为什么没有人愿意给我资金来支持我的密码签名减轻方案?

1作者: slowdoorsemillc7 天前原帖
以下内容翻译成中文: https://github.com/SlowdoorSemiconductorLLC/CryptographicSignatureMitigationIdea https://www.reddit.com/r/cryptography/s/rp9OUHLjiq 通过在解密后检查填充来减轻密码签名验证问题的想法。 这个想法是在文件的开头添加2048位(可以添加或减少更多或更少的位)。这2048位全部为0。然后,用私钥对文件进行加密。当用正确的公钥解密时,前2048位全部为0,剩余的明文也能正确解密。如果使用错误的公钥进行解密,或者用公钥A解密用不产生公钥A的私钥加密的明文数据,那么前2048位全部为0的概率为1/2^2048。这是解决哈希碰撞的一个方案。 我将这个想法献给公共领域。 为什么我不能被英特尔雇佣来为他们的Boot Guard做贡献? 我的FPGA架构的GoFundMe被GoFundMe(或州政府)删除了。 我被剥夺了亿万富翁的未来。
查看原文
https:&#x2F;&#x2F;github.com&#x2F;SlowdoorSemiconductorLLC&#x2F;CryptographicSignatureMitigationIdea<p>https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;cryptography&#x2F;s&#x2F;rp9OUHLjiq<p>Cryptographic Signature Verification Mitigation Idea by checking padding after decryption.<p>The idea is to add 2048 bits (more or fewer could be added or removed) to the beginning of a file. All 2048 of those bits are 0&#x27;s. Then, encrypt the file with a private key. When decrypted with the right public key, all of the first 2048 bits are 0&#x27;s, as well as the rest of the plaintext being decrypted properly. If decrypting using the wrong public key or decrypting with public key A the plaintext data that has been encrypted with a private key that doesn&#x27;t produce public key A, there is a 1 in 2^2048 chance of the first 2048 bits being all 0&#x27;s. This is a solution to hash collisions.<p>I dedicate this idea to the Public Domain.<p>Why can&#x27;t I be hired by Intel to add to their Boot Guard?<p>My GoFundMe for my FPGA Architecture was taken down by GoFundMe (or the State).<p>I am denied my billionaire future.