Proof of private key ownership in practice, meaning keypairs are mathematically linked to prove that one person owns both, seems like something I'll need to figure out with a foundation that I understand better. pem into SHA256 HEX with the following code for the private key, but I'm not sure if it loses its mathematical relationship with the public key, that I'm apparently not sure how to also produce as 64chr HEX for that is mathematically associated and usable for cryptographically signing data. I'd like to replicate this and have it work in tandem with everything else I need to do, e.g. Number 3 is in a close second because it appears to allow me to convert keys to. Number 2 is what I'm most interested in since I am working on a blockchain. Generate ECDSA Key and Get Details as XML Generate an ECC Key (Public and Private)ģ. Bob signs a digital signature with his private key and signals it to the blockchain network, they form consensus that Bob does own the private key, based on being able to decrypt his message with his public key, allowing miners or network operators to positively ID the client.ġ. I need to use them for digital signatures primarily e.g. I've been experimenting with Chilkat features. I need to figure out how to create and retrieve 64 character sha256 hashes. CouttsYeah I'm apparently trying to use secp256r1 from within Chilkat. When looking at third party solutions, keep in mind that the only thing considered secure these days is TLS 1.2 or better. If not, I may have questions and maybe more $20 BTC bounties Generating Keypairs, Signing Messages and then Authenticating Signed Messages, but if I am able to make one I will drop it in this thread. I'm not sure if there are any solid examples of Capicom doing exactly this. Update: I'm going to see how far I manage to get with this and will report back tomorrow. I'm a junkie for speed optimization.īad news: This appeared to be about the most relevant, easy to use solution - it just didn't work on my computer despite a couple of installs. I think it'll run on Vista to WS2019 or so, and might actually end up being pretty fast. Good News: I believe this is one of the final areas for me to nail down before I can program and deploy the VB6 blockchain. I'm not sure how to associate public and private keys together with a "mathematical relationship" and tie that into Alice authenticating that Bob has access to the private key associated with his public key. With only a surface level understanding of many areas of crypto, there's a learning curve (heh) for me at this step. Welcome to Episode 3 of "Backflip codes the world's first and last blockchain in VB6."
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |