I'm in the process of writing an application that signs binary data for
loading
onto a Analog Devices BlackFin microprocessor. These chips have "built in"
support for verification of code. The chip gets loaded with the EC
public key,
and then you just update the code and signature on every update.
My problem is with their specific implementation of FIPS 186-2. They
specify the
parameters as below, and I would like to know which are important, and
where
do I add them? They use a Koblitz curve for the keys (sect163k1). I'm
under the
impression that just using the correct curve should be sufficient, but
would like
to make sure.
1. m: 163 (dimension of binary field)
2. a: 1
3. b: 1 (a and b are the constants in the elliptic curve equation: y2 + xy = x3
+ ax + b)
4. Xg: 2FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8
5. Yg: 289070FB05D38FF58321F2E800536D538CCDAA3D9 (Xg and Yg define a point G on the
curve above)
6. n: 4000000000000000000020108A2E0CC0D99F8A5EF (n is the order of the point G)
7. k3: 7
8. k2: 6
9. k1: 3 (k1, k2, and k3 specify the field pentanomial x^m + x^k3 + x^k2 + x^k1
+ 1)
Regards
Fred
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org