We takes the lowest 16 bits of and donote it as. Where means we take X coordinate of and convert it from to a big integer.ĥ. Generate a random big integer which satisfies. If we use to denote the hash of input data, WinRAR use the following algorithm to perform signing: We use to denote private key, to denote public key. Instead, it use a big integer as the hash of the input message. However, WinRAR doesn't serialize the 5 state values. Generally speaking, the final SHA1 value should be the join of these 5 state values while each of state values is serialized in big-endian. Where are 5 state values when SHA1 outputs. The equation of the elliptic curve that WinRAR uses is The irreducible polynomial of composite field isĪs the standard basis of the composite field, an element in can be denoted asįor clarity, we use, which is a 255-bits-long integer to denote an element in. If we useĪs the standard basis of the ground field, an element in can be denoted as Composite fieldĮlements in ground field are represented with standard basis, i.e. Different to many standard ECDSAs, the curve that WinRAR selected is a curve over composite field. The algorithm it used is a varient of Chinese SM2 digital signature algorithm. WinRAR uses an ECC-based signature algorithm to generate rarreg.key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |