This library is a fork from phpecc/phpecc
, which is itself a fork of mdanter/ecc
.
It should serve as a drop-in replacement for any applications that previously depended
on either method.
By default, this library will attempt to use OpenSSL's implementation first. This requires PHP 8.1+ and OpenSSL 3.0+ to work. OpenSSL's implementation should be constant-time.
When OpenSSL is not available, this library will back to a Pure PHP implementation. There are actually two implementations:
We have taken every effort to harden our fork of this library against side-channel attacks in the "optimized" code.
We cannot guarantee that the generic elliptic curve code is constant-time. We instead urge users to use either OpenSSL's implementation or our constant-time implementation.
If you just need Diffie-Hellman or ECDSA, you should install EasyECC instead of working with this library directly. EasyECC was designed to use PHPECC in a secure-by-default manner.
This library is a rewrite/update of Matyas Danter's ECC library. All credit goes to him.
The library supports the following curves:
Additionally, the following curves are also provided if, and only if, you enable insecure curves:
During ECDSA, a random value k
is required. It is acceptable to use a true RNG to generate this value, but
should the same k
value ever be repeatedly used for a key, an attacker can recover that signing key.
However, it's actually even worse than a simple "reuse" concern. Even if you never reuse a k
value,
if you have any bias in the distribution of bits in k
,
an attacker that observes sufficient signatures can use Lattice Reduction to recover your key.
The HMAC random generator can derive a deterministic k value from the message hash and private key. This provides an unbiased distribution of bits, and is therefore suitable for addressing this concern.
The library uses a non-branching Montgomery ladder for scalar multiplication, as it's constant time and avoids secret dependant branches.
The "optimized" constant-time code uses Complete addition formulas for prime order elliptic curves to avoid side-channels with point addition and point doubling.
This package is released under the MIT license.
You can install this library via Composer :
composer require paragonie/ecc:^2
When sending in pull requests, please make sure to run the make
command.
The default target runs all PHPUnit and PHPCS tests. All tests must validate for your contribution to be accepted.
It's also always a good idea to check the results of the Scrutinizer analysis for your pull requests.
Examples:
The EccFactory
class will, by default, only allow you to instantiate secure elliptic curves.
An elliptic curve is considered secure if one or more of the following is true:
To bypass this guard-rail, simply pass true
to the second argument, like so:
<?php
use Mdanter\Ecc\EccFactory;
use Mdanter\Ecc\Math\GmpMath;
$adapter = new GmpMath();
// This will throw an InsecureCurveException:
// $p192 = EccFactory::getNistCurves($adapter)->generator192();
// This will succeed:
$p192 = EccFactory::getNistCurves($adapter, true)->generator192();
// This will also succeed, without any special considerations:
$p256 = EccFactory::getNistCurves()->generator256();