Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • The United States Leads the Charge in Bitcoin Adoption: A Rising Correlation with Stock Markets
    • Memecoins Stir Up the Market – CryptoNinjas
    • Meme Coins Are #1 Trend in 2024
    • Top Analyst Now Sees Window of Opportunity for Bitcoin and Altcoins To Pop – But There’s a Catch
    • Toncoin Signals Accumulation Phase as Open Interest Hits Nine-Month Low – What’s Next?
    • Bitget Token Surprises the Market by Rising 813% in 2024: Can You Predict Its 2025 Value?
    • Ethereum Price Approaches Critical Resistance: A Turning Point?
    • DeFi Exploits Plunge 40% In 2024, But Centralized Exchange Losses Soar – Report
    Coin Elites
    • Home
    • Cryptocurrency
    • Crypto News
    • Ethereum
    • Bitcoin News
    • Blockchain
    • Altcoins
    • Shop
    Coin Elites
    Home»Crypto News»Safegcd’s Implementation Formally Verified
    Crypto News

    Safegcd’s Implementation Formally Verified

    dfrancis36By dfrancis36November 25, 2024No Comments5 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    Introduction

    The security of Bitcoin, and other blockchains, such as Liquid, hinges on the use of digital signatures algorithms such as ECDSA and Schnorr signatures. A C library called libsecp256k1, named after the elliptic curve that the library operates on, is used by both Bitcoin Core and Liquid, to provide these digital signature algorithms. These algorithms make use of a mathematical computation called a modular inverse, which is a relatively expensive component of the computation.

    In “Fast constant-time gcd computation and modular inversion,” Daniel J. Bernstein and Bo-Yin Yang develop a new modular inversion algorithm. In 2021, this algorithm, referred to as “safegcd,” was implemented for libsecp256k1 by Peter Dettman. As part of the vetting process for this novel algorithm, Blockstream Research was the first to complete a formal verification of the algorithm’s design by using the Coq proof assistant to formally verify that the algorithm does indeed terminate with the correct modular inverse result on 256-bit inputs.

    The Gap between Algorithm and Implementation

    The formalization effort in 2021 only showed that the algorithm designed by Bernstein and Yang works correctly. However, using that algorithm in libsecp256k1 requires implementing the mathematical description of the safegcd algorithm within the C programming language. For example, the mathematical description of the algorithm performs matrix multiplication of vectors that can be as wide as 256 bit signed integers, however the C programming language will only natively provide integers up to 64 bits (or 128 bits with some language extensions).

    Implementing the safegcd algorithm requires programming the matrix multiplication and other computations using C’s 64 bit integers. Additionally, many other optimizations have been added to make the implementation fast. In the end, there are four separate implementations of the safegcd algorithm in libsecp256k1: two constant time algorithms for signature generation, one optimized for 32-bit systems and one optimized for 64-bit systems, and two variable time algorithms for signature verification, again one for 32-bit systems and one for 64-bit systems.

    Verifiable C

    In order to verify the C code correctly implements the safegcd algorithm, all the implementation details must be checked. We use Verifiable C, part of the Verified Software Toolchain for reasoning about C code using the Coq theorem prover.

    Verification proceeds by specifying preconditions and postconditions using separation logic for every function undergoing verification. Separation logic is a logic specialized for reasoning about subroutines, memory allocations, concurrency and more.

    Once each function is given a specification, verification proceeds by starting from a function’s precondition, and establishing a new invariant after each statement in the body of the function, until finally establishing the post condition at the end of the function body or the end of each return statement. Most of the formalization effort is spent “between” the lines of code, using the invariants to translate the raw operations of each C expression into higher level statements about what the data structures being manipulated represent mathematically. For example, what the C language regards as an array of 64-bit integers may actually be a representation of a 256-bit integer.

    The end result is a formal proof, verified by the Coq proof assistant, that libsecp256k1’s 64-bit variable time implementation of the safegcd modular inverse algorithm is functionally correct.

    Limitations of the Verification

    There are some limitations to the functional correctness proof. The separation logic used in Verifiable C implements what is known as partial correctness. That means it only proves the C code returns with the correct result if it returns, but it doesn’t prove termination itself. We mitigate this limitation by using our previous Coq proof of the bounds on the safegcd algorithm to prove that the loop counter value of the main loop in fact never exceeds 11 iterations.

    Another issue is that the C language itself has no formal specification. Instead the Verifiable C project uses the CompCert compiler project to provide a formal specification of a C language. This guarantees that when a verified C program is compiled with the CompCert compiler, the resulting assembly code will meet its specification (subject to the above limitation). However this doesn’t guarantee that the code generated by GCC, clang, or any other compiler will necessarily work. For example, C compilers are allowed to have different evaluation orders for arguments within a function call. And even if the C language had a formal specification any compiler that isn’t itself formally verified could still miscompile programs. This does occur in practice.

    Lastly, Verifiable C doesn’t support passing structures, returning structures or assigning structures. While in libsecp256k1, structures are always passed by pointer (which is allowed in Verifiable C), there are a few occasions where structure assignment is used. For the modular inverse correctness proof, there were 3 assignments that had to be replaced by a specialized function call that performs the structure assignment field by field.

    Summary

    Blockstream Research has formally verified the correctness of libsecp256k1’s modular inverse function. This work provides further evidence that verification of C code is possible in practice. Using a general purpose proof assistant allows us to verify software built upon complex mathematical arguments.

    Nothing prevents the rest of the functions implemented in libsecp256k1 from being verified as well. Thus it is possible for libsecp256k1 to obtain the highest possible software correctness guarantees.

    This is a guest post by Russell O’Connor and Andrew Poelstra. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    dfrancis36
    • Website

    Related Posts

    Meme Coins Are #1 Trend in 2024

    December 25, 2024

    Avg Active Users Jumped 10% In 2024

    December 25, 2024

    Crypto Staking Classified As Taxable By IRS Amid Legal Dispute

    December 25, 2024

    Singapore Takes the Lead Over Hong Kong in Asia’s Crypto Hub Race – Here’s Why

    December 24, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The United States Leads the Charge in Bitcoin Adoption: A Rising Correlation with Stock Markets

    January 28, 2025

    Memecoins Stir Up the Market – CryptoNinjas

    December 25, 2024

    Meme Coins Are #1 Trend in 2024

    December 25, 2024

    Top Analyst Now Sees Window of Opportunity for Bitcoin and Altcoins To Pop – But There’s a Catch

    December 25, 2024

    Toncoin Signals Accumulation Phase as Open Interest Hits Nine-Month Low – What’s Next?

    December 25, 2024
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto News
    • Cryptocurrency
    • Ethereum
    About us

    Welcome to CoinElites.com, your premier destination for the latest news and insights in the dynamic world of cryptocurrency. Our blog is dedicated to providing you with up-to-the-minute updates and comprehensive analysis on everything related to Crypto News, Bitcoin, Ethereum, and other cryptocurrencies.

    At CoinElites.com, we understand the fast-paced nature of the crypto market and the importance of staying informed. Whether you're an experienced trader, a casual investor, or someone new to the world of digital currencies, our mission is to deliver accurate and relevant information to help you navigate the ever-evolving landscape of cryptocurrency.

    Top Insights

    The United States Leads the Charge in Bitcoin Adoption: A Rising Correlation with Stock Markets

    January 28, 2025

    Memecoins Stir Up the Market – CryptoNinjas

    December 25, 2024

    Meme Coins Are #1 Trend in 2024

    December 25, 2024
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto News
    • Cryptocurrency
    • Ethereum
    • Privacy Policy
    • Disclaimer
    • Terms & Conditions
    • About us
    • Contact us
    Copyright © 2024 Coinelites.com All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.