Implementing curve agnostic Elliptic Curve Signatures from scratch in Rust
If Bob wants to talk to Alice over an insecure channel, can he guarantee the messages come from her? The answer is yes, one method for achieving this is the Elliptic Curve Digital Signature Algorithm (ECDSA). In the modern day, ECDSA is used in a variety of applications to ensure the integrity of messages passed over insecure channels, including Bitcoin, and Ethereum. This is a post on building a rust implementation of ECDSA over finite fields of order p, where the underlying curve is an arbitrary specified elliptic curve. Very little high level maths is assumed, and the content should be fairly accessible to people with little prior maths knowledge. It is not a rigorous treatment of elliptic curves in general, and the code provided is not guaranteed to be cryptographically secure.
We will cover 3 sections, finite fields, elliptic curves, and finally ECDSA. Each section inherits from the previous, the objects’ implementations are provided and explained in situ with their maths.
Finite Fields
Before we can go on, understanding the rest of this blog hinges on “fields”, these are a set of objects where you can do basic operations like adding, subtracting, multiplying, and dividing, and these operations behave in the way you expect.
Fields in general
A Field is a set of “elements” that are endowed with two associated “relations” these operations act as one would expect (addition and multiplication on the real numbers).
- If and are in your set then both and are in your set
- There exists an element such that for all in your set
- There exists an element such that for all in your set
- If is in your set, then is also in your set such that and is denoted by
- If is in your set and is not , then is also in your set such that
These operations also follow a couple of “nice” rules
- Associativity, for all we have and
- Commutativity, for all we have and
- Distributivity, for all we have
Fields mod p
The specific type of field that we will consider here will be , where is a prime number, the set of numbers we consider is , and work like normal addition but “wrap around” at . This keeps all our numbers inside our set. A clock gives is a good way to imagine this. On a 12-hour clock:
- After 12 o’clock, it “wraps around” and starts again at 1. So, if it’s 11 o’clock and we add 2 hours, we don’t get 13—we get 1 o’clock again.
This is similar to how mod p works, but instead of wrapping around after 12, we wrap around after p , which is any prime number (e.g., 5, 7, 11).
Implementation Details
The implementation of our finite field arithmetic can be found in fpelem.rs
. Here we go over the key functions.
Modular Subtraction (sub_mod
)
For subtraction, we handle the case where a < b by adding the modulus, otherwise just doing regular subtraction:
1if a >= b {
2 return a - b;
3} else {
4 return m - b + a;
5}
This was grabbed from here
Modular Addition (add_mod
)
Addition in a finite field needs to wrap around at p. Rather than implementing this directly, we use a clever trick:
1if b == 0 {
2 return a
3}
4let b = m - b;
5sub_mod(a, b, m)
This converts addition into subtraction, allowing us to reuse the subtraction logic.
Modular Multiplication (mul_mod
)
Multiplication is implemented using the binary expansion method. This works by breaking down multiplication into repeated addition based on the binary representation of numbers. 13 × 7 as an example:
- First convert 13 to binary:
- Now this means we can rewrite 13 as:
- Therefore:
In our implementation, we:
- Look at each bit of the multiplier (13 in our example)
- If the bit is 1, add the current value of the multiplicand (7 in our example)
- Double the multiplicand for the next bit position
This is much more efficient than adding the number to itself repeatedly!
Modular Inverse (mul_inv
)
We use the extended Euclidean algorithm to find multiplicative inverses. This involves keeping track of the coefficients in Bézout’s identity while running the Euclidean algorithm. The implementation uses a custom signed integer type to handle negative numbers during the computation. Read more about the algorithm here.
Modular Exponentiation (pow_mod
)
Similar to multiplication, we use the binary expansion method:
- Convert the exponent to binary
- For each 1 bit, multiply by the current value
- Square the current value at each step
All these operations are wrapped in the FpElem<T>
struct which represents an element in our finite field. The implementation is generic over any unsigned integer type that implements basic arithmetic operations (defined by the GenericUInt
trait).
The complete implementation can be found in fpelem.rs
.
Elliptic Curves
An elliptic curve is a mathematical object that consists of points in a field satisfying an equation of the form:
Where and are constants that define the shape of the curve. When we work with elliptic curves in cryptography, we use points whose coordinates are elements of our finite field .
Point Addition
The most important operation on elliptic curves is point addition. Given two points and on the curve, we can define a third point using the following geometric construction:
- Draw a line through points and
- Find where this line intersects the curve at a third point
- Reflect this point across the x-axis
When working in , this geometric intuition translates into algebraic formulas:
For and , where:
then in terms of :
and
Properties
Elliptic curve point addition has several important properties:
- It is associative:
- It has an identity element (the “point at infinity” - this can come from when both and )
- Every point has an inverse (its reflection across the x-axis)
- Addition is commutative:
The Discrete Logarithm Problem
The security of elliptic curve cryptography relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP). This problem can be stated as:
Given a point on an elliptic curve and another point (where means adding to itself times), find the value of .
Importantly:
- We have a “generator point”
- We perform “scalar multiplication” by adding to itself times
- Given only and , finding is computationally infeasible for large values
To be continued…