FYI
____________________________________________________________________
If the law is based on precedence, why is the Constitution
not the final precedence since it's the primary authority?
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ [EMAIL PROTECTED]
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------- Forwarded message ----------
Date: Thu, 29 Mar 2001 13:58:32 -0800 (PST)
From: Bram Cohen <[EMAIL PROTECTED]>
To: People who supposedly write code <[EMAIL PROTECTED]>
Subject: Digital Signatures based on secure hashes
I put together some code for doing digital signatures based on secure
hashes.
Surprisingly, I was able to make it reasonably practical. You can find
well-documented reference code with test cases at -
http://gawth.com/bram/CheapSignaturesBeta.py
I would much appreciate it if anyone would analyze the code - I'm pretty
sure it's secure, since it's use of hashes falls within my area of
expertise, but don't really feel confident until other people have looked
at it as well.
I suspect at least some of the ideas are original, although I haven't
looked at the literature much - I'm particularly proud of the 165 choose
82 trick.
You can find code for running all it's tests at -
http://gawth.com/bram/testtest.py
-Bram Cohen
Soko! puzzle game - http://ch.havenco.com:4201/