Elliptic Curve Digital Signature Algorithm
Elliptic Curve Digital Signature Algorithm, as defined in FIPS 186-5. Signatures generated by this package are not deterministic, but entropy is mixed with the private key and the message, achieving the same level of security in case of randomness source failure. Operations involving private keys are implemented using constant-time algorithms, as long as an elliptic.Curve returned by elliptic.P224, elliptic.P256, elliptic.P384, or elliptic.P521 is used.
Generate public/private key pairs using NIST P-224 (FIPS 186-3, section D.2.2), also known as secp224r1.
P224:
Private Key
Public Key
Generate public/private key pairs using NIST P-256 (FIPS 186-3, section D.2.3), also known as secp256r1 or prime256v1.
P256:
Private Key
Public Key
Generate public/private key pairs using NIST P-384 (FIPS 186-3, section D.2.4), also known as secp384r1.
P384:
Private Key
Public Key
Generate public/private key pairs using NIST P-521 (FIPS 186-3, section D.2.5), also known as secp521r1.
P521:
Private Key
Public Key
Hash and sign the content given the private key and type. The type must match the private key type and be one of "P224", "P256", "P384", or "P521". A corresponding checksum of "SHA224", "SHA256", "SHA384", or "SHA512" will be used respectively.
Type:
PrivateKey:
Content:
Signature
Verify the signature matches the content hash given the public key and type. The type must match the public key type and be one of "P224", "P256", "P384", or "P521". A corresponding checksum of "SHA224", "SHA256", "SHA384", or "SHA512" will be used respectively.