NTP-3: Cryptography and Hash Specification
Authors: Danthur Lice
Date of Creation: 2025-01-09
Date of Publication: 2025-01-15
License: NCL-11
1. Scope
2. Normative Principles
3. Technical Specification
3.1 Hashing Standards
3.2 Hash Representation and Encoding
a3f1c2...
)3.3 Digital Signature Algorithm
NONEwithECDSA
. This method decouples hashing from the signature algorithm, avoiding discrepancies across runtimes or libraries.NONEwithECDSA
Format | Encoding | Usage |
---|---|---|
PEM | Base64-wrapped | External APIs |
Base64 | Raw DER-encoded bytes | Network protocols |
Hexadecimal | Raw DER-encoded bytes | Diagnostic tooling |
3.4 Signature Generation and Validation
NONEwithECDSA
NONEwithECDSA
3.5 Canonicalization Rules for Signature Inputs
|
, ASCII 124)""
true
or false
, lowercase.
as decimal separator, no scientific notationZ
)Input values:
["user123", 100.0, "2025-01-09T15:00:00Z", null, "active"]
user123|100.0|2025-01-09T15:00:00Z||active
3.6 ECIES Encryption and Decryption (Optional)
"ECIES"
from "BC"
4. Security Considerations
5. Conclusion
Modified at 2025-05-29 16:04:51