CS297 Proposal
MP3 Base currency system
Timothy Chen (Timchen623@gmail.com)
Advisor: Dr. Chris Pollett
Description:
In the last year crypto-currencies such as
Bitcon have become popular.
This project proposes a new crypto-currency system which
allows music artists to upload their music in MP3 format to the
website that I implement and earn the currency I have create. The currency amount
depends on how long the website users listening to the music.
The technology which I am going to use are JavaScript for the front end of website,
Php for the back end of website,
One way function to do the hash encryption for currency coin.
Schedule:
Week 1:
Jan. 27 to Feb. 4 | Finish the Proposal |
Week 2:
Feb. 4-11 | Read BitCoin paper Bitcoin: A Peer-to-Peer Electronic Cash System |
Week 3:
Feb. 11-18 | Finish read BitCoin paper and install BitCoin wallet |
Week 4,5,6:
Feb. 18 to March 4 | Finish implement simple hash function work in new currency |
Week 7 to 10:
March 18 to Apr. 1 | Finish implement tiger hash and Spring break |
Week 11,12,13:
Apr. 8-29 | Finish implement function computer hash while audio playing |
Week 14:
Apr. 29 to May 6 | Working on 297 report |
Week 15:
May 6-13 | Study for final |
Week 16:
May 13-20 | Finish 297 report |
Deliverables:
The full project will be done when CS298 is completed. The following will
be done by the end of CS297:
1. Read BitCoin paper and install BitCoin wallet
2. Use JavaScript to implement a hash function work in new currency
3. Use JavaScript to implement Tiger hash
4. Use JavaScript to implement function to compute hashes while audio playing
5. A ten page writer report on the progress made in CS297
References:
Satoshi Nakamoto (2009), Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf.
Florian Mendel and Vincent Rijmen, Cryptanalysis of the Tiger Hash Function. Retrieved from https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=31042
SHA-256 Cryptographic Hash Algorithm. Retrieved from http://www.movable-type.co.uk/scripts/sha256.html
Applied Cryptography Second edition, Bruce Schneier 1996
Jeremy Shulman and Jabari, JordanTiger Hash Algorithm. Retrieved from http://www.cs.rit.edu/~ark/fall2012/482/team/u6/presentation1.pdf
Eric Christopher Seidel(November 18, 2003), Tiger Hash Algorithm. Retrieved from http://www.cs.rit.edu/~ark/fall2012/482/team/u6/presentation1.pdf
|