Digital Signatures based on secure hashes (fwd)
FYI ____________________________________________________________________ If the law is based on precedence, why is the Constitution not the final precedence since it's the primary authority? The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage@ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- ---------- Forwarded message ---------- Date: Thu, 29 Mar 2001 13:58:32 -0800 (PST) From: Bram Cohen <bram@gawth.com> To: People who supposedly write code <coderpunks@toad.com> Subject: Digital Signatures based on secure hashes I put together some code for doing digital signatures based on secure hashes. Surprisingly, I was able to make it reasonably practical. You can find well-documented reference code with test cases at - http://gawth.com/bram/CheapSignaturesBeta.py I would much appreciate it if anyone would analyze the code - I'm pretty sure it's secure, since it's use of hashes falls within my area of expertise, but don't really feel confident until other people have looked at it as well. I suspect at least some of the ideas are original, although I haven't looked at the literature much - I'm particularly proud of the 165 choose 82 trick. You can find code for running all it's tests at - http://gawth.com/bram/testtest.py -Bram Cohen Soko! puzzle game - http://ch.havenco.com:4201/
participants (1)
-
Jim Choate