Changes To Experiment: Chainsignature
Not logged in

Changes to "Experiment: Chainsignature" between 2019-03-24 14:37:06 and 2019-03-24 14:41:31

    26     26   <pre>    sha256sum ./x.blob &gt; ./the_signature.txt</pre>
    27     27   <pre><font color="#ff0000">    cat ./M_n_hijacker &gt;&gt; ./x_hijacker.blob</font></pre>
    28     28   <pre><font color="#ff0000">    sha256sum ./x_hijacker.blob &gt; ./hijacked_branch_message_signature.txt</font></pre>
    29     29   <pre><br>
    30     30   
    31     31   
    32     32   
           33  +
           34  +
    33     35   
    34     36   </pre>
    35     37   
    36     38   <p>The M_n must be included to the signature calculation x.blob to make sure
    37     39   that an eavesdropper can not reuse the signature for signing its own message.
    38     40   To make eavesdropping and hijacking more difficult, different messages might be
    39     41   sent through different channels.&nbsp;</p>
................................................................................
    66     68   </p>
    67     69   
    68     70   <h1>Similar Ideas and Projects</h1>
    69     71   
    70     72   <p>The obvious source of inspiration is the Bitcoin. Some other inspiration
    71     73   sources are:</p>
    72     74   
    73         -<p>
           75  +<p></p>
    74     76   <ul>
    75     77   <li>A
    76     78   <a href="https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/">2018_04_07
    77     79   blog post</a>&nbsp;<i>(<a href="https://archive.is/zLTyw">archival copy</a>,
    78         -local copy)</i> by Matthew Green</li>
    79         -</ul></p>
           80  +<a href="./ainfo/5c129af665b94a2c">local copy</a>)</i> by Matthew Green</li>
           81  +</ul>
           82  +
           83  +<p></p>
    80     84   
    81     85   <p><br>
    82     86   </p>