Cryptography I
Blockchain Security and Cryptographic Foundations
The fourth module of the XRPL Core Dev Bootcamp – Online Edition is dedicated to understanding the cryptographic bedrock upon which the entire XRP Ledger is built.

Module overview
This module provides a comprehensive journey through rippled’s cryptographic implementation, from abstract mathematical concepts to the C++ code that transforms them into real security guarantees.
In this module
Understanding XRPL Cryptographic Architecture
The module includes an essential hands-on exploration: tracing transaction signature flows from creation to verification, understanding how random entropy becomes secure keys, exploring signature malleability prevention, and debugging cryptographic operations in a live environment.
This step is crucial to ensure that everyone understands not just what the cryptographic code does, but why it was designed that way and how it integrates with the rest of the protocol.
You will learn to read production cryptographic code in a system securing billions of dollars, understand the security reasoning behind each design decision, and develop the defensive mindset necessary for blockchain development.
Learning objectives
Key management
Generate, derive, and manage cryptographic keys securely.
Signature schemes
Understand both signature systems supported by XRPL (secp256k1 and ed25519) and their trade-offs.
Signature flows
Trace complete signature flows through the codebase and understand canonical signature enforcement.
Hash functions
Explore how SHA-512Half, RIPESHA, and Base58Check are used across the protocol.
Secure memory
Implement safe memory handling to prevent key leakage.
Debugging
Identify and analyze cryptographic issues using rippled’s internal tools.
These skills are essential for any developer who wants to contribute to the XRPL core protocol, implement secure wallets and custody solutions, or build advanced applications with strong security foundations.











