skip to content
image/svg+xml Another's blog

ECDSA (Eliptic Curves signatures)

/ 8 min read

An elliptic curve over a finite field Fp\mathbb{F}_{p} is defined by the Weierstrass standard equation:

y2=x3+ax+by^2 = x^3 + ax + b

Where aa and bb are constants that determine the shape of the curve.

These type of curves are used on crypto-systems like ECDSA (Elliptic Curve Digital Signature Algorithm) due to the difficulty of solving the ECDLP (Elliptic Curve Discrete Logarithm Problem).

Eliptic Curve with projective plane

1. Elliptic curves in cryptography

Elliptic curves have gained popularity over classical methods such as RSA because they offer an equivalent or superior level of security with significantly shorter key sizes. For example, a 256-bits key on ECDSA offers a security level comparable to 3072-bits RSA key (See Table 2 of NIST SP 800-57 Part 1 Rev. 5)1. This results in significant savings in bandwidth, computational time, and storage space. Additionally, the ECDLP (Elliptic Curve Discrete Logarithm Problem) is considered harder to solve than the classical DLP (Discrete Logarithm Problem) in integers modulo nn. As a result, with equal computational resources, elliptic curves provide a higher level of security.

2. Group structure in Elliptic Curves

For the construction of the algebraic structure used in ECDSA, we must define an abelian group over the curve.

2.1 Definition of an Abelian group

An abelian group is an algebraic structure (G,\mathbb{G}, \oplus), where:

  • G\mathbb{G} is a non-empty set
  • \oplus is a binary operation defined :G×GG\oplus : \mathbb{G} \times \mathbb{G} \to \mathbb{G}
    Which satisfies the following properties:
    • Associativity: a,b,cG,(ab)c=a(bc)\forall a,b,c \in \mathbb{G}, (a \oplus b) \oplus c = a \oplus (b \oplus c)
    • Identity element: eGaG,ea=ae=a\exists e \in \mathbb{G} \mid \forall a \in \mathbb{G}, e \oplus a = a \oplus e = a
    • Inverse element: aG,bGab=ba=e\forall a \in \mathbb{G}, \exists b \in \mathbb{G} \mid a \oplus b = b \oplus a = e
    • Commutativity: a,bG,ab=ba\forall a,b \in \mathbb{G}, a \oplus b = b \oplus a

2.2 Construction

Over these elliptic curves, we define the algebraic structure of an abelian group as follows: Let CC be an elliptic curve over a field Fp\mathbb{F}_{p} defined by the Weierstrass standard equation

y2=x3+ax+by^2 = x^3 + ax + b

where a,bFpa,b \in \mathbb{F}_{p} and the curve is non-singular (i.e., it has no points with multiple tangents).
Consider the points P=(xp,yp)P = (x_{p},y_{p}) and Q=(xq,yq)Q = (x_{q}, y_{q}) such that P,QCP,Q \in C The binary operation :C×CC\oplus: C \times C \to C is defined as follows:

If PQP \neq Q and xpxqx_{p} \neq x_{ q}:

  1. Calculate the slope between PP and QQ
m=yqypxqxpm = \frac{y_{q}- y_{p}}{x_{q}-x_{p}}
  1. Calculate coordinates of the point RR
xr=m2xpxqyr=m(xpxr)ypx_{r } = m^2-x_{p}-x_{q} \qquad y_{r} = m(x_{p}-x_{r})-y_{p}

Thus:

PQ=(xr,yr)=RP \oplus Q = (x_{r}, y_{r}) = R

If P=QP = Q: the slope between PP and QQ is the derivative of the curve at xpx_{p}:

y2=x3+ax+b.y^2=x^3+ax+b.

Taking the derivative:

2ydydx=3x2+a2y\frac{dy}{dx} = 3x^2 + a dydx=3x2+a2y    m=3xp2+a2yp\frac{dy}{dx} = \frac{3x^2+a}{2y} \implies m = \frac{3x_{p}^2 + a}{2y_{p}}

Substituting mm gives:

PQ=PP=2P=(xr,yr)P \oplus Q = P \oplus P = 2P = (x_{r},y_{r})

We define a point O\mathcal{O} at infinity on the projective plane, this point satisfies the following properties:

PO=POQ=QP \oplus \mathcal{O} = P \qquad \mathcal{O} \oplus Q = Q

If P=(x,y)P = (x, y) and Q(x,y)Q(x,-y) then:

PQ=OP \oplus Q = \mathcal{O}

The point O\mathcal{O} serves as the neutral element, ensuring the structure is an abelian group.

Scalar multiplication in this structure is defined as follows: Given a point PCP \in C and a scalar kZk \in \mathbb{Z}:

kP=n=1kPP(mod p)k\cdot P = \sum_{n=1}^{k} P \oplus P \qquad (\text{mod } p) Eliptic Curve operations

3. The security of Elliptic Curves: ECDLP (Elliptic Curve Discrete Logarithm Problem)

The security on this signature scheme relies entirely on the ECDLP, which is defined as follows:

  • Given an elliptic curve CC over the finite field Fp\mathbb{F}_{p}, a generator point GG on the curve, and a point PP on the curve, find the integer kk such that P=kGP = k \cdot G

For carefully selected finite fields, there is not efficient solution to this problem.

Scalar multiplication on an elliptic curve over a finite field Fp\mathbb{F}_{p} is analogous to exponentiation in the multiplicative group Zp\mathbb{Z}_{p} (Integers modulo pp), for example:.

kG=GGGk times=Pk \cdot G = \underbrace{G \oplus G \oplus \dots \oplus G}_{k \text{ times}} = P

mirrors the operation in Zp\mathbb{Z}_{p}

i=1ka=ak mod p=b\sum_{i=1}^{k} a = a ^ k \text{ mod } p = b

Thus, the ECDLP is analogous to DLP (Discrete logarithm problem) in Zp\mathbb{Z}_{p}.

However, the best known algorithms for ECDLP have roughly exponential complexity, unlike DLP in some groups where subexponential algorithms are known. As a result, breaking ECDLP is widely believed to be harder at equivalent key sizes.

Note that the difficult of ECDLP depends largely on the size of the field Fp\mathbb{F}_{p} and the rigorous selection of the curve, such as secp256k1.

4. Cryptographic keys in Elliptic curves

4.1 Private keys

Private keys are integers selected within the range of the curve size, generally are integers of 256-bit. The generation of these keys is extremely fast and efficient.

4.2 Public keys

The public keys are points on the elliptic curve, defined by their coordinates (x,y)(x,y). Due the properties of this family of curves, the points can be expressed in a compressed format using only a single coordinate xx and a flag indicating whether yy is positive or negative. Therefore, a 256-bit private key corresponds to a 257-bit public key.

4.3 Generator and order

On an elliptic curve CC, a point GG (generator), an integer nn (order) are defined; nn represents the number of points over the curve. For a generator GG, there exists an rZ+r \in \mathbb{Z}^+ such that rG=Or \cdot G = O where rnr \mid n. This rr is called the order of the subgroup generated by GG. GG is a generator of the entire group if r=nr = n.

4.4 Key derivation

Given a elliptic curve CC and a generator point GG, let kk be an integer (Private key). It is possible to compute a point on the curve.

P=kGP = k\cdot G

This operation consists of summing the point GG with itself kk times.

Note that calculate kk given the points GG and PP is computationally infeasible because:

  1. There is no defined inverse operation in the group that allows k=PGk = \frac{P}{G}
  2. The only known methods to determine kk are through brute force or specialized algorithms, ensuring the security of the system.

This process is described in greater detail in Digital Signature Standard (DSS)2

5. ECDSA: Digital signatures with Elliptic Curves

It is important to use well-known and rigorously selected elliptic curves to avoid security breaches, such as the widely used secp256k1.

Below, we outline the ECDSA algorithm, based on Practical Cryptography For Developers3

5.1 Generation

The process for signing a message is as follows:

  1. Compute the hash of the message (mm) with SHA-256 (Secure Hash Algorithm) h=hash(m)h = \text{hash}(m)
  2. Generate a random integer cc in the range [1,n1][1, n-1] where nn is the order of the curve.
  3. Compute the point R=cGR = c \cdot G. Take the xx coordinate of the point RR and assign it to rr
  4. Calculate the signature proof:
s=c1(h+rk) mod ns = c^{-1} (h + r \cdot k) \text{ mod } n

where c1c^{-1} is the modular inverse of cc satisfying cc1=1 mod nc \cdot c^{-1} = 1 \text{ mod } n and kk is the private key of the signer.

  1. The signature is the pair (r,s)(r,s)

5.1.1 Considerations

Note that if the random number cc is generated with low entropy—meaning it is predictable or reused—the system becomes vulnerable to leaking the signer’s private key.

5.2 Verification

To verify the signature, the message mm, the public key PP and the signature (r,s)(r,s) are taken as input. The process is as follows:

  1. Compute the hash of the message (mm) using SHA-256 (Secure Hash Algorithm) h=hash(m)h = \text{hash}(m)
  2. Compute the modular inverse of the signature proof s1 mod ns^{-1} \text{ mod } n
  3. Attempt to recover the random point RR used during the signature. Define: R=(hs1)G+(rs1)PR' = (h \cdot s^{-1}) \cdot G + (r \cdot s^{-1}) * P
  4. Take the xx coordinate of the recovered point RR' as rr'
  5. The signature is valid if r=rr' = r.

It is also possible to recover then public key PP from the signature.

5.2.1 Considerations

Note that finding rr and ss through brute force is totally infeasible.

5.3 Implementation

The following is an example of the ECDSA algorithm implemented in Solidity.

function verifySignature(bytes32 message, uint8 v, bytes32 r, bytes32 s) public view returns (bool) {
bytes32 hash = sha256(abi.encodePacked(message));
return ecrecover(hash, v, r, s) == msg.sender;
}

6. Conclusion

The elliptic curves offers high security and efficiency for cryptographic purposes due to their algebraic-geometric structure, which complicates the development of algorithms capable of solving the ECDLP quickly. On the other hand, ECDSA uses shorter keys than other equivalent systems, such as RSA, which has made ECDSA a standard in the cryptography industry.

6.1 References

Footnotes

  1. NIST, “Recommendation for Key Management: Part 1 – General (Rev. 5),” NIST Special Publication 800-57 Part 1 Rev. 5, 2020. [Online]. Available: https://doi.org/10.6028/NIST.SP.800-57pt1r5.

  2. NIST, “Digital Signature Standard (DSS),” Federal Information Processing Standards Publication 186-4, Section 6, pp. 15-22, July 2013. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.

  3. Svetlin Nakov, “ECDSA: Sign and Verify Messages,” Cryptobook, [Online]. Available: https://cryptobook.nakov.com/digital-signatures/ecdsa-sign-verify-messages. [Accessed: Dec. 12, 2024].

Feel free to contribute or suggest corrections here