Тёмный

3. Signatures 

MIT OpenCourseWare
Подписаться 5 млн
Просмотров 38 тыс.
50% 1

MIT MAS.S62 Cryptocurrency Engineering and Design, Spring 2018
Instructor: Tadge Dryja
View the complete course: ocw.mit.edu/MA...
RU-vid Playlist: • MIT MAS.S62 Cryptocurr...
Discussion of hash signatures, public and private keys, examples of how to use elliptic curves vs. hashes.
License: Creative Commons BY-NC-SA
More information at ocw.mit.edu/terms
More courses at ocw.mit.edu

Опубликовано:

 

20 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 33   
@Sunny-tp9ro
@Sunny-tp9ro 5 лет назад
Such a great initiative by MIT to spread all this knowledge for free around the globe. Bless you guys!
@ecavero1
@ecavero1 4 года назад
On the elliptic curves, G is called the Generator Point because the repeated addition of G to itself generate all the numbers in the cyclic group.
@nomad7935
@nomad7935 2 года назад
Generate all the 'points' not numbers, right?
@ecavero1
@ecavero1 2 года назад
@@nomad7935 Correct. I thought of numbers because in bitcoin we almost always discard the y coordinate.
@randalllionelkharkrang4047
@randalllionelkharkrang4047 8 месяцев назад
Oh group theory. how I miss you.
@Esparzamx
@Esparzamx 5 лет назад
I feel like I'm watching Dora the explorer whenever I yell out the answer to the screen, great content, thank you!
@levyyitzhak7398
@levyyitzhak7398 4 года назад
Tadge is awesome.
@abdullahh283
@abdullahh283 3 года назад
He is super awesome, kinda the person I wanna be if I ever give a lecture!
@vmalonbc
@vmalonbc 5 лет назад
When you double your public key in the first 3 minutes aren’t you still giving away half you private key every time you sign? I can’t see why extending the public key to 32 bytes would allow for 1 more use.
@vmalonbc
@vmalonbc 5 лет назад
Basically I’m asking the same question the student was asking around seven minutes.
@fafk
@fafk 4 года назад
I came to the same conclusion and I'm very confused. If I reveal part of the private key, anyone can forge thart part of the signature for any message.
@levyyitzhak7398
@levyyitzhak7398 4 года назад
you are simply adding 16 bits so you can add 1 more variable which you use to denote what TYPE of key the next 16 bits are describing. Kind of like taking 1 glass, and adding a multiplier by color.
@rachitsharma7921
@rachitsharma7921 3 года назад
I couldn't find the signatures.go file that's reqd for the assignment. Can someone help?
@jeeveshjuneja445
@jeeveshjuneja445 3 года назад
In the first 3 minutes, both private key and public key sizes are doubled.
@randalllionelkharkrang4047
@randalllionelkharkrang4047 8 месяцев назад
i dont understand why signature for a 32 byte would have an 8K byte signature? i think whats not clear to me, is that if u use 32 byte secretkey. we should actually have a 16 byte signature. but if my public key is 16kb. during verification, why would my signature size increase? when im literally just comparing each block of public key selected(depending on the hash of my message whether its 0 or 1, i would eventually get a 8 kb temp "object"). now just use the hash with index on signature right?
@cauebraga
@cauebraga 2 года назад
Thank you MIT
@kevinrandalrulach
@kevinrandalrulach 9 дней назад
I'm not getting most of the stuff, but I'm trying to assimilate atleast a bit. I have forgotten most stuff cos I was studying biology, brain and stuff.
@lambdapractitioner835
@lambdapractitioner835 6 месяцев назад
With RSA ... one needs to mind one's Ps and Qs,
@jordankuzmanovik5297
@jordankuzmanovik5297 3 года назад
Where can i find the presentation for lecture 3? Because on the website it poitns me to lecture 4. Anyway great series,
@mitocw
@mitocw 3 года назад
Thanks for the note! We will check into it.
@jordankuzmanovik5297
@jordankuzmanovik5297 3 года назад
@@mitocw Thanks let me know :D Edit: I found them github.com/mit-dci/mas.s62/blob/master/slides/lec03-tadge.pdf
@abypaul100
@abypaul100 3 года назад
@@mitocw Yes, Lectures 3 and 4 got the same set of slides at OCW site.
@kevinrandalrulach
@kevinrandalrulach 9 дней назад
I'm not getting most of the stuff, but I'm trying to assimilate atleast a bit.
@nomad7935
@nomad7935 2 года назад
35:00 the slide is wrong, it should read P+Q=R
@hahneortiz
@hahneortiz Год назад
How is it at 12:00 that we have a 32-byte private key?
@abdulazeemshaik7112
@abdulazeemshaik7112 10 месяцев назад
I think it's because you have the 0 row and the 1 row. You've got these 2 rows by concatenating the original 16 kB private key with 0/1. Now we can use the values from the private keys, let's say privKey_1 [ 0 ] = alpha. now you can have a pubKey_alpha where the values of this key are generated by hashing alpha with the respective indexes. so pubKey_alpha [0] = hash (alpha, 0). I might be wrong. but this is sort of an understanding that I have. Now if you need to verify, you could just add bits to the signature which declares which index and which row of the private key were used so that I can refer to that publicKey in my available directory.
@Imamtalhaoui
@Imamtalhaoui 3 года назад
13:01
@pakistan070829
@pakistan070829 2 года назад
where can i find pset01?? the assignment?
@mitocw
@mitocw 2 года назад
The course materials are on MIT OpenCourseWare at: ocw.mit.edu/MAS-S62S18. Best wishes on your studies!
Далее
4. Transactions and the UTXO model
1:12:20
Просмотров 43 тыс.
Are we all wrong about AI?
24:55
Просмотров 238 тыс.
What are Digital Signatures? - Computerphile
10:17
Просмотров 334 тыс.
5. Synchronization Process and Pruning
1:12:01
Просмотров 19 тыс.
LogJam Attack - Computerphile
18:47
Просмотров 181 тыс.
What La Niña Will do to Earth in 2025
19:03
Просмотров 725 тыс.
How To Think Like A Programmer
1:00:07
Просмотров 2 млн
Breaking RSA - Computerphile
14:50
Просмотров 360 тыс.
Lecture 1 | String Theory and M-Theory
1:46:55
Просмотров 2,3 млн