Skip to content

Commit

Permalink
define basic terms for crypto operations
Browse files Browse the repository at this point in the history
  • Loading branch information
mastercyb committed Jul 19, 2024
1 parent 9227745 commit 36cdaa4
Show file tree
Hide file tree
Showing 13 changed files with 71 additions and 1 deletion.
2 changes: 2 additions & 0 deletions logseq/.recycle/pages_magic list.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
- list of words for [[casting spells]]
- [origin](https://github.com/bitcoin/bips/blob/master/bip-0039/english.txt)
3 changes: 3 additions & 0 deletions pages/casting spells.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
alias:: casting signals

- [[spell]] and [[signal]]
4 changes: 4 additions & 0 deletions pages/hash.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
- fixed-length [[string]] of characters deterministically generated from input data of any size
- uniquely represents the original data, making it impossible to derive the original input from the hash
- foundational crypto primitive used for data integrity verification of [[particles]] and [[signatures]]
-
2 changes: 2 additions & 0 deletions pages/magic words.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
- list of words for [[casting spells]]
- [origin](https://github.com/bitcoin/bips/blob/master/bip-0039/english.txt)
1 change: 1 addition & 0 deletions pages/neuron.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ tags:: cyber

- [[subject]] of [[information]]
- abstraction over different types of cryptographic virtual addresses which are used in any blockchain
- neuron is derived from [[public key]]
- more technically neurons are
- either can prove correctness of [[signature]]
- or can act as a [[prog]] in accordance to [[consensus]] of [[vimputer]]
Expand Down
9 changes: 9 additions & 0 deletions pages/public key.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
alias:: public

- each [[neuron]] is derived from a public key
- multiple [[neurons]] can be generated from the same public key
- through different encoding schemes or by using different prefixes in various [[vimputers]]
- however, a single [[neuron]] corresponds to a single public key
- public keys are being used behind the scene for [[signing]]
- while [[neurons]] are being used for as shorter, user-friendly representation
- derived from the public key
4 changes: 3 additions & 1 deletion pages/signal.md
Original file line number Diff line number Diff line change
@@ -1 +1,3 @@
alias:: tx, transaction, txs, transactions, signals
alias:: tx, transaction, txs, transactions, signals, signaling

-
6 changes: 6 additions & 0 deletions pages/signature.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
alias:: signatures

- cryptographic method used to prove the authenticity and integrity of [[signals]]
- uses [[asymmetric encryption]] involving a pair of keys
- [[private key]] for [[signing]]
- [[public key]] for [[verification]]
2 changes: 2 additions & 0 deletions pages/signing.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
- process of computing a string by [[neuron]] using [[spell]]
- that prove authenticity and integrity of [[signal]]
21 changes: 21 additions & 0 deletions pages/spell.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
alias:: private key, secret, key, mnemonic

- used in cryptographic operations for [[signaling]] and [[encryption]]
- the only way to own [[tokens]] is to know the spell
- the only way to not lose [[tokens]] is to never lose the spell
- the only way to save [[tokens]] from theft is to never reveal the spell
- gives great power, but requires personal responsibility
- preferably randomly generated [[string]]
- [[moon code]] rules for spells
- always remember your [[keys]]
- never give your keys to anyone
- learn to trust your keys to apps
- verify your keys before using them
- pass down your keys
- notable difference between private key and mnemonic
- private key is [[string]] format
- mnemonic is representation of private key using easy to remember vocabulary
- [bip39](https://github.com/bitcoin/bips/tree/master/bip-0039) is called is [[magic words]]
- ubiquitously used for mnemonic representation of private keys
- contain 2048 common words
- used in [[keplr]], [[frame]], [[cyb-ts]], [[go-cyber]] and numerous crypto software
10 changes: 10 additions & 0 deletions pages/spells.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
alias:: keys, secrets

- personal collection of
- use in [[go-cyber]]
- comand `cyber keys`
- use in [[cyb-ts]]
- go to [cyb.ai/settings/keys](https://cyb.ai/settings/keys)
-
-
-
3 changes: 3 additions & 0 deletions pages/string.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
- sequence of characters, used to represent text in programming and computing
- can include letters, numbers, symbols, and spaces
- strings are used to store and manipulate text data
5 changes: 5 additions & 0 deletions pages/verification.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
- process of computing that statement is true
- example: verification of signature
- given [[neuron]], [[signal]] and [[signature]]
- validators of [[vimputer]] can verify
- that [[signal]] is indeed authenticated by signing [[neuron]]

0 comments on commit 36cdaa4

Please sign in to comment.