Close Menu
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain
  • Web 3
    • NFT
    • Metaverse
  • Regulation
  • Analysis
  • Learn
  • Blog
What's Hot

Tether unveils developer grant program to fund on-device AI and open-source payment tools

2026-05-14

Why this could be bullish

2026-05-14

XRP price remains lower as buyers remain on the sidelines

2026-05-14
Facebook X (Twitter) Instagram
  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
Facebook X (Twitter) Instagram
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain

    Tether unveils developer grant program to fund on-device AI and open-source payment tools

    2026-05-14

    Google BigQuery adds support for ZeroG On-Chain data analytics

    2026-05-14

    Ondo brings tokenized US equities to Hyperliquid’s HyperEVM

    2026-05-13

    Ronin moves from independent sidechain to Ethereum layer 2

    2026-05-13

    Chainlink adds 10 new integrations, including Bermuda’s Central Bank and State Street

    2026-05-13
  • Web 3
    • NFT
    • Metaverse
  • Regulation

    CLARITY Act faces more than 100 changes as bankers send 8,000 demand letters against stablecoin rewards

    2026-05-13

    Bank lobbyists battle Clarity Act, saying bill would risk ‘flight from bank deposits’ to payment stability

    2026-05-12

    Het Witte Huis onthult dat Amerikaanse banken ‘weigerden’ bijeenkomsten bij te wonen om het probleem met stablecoin-beloningen in de CLARITY Act op te lossen

    2026-05-11

    Progress on the CLARITY Act markup now depends on these Democratic lawmakers

    2026-05-11

    Authorities abruptly shut down lender in Georgia after second bank failure of 2026

    2026-05-11
  • Analysis

    XRP price remains lower as buyers remain on the sidelines

    2026-05-14

    Dogecoin (DOGE) breaks away from the pack as momentum turns aggressive

    2026-05-14

    Bitcoin price falls further below $80,000 – bears tighten their grip on the market

    2026-05-13

    Trump’s CEO-Packed China Visit Could Decide Whether Bitcoin’s $80,000 Risk Rally Survives This Week

    2026-05-13

    Trump’s CEO-Packed China Visit Could Decide Whether Bitcoin’s $80,000 Risk Rally Survives This Week

    2026-05-13
  • Learn

    AI Agent by Changelly: automated crypto swaps and no-code API integration

    2026-05-13

    Parabolic SAR Crypto Guide: Signals, Settings, and Risks

    2026-05-13

    What Is the Average Directional Index (ADX) in Crypto?

    2026-05-12

    Mean Reversion Trading in Crypto: Strategies, Signals, and Risks

    2026-05-12

    Moving Averages in Crypto Explained: SMA, EMA & Crossovers

    2026-05-12
  • Blog
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
Home»Blockchain»Safegcd implementation formally verified
Blockchain

Safegcd implementation formally verified

2024-11-26No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Introduction

The security of Bitcoin and other blockchains, such as Liquid, depends on the use of digital signature algorithms such as ECDSA and Schnorr signatures. The AC library called libsecp256k1, named after the elliptic curve on which the library operates, is used by both Bitcoin Core and Liquid to provide these digital signature algorithms. These algorithms use a mathematical calculation called a modular invertedwhich is a relatively expensive part of the calculation.

In “Fast constant-time gcd computation and modular inversion”, Daniel J. Bernstein and Bo-Yin Yang develop a new modular inversion algorithm. In 2021, this algorithm, also called ‘safegcd’, was implemented for libsecp256k1 by Peter Dettman. As part of the vetting process for this new algorithm, Blockstream Research was the first to complete a formal verification of the algorithm’s design by using the Coq proof assistant to formally verify that the algorithm indeed ends with the correct modular inverse result at 256 -bit inputs.

The gap between algorithm and implementation

The formalization efforts in 2021 have only shown that the algorithm designed by Bernstein and Yang works correctly. However, using that algorithm in libsecp256k1 requires implementing the mathematical description of the safegcd algorithm in the C programming language. For example, the mathematical description of the algorithm performs matrix multiplication of vectors that can be as wide as signed integers of 256 bits , but the C programming language only provides integers up to 64 bits (or 128 bits with some language extensions).

Implementing the safegcd algorithm requires programming the matrix multiplication and other calculations using C’s 64-bit integers. In addition, many other optimizations have been added to make the implementation fast. Ultimately, there are four separate implementations of the safegcd algorithm in libsecp256k1: two constant-time signature generation algorithms, one optimized for 32-bit systems and one optimized for 64-bit systems, and two variable-time signature verification algorithms, again one for 32 -bit systems and one for 64-bit systems.

See also  Revolutionary SportsFi platform GolfN drives global expansion with major brand partnerships

Verifiable C

To verify that the C code correctly implements the safegcd algorithm, all implementation details must be checked. We use Verifiable C, part of the Verified Software Toolchain, to reason about C code using the Coq theorem prover.

Verification is accomplished by specifying pre- and post-conditions using separation logic for each function undergoing verification. Separation logic is a logic that specializes in reasoning about subroutines, memory allocations, concurrency, and more.

Once each function has been given a specification, verification continues by starting from a function’s precondition and establishing a new invariant after each statement in the function’s body, until finally establishing the postcondition at the end of the function. function text or at the end of each function. statement back. Most of the formalization effort is spent “between” the lines of code, using the invariants to translate the raw operations of each C expression into higher-level statements about what the data structures being manipulated mathematically represent. For example, what the C language considers an array of 64-bit integers may actually be a representation of a 256-bit integer.

The end result is a formal proof, verified by the Coq proof assistant, that libsecp256k1’s 64-bit variable time implementation of the safegcd modular inverse algorithm is functionally correct.

Limitations of authentication

There are some limitations to the proof of functional correctness. The separation logic used in Verifiable C implements what is known as partial correctness. That means it only proves that the C code returns with the correct result as it returns, but it does not prove the termination itself. We mitigate this limitation by using our previous Coq proof of the limits of the safegcd algorithm to prove that the loop counter value of the main loop is in fact never greater than 11 iterations.

See also  Chainlink CCIP integration enables DRIFT Labs to expand token accessibility

Another problem is that the C language itself has no formal specification. Instead, the Verifiable C project uses the CompCert compiler project to provide a formal specification of a C language. This guarantees that when a verified C program is compiled with the CompCert compiler, the resulting assembly code will conform to the specification (subject to the above restriction). However, this does not guarantee that the code generated by GCC, clang or any other compiler will necessarily work. For example, C compilers are allowed to have different evaluation orders for arguments within a function call. And even if the C language had a formal specification, any compiler that hasn’t been formally verified itself could still compile programs incorrectly. This does happen in practice.

Finally, Verifiable C does not support passing structures, returning structures, or assigning structures. While in libsecp256k1 structures are always passed via a pointer (which is allowed in Verifiable C), there are a few cases where structure allocation is used. For the modular inverse correctness proof, there were 3 commands that had to be replaced by a specialized function call that performs the structure assignment field by field.

Summary

Blockstream Research has formally verified the correctness of libsecp256k1’s modular inverse function. This work provides further evidence that verification of C code is possible in practice. Using a general-purpose proofing assistant, we can verify software built on complex mathematical arguments.

Nothing prevents the rest of the functions implemented in libsecp256k1 from also being verified. Thus, it is possible for libsecp256k1 to obtain the highest possible guarantees of software correctness.

This is a guest post by Russell O’Connor and Andrew Poelstra. The opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

See also  UniX AI claims the first real-home implementation of mass-produced humanoid robot Panther

Source link

formally Implementation Safegcd verified
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Tether unveils developer grant program to fund on-device AI and open-source payment tools

2026-05-14

Google BigQuery adds support for ZeroG On-Chain data analytics

2026-05-14

Ondo brings tokenized US equities to Hyperliquid’s HyperEVM

2026-05-13

Ronin moves from independent sidechain to Ethereum layer 2

2026-05-13
Add A Comment

Comments are closed.

Top Posts

Crypto’s smoking solution will likely create more vape addicts

2024-09-07

Bitcoin -price can rise to $ 146k in the next leg – Analyst explains how

2025-07-13

Top Trader Predicts Bitcoin Breakout to $100,000 After Months of Consolidation – But There’s a Big Catch

2024-10-22
Editors Picks

Metis announces a partnership with Enki protocol to streamline infrastructure in the chain

2025-07-23

Solana and Bitcoin NFT trading reaches record numbers

2024-05-01

Ethereum – Prize squeezes tight – Watch out for sudden outbreak at any time

2025-09-20

Lendr.fi collaborates with BSCS Global to Power tokenized RWA-Activa in Defi Communities, Web3 Cross-Chain Networks

2025-09-15

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Cryptocurrencies, Defi, NFT, Metaverse and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Tether unveils developer grant program to fund on-device AI and open-source payment tools

Why this could be bullish

XRP price remains lower as buyers remain on the sidelines

Get Informed

Subscribe to Updates

Get the latest news and Update from Bitcoin Platform about Crypto, Metaverse, NFT and more.

  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
© 2026 Bitcoinplatform.com - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.