generateK static method

BigInt generateK(
  1. BigInt order,
  2. BigInt secexp,
  3. HashFunc hashFunc,
  4. List<int> data, {
  5. int retryGn = 0,
  6. List<int>? extraEntropy,
})

Generates a deterministic K value for ECDSA signatures.

This method implements the RFC6979 deterministic K value generation algorithm for use in ECDSA signatures. It takes various input parameters, including the curve order, secret exponent, a hash function, data, and optional extra entropy.

Parameters:

  • order: The order of the elliptic curve.
  • secexp: The secret exponent.
  • hashFunc: A hash function to use in the HMAC operations.
  • data: Additional data for K generation.
  • retryGn: The number of retries allowed in case of invalid K values.
  • extraEntropy: Optional extra entropy for K generation.

Returns:

  • BigInt: The generated deterministic K value.

Details:

  • This method follows the RFC6979 algorithm for deterministic K value generation in ECDSA signatures. It utilizes the provided parameters to create a secure and deterministic K value suitable for ECDSA signature operations.
  • The optional 'extraEntropy' parameter allows you to introduce additional entropy for improved security if needed.
  • The method handles the entire K generation process according to the RFC6979 specifications and returns the generated K value.

Note: The RFC6979 algorithm ensures that K values are generated deterministically and securely, which is essential for cryptographic operations.

Implementation

static BigInt generateK(
    BigInt order, BigInt secexp, HashFunc hashFunc, List<int> data,
    {int retryGn = 0, List<int>? extraEntropy}) {
  final int qlen = order.bitLength;
  final hx = hashFunc();
  final int holen = hx.getDigestLength;
  final int rolen = (qlen + 7) ~/ 8;

  final List<List<int>> bx = [
    BigintUtils.toBytes(secexp, length: BigintUtils.orderLen(order)),
    BigintUtils.bitsToOctetsWithOrderPadding(data, order),
    extraEntropy ?? List.empty(),
  ];

  List<int> v = List<int>.filled(holen, 0);
  v.fillRange(0, holen, 0x01);

  List<int> k = List<int>.filled(holen, 0);

  HMAC hmac = HMAC(hashFunc, k);

  hmac.update(List<int>.from([...v, 0x00]));

  for (final i in bx) {
    hmac.update(i);
  }
  k = hmac.digest();

  hmac.clean();
  hmac = HMAC(hashFunc, k);
  hmac.update(v);
  v = hmac.digest();

  hmac.clean();
  hmac = HMAC(hashFunc, k);
  hmac.update(List<int>.from([...v, 0x01]));

  for (final i in bx) {
    hmac.update(i);
  }
  k = hmac.digest();

  // Step G
  v = HMAC(hashFunc, k).update(v).digest();

  // Step H
  while (true) {
    // Step H1
    List<int> t = List.empty();

    // Step H2
    while (t.length < rolen) {
      v = HMAC(hashFunc, k).update(v).digest();
      t = List<int>.from([...t, ...v]);
    }

    // Step H3
    final BigInt secret = BigintUtils.bitsToBigIntWithLengthLimit(t, qlen);

    if (secret >= BigInt.one && secret < order) {
      if (retryGn <= 0) {
        return secret;
      }
      retryGn -= 1;
    }

    k = HMAC(hashFunc, k).update(List<int>.from([...v, 0x00])).digest();
    v = HMAC(hashFunc, k).update(v).digest();
  }
}