-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to replicate signatures from other implementations / verify correctness? #46
Comments
Have you tried using the I'm also not sure |
Good point on the encoder. I missed that, but added it now. Now my def sign(private_key_bytes: bytes, message_hash_bytes: bytes) -> bytes:
private_key = int.from_bytes(private_key_bytes, byteorder='big')
r, s = ecdsa.sign(
message_hash_bytes.hex(),
private_key,
curve=curve.secp256k1,
prehashed=True,
)
return DEREncoder.encode_signature(r, s) The reason for the call to
|
This looks like a legitimate bug with bytes being passed as pre hashed messages. I’ll need to take a look at the C bindings, they should really be operating on bytes and not strings. Will try to work the issue this weekend. |
I fixed the pre-hashing issue but there's still an issue with the DER encoder generating bad ASN.1 so I'll keep this open. I'll have to look at the implementation, I think that code was from a PR. The tests for the implementation pass but they may not actually be valid, there's some odd corner cases around the most significant bit of the most significant byte being 1 which seem to be trying to handle signed integers (but we only work with unsigned integers since all negative numbers have an equivalent positive number in the field we're working in) On a side note, I strongly dislike exposing pre-hashing in the interface because it confuses the interface massively. What I mean is it's not clear what the function expects for a pre-hashed message... is it bytes? a string? hex encoded (like most hash digests are commonly shown)? an integer? It's not clear because ECDSA is not defined for pre-hashed messages. I may actually end up removing support for this because it's confusing and doesn't have many legitimate uses (just sign the message and indicate the hash algorithm). |
From what I've read, DER encodes all integers as signed integers; it does not distinguish. So if one wants to encode an unsigned integer with a most significant 1 bit, one must prefix it with a zero byte, extending its length by 1. I'm fine if the |
Sorry for the late reply. You're correct, unsigned integers need a leading 0 bit. I'll look into making sure the DER encoding is actually conforming to test vectors. These should be part of the test suite to begin with, seems like the overall encoding tested against known values got missed as a case when initially adding DER encoding. Overriding |
Indeed. You can see my |
I probably should have checked this a lot earlier - The root of the issue is that the raw r and s values of the signatures differ between the libraries. So the mismatch is occurring pre encoding. Do you know if the libraries you're using are using RFC6979 to generate nonces and using sha256 as the hash for the HMAC in that algorithm? |
The libraries I've been testing are
|
I added a test after changing my call to |
Still looking into this, haven’t had too much success root causing. |
Finally figured this one out, issue is with prehashed values. RFC6979 indicates that the message passed to it should be hashed, but prehashed ECDSA interprets this as meaning only if the message is prehashed, so the step isn't applied for prehashed signs. This ended up breaking everything since |
Fixed in 033ab59. Closing this out, let me know if you continue to have issues. |
I install |
It's going to be a bit until the next release (I don't have access to the machine with my signing keys for the time being). But yes, this will be published to pypi in the next release. |
@thejohnfreeman v2.1.1 is now available via pypi with this fix. Sorry it took a while to get this diagnosed and implemented,. |
I can confirm v2.1.2 let me replicate signatures. Thank you! |
I'm looking for a Python library for ECDSA. I need to match the output of projects in other languages using different libraries for ECDSA. I took some known (key, message, signature) "test vectors" from this ECDSA library in Go and was able to replicate them (or at least the first and fourth) with
elliptic
in JavaScript, to verify that they work the same. However, I can't seem to do the same withfastecdsa
.How would you write a function that, given two 32-byte
bytes
values for both the key and the message digest, returns a DER-encodedbytes
signature? I tried this (paraphrased):You can see it failing on the two test vectors I copied from the Go project.
The text was updated successfully, but these errors were encountered: