[Cryptech Tech] Curve 25519 in use cases?
Bernd Paysan
bernd at net2o.de
Wed Mar 4 15:53:44 UTC 2015
Am Dienstag, 3. März 2015, 23:50:33 schrieb Daniel Kahn Gillmor:
> On Mon 2015-03-02 10:39:51 +0100, Joachim Strömbergson wrote:
> > In what use cases do we see Curve 25519. And how is the algorithm being
> > used - DH only?
>
> in OpenPGP, we currently only have EdDSA mechanisms propoesd (and
> implemented) by Werner Koch, and *not* yet DH.
>
> https://tools.ietf.org/html/draft-koch-eddsa-for-openpgp
>
> fwiw, i'd like to see EC DH added for 25519 soon too, but it isn't
> spec'ed out yet.
There are two versions of Curve25519, the montgommery ladder, usually called
Curve25519, and the Edwards curve, Ed25519. libnacl has a DH algorithm for
Curve25519, which is just shared_secret=pk1*sk2=pk2*sk1 (* the scalar product
of the curve). DH for Ed25519 is just the same scalar product; what you need
for that is a constant-time scalar product to avoid leaking bits of the
secret.
I've added a constant-time scalar product to ed25519-donna in my github fork:
https://github.com/forthy42/ed25519-donna/blob/master/ed25519-donna-impl-base.h
Search for ge25519_scalarmult...
--
Bernd Paysan
"If you want it done right, you have to do it yourself"
http://bernd-paysan.de/
net2o ID: kQusJzA;7*?t=uy at X}1GWr!+0qqp_Cn176t4(dQ*
More information about the Tech
mailing list