python-ecdsa
python-ecdsa copied to clipboard
pure-python ECDSA signature/verification and ECDH key agreement
Use mutation testing to verify if the existing test coverage is good enough. Options: * [cosmic-ray](https://github.com/sixty-north/cosmic-ray) ([docs](https://cosmic-ray.readthedocs.io/en/latest/quickstart.html)) (see also https://github.com/sixty-north/cosmic-ray/issues/484) * [mutmut](https://github.com/boxed/mutmut/)
I'm trying to package your module as an rpm package. So I'm using the typical PEP517 based build, install and test cycle used on building packages from non-root account. -...
A lot of documentation are comments, not documentation strings – they should be changed. Most documentation strings don't actually document what the different arguments are and what the expected outputs...
https://safecurves.cr.yp.to/ is outdated, there are complete point addition and doubling formulas: https://eprint.iacr.org/2015/1060 we should use them to protect against bugs in special case handling
As the code isn't using constant-time algorithms, to make comparisons between different scalar multiplication algorithms meaningful, we need to benchmark the exact same operations (same private keys, same messages, and...
[SEC 1 v2.0](http://www.secg.org/sec1-v2.pdf) specifies ECDSA-Sig-Value structure with 4 values, not two, and one alternative formatting: * ECDSA-Sig-Value with a or y elements * ECDSA-Full-R structure add support for creating those...
related to #131 0.14.1: With just 20 mutants executed in 25 minutes, it's not really useful (the confidence interval is way too large) 0.15-beta (8deb089e7d): Single test suite execution takes...
the PRNG generates a different keystream on Py2 than it does on Python3, as such methods like `randrange_from_seed__trytryagain` are not constant over python versions
While blinding in ECC is not really practical for performance applications, it would be a good teaching opportunity to show how blinding can be performed in ECDSA signatures. the new...
The default curve is `prime192v1` - weak, and deprecated/unusable in TLS 1.3 The default hash is `sha1` - similarly, weak and deprecated/unusable in TLS 1.3 The library should default to...