Crates.io | hash-based-signatures |
lib.rs | hash-based-signatures |
version | 0.1.0 |
source | src |
created_at | 2022-11-02 16:20:42.718136 |
updated_at | 2022-11-02 16:20:42.718136 |
description | A command-line tool to sign arbitrary files using hash-based signatures. |
homepage | |
repository | https://github.com/georgwiese/hash-based-signatures |
max_upload_size | |
id | 703588 |
size | 1,136,363 |
A Rust implementation of hash-based signatures.
Disclaimer: This repository is a toy project to play around with Rust and cryptographic primitives. It implements some ideas of Chapter 14 of "A Graduate Course in Applied Cryptography" by Dan Boneh and Victor Shoup.
Hash-based signatures - unlike signature schemes based on RSA or ECC - do not rely on number-theoretic assumptions that are known to be broken by Quantum computers.
Stateless many-time signature schemes can be built in a three-step process:
Install Rust and run:
$ cargo install hash-based-signatures
This gives you a command-line tool that lets you generate keys, sign files, and validate signatures:
To get started with signature verification, check out the example!
To sign files, run:
$ cargo run -- key-gen
This will create a .private_key.json
in your working directory and print the corresponding public key.
Keep it private!
To sign a file, make sure that you have a .private_key.json
in your working directory and run:
$ cargo run -- sign example/readme.md
Last but not least, signatures can also be verified using a web app, based on a Web Assembly compilation of the code: