Matt Corallo [ARCHIVE] on Nostr: 📅 Original date posted:2018-01-18 📝 Original message:Or make it a part of your ...
📅 Original date posted:2018-01-18
📝 Original message:Or make it a part of your secret-split logic... Gotta love how fast GF(2^8) is:
https://github.com/TheBlueMatt/shamirs/blob/master/main.c#L57On January 17, 2018 3:31:44 PM UTC, Gregory Maxwell via bitcoin-dev <bitcoin-dev at lists.linuxfoundation.org> wrote:
>If the generalization isn't obvious, it might be helpful to make a
>little test utility that tries all possible one byte messages with all
>possible share values using the GF(256) sharing scheme proposed in the
>draft-- in this case information theory is why we can know SSS (and
>similar) have (within their limited scope) _perfect_ security, rather
>than it being a reason to speculate that they might not turn out to be
>secure at all. (or, instead of a test utility just work through some
>examples on paper in a small field).
>
Published at
2023-06-07 18:09:33Event JSON
{
"id": "0618d2f033a1eb27c9475b050e2a4a8b8f6ca2a33661387d6cae7fafbf45143e",
"pubkey": "cd753aa8fbc112e14ffe9fe09d3630f0eff76ca68e376e004b8e77b687adddba",
"created_at": 1686161373,
"kind": 1,
"tags": [
[
"e",
"ac3c87f148ca764c85262d935c0d26818cde51a790aa045223a08240c1ff8e91",
"",
"root"
],
[
"e",
"af661a9436cba7822fc04bf6c0f0025c51a9e70a903b0f6a3bb16724ea6d3358",
"",
"reply"
],
[
"p",
"4aa6cf9aa5c8e98f401dac603c6a10207509b6a07317676e9d6615f3d7103d73"
]
],
"content": "📅 Original date posted:2018-01-18\n📝 Original message:Or make it a part of your secret-split logic... Gotta love how fast GF(2^8) is:\nhttps://github.com/TheBlueMatt/shamirs/blob/master/main.c#L57\n\nOn January 17, 2018 3:31:44 PM UTC, Gregory Maxwell via bitcoin-dev \u003cbitcoin-dev at lists.linuxfoundation.org\u003e wrote:\n\u003eIf the generalization isn't obvious, it might be helpful to make a\n\u003elittle test utility that tries all possible one byte messages with all\n\u003epossible share values using the GF(256) sharing scheme proposed in the\n\u003edraft-- in this case information theory is why we can know SSS (and\n\u003esimilar) have (within their limited scope) _perfect_ security, rather\n\u003ethan it being a reason to speculate that they might not turn out to be\n\u003esecure at all. (or, instead of a test utility just work through some\n\u003eexamples on paper in a small field).\n\u003e",
"sig": "a103831b8831f16986de18d31058232e411fb19f61df8e187f04ffb6a35b237dc8ef0636c4eda00b4de3fff63b053023e871a730aceb61dd5c3fa95c40657ac1"
}