Signing a Deploy
When creating a
Deploy to be executed on a Casper network, the account owner, or more accurately, enough authorized signers must sign the deploy using their account's cryptographic key-pair. This key-pair is a combination of the account's secret and public keys. The signatures attached to the Deploy allow the network to verify that it should be executed.
When a signature is attached to a deploy, it is paired with the public key of the signer, and referred to as an
Approval. Every valid deploy has at least one approval.
The signature creation process begins with the hashing of the payment and session of the deploy to create the
BodyHash becomes a component of the
DeployHeader as outlined in the serialization standard. From there, the
DeployHeader can be hashed to create the
DeployHash. As outlined above, the
DeployHash is then combined with the account's key-pair to create the deploy's signature.
DeployHash contains a hash of the deploy's body within, any variation to any aspect of the deploy or sending account's keys would render the
Public Key Cryptography
Casper networks are compatible with both
secp256k1 public key cryptography. When serialized, public keys and signatures are prefixed with a single byte, used as a tag to denote the applicable algorithm. Ed25519 public keys and signatures are prefixed with
1, whereas secp256k1 are prefixed with
blake2b hashing within our serialization. However, these hashed values will be hashed once again when they are signed over. The type of hashing depends on the associated keypair algorithm as follows:
Ed25519 signs over a SHA-512 digest.
secp256k1 signs over a SHA-256 digest.