-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review use of libsecp256k1 contexts #131
Comments
This deserves some major brownie pts, pmconrad, please post a BTS account name. |
Well, since I coded some of it I don't feel like I really deserve it, but... |
Wait, libsecp256k1 supports deterministic signing.
Here is RFC6979 by the way: https://tools.ietf.org/html/rfc6979 So is that extra entropy necessary at all or is it just an optional bonus? I don't understand why context_randomize should be necessary at all? Edit: Apparently, this (bitcoin-core/secp256k1@d227579) is why it is needed. It is to "reduce exposure to potential power/EMI sidechannels". Crazy stuff. Of course, it isn't a threat at all if the attacker isn't physically near the signing device. |
@bytemaster what is the status of this ticket? Is this a real problem, or can I close it? |
This issue was moved to bitshares/bitshares-core#36 |
I stumbled across this bitcoin-core/secp256k1#254 (comment) :
Apparently we need to call context_randomize regularly (for signing), with proper synchronization.
The text was updated successfully, but these errors were encountered: