You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
curve: NIST P-256
private key:
x = C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721
With SHA-256, message = "sample":
k = A6E3C57DD01ABE90086538398355DD4C3B17AA873382B0F24D6129493D8AAD60
r = EFD48B2AACB6A8FD1140DD9CD45E81D69D2C877B56AAF991C34D0EA84EAF3716
s = F7CB1C942D657C41D436C7A1B6E29F65F3E900DBB9AFF4064DC4AB2F843ACDA8
You can find the test for this vector against the p256 implementation here:
(it's possible I adapted the example incorrectly, please double check me on that)
ECDSA signing implementations are free to choose k as they please. You might want to check if cryptography implements RFC6979. Whatever they're doing appears to be deterministic, but may not necessarily match RFC6979.
When running the following code with the Python3 cryptography library:
I get this output:
When running this code
I see this:
What what I can tell the Rust and Python code should be doing the same thing, but I get different
r
ands
values at the end.The text was updated successfully, but these errors were encountered: