Elliptic Curve Cryptography¶
This module offer cryptographic primitives based on Elliptic Curves. In particular it provides key generation and validation, signing, and verifying, for the following curves:
-
secp160r1
-
secp192r1 (NISTP192)
-
secp224r1 (NISTP224)
-
secp256r1 (NISTP256)
-
secp256k1 (used by Bitcoin)
For an awesome introduction to ECC check here. For an online ECC calculator check here
The module is based on MicroECC patched with functions to enable public key recovery (mainly for blockchain applications).
The module defines the following constants defining curves:
-
SECP160R1
-
SECP192R1
-
SECP224R1
-
SECP256R1
-
SECP256K1
make_keys(curve)
Return a tuple of two elements. The first element is a byte object containing the uncompressed representation of the generated public key. The second element is a byte object containing the representation of the generated public key. curve
specifies the curve to use
This function uses the random number generator provided by the VM. For real world usage and enhanced security the random number generator must be of cryptographic quality (generally implemented in hardware).
check_public_key(curve, pbkey)
Return True
if pbkey
(in uncompressed format) is a valid public key for curve
.
derive_public_key(curve, pvkey)
Return a byte object containing the uncompressed representation of the public key matching pvkey
for curve curve
.
Raise ValueError
if derivation is not possible.
compress_key(curve, key)
Return a compressed representation of key
.
decompress_key(curve, key)
Return a uncompressed representation of key
.
verify(curve, message, signature, pbkey)
Return True
if signature
is a valid signature for message message
given curve
and a public key pbkey
.
sign(curve, message, pvkey, deterministic = False, recoverable = False)
Return the signature of message
with pvkey
for curve curve
. Usually the message to sign is not the entire message but a hash of it. The deterministic
parameter, if given, creates a deterministic signature according to RFC6979 . If given, the deterministic
parameter must be an instance of a hash class from module crypto.hash
. Deterministic signatures are not dependent on a good random number generator for their security and can therefore be used in hardware without such capabilities. If recoverable
is given and True, the returned object is a tuple such that the first element is the recovery id and the second element is the signature. The recovery id is a parameter that can be used to derive the public key from a just a valid signature. For more info refer to this paper.