Implement cryptographic techniques that ensure the secure verification of signatures and compliance with standards to maintain the integrity of authenticated transactions.
S6.2.A Cryptographic Techniques for Authentication¶
SCSVS VR ID
Requirement
L1
L2
L3
SWE
S6.2.A1
Ensure that cryptographic algorithms used for signature verification are secure and follow best practices.
Verify that ECDSA signature handling functions, such as ECDSA.recover and ECDSA.tryRecover, properly manage signature formats to prevent signature malleability, especially when handling both traditional 65-byte and EIP-2098 compact signatures.