Digital Signatures based on secure hashes (fwd)

Jim Choate ravage at ssz.com
Thu Mar 29 17:18:00 PST 2001



FYI

    ____________________________________________________________________

         If the law is based on precedence, why is the Constitution
         not the final precedence since it's the primary authority?

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

---------- Forwarded message ----------
Date: Thu, 29 Mar 2001 13:58:32 -0800 (PST)
From: Bram Cohen <bram at gawth.com>
To: People who supposedly write code <coderpunks at toad.com>
Subject: Digital Signatures based on secure hashes

I put together some code for doing digital signatures based on secure
hashes.

Surprisingly, I was able to make it reasonably practical. You can find
well-documented reference code with test cases at -

http://gawth.com/bram/CheapSignaturesBeta.py

I would much appreciate it if anyone would analyze the code - I'm pretty
sure it's secure, since it's use of hashes falls within my area of
expertise, but don't really feel confident until other people have looked
at it as well.

I suspect at least some of the ideas are original, although I haven't
looked at the literature much - I'm particularly proud of the 165 choose
82 trick.

You can find code for running all it's tests at -

http://gawth.com/bram/testtest.py

-Bram Cohen

Soko! puzzle game - http://ch.havenco.com:4201/





More information about the cypherpunks-legacy mailing list