Evaluating the SHA-256 and Elliptic Curve Digital Signature

download Evaluating the SHA-256 and Elliptic Curve Digital Signature

of 16

Transcript of Evaluating the SHA-256 and Elliptic Curve Digital Signature

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    1/16

    Evaluating the SHA-256 and Elliptic

    Curve Digital Signature Algorithmsin Bitcoin Transactions

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    2/16

    Overview

    What is a Bitcoin?

    How do I get Bitcoins?

    Bitcoin transactions SHA-256

    ECDSA

    Current price Q/A

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    3/16

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    4/16

    How do I get Bitcoins?

    21-million Bitcoins

    Designed to be an obtainable resource

    Must be mined

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    5/16

    The Mint

    Central authority that checksevery transaction

    Contradictory?

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    6/16

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    7/16

    Secure Hash Algorithm

    Designed by the U.S. National Security Agency

    (NSA)

    Transforms set of data elements into a fixed-

    length value.

    Verifies integrity of copies without needing to

    derive original data

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    8/16

    SHA-256

    Define

    Preprocessing1. Append the bit 1 to the end of the message, followed by kzero bits, where kis the smallest non-negative solution to the

    equation:

    2. Parse the padded message intoN512-bit blocks:

    3. The initial values of eight 32-bit words are initialized to the first 32 bits of the fractional parts of the square roots of the first

    eight prime numbers:

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    9/16

    SHA-256 cont.

    Steps:

    1. The message schedule is prepared according to the equation:

    2. Initialize the eight 32-bit working variables:

    3. Perform the compression function for t = 0 to 63:

    4. Compute the intermediate hash:

    Final Hash:

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    10/16

    SHA Example

    ASCII string: abc 448(24 + 1) =

    Hex Representation:

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    11/16

    SHA Example Cont.

    SHA-256 initial hash value:

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    12/16

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    13/16

    Elliptic Curve Digital Signature Algorithm

    Public-key pairs

    Key generation

    Signature generation Signature verification

    Weaknesses

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    14/16

    Signature Generation

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    15/16

    Signature Verification

  • 8/13/2019 Evaluating the SHA-256 and Elliptic Curve Digital Signature

    16/16

    References

    http://spectrum.ieee.org/computing/software

    /bitcoin-the-cryptoanarchists-answer-to-cash

    http://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cashhttp://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cash