Response under 100ms.
A set of prepared cryptographic APIs with unified endpoints which save time and effort.
Get access to unified market data using REST APIs from top crypto exchanges.
There are nightmare scenarios floating around the blockchain industry regarding the possibility of the attacks that pose threats to all of the assets that are part of the technology (check “51%” in our glossary). The interest is high not only because those assets are in growing demand daily but because, unlike in traditional financial systems, the corrupt transactions can’t be reversed.
We are going briefly into what the aim of blockchain itself is, what the cryptography situation is and further on, we will introduce one of the solutions that is starting to gain momentum, which means CryptoAPIs is here to grasp it.
Simply put, the technology aims to make peer-to-peer transactions possible without the necessity of intermediaries, thus without the risk of being hacked. For the latter to become valid, the proclivity of enhancing crypto security’s credibility was essential in all blockchains: such as the bitcoin, ethereum, litecoin etc.
Dependence exists on a trusted third party with which privileged insights are halfway mutual and stored. You can trust the platform to the degree you can trust this third party. In the event that an insider poses threats, all credibility is put at risk.
There are two essential parts to the whole cryptography situation: a standardized algorithm and a secret key. It started gaining attention in 1970s, by applying asymmetric cryptography to the internet systems with 2 keys: public and private for encryption and digital signature, which meant the generation of:
Digital signature allows for the private key to create a unique “mark” that represents authenticity to the transaction made. In blockchain, these signatures go through validation and show a public statement by the private key. This underpins the meaning of a certain limit for the number of parties which may be hacked, conceivably going astray from the defined protocol, and still permit valid cryptographic tasks to continue.
In blockchain, there are two models of technology where this is applied:
Similarly, this separation can result based on the management of the blockchain assets, which still revolves around two types:
Finally, the point is secure key management has huge importance in the security of the blockchain, which means 1/more entities possess total control over a distinct private key of their own and the points of failure centralize to a single support.
This is controversial to the whole concept of decentralization.
The preferred solution would provide the possibility to not have the power of the key in the users’ hands, rather for the option to set the account in the simplest way and later on have a wallet that is practical and interactive with blockchain.
This alternative solution includes 3 concepts:
MPC – Multi-Party Computing is a technology event where multiple non-trusting computers can conduct computation on their own unique fragments of a larger data set to collectively produce a desired common transaction. Certain elements represent MPC for being able to correctly put this into action:
Therefore, MPC enables this sharing in generating and computing the fragments of the private key, which allows to compute across the shares of the participating parties. Hence, it generates the digital signature or decrypts data without ever having to produce or recreate a whole key on any appliance at any time.
Moreover, the benefits are huge in comparison to the two widely used models in crypto security so far:
In a nutshell, it simply provides the much-needed certainty that our funds will be tact and secured.