I recently started reading RFC 6979. I'm curious why it needs so many loops.
This post asks a similar question: "RFC 6979 - Why not simply hash the message & the private key for deterministic ECDSA?", but my doubts are still unanswered.
Why can't the $k$ used in ECDSA be just like $k = SHA256(sk + HASH(m))$ ?
Is it just because HMAC_DRBG has a better security proof ?