STM32 cryptographic firmware ECDSA
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-23 8:13 PM
Hi ST,
What tool generated the following data?Can you send me this tool? thanks.
https://www.st.com/en/embedded-software/x-cube-cryptolib.html
STM32 cryptographic firmware library software expansion for STM32Cube.
The path of the code is as follows:
.\STM32CubeExpansion_Crypto_V4.2.0\Projects\NUCLEO-G474RE\Applications\ECC\ECDSA_SignVerify\Src\main.c
Solved! Go to Solution.
- Labels:
-
Cryptography
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 1:37 PM
https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/digital-signatures
https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/dss2/ecdsa2vs.pdf
https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/dss/186-4ecdsatestvectors.zip (SigGen.txt this vector about 10% into file, grep or search for it)
If you want to replicate, convert the message into a byte array, run SHA-224, check d
Use your signing code, the private key and the random data to recreate the signing, and then verify
Make a "pretty printer" to output info in this format for your own keys or whatever.
This is really just a validation pattern people can use to assure the algo is implemented and working correctly.
Up vote any posts that you find helpful, it shows what's working..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 11:59 AM
Hi Roger0x0000
This post has been escalated to the ST Online Support Team for additional assistance. We'll contact you directly.
Kind Regards
Joe
STMicro Support
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 12:44 PM
Looks to be cut from the NIST test vectors. For some of the newer ones they had .PY scripts too.
But you could test and make your own with things like Micro ECC and there are other Windows tools
Up vote any posts that you find helpful, it shows what's working..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 1:37 PM
https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/digital-signatures
https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/dss2/ecdsa2vs.pdf
https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/dss/186-4ecdsatestvectors.zip (SigGen.txt this vector about 10% into file, grep or search for it)
If you want to replicate, convert the message into a byte array, run SHA-224, check d
Use your signing code, the private key and the random data to recreate the signing, and then verify
Make a "pretty printer" to output info in this format for your own keys or whatever.
This is really just a validation pattern people can use to assure the algo is implemented and working correctly.
Up vote any posts that you find helpful, it shows what's working..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 1:43 PM
I unpacked some in to arrays and annotated
https://community.st.com/t5/stm32-mcus-security/ecc-signature-failure/m-p/657551
Up vote any posts that you find helpful, it shows what's working..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-07-26 7:28 PM
Thank you, currently I am able to calculate these parameters.
