diff options
| author | J08nY | 2016-12-21 22:59:30 +0100 |
|---|---|---|
| committer | J08nY | 2016-12-21 22:59:30 +0100 |
| commit | 7a982bbb89b15965952058c7cdaecfb68aeff37b (patch) | |
| tree | 38cef1224ffba305267601b2771b59d2f6cbe85d /README.md | |
| parent | fcdbe30e418956c738d614c94992b4e3b351e16d (diff) | |
| download | ecgen-7a982bbb89b15965952058c7cdaecfb68aeff37b.tar.gz ecgen-7a982bbb89b15965952058c7cdaecfb68aeff37b.tar.zst ecgen-7a982bbb89b15965952058c7cdaecfb68aeff37b.zip | |
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 24 |
1 files changed, 23 insertions, 1 deletions
@@ -6,5 +6,27 @@ Currently only supports curves over prime fields. ### Usage -`gen.sh [-l|-s|-p] [num_curves] [prime_size] [timeout]` +#### ecgen +The main binary of the tool, does the hard work. +``` +ecgen [-l|-s|-p] + -l for point with the largest prime order on the curve + -s for point with the smallest prime order on the curve + -p for a generator of the whole curve as well as a smallest prime order point(pubkey) +``` +ecgen then reads three lines of input: +`p` +`a` +`b` +the curve is then specified as `E(Fp): y^2 = x^3 + a x + b mod p` +#### gen.sh +Utility script, uses openssl to generate the *p*, *a*, *b* parameters +required for ecgen. +`gen.sh [-l|-s|-p] [num_curves] [prime_size] [timeout]` +*p* is `prime_size` bits prime number, *a* and *b* are `prime_size` bits +random numbers. +This script will generate `num_curves` curves with random parameters. +It requires a timeout value, as the curve order computation can get really +slow for some unfortunate curve parameters, it is therefore more effective +to skip those after some timeout. |
