Skip to content

Document assumptions #242

@gmaxwell

Description

@gmaxwell

The library should provide clear documentation of the strong assumptions that the libraries security rest on. E.g.

  • Secret keys are chosen uniformly at random and in an unpredictable way.
  • Message hashes are the output of a cryptographic hash. (In particular, you can't be caused to sign 0 or verify the signature of 0 (which can be trivially forged))
  • You correctly check the return values of the functions, and correctly supply their inputs
  • The C compiler or computer has not undermined the operation of the software
  • The authors and reviewers of the software made no errors which are not detected by the included tests
  • You obtained a faithful copy of the software
  • Your computers operation is not excessively observable or modifiable by an attacker.
  • The discrete Log problem is hard for the secp256k1 algebraic group
  • The ECDSA signature algorithm is as strong as the discrete log problem

etc.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions