|
You are here |
ordep.dev | ||
| | | | |
berthub.eu
|
|
| | | | | Recapping from part 1: Galileo will soon add cryptographic signatures to the navigation messages. These cryptographic signatures are made with symmetric cryptography, which means clever techniques are required to prevent receivers from impersonating the network. The key to the technique is first signing messages, and only later disclosing the key used for the signatures, thus invalidating it for further use. Receivers can however verify that earlier signatures were indeed made with that key. | |
| | | | |
linderud.dev
|
|
| | | | | Lets prefix this with: I really love Transparency Logs! It's a fairly simple concept: If you hash elements together in a binary tree, you can validate and verify if elements are present on a tree by hashing a couple of elements. This is what is commonly known as a Merkle tree. I forget the math, but if you have a tree with a million items, you would only really need less than 10 hashes (I think) to figure out what the hash of the top node would be. | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
chrome.googleblog.com
|
|
| | | A little less than two years ago we set out to make computers much better . Today, we're announcing the first Chromebooks from our partners,... | ||