-
Notifications
You must be signed in to change notification settings - Fork 330
Readme updates #140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Readme updates #140
Conversation
c2e39d7 to
a21c000
Compare
simo5
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor nits to the language, otherwise looks good.
The RF/power consumption part is a bit dramatic but hey, it's true :)
README.md
Outdated
| 224, 256, 384, and 521 bits. The "short names" for these curves, as known by | ||
| the OpenSSL tool (`openssl ecparam -list_curves`), are: `prime192v1`, | ||
| `secp224r1`, `prime256v1`, `secp384r1`, and `secp521r1`. It also includes the | ||
| 256-bit curve used by Bitcoin, whose short name is `secp256k1`. No other curves |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It also uses the 256-bit curve secp256k1 used by Bitcoin.
README.md
Outdated
| the OpenSSL tool (`openssl ecparam -list_curves`), are: `prime192v1`, | ||
| `secp224r1`, `prime256v1`, `secp384r1`, and `secp521r1`. It also includes the | ||
| 256-bit curve used by Bitcoin, whose short name is `secp256k1`. No other curves | ||
| are included, but it would not be too hard to add support for more curves |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would not be -> is not
README.md
Outdated
| a keypair or signing a message. Note: just loading the private key will cause | ||
| keypair generation. Other operations or attack vectors may also be | ||
| vulnerable to attacks. **For a sophisticated attacker observing just one | ||
| operation with private key will be sufficient to completely |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
with a private key
README.md
Outdated
| is to call `s=sk.to_string()`, and then re-create it with | ||
| `SigningKey.from_string(s, curve)` . This short form does not record the | ||
| curve, so you must be sure to tell from_string() the same curve you used for | ||
| curve, so you must be sure to tell `from_string()` the same curve you used for |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
tell -> pass to
make it a bit more modular and make the output look more like OpenSSL's
use calling convention for open that doesn't leak file descriptors emphasise that SHA-1 is the default signature algorithm add examples with compressed and uncompressed formatting
21dd402 to
e5ae843
Compare
I've seen how-to's that used this library on Raspberry PI, on such embedded platforms that is not an unlikely venue of attack... |
Few things changed since 2008... Update the README and speed.py to make them more current.
fixes #67, fixes #30
Update: