A class for elliptic curve cryptography
Project description
Basic Blockchains ECC
BasicBlockchains_ECC is a Python library for elliptic curve cryptography. It has all NIST secp curves available by default and is suitable for use in a cryptographically secure blockchain.
Updates
Version 2.2.0
- Verified previous versions of python using tox
- Package can now be run on python 3.7 and up
Version 2.1.0
- Added compress_point and decompress_point to EllipticCurve class. Uses 0x02 or 0x03 prefix to indicate parity of y
- Added test for new compress/decompress functions. We run through all secp curves, generate a random point and verify that compression/decompression yields the same random point.
- Added repr method to Class for convenience. Will use JSON for representation of class.
Installation
pip install basicblockchains-ecc
General Usage
The EllipticCurve class can be instantiated using coefficients a and b and an odd prime p. As well, we have the option to include the group order and a generator point. We use the factory method to generate curves that can be used for ECC and the ECDSA; this is the CurveFactory class. This class will verify that
- p is prime
- the curve is non_singular
- if the order is given, it's prime
- if p > MAX_PRIME, then the order is not None
- if p <= MAX_PRIME, then the calculated order is prime
- if p <= MAX_PRIME and the curve is instantiated using incorrect order, the curve will replace it with the calculated order
We hard code the MAX_PRIME value to be the 7th Mersenne prime: 2^19 -1. This value is found in the CurveFactory class.
For p <= MAX_PRIME, we cannot verify the generator point until the curve has been created. Hence, the EllipticCurve class verifies the generator when the curve is instantiated and handle any exceptions gracefully. It is possible to create a curve without prime order by instantiating the Elliptic Curve directly, but in this case the generator will just be a random point and not actually a generator of the group.
from basicblockchains_ecc import elliptic_curve as EC
# Set constants - known to generate curve of prime group order
a = 0
b = 7
p = 43
# Create factory
curve_factory = EC.CurveFactory()
# Create curve
curve = curve_factory.create_curve(a, b, p)
# Prime order
curve.order
31
# Random generator point chosen
curve.generator
(13, 21)
# Add points
curve.add_points((13, 21), (13, 21))
(12, 31)
# Scalar multiplication
curve.scalar_multiplication(2, (13, 21))
(12, 31)
# Generate ECDSA signature
random_number = 13 # Acts as private key
hex_string = '0xaabbcc'
curve.generate_signature(random_number, hex_string)
(25, 1)
# Validate ECDSA signature
public_key = curve.scalar_multiplication(random_number, curve.generator)
curve.verify_signature((25, 1), hex_string, public_key)
True
Cryptographically secure curves
We use the values provided by NIST to generate cryptographically securve curves.
We provide an example below using secp256k1. We use the function provided to get the secp256k1 curve. We then use the randbits function from the secrets package to generate a 256-bit private key, and the sha256 function from Python's hashlib package to generate a random hex string. We see that we can generate a valid ECDSA.
from hashlib import sha256
from secrets import randbits
from basicblockchains_ecc import elliptic_curve as EC
# Get secp256k1 directly
crypto_curve = EC.secp256k1()
# Agrees with NIST values
crypto_curve
{"a": "0x0", \
"b": "0x7", \
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f",\
"order": "0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141",\
"generator": "0x0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"}
# Random hex string
hex_string = sha256(b'Random string').hexdigest()
hex_string
'2dc973292d0db59152bb0405e47d85a53ada96bef92ec8eb9c4ddeb762f1907b'
# Random number for private_key
random_number = randbits(256)
hex(random_number)
'0x631d672f03d3e55e77ca5a40c58a5af577d659a355d1f842c9476460cc4ee746'
# Generate signature
signature = crypto_curve.generate_signature(random_number, hex_string)
sx, sy = signature
(hex(sx), hex(sy))
('0x695d0be339314478450fadbb8549bdd8e94bfc952cbc53f3e932fddfea1a3edc',
'0xaffdca208bc65962a06b445fbbc4bc27a332710288590667cc41f869889f7380')
# Get public key
public_key = crypto_curve.scalar_multiplication(random_number, crypto_curve.generator)
ux, uy = public_key
(hex(ux), hex(uy))
('0x97db4fa5bd0cfa0b15f4783e7ff90f5a3b25729e3a8857581c06d541c63aeff0',
'0xc15ea3c9584b90f69d818aeed277c74cf869b55550b6b7e7bf9709d550f9d9e')
# Validate signature
crypto_curve.verify_signature(signature, hex_string, public_key)
True
Math
Let E(a,b,p) denote the set of rational points of the curve y^2 = x^3 + ax + b over the finite field F_p, for p an odd prime. We assume that p > 3 for convenience. From the curve equation, we see that for any x in F_p, a corresponding y will exist if and only if x is a quadratic residue modulo p. For this reason, the cryptomath file will include various quadratic residue functions.
- We use Euler's criterion to determine if n is a quadratic residue or non-residue modulo a prime p.
- We use the Legendre symbol to display whether n is a quadratic residue/non-residue mod p.
- If n is a quadratic residue mod p, we use the Tonelli-Shanks algorithm to find a value x such that x^2 = n (mod p).
We let 0 denote the 'point at infinity' which is
represented by the value None
in the EllipticCurve class. The set E(a,b,p) along with 0 is an abelian
group G. G will either be cyclic or be the product of two cyclic groups. When the group order is prime, G will be
cyclic and every element except for 0 will be a generator.
More information about elliptic curves:
Tests
We have 4 tests in the test_ecc.py file in the ./tests folder:
- test_curve_functions: creates random curve with small prime using factory and verifies properties
- test_factory: we verify that the CurveFactory class fails for all desired fail conditions
- test_secp_curves: for each secp curve, we verify some necessary curve values as well as the order through scalar multiplication of a random point
- test_point_compression: for each secp curve, we generate a random point, then verify that compressing and decompressing it yields the same point
Packages
We use the Python secrets package in the ECDSA to generate a random integer. This is stated by Python to be a cryptographically secure random number generator. See here
We use the isprime function from the primefac package to verify that various integers are prime. This is a suitable package for primes of high bit count.
Finally, in the test_ecc folder we use the random function, but this is not used in the EllipticCurve class.
Contributing
If there are any suggested improvements, please submit a request. If any errors are found, please open an issue immediately.
License
MIT License
Copyright (c) 2022 Basic Blockchains
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file basicblockchains_ecc-2.2.0.tar.gz
.
File metadata
- Download URL: basicblockchains_ecc-2.2.0.tar.gz
- Upload date:
- Size: 15.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e56c920baa08ae6e51c68b6697394dd39d2d3da3524cbc2fd2d46d015e868c44 |
|
MD5 | 83cefa97488c62b0bdaec284fc2c71d4 |
|
BLAKE2b-256 | fc875cd918e0a1914a261dab5c9b12e53ebfad3f9cbc2bc4e753b60121afc55f |
File details
Details for the file basicblockchains_ecc-2.2.0-py3-none-any.whl
.
File metadata
- Download URL: basicblockchains_ecc-2.2.0-py3-none-any.whl
- Upload date:
- Size: 13.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 01eeb9e6d8d0be4df80996ca0045c8a223fb634faae2674cf06510e8da9534d9 |
|
MD5 | 1e90ecb081b7470039186884842ac89b |
|
BLAKE2b-256 | 7ba9b04795e4d89c935e146909abb3f349063e844b206ccb5138ba60c9c38e5f |