Basic Blockchains ECC
BasicBlockchains_ECC is a Python library for elliptic curve cryptography. It has all NIST secp curves available by
default and is suitable for use in a cryptographically secure blockchain.
Updates
Version 2.2.0
- Verified previous versions of python using tox
- Package can now be run on python 3.7 and up
Version 2.1.0
- Added compress_point and decompress_point to EllipticCurve class. Uses 0x02 or 0x03 prefix to indicate parity of y
- Added test for new compress/decompress functions. We run through all secp curves, generate a random point and
verify that compression/decompression yields the same random point.
- Added repr method to Class for convenience. Will use JSON for representation of class.
Installation
pip install basicblockchains-ecc
General Usage
The EllipticCurve class can be instantiated using coefficients a and b and an odd prime p. As well, we have the
option to include the group order and a generator point. We use the factory method to
generate curves that can be used for ECC and the ECDSA; this is the CurveFactory class. This class will verify that
- p is prime
- the curve is non_singular
- if the order is given, it's prime
- if p > MAX_PRIME, then the order is not None
- if p <= MAX_PRIME, then the calculated order is prime
- if p <= MAX_PRIME and the curve is instantiated using incorrect order, the curve will replace it with the
calculated order
We hard code the MAX_PRIME value to be the 7th Mersenne prime: 2^19 -1. This value is found in the CurveFactory class.
For p <= MAX_PRIME, we cannot verify the generator point until the curve has been created. Hence, the EllipticCurve
class verifies the generator when the curve is instantiated and handle any exceptions gracefully. It is possible to
create a curve without prime order by instantiating the Elliptic Curve directly, but in this case the generator will
just be a random point and not actually a generator of the group.
from basicblockchains_ecc import elliptic_curve as EC
a = 0
b = 7
p = 43
curve_factory = EC.CurveFactory()
curve = curve_factory.create_curve(a, b, p)
curve.order
31
curve.generator
(13, 21)
curve.add_points((13, 21), (13, 21))
(12, 31)
curve.scalar_multiplication(2, (13, 21))
(12, 31)
random_number = 13
hex_string = '0xaabbcc'
curve.generate_signature(random_number, hex_string)
(25, 1)
public_key = curve.scalar_multiplication(random_number, curve.generator)
curve.verify_signature((25, 1), hex_string, public_key)
True
Cryptographically secure curves
We use the values provided by NIST to generate cryptographically securve curves.
We provide an example below using secp256k1. We use the function provided to get the secp256k1 curve. We then use
the randbits function from the secrets package to generate a 256-bit private key, and the sha256 function from Python's
hashlib package to generate a random hex string. We see that we can generate a valid ECDSA.
from hashlib import sha256
from secrets import randbits
from basicblockchains_ecc import elliptic_curve as EC
crypto_curve = EC.secp256k1()
crypto_curve
{"a": "0x0", \
"b": "0x7", \
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f",\
"order": "0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141",\
"generator": "0x0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"}
hex_string = sha256(b'Random string').hexdigest()
hex_string
'2dc973292d0db59152bb0405e47d85a53ada96bef92ec8eb9c4ddeb762f1907b'
random_number = randbits(256)
hex(random_number)
'0x631d672f03d3e55e77ca5a40c58a5af577d659a355d1f842c9476460cc4ee746'
signature = crypto_curve.generate_signature(random_number, hex_string)
sx, sy = signature
(hex(sx), hex(sy))
('0x695d0be339314478450fadbb8549bdd8e94bfc952cbc53f3e932fddfea1a3edc',
'0xaffdca208bc65962a06b445fbbc4bc27a332710288590667cc41f869889f7380')
public_key = crypto_curve.scalar_multiplication(random_number, crypto_curve.generator)
ux, uy = public_key
(hex(ux), hex(uy))
('0x97db4fa5bd0cfa0b15f4783e7ff90f5a3b25729e3a8857581c06d541c63aeff0',
'0xc15ea3c9584b90f69d818aeed277c74cf869b55550b6b7e7bf9709d550f9d9e')
crypto_curve.verify_signature(signature, hex_string, public_key)
True
Math
Let E(a,b,p) denote the set of rational points of the curve y^2 =
x^3 + ax + b over the finite field F_p, for p an odd prime. We assume
that p > 3 for convenience. From the curve equation, we see that for any x in F_p, a corresponding
y will exist if and only if x is
a quadratic residue modulo p. For this reason, the
cryptomath file will include various quadratic
residue functions.
- We use Euler's criterion to determine if n is a
quadratic residue or non-residue modulo a prime p.
- We use the Legendre symbol to display whether n
is a quadratic residue/non-residue mod p.
- If n is a quadratic residue mod p, we use the Tonelli-Shanks
algorithm to find a value x such that x^2 = n (mod p).
We let 0 denote the 'point at infinity' which is
represented by the value None
in the EllipticCurve class. The set E(a,b,p) along with 0 is an abelian
group G. G will either be cyclic or be the product of two cyclic groups. When the group order is prime, G will be
cyclic and every element except for 0 will be a generator.
More information about elliptic curves:
Tests
We have 4 tests in the test_ecc.py file in the ./tests folder:
- test_curve_functions: creates random curve with small prime using factory and verifies properties
- test_factory: we verify that the CurveFactory class fails for all desired fail conditions
- test_secp_curves: for each secp curve, we verify some necessary curve values as well as the order through scalar
multiplication of a random point
- test_point_compression: for each secp curve, we generate a random point, then verify that compressing and
decompressing it yields the same point
Packages
We use the Python secrets package in the ECDSA to generate a random integer. This is stated by Python to be a
cryptographically secure random number generator. See here
We use the isprime function from the primefac package to verify that various
integers are prime. This is a suitable package for primes of high bit count.
Finally, in the test_ecc folder we use the random function, but this is not used in the EllipticCurve class.
Contributing
If there are any suggested improvements, please submit a request. If any errors are found, please open an issue
immediately.
License
MIT License
Copyright (c) 2022 Basic Blockchains
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the
Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.