The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto by Phil Champagne
Author:Phil Champagne [Champagne, Phil]
Language: eng
Format: epub
ISBN: 9780996061315
Amazon: 0996061312
Publisher: The Book Of Satoshi
Published: 2014-06-04T22:00:00+00:00
* * *
Re: Stealing Coins
Posted by knightmb, July 25, 2010, 07:34:42 PM
* * *
Very nice. *another reason why I love open source*
As I understand it then, and please correct me if I’m wrong
Since the hash of the public key is smaller than the actual public key itself, one need only find a collision that matches the hash and when that collision is found you’ll know the public/private key combo. Then you simply spend coin using the known ones and the other clients will think it’s a valid transfer because the clients are only concerned that your hash matches the hash of the victim and the transaction is recorded for all time.
Currently the hash is 35 characters long, alpha-numeric26 (upper case) +26 (lower case) +10 (numbers) = 62 possible per character
So we have 541,638,008,296,341,754,635,824,011,376,225,346,986,572,413,939,634,062,667,808,768 possible combinations.
So I think we have about half of much work to do compared to going brute force against the main private/public key. Never hurts to plan for the future : )
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Deep Learning with Python by François Chollet(12593)
Hello! Python by Anthony Briggs(9928)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9804)
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)
Dependency Injection in .NET by Mark Seemann(9348)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8310)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7772)
Grails in Action by Glen Smith Peter Ledbrook(7705)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7567)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7187)
Microservices with Go by Alexander Shuiskov(6951)
Practical Design Patterns for Java Developers by Miroslav Wengner(6868)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6813)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6426)
Angular Projects - Third Edition by Aristeidis Bampakos(6230)
The Art of Crafting User Stories by The Art of Crafting User Stories(5746)
NetSuite for Consultants - Second Edition by Peter Ries(5674)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5490)
Kotlin in Action by Dmitry Jemerov(5075)
