Digital Signatures based on secure hashes (fwd)
Jim Choate
ravage at ssz.com
Thu Mar 29 17:18:00 PST 2001
FYI
____________________________________________________________________
If the law is based on precedence, why is the Constitution
not the final precedence since it's the primary authority?
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage at ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------- Forwarded message ----------
Date: Thu, 29 Mar 2001 13:58:32 -0800 (PST)
From: Bram Cohen <bram at gawth.com>
To: People who supposedly write code <coderpunks at toad.com>
Subject: Digital Signatures based on secure hashes
I put together some code for doing digital signatures based on secure
hashes.
Surprisingly, I was able to make it reasonably practical. You can find
well-documented reference code with test cases at -
http://gawth.com/bram/CheapSignaturesBeta.py
I would much appreciate it if anyone would analyze the code - I'm pretty
sure it's secure, since it's use of hashes falls within my area of
expertise, but don't really feel confident until other people have looked
at it as well.
I suspect at least some of the ideas are original, although I haven't
looked at the literature much - I'm particularly proud of the 165 choose
82 trick.
You can find code for running all it's tests at -
http://gawth.com/bram/testtest.py
-Bram Cohen
Soko! puzzle game - http://ch.havenco.com:4201/
More information about the cypherpunks-legacy
mailing list