Understanding ECDSA

ECDSA ‘Basic Math’ Guide Melts Brains and Splits the Room

TLDR: A long explainer on Ethereum’s signature tech (ECDSA) claimed “basic math,” but readers clapped back that it’s dense, meandering, and hard to follow. Debate split between calls for clearer structure and experts adding deeper critiques like malleability and missing “exclusive ownership,” highlighting why accessible crypto docs matter.

A 45‑minute “Understanding ECDSA” deep dive promised friendly, basic math about the signature tech behind Ethereum—but the comments came in hotter than a GPU farm. Readers balked at the “basic” label, with several confessing they got lost fast. One camp says the biggest villain isn’t the math itself, it’s the notation. A standout analogy compared it to a Python one‑liner that looks “simple” only to people who already speak Python, sparking jokes about getting stranded at the “point at infinity.”

Others slammed the piece’s meandering style. Critics argued they wanted a straightforward guide and got detours galore. “Say what’s on the tin,” the vibe went, begging for digressions to be tucked into links or footnotes so newcomers can actually follow along. Meanwhile, crypto purists pushed the convo deeper: yes, the article explains signature malleability (two different signatures can verify the same thing), but pros flagged that ECDSA also lacks “exclusive ownership,” linking to soatok’s explainer. The meta-drama over the author’s “no internet, no LLMs” writing rule added spice—admirable to some, eyebrow‑raising to others. Verdict from the crowd: great for math enjoyers, painful for “just a dev,” and a reminder that packaging matters as much as precision.

Key Points

  • The article explains ECDSA with an emphasis on the Ethereum blockchain’s implementation.
  • It introduces modular arithmetic and the extended Euclidean algorithm as prerequisites for ECDSA.
  • The secp256k1 elliptic curve and its group law are presented, including geometric intuition and projective coordinates.
  • It outlines how to sign messages and verify signatures in ECDSA, and discusses recovering the public key (Q).
  • It examines the signature malleability attack as a security issue connected to ECDSA signatures.

Hottest takes

"Your definition of 'basic math' greatly differs from mine..." — joezydeco
"what it said on the tin" — NetMageSCW
"doesn't provide a property called exclusive ownership" — some_furry
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.