Skip to content

WASM port of tiny-ecdh-wasm, so it can be used in browser JS

License

Notifications You must be signed in to change notification settings

gzalo/tiny-ECDH-wasm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

tiny-ECDH-wasm

WASM port of tiny-ECDH-c, so it can be used in browser JS.

Changes:

  • removed broken ecdsa_* functions
  • ported example to JS

Compilation:

  • Install Emscripten
  • Create the ecdh.js and ecdh.wasm files by running make

Test:

  • Run python3 -m http.server and then go to http://localhost:8000/ecdh_example.html. This is required as ecdh_example.html needs to run in an HTTP server (because wasm files can't be loaded locally)
  • Sample data appears in the JS console

Original readme

This is a small and portable implementation of the Elliptic-Curve Diffie-Hellman key agreement algorithm written in C.

Description from Wikipedia:

Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key. The key, or the derived key, can then be used to encrypt subsequent communications using a symmetric-key cipher. It is a variant of the Diffie–Hellman protocol using elliptic-curve cryptography. `

You can choose between 10 standard NIST curves of different sizes. 5 pseudo-random curves and 5 Koblitz curves providing from 80 to 256 bits symmetrically equivalent security. See ecdh.h for clarification.

You can define the macro ECDH_COFACTOR_VARIANT in ecdh.c to enable the co-factor variant of ECDH for safe non-ephemeral use.

The API is very simple and looks like this (I am using C99 <stdint.h>-style annotated types):

/* NOTE: assumes private is filled with random data before calling */
int ecdh_generate_keys(uint8_t* public, uint8_t* private);

/* input: own private key + other party's public key, output: shared secret */
int ecdh_shared_secret(const uint8_t* private, const uint8_t* others_pub, uint8_t* output);

You need to provide random data for the private key yourself, for the key generation process. See ecdh_example.c for an example of how to use the library.

There is no built-in protection from out-of-bounds memory access errors as a result of malicious input. The two functions ecdh_shared_secret() and ecdh_generate_keys() expect inputs of a certain length. See ecdh.h for clarification.

The module allocates no RAM internally and takes up 2.1K ROM when compiled for ARM (1.4K for Thumb but YMMV). A keypair requires between 72 and 216 bytes of RAM depending on which curve you choose (i.e. how big the underlying base field is).

It is the smallest implementation of ECC in C I've seen yet, but do contact me if you know of something smaller (or have improvements to the code here).

$ arm-none-eabi-gcc -Os -c ecdh.c -mthumb
$ size ecdh.o
   text    data     bss     dec     hex filename
   1413       0       0    1413     585 ecdh.o

I am using the Free Software Foundation, ARM GCC compiler:

$ arm-none-eabi-gcc --version
arm-none-eabi-gcc (4.8.4-1+11-1) 4.8.4 20141219 (release)
Copyright (C) 2013 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

All material in this repository is in the public domain.

TODO:

  • Implement ECDSA signing and verifification.

About

WASM port of tiny-ecdh-wasm, so it can be used in browser JS

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages