Elliptic Curve Cryptography

This module offer cryptographic primitives based on Elliptic Curves. In particular it provides key generation and validation, signing, and verifying, for the following curves:

  • secp160r1
  • secp192r1 (NISTP192)
  • secp224r1 (NISTP224)
  • secp256r1 (NISTP256)
  • secp256k1 (used by Bitcoin)

For an awesome introduction to ECC check here. For an online ECC calculator check here

The module is based on MicroECC patched with functions to enable public key recovery (mainly for blockchain applications).

The module defines the following constants defining curves:

  • SECP160R1
  • SECP192R1
  • SECP224R1
  • SECP256R1
  • SECP256K1
make_keys(curve)

Return a tuple of two elements. The first element is a byte object containing the uncompressed representation of the generated public key. The second element is a byte object containing the representation of the generated public key. curve specifies the curve to use

This function uses the random number generator provided by the VM. For real world usage and enhanced security the random number generator must be of cryptographic quality (generally implemented in hardware).

check_public_key(curve, pbkey)

Return True if pbkey (in uncompressed format) is a valid public key for curve.

derive_public_key(curve, pvkey)

Return a byte object containing the uncompressed representation of the public key matching pvkey for curve curve.

Raise ValueError if derivation is not possible.

compress_key(curve, key)

Return a compressed representation of key.

decompress_key(curve, key)

Return a uncompressed representation of key.

verify(curve, message, signature, pbkey)

Return True if signature is a valid signature for message message given curve and a public key pbkey.

sign(curve, message, pvkey, deterministic = False, recoverable = False)

Return the signature of message with pvkey for curve curve. Usually the message to sign is not the entire message but a hash of it. The deterministic parameter, if given, creates a deterministic signature according to RFC6979 . If given, the deterministic parameter must be an instance of a hash class from module crypto.hash. Deterministic signatures are not dependent on a good random number generator for their security and can therefore be used in hardware without such capabilities. If recoverable is given and True, the returned object is a tuple such that the first element is the recovery id and the second element is the signature. The recovery id is a parameter that can be used to derive the public key from a just a valid signature. For more info refer to this paper.