Author

Topic: Origins of Bitcoin (Read 1059 times)

sr. member
Activity: 280
Merit: 257
bluemeanie
November 19, 2013, 04:00:30 PM
#4

this concept is a fairly basic cryptographic primitive: http://en.wikipedia.org/wiki/Hash_chain

-bm


Did a little sleuthing today upon arriving to the office.  I had remembered something from an old book I've had for more than 12 years.  A book I used to help write some encryption classes in Java before Java offered them.  I remembered that the author presented a payment system leveraging a protocol hashing and encryption.  This wasn't my interest at the time, but somehow it stuck with me.  Well I found the book again and did some reading (I've put this off too long).

"A really clever thing about this protocol is that the encryption key for each message depends on the previous message.  Each message doubles as an authenticator for all previous messages.  This means that someone can't replay an old message; the receiver could never decrypt it.  I am impressed with this idea and expect that it will see wider use once it becomes widely known." [1]

I don't have the first edition of this book, so I don't know exactly when this was penned, but not after 1995.

[1] - Schneier, Bruce (1996). Applied Cryptography Second Edition : protocols, algorithms, and source code in C. John Wiley & Sons, Inc. p. 590
sr. member
Activity: 462
Merit: 250
Lux e tenebris
November 19, 2013, 03:18:29 PM
#3
Bruce Schneier's secure handshake is so strong, you won't be able to exchange keys with anyone else for days.
legendary
Activity: 2646
Merit: 1722
https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF
November 19, 2013, 02:59:03 PM
#2
full member
Activity: 157
Merit: 101
November 19, 2013, 09:49:24 AM
#1
Did a little sleuthing today upon arriving to the office.  I had remembered something from an old book I've had for more than 12 years.  A book I used to help write some encryption classes in Java before Java offered them.  I remembered that the author presented a payment system leveraging a protocol hashing and encryption.  This wasn't my interest at the time, but somehow it stuck with me.  Well I found the book again and did some reading (I've put this off too long).

"A really clever thing about this protocol is that the encryption key for each message depends on the previous message.  Each message doubles as an authenticator for all previous messages.  This means that someone can't replay an old message; the receiver could never decrypt it.  I am impressed with this idea and expect that it will see wider use once it becomes widely known." [1]

I don't have the first edition of this book, so I don't know exactly when this was penned, but not after 1995.

[1] - Schneier, Bruce (1996). Applied Cryptography Second Edition : protocols, algorithms, and source code in C. John Wiley & Sons, Inc. p. 590
Jump to: