Crates.io | earthbucks_k256 |
lib.rs | earthbucks_k256 |
version | 0.8.2 |
source | src |
created_at | 2024-10-15 20:50:02.020781 |
updated_at | 2024-10-15 21:35:32.461475 |
description | secp256k1 elliptic curve library written in pure Rust with support for ECDSA signing/verification/public-key recovery, Taproot Schnorr signatures (BIP340), Elliptic Curve Diffie-Hellman (ECDH), and general-purpose secp256k1 elliptic curve group operations which can be used to implement arbitrary protocols |
homepage | https://github.com/RustCrypto/elliptic-curves/tree/master/k256 |
repository | https://github.com/RustCrypto/elliptic-curves |
max_upload_size | |
id | 1410412 |
size | 382,291 |
This is a fork of the RustCrypto project designed to use blake3 for deterministic k and remove all unused dependencies for the EarthBucks project.
secp256k1 (a.k.a. K-256) elliptic curve library written in pure Rust with support for ECDSA signing/verification/public-key recovery, Taproot Schnorr signatures as defined in BIP340, Elliptic Curve Diffie-Hellman (ECDH), and general-purpose secp256k1 elliptic curve group operations which can be used to implement arbitrary group-based protocols.
Uses traits and base types from the elliptic-curve
crate.
Optionally includes a secp256k1 arithmetic
feature providing scalar and
point types (projective/affine) with support for constant-time scalar
multiplication. Additionally, implements traits from the group
crate
which can be used to generically construct group-based protocols.
This crate has been audited by NCC Group, which found a high severity issue in the ECDSA/secp256k1 implementation and another high severity issue in the Schnorr/secp256k1 signature implementation, both of which have since been corrected. We would like to thank Entropy for funding the audit.
This crate has been designed with the goal of ensuring that secret-dependent
secp256k1 operations are performed in constant time (using the subtle
crate
and constant-time formulas). However, it is not suitable for use on processors
with a variable-time multiplication operation (e.g. short circuit on
multiply-by-zero / multiply-by-one, such as certain 32-bit PowerPC CPUs and
some non-ARM microcontrollers).
USE AT YOUR OWN RISK!
ecdh
feature.
Note that this is technically ephemeral secp256k1 Diffie-Hellman
(a.k.a. ECDHE)ecdsa
feature. Support for ECDSA/secp256k1 signing and verification,
applying low-S normalization (BIP 0062) as used in
consensus-critical applications, and additionally supports secp256k1
public-key recovery from ECDSA signatures (as used by e.g. Ethereum)secp256k1 is a Koblitz curve commonly used in cryptocurrency applications. The "K-256" name follows NIST notation where P = prime fields, B = binary fields, and K = Koblitz curves.
The curve is specified as secp256k1
by Certicom's SECG in
"SEC 2: Recommended Elliptic Curve Domain Parameters":
https://www.secg.org/sec2-v2.pdf
secp256k1 is primarily notable for usage in Bitcoin and other cryptocurrencies, particularly in conjunction with the Elliptic Curve Digital Signature Algorithm (ECDSA). Owing to its wide deployment in these applications, secp256k1 is one of the most popular and commonly used elliptic curves.
Rust 1.73 or higher.
Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump.
All crates licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.