github.com/phillinzzz/newBsc@v1.1.6/crypto/ecies/README (about)

     1  # NOTE
     2  
     3  This implementation is direct fork of Kylom's implementation. I claim no authorship over this code apart from some minor modifications.
     4  Please be aware this code **has not yet been reviewed**.
     5  
     6  ecies implements the Elliptic Curve Integrated Encryption Scheme.
     7  
     8  The package is designed to be compliant with the appropriate NIST
     9  standards, and therefore doesn't support the full SEC 1 algorithm set.
    10  
    11  
    12  STATUS:
    13  
    14  ecies should be ready for use. The ASN.1 support is only complete so
    15  far as to supported the listed algorithms before.
    16  
    17  
    18  CAVEATS
    19  
    20  1. CMAC support is currently not present.
    21  
    22  
    23  SUPPORTED ALGORITHMS
    24  
    25          SYMMETRIC CIPHERS               HASH FUNCTIONS
    26               AES128                         SHA-1
    27               AES192                        SHA-224
    28               AES256                        SHA-256
    29                                             SHA-384
    30          ELLIPTIC CURVE                     SHA-512
    31               P256
    32               P384		    KEY DERIVATION FUNCTION
    33               P521	       NIST SP 800-65a Concatenation KDF
    34  
    35  Curve P224 isn't supported because it does not provide a minimum security
    36  level of AES128 with HMAC-SHA1. According to NIST SP 800-57, the security
    37  level of P224 is 112 bits of security. Symmetric ciphers use CTR-mode;
    38  message tags are computed using HMAC-<HASH> function.
    39  
    40  
    41  CURVE SELECTION
    42  
    43  According to NIST SP 800-57, the following curves should be selected:
    44  
    45      +----------------+-------+
    46      | SYMMETRIC SIZE | CURVE |
    47      +----------------+-------+
    48      |     128-bit    |  P256 |
    49      +----------------+-------+
    50      |     192-bit    |  P384 |
    51      +----------------+-------+
    52      |     256-bit    |  P521 |
    53      +----------------+-------+
    54  
    55  
    56  TODO
    57  
    58  1. Look at serialising the parameters with the SEC 1 ASN.1 module.
    59  2. Validate ASN.1 formats with SEC 1.
    60  
    61  
    62  TEST VECTORS
    63  
    64  The only test vectors I've found so far date from 1993, predating AES
    65  and including only 163-bit curves. Therefore, there are no published
    66  test vectors to compare to.
    67  
    68  
    69  LICENSE
    70  
    71  ecies is released under the same license as the Go source code. See the
    72  LICENSE file for details.
    73  
    74  
    75  REFERENCES
    76  
    77  * SEC (Standard for Efficient Cryptography) 1, version 2.0: Elliptic
    78    Curve Cryptography; Certicom, May 2009.
    79    http://www.secg.org/sec1-v2.pdf
    80  * GEC (Guidelines for Efficient Cryptography) 2, version 0.3: Test
    81    Vectors for SEC 1; Certicom, September 1999.
    82    http://read.pudn.com/downloads168/doc/772358/TestVectorsforSEC%201-gec2.pdf
    83  * NIST SP 800-56a: Recommendation for Pair-Wise Key Establishment Schemes
    84    Using Discrete Logarithm Cryptography. National Institute of Standards
    85    and Technology, May 2007.
    86    http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf
    87  * Suite B Implementer’s Guide to NIST SP 800-56A. National Security
    88    Agency, July 28, 2009.
    89    http://www.nsa.gov/ia/_files/SuiteB_Implementer_G-113808.pdf
    90  * NIST SP 800-57: Recommendation for Key Management – Part 1: General
    91    (Revision 3). National Institute of Standards and Technology, July
    92    2012.
    93    http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf
    94