Skip to content

Commit

Permalink
mv imgs/gifs to assets, cleanup
Browse files Browse the repository at this point in the history
  • Loading branch information
mrdaybird committed Jan 10, 2025
1 parent abd5041 commit 58230aa
Show file tree
Hide file tree
Showing 7 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ license ="MIT OR Apache-2.0"
name ="ronkathon"
repository ="https://github.com/pluto/ronkathon"
version ="0.1.0"
exclude =["CHANGELOG.md", "src/tree/ConstructMerkleTree.gif", "src/dsa/keygen.gif", "src/dsa/sign_and_verify.gif"]
exclude =["CHANGELOG.md", "assets/"]

[dependencies]
rand ="0.8"
Expand Down
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
6 changes: 3 additions & 3 deletions src/dsa/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,13 +26,13 @@ Bobby is the one whose signature is required, so Bobby will run the $\text{Gen(n
Then, the public key, $\text{pk}$, is publicized as belonging to Bobby. This not only provides authentication but also ensures non-repudiation. This one of the critical parts of a secure digital signature scheme.
You can read more on this here: [Public key infrastructure](https://en.wikipedia.org/wiki/Public_key_infrastructure)

![](./keygen.gif)
![](../../assets/keygen.gif)

Now when Alex sends a message(document, contract, etc.), $m$, for Bobby to sign, they compute the signature, $s$ as, $s\leftarrow\text{Sign(sk,m}** and sents $s$ to Alex or any other party who wants to take a look.
Now when Alex sends a message(document, contract, etc.), $m$, for Bobby to sign, they compute the signature, $s$ as, $s\leftarrow\text{Sign(sk,m)}$ and sents $s$ to Alex or any other party who wants to take a look.
Now, any party who wants to see if Bobby signed the document or not, applies the verification algorithm using the public key as $\text{Verify(pk,m,s)}$. Thus Alex or any other party can be sure of the authenicity of
the signature as well as the integrity of the message.

![](./sign_and_verify.gif)
![](../../assets/sign_and_verify.gif)

### When is a signature scheme said to be secure?

Expand Down
4 changes: 2 additions & 2 deletions src/tree/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ To create a Merkle Tree, Bob follows the following steps-
2. In the next step, we concatenate adjacent hashes and hash it again using $H$. Now we are left with 4 hashes.
3. We repeat the last step until a single hash is left. This final hash is called the Merkle root hash.

![](./ConstructMerkleTree.gif)
![](../../assets/ConstructMerkleTree.gif)

Voila!

Expand All @@ -48,7 +48,7 @@ at the current node with the sibling and hash the resultant. Thus, if we are onl
In the image below, the nodes marked in yellow will be part of the Merkle Proof and the red nodes will recomputed during the verification
step.

![](./MerkleProof.png)
![](../../assets/MerkleProof.png)

Merkle Proof, which is a set of hashes, may contain additional information about which branch, left or right, each hash value belonged to.

Expand Down

0 comments on commit 58230aa

Please sign in to comment.