Questions tagged [ecdsasignature]

14 questions
3
votes
1 answer

P384 Public Key getting "IncorrectParameterSize"

I am working on the ECDSA Algorithm where i am taking signature from the APIs and i have one local public key inside constant file. Below is my code when i am trying to run this and verify the signature then i am getting error in this link let…
Mayank Patel
  • 3,868
  • 10
  • 36
  • 59
1
vote
1 answer

Does python ecdsa NIST-256p provide recovery code (byte)?

I am using the python ecdsa library for signing messages for blockchain transactions. In the blockchain specification it says, for secp256r1 that the signature should have a length of 65 bytes where: The signature must be of length 65 bytes in the…
Frank C.
  • 7,758
  • 4
  • 35
  • 45
0
votes
2 answers

How to create a signature using secp256k1 in Dart the same as in JavaScript code

I am trying to create a signature in Dart using secp256k1. But I am generating different signature as compared to javascript. JavaScript Method as follows: import * as secp from "@noble/secp256k1"; const signature = await secp.sign(msgHash,…
dev
  • 73
  • 3
  • 11
0
votes
1 answer

Why is my ECDSA P-384 signature not different for the same message?

ECDSA P-384 is supposed to have signatures which are different even if the message being signed are the exact same. Why does ECDSA produce different signatures for the same data, whereas RSA doesn't? That seems to work in JavaScript using the Crypto…
0
votes
0 answers

trying to sign the governance and permission certificate using ECDSA based CA certificate in Java for Cyclone DDS

I am trying to sign the governance and permission certificate using ECDSA based CA certificate in Java for Cyclone DDS, Here are couple of references https://www.tabnine.com/code/java/methods/java.security.KeyStore/getCertificate It is using the…
0
votes
0 answers

Can't verify ECDSA signature in Python which generated in Android Studio(Kotlin)

I generate an ECDSA PKI and a signature. I need to verify the signature in Python. But the verifier I make in Python can't verify the signature from android. This is the code I use to generate the PKI and signature. I use secp256r1 curve and…
0
votes
2 answers

ECDSA Signature Verification fails using openssl

I am not able to verify the NIST signature for ECDSA algorithm and below I am presenting the source code for reference. I have tried few vectors available from the ACVP server for testing sample vector for verification Msg = …
0
votes
0 answers

When using ECDSA P-384 for signing and verifying messages, should the public key be also included **INSIDE** the message before signing?

I am using ECDSA P-384 for signing and verifying messages. The messages are basically stringified JSON. Should the public key be included inside the message (aka the JSON which gets stringified)? Or should I send the public key separately along with…
0
votes
0 answers

What is the format of ECDSA Signature used in practical applications?

The output format of ECDSA Signature Algorithm is a tuple (r,s) according to its wiki aticle and other similar sources. But when I triedy the signature generated through their my own algo through standard crypto programming libraries, the signature…
Divyansh
  • 3
  • 3
0
votes
0 answers

Produce different signing messages with ECDSA

I have following code to sign messages with ecdsa library. I am getting different result on each run. import ecdsa from hashlib import sha256 random_number_for_private_key =…
Mahsum Akbas
  • 1,523
  • 3
  • 21
  • 38
0
votes
0 answers

Error while decoding a ecdsa (secp256k1) private key

I created a private key (pem) file using following command openssl ecparam -name secp256k1 -genkey -noout -out ec-secp256k1-priv-key.pem here is the file content. -----BEGIN EC PRIVATE…
KbiR
  • 4,047
  • 6
  • 37
  • 103
0
votes
1 answer

ACME Client Implementation

I am currently working on my own ACME client implementation. I generated the following JWS: {"protected":…
0
votes
0 answers

Is Exposing a ECDSA Signature bad practice?

I'm developing an app that uses ECDSA for identity management, a steep learning curve wrt best practices. Is it wrong or just bad form to leave a signed message visible or discoverable? The data being signed is hashed (or at least, it will be…
Greg Rowles
  • 191
  • 2
  • 11
0
votes
0 answers

Using a Known Nonce to Derive Private Key From Nonce, Signature and Message

I am trying to derive a private key using the formula below: The inputs are: r & s are from the signature. H(m) is a hash of the message being signed. k is the nonce used to sign the message. Below is my code implementation using the npm elliptic…
Isaac Byrne
  • 603
  • 1
  • 7
  • 19