BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20180301T163000Z
DTEND:20180301T181500Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:SVTC Luncheon | Cryptocurrency and Bitcoin: The Deeper Dive
DESCRIPTION:Join SVTC on March 1st for an informative luncheon on cryptocurrency!\n\nYou asked for tech answers\, so here we go! Building on our January luncheon\, Dr. Morgan Benton (JMU CISE) will "dig deeper" with us and discuss how blockchain technology works and difference between bitcoin and ethereum. In order to understand what he'll cover\, attendees should be aware of how hashing algorithms work\, and know what a public/private key is.\n\nPlease read ahead:\n\n\n	Public key cryptography\, or asymmetrical cryptography\, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely\, and private keys which are known only to the owner. This accomplishes two functions: authentication\, where the public key verifies a holder of the paired private key sent the message\, and encryption\, where only the paired private key holder can decrypt the message encrypted with the public key. Details: Public-key cryptography (Wikipedia)\n	A very good and easy-to-digest explanation for Symmetric Cryptography\, Asymmetric Cryptography\, and Public Key Cryptography is here:  Explaining public-key cryptography to non-geeks. (Panayotis Vryonis/Medium.com)\n	About  hashing algorithms: The main features of a hashing algorithm are that they are a one way function   or in other words you can get the output from the input but you can't get the input from the output   just like elliptic curve cryptography where you can't get the private key from the public key. The other property is that the same input creates the same output. More details re. hashing algorithms (Cryptocompare.com)\n\n\nRegister for March 1\, 2018 Luncheon
X-ALT-DESC;FMTTYPE=text/html:<p style="text-align:center"><strong><a href="https://svtc-va.org/event/cryptocurrency2/">Join SVTC on March 1st for an informative luncheon on cryptocurrency!</a></strong></p>\n\n<p>You asked for tech answers\, so here we go! Building on our January luncheon\, Dr. Morgan Benton (JMU CISE) will &ldquo\;dig deeper&rdquo\; with us and discuss<strong>&nbsp\;how&nbsp\;blockchain technology works</strong>&nbsp\;and&nbsp\;<strong>difference between bitcoin and ethereum</strong>. In order to understand what he&rsquo\;ll cover\, attendees should be aware of how hashing&nbsp\;algorithms work\, and know what a public/private key is.</p>\n\n<p>Please read ahead:</p>\n\n<ul>\n	<li>Public key cryptography\, or asymmetrical cryptography\, is any cryptographic system that uses pairs of keys:&nbsp\;<strong>public keys</strong>&nbsp\;which may be disseminated widely\, and&nbsp\;<strong>private keys</strong>&nbsp\;which are known only to the owner. This accomplishes two functions:&nbsp\;<span style="font-size:inherit">authentication</span>\, where the public key verifies a holder of the paired private key sent the message\, and&nbsp\;<span style="font-size:inherit">encryption</span>\, where only the paired private key holder can decrypt the message encrypted with the public key. Details:&nbsp\;<a href="https://en.wikipedia.org/wiki/Public-key_cryptography" style="color: rgb(255\, 159\, 25)\; box-sizing: border-box\; margin: 0px\; padding: 0px\; border: 0px rgb(225\, 225\, 225)\; font-style: inherit\; font-variant: inherit\; font-weight: inherit\; font-stretch: inherit\; font-size: inherit\; line-height: inherit\; vertical-align: baseline\; outline: 0px\; max-width: 100%\;"><span style="font-size:inherit">Public-key cryptography</span></a>&nbsp\;(Wikipedia)</li>\n	<li>A very good and easy-to-digest explanation for Symmetric Cryptography\, Asymmetric Cryptography\, and Public Key Cryptography is here:&nbsp\;&nbsp\;<a href="https://medium.com/@vrypan/explaining-public-key-cryptography-to-non-geeks-f0994b3c2d5" style="color: rgb(255\, 159\, 25)\; box-sizing: border-box\; margin: 0px\; padding: 0px\; border: 0px rgb(225\, 225\, 225)\; font-style: inherit\; font-variant: inherit\; font-weight: inherit\; font-stretch: inherit\; font-size: inherit\; line-height: inherit\; vertical-align: baseline\; outline: 0px\; max-width: 100%\;"><span style="font-size:inherit">Explaining public-key cryptography to non-geeks</span></a>. (Panayotis Vryonis/Medium.com)</li>\n	<li>About&nbsp\; hashing&nbsp\;algorithms: The main features of a hashing algorithm are that they are a one way function &ndash\; or in other words you can get the output from the input but you can&rsquo\;t get the input from the output &ndash\; just like elliptic curve cryptography where you can&rsquo\;t get the private key from the public key. The other property is that the same input creates the same output.&nbsp\;<a href="https://www.cryptocompare.com/coins/guides/how-does-a-hashing-algorithm-work/" style="color: rgb(255\, 159\, 25)\; box-sizing: border-box\; margin: 0px\; padding: 0px\; border: 0px rgb(225\, 225\, 225)\; font-style: inherit\; font-variant: inherit\; font-weight: inherit\; font-stretch: inherit\; font-size: inherit\; line-height: inherit\; vertical-align: baseline\; outline: 0px\; max-width: 100%\;"><span style="font-size:inherit">More details re.&nbsp\;hashing&nbsp\;algorithms</span></a>&nbsp\;(Cryptocompare.com)</li>\n</ul>\n\n<div style="text-align:center"><a href="https://svtc-va.org/event/cryptocurrency2/"><strong>Register for March 1\, 2018 Luncheon</strong></a></div>\n
LOCATION:Wood Grill Buffet 1711 Reservoir St Harrisonburg\, VA 22801
UID:e.2338.3653
SEQUENCE:3
DTSTAMP:20260420T100532Z
URL:https://chamber.hrchamber.org/events/details/cryptocurrency-and-bitcoin-the-deeper-dive-3653
END:VEVENT

END:VCALENDAR
