โ๏ธ ECDSA: How Bitcoin Signs Transactions
Understand the Elliptic Curve Digital Signature Algorithm powering crypto
Your Progress
0 / 5 completedโ๏ธ ECDSA Digital Signatures
ECDSA (Elliptic Curve Digital Signature Algorithm) proves you authorized a transaction without revealing your private key!
๐ฏ What Are Digital Signatures?
Think of a digital signature like a handwritten signature, but mathematically provable:
- โขCan be forged with practice
- โขSame signature every time
- โขCan be copied to other documents
- โขMathematically impossible to forge
- โขDifferent for every message
- โขTied to specific message (can't copy)
๐ฎ Interactive: Sign a Message
In real life, this is a 256-bit number kept secret!
๐ Signature Verification
Anyone can verify your signature using only your public key (no access to private key needed):
Modular inverse of s
Two scalar values from message hash and signature
Where Q is your public key
If x-coordinate matches r, signature is valid!
Verification works because of the mathematical relationship between your private key (d), public key (Q = dG), and the signature (r, s). Only someone with private key d could have created a valid signature!
โ ๏ธ Critical Security Rules
If you use the same k for two different messages, attackers can calculate your private key! This is how PlayStation 3 was hacked in 2010.
Predictable k values can leak your private key. Use cryptographically secure random number generators!
Your private key is like your password. If someone gets it, they can sign transactions as you!
๐ ECDSA Summary
- โข Requires: Private key (d)
- โข Inputs: Message + Random k
- โข Output: Signature (r, s)
- โข Purpose: Prove authorization
- โข Requires: Public key (Q)
- โข Inputs: Message + Signature (r, s)
- โข Output: Valid or Invalid
- โข Purpose: Confirm authenticity