I'm in the process of writing an application that signs binary data for loading
onto a Analog Devices BlackFin microprocessor. These chips have "built in"
support for verification of code. The chip gets loaded with the EC public key,
and then you just update the code and signature on every update.

My problem is with their specific implementation of FIPS 186-2. They specify the parameters as below, and I would like to know which are important, and where do I add them? They use a Koblitz curve for the keys (sect163k1). I'm under the impression that just using the correct curve should be sufficient, but would like
to make sure.

1. m: 163 (dimension of binary field)
2. a: 1
3. b: 1 (a and b are the constants in the elliptic curve equation: y2 + xy = x3 
+ ax + b)
4. Xg: 2FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8
5. Yg: 289070FB05D38FF58321F2E800536D538CCDAA3D9 (Xg and Yg define a point G on the curve above)
6. n: 4000000000000000000020108A2E0CC0D99F8A5EF (n is the order of the point G)
7. k3: 7
8. k2: 6
9. k1: 3 (k1, k2, and k3 specify the field pentanomial x^m + x^k3 + x^k2 + x^k1 
+ 1)

Regards
Fred

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to