The next is taken from downside 3 in HW1 of CS 251 Stanford’s course (https://cs251.stanford.edu/syllabus.html).
Alice is on a backpacking journey and is apprehensive about her units containing non-public keys getting stolen. She needs to retailer her bitcoins in such a manner that they
will be redeemed through data of a password P. Accordingly, she shops them within the following
ScriptPubKey handle:
OP_SHA256
<0xeb271cbcc2340d0b0e6212903e29f22e578ff69b>
OP_EQUAL
-
Write a ScriptSig script that may efficiently redeem this UTXO given the password P.
Trace: it ought to solely be one line lengthy. -
. Suppose Alice chooses a six character password P. Clarify why her bitcoins will be stolen
quickly after her UTXO is posted to the blockchain. Chances are you’ll assume that computing SHA256
of all six character passwords will be completed in cheap time. -
Suppose Alice chooses a powerful 30 character passphrase P. Is the ScriptPubKey above a
safe strategy to defend her bitcoins? Why or why not?
Trace: cause by means of what occurs when she tries to redeem her bitcoins
My makes an attempt/doubts:
-
The non-public key must be 256 bit quantity, I do not see learn how to join this with ANY password P to acquire the ScriptSig composed of personal and public key. Additionally ought to’t the hashed model of the general public key correspond to eb271cbcc2340d0b0e6212903e29f22e578ff69b?
-
Comparable doubt as in 1)
-
Funds will be stolen by the node that sees the transaction?
