# RFC Errata

Found 7 records.

## Status: Verified (1)

### RFC 6090, "Fundamental Elliptic Curve Cryptography Algorithms", February 2011

Source of RFC: IETF - NON WORKING GROUPArea Assignment: sec

Errata ID: 3920

**Status: Verified
Type: Technical
Publication Format(s) : TEXT**

Reported By: Watson Ladd

Date Reported: 2014-03-15

Verifier Name: Kathleen Moriarty

Date Verified: 2014-07-01

Section Appendix F says:

Then, the product P3=(X3,Y3,Z3) = P1 * P2 is given by: if P1 is the point at infinity, P3 = P2 else if P2 is the point at infinity, P3 = P1 else if u is not equal to 0 but v is equal to 0, P3 = (0,1,0) else if both u and v are not equal to 0, X3 = v * (Z2 * (Z1 * u^2 - 2 * X1 * v^2) - v^3) Y3 = Z2 * (3 * X1 * u * v^2 - Y1 * v^3 - Z1 * u^3) + u * v^3 Z3 = v^3 * Z1 * Z2 else // P2 equals P1, P3 = P1 * P1 w = 3 * X1^2 + a * Z1^2 X3 = 2 * Y1 * Z1 * (w^2 - 8 * X1 * Y1^2 * Z1) Y3 = 4 * Y1^2 * Z1 * (3 * w * X1 - 2 * Y1^2 * Z1) - w^3 Z3 = 8 * (Y1 * Z1)^3

It should say:

Then, the product P3=(X3,Y3,Z3) = P1 * P2 is given by: if P1 is the point at infinity, P3 = P2 else if P2 is the point at infinity, P3 = P1 else if P1=-P2 as projective points P3 = (0,1,0) else if P1 does not equal P2 X3 = v * (Z2 * (Z1 * u^2 - 2 * X1 * v^2) - v^3) Y3 = Z2 * (3 * X1 * u * v^2 - Y1 * v^3 - Z1 * u^3) + u * v^3 Z3 = v^3 * Z1 * Z2 else // P2 equals P1, P3 = P1 * P1 w = 3 * X1^2 + a * Z1^2 X3 = 2 * Y1 * Z1 * (w^2 - 8 * X1 * Y1^2 * Z1) Y3 = 4 * Y1^2 * Z1 * (3 * w * X1 - 2 * Y1^2 * Z1) - w^3 Z3 = 8 * (Y1 * Z1)^3

Notes:

The original algorithm was wrong and produces incorrect answers. There are several fixes that could take place.

## Status: Reported (1)

### RFC 6090, "Fundamental Elliptic Curve Cryptography Algorithms", February 2011

Source of RFC: IETF - NON WORKING GROUPArea Assignment: sec

Errata ID: 6329

**Status: Reported
Type: Editorial
Publication Format(s) : TEXT**

Reported By: Yannik Klubertanz

Date Reported: 2020-11-06

Section F.1. says:

if P is (@,@), R = Q else if Q is (@,@), R = P else if P is not equal to Q and x1 is equal to x2, R = (@,@) else if P is not equal to Q and x1 is not equal to x2, x3 = ((y2-y1)/(x2-x1))^2 - x1 - x2 mod p and y3 = (x1-x3)*(y2-y1)/(x2-x1) - y1 mod p else if P is equal to Q and y1 is equal to 0, R = (@,@) else // P is equal to Q and y1 is not equal to 0 x3 = ((3*x1^2 + a)/(2*y1))^2 - 2*x1 mod p and y3 = (x1-x3)*(3*x1^2 + a)/(2*y1) - y mod p.

It should say:

if P is (@,@), R = Q else if Q is (@,@), R = P else if P is not equal to Q and x1 is equal to x2, R = (@,@) else if P is not equal to Q and x1 is not equal to x2, x3 = ((y2-y1)/(x2-x1))^2 - x1 - x2 mod p and y3 = (x1-x3)*(y2-y1)/(x2-x1) - y1 mod p else if P is equal to Q and y1 is equal to 0, R = (@,@) else // P is equal to Q and y1 is not equal to 0 x3 = ((3*x1^2 + a)/(2*y1))^2 - 2*x1 mod p and y3 = (x1-x3)*(3*x1^2 + a)/(2*y1) - y1 mod p.

Notes:

In the last case in the pseudocode, there's a typo. It should be "y1" mod p instead of "y mod p".

## Status: Held for Document Update (5)

### RFC 6090, "Fundamental Elliptic Curve Cryptography Algorithms", February 2011

Source of RFC: IETF - NON WORKING GROUPArea Assignment: sec

Errata ID: 2777

**Status: Held for Document Update
Type: Technical
Publication Format(s) : TEXT**

Reported By: Annie Yousar

Date Reported: 2011-04-11

Held for Document Update by: Sean Turner

Section 7.2 says:

KT-I is mathematically and functionally equivalent to ECDSA, and can interoperate with the IEEE [P1363] and ANSI [X9.62] standards for Elliptic Curve DSA (ECDSA) based on fields of characteristic greater than three. KT-I signatures can be verified using the ECDSA verification algorithm, and ECDSA signatures can be verified using the KT-I verification algorithm.

It should say:

For many hash functions KT-I is mathematically and functionally equivalent to ECDSA, and can interoperate with the IEEE [P1363] and ANSI [X9.62] standards for Elliptic Curve DSA (ECDSA) based on fields of characteristic greater than three. KT-I signatures can be verified using the ECDSA verification algorithm, and ECDSA signatures can be verified using the KT-I verification algorithm (refer to Section 10.4).

Notes:

If the hash function h generates a bit string that has a bit length greater than the bit length of the elliptic curve group order, ECDSA as specified in P1363 uses a truncation of the hash value to the left-most bits. The KT-I algorithm does not use this truncation but reduces modulo q. Therefore ECDSA and KT-I with SHA-384 on the P-256 curve result in different signature values. Add a corresponding note in 10.4: The output of the hash used in KT signatures should truncated to the left-most bits if its bit-length is longer than the bit-length of the group order.

Errata ID: 2773

**Status: Held for Document Update
Type: Editorial
Publication Format(s) : TEXT**

Reported By: Annie Yousar

Date Reported: 2011-04-11

Held for Document Update by: Sean Turner

Section 2.2 says:

Sometimes an alternative called additive notation is used, in which a * b is denoted as a + b, and a^N is denoted as N * a.

It should say:

Sometimes an alternative called additive notation is used, in which a * b is denoted as a + b, and a^N is denoted as Na.

Notes:

The original text refers to Appendix E some sentences later:

"Appendix E elucidates the correspondence between the two notations."

In the Appendix E the notation "Na" is used, whereas the original text uses the notation "N*a".

Errata ID: 2774

**Status: Held for Document Update
Type: Editorial
Publication Format(s) : TEXT**

Reported By: Annie Yousar

Date Reported: 2011-04-11

Held for Document Update by: Sean Turner

Section 2.2 says:

By convention, a^0 is equal to the identity element for any a in G.

It should say:

By convention, a^0 is equal to the identity element and a^1 is equal to a itself for any a in G.

Notes:

Without this convention the explanation on the next page: "... for any integers X and Y: a^(X+Y) = (a^X)*(a^Y) ..." would be incomplete, as being undefined for the integers X=1 and/or Y=1.

Errata ID: 2775

**Status: Held for Document Update
Type: Editorial
Publication Format(s) : TEXT**

Reported By: Annie Yousar

Date Reported: 2011-04-11

Held for Document Update by: Sean Turner

Section 2.2 says:

Note that a^M is equal to g^(M modulo R) for any non-negative integer M.

It should say:

Note that a^M is equal to a^(M mod R) for any non-negative integer M.

Notes:

g is a typo. The result of the modulo operation is always denoted in the text by "mod". The notation "modulo" identifies the operation and not the result.

Errata ID: 2776

**Status: Held for Document Update
Type: Editorial
Publication Format(s) : TEXT**

Reported By: Annie Yousar

Date Reported: 2011-04-11

Held for Document Update by: Sean Turner

Section 6.2 says:

The integer x shall be converted to an octet string S of length k as follows. The string S shall satisfy k y = SUM 2^(8(k-i)) Si . i = 1

It should say:

The integer y shall be converted to an octet string S of length k as follows. The string S shall satisfy k y = SUM 2^(8(k-i)) Si . i = 1 Note that the conversion fails if y >= 2^(8*k).

Notes:

Typo corrected. The integer y can not be converted, if the octet string is to short.