EdDSA, the Glossary
In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves.[1]
Table of Contents
61 relations: Apple Watch, Assembly language, Birational geometry, Botan (programming library), C (programming language), Chaos Communication Congress, Concatenation, Crypto++, Cryptocurrency, Cryptographic hash function, Cryptographic nonce, Cryptographic protocol, CryptoNote, Curve25519, Curve448, Daniel J. Bernstein, Digital signature, Digital Signature Algorithm, Dropbear (software), Elliptic Curve Digital Signature Algorithm, Elliptic-curve cryptography, Endianness, Federal Information Processing Standards, Finite field, GitHub, GNU Privacy Guard, Hasse's theorem on elliptic curves, Internet Engineering Task Force, Internet Key Exchange, Internet Research Task Force, IPhone, Java Development Kit, Libgcrypt, MacOS, Medium (website), Montgomery curve, NaCl (software), National Institute of Standards and Technology, Nehalem (microarchitecture), OpenBSD, OpenBSD security features, OpenSSH, OpenSSL, PlayStation 3, Pollard's rho algorithm for logarithms, Public-domain software, Public-key cryptography, Python (programming language), Random oracle, Rational point, ... Expand index (11 more) »
- Digital signature schemes
- Elliptic curve cryptography
Apple Watch
The Apple Watch is a brand of smartwatch products produced by Apple.
Assembly language
In computer programming, assembly language (alternatively assembler language or symbolic machine code), often referred to simply as assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence between the instructions in the language and the architecture's machine code instructions.
See EdDSA and Assembly language
Birational geometry
In mathematics, birational geometry is a field of algebraic geometry in which the goal is to determine when two algebraic varieties are isomorphic outside lower-dimensional subsets.
See EdDSA and Birational geometry
Botan (programming library)
Botan is a BSD-licensed cryptographic and TLS library written in C++11.
See EdDSA and Botan (programming library)
C (programming language)
C (pronounced – like the letter c) is a general-purpose programming language.
See EdDSA and C (programming language)
Chaos Communication Congress
The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club.
See EdDSA and Chaos Communication Congress
Concatenation
In formal language theory and computer programming, string concatenation is the operation of joining character strings end-to-end.
Crypto++
Crypto++ (also known as CryptoPP, libcrypto++, and libcryptopp) is a free and open-source C++ class library of cryptographic algorithms and schemes written by Wei Dai. EdDSA and Crypto++ are public-domain software with source code.
Cryptocurrency
A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Cryptographic hash function
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptographic application.
See EdDSA and Cryptographic hash function
Cryptographic nonce
In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication.
See EdDSA and Cryptographic nonce
Cryptographic protocol
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.
See EdDSA and Cryptographic protocol
CryptoNote
CryptoNote is an application layer protocol designed for use with cryptocurrencies that aims to solve specific problems identified in Bitcoin.
Curve25519
In cryptography, Curve25519 is an elliptic curve used in elliptic-curve cryptography (ECC) offering 128 bits of security (256-bit key size) and designed for use with the Elliptic-curve Diffie–Hellman (ECDH) key agreement scheme.
Curve448
In cryptography, Curve448 or Curve448-Goldilocks is an elliptic curve potentially offering 224 bits of security and designed for use with the elliptic-curve Diffie–Hellman (ECDH) key agreement scheme.
Daniel J. Bernstein
Daniel Julius Bernstein (sometimes known as djb; born October 29, 1971) is an American mathematician, cryptologist, and computer scientist.
See EdDSA and Daniel J. Bernstein
Digital signature
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. EdDSA and digital signature are public-key cryptography.
See EdDSA and Digital signature
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. EdDSA and digital Signature Algorithm are digital signature schemes and public-key cryptography.
See EdDSA and Digital Signature Algorithm
Dropbear (software)
Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client.
See EdDSA and Dropbear (software)
Elliptic Curve Digital Signature Algorithm
In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve cryptography. EdDSA and elliptic Curve Digital Signature Algorithm are digital signature schemes, elliptic curve cryptography and public-key cryptography.
See EdDSA and Elliptic Curve Digital Signature Algorithm
Elliptic-curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. EdDSA and elliptic-curve cryptography are elliptic curve cryptography and public-key cryptography.
See EdDSA and Elliptic-curve cryptography
Endianness
''Gulliver's Travels'' by Jonathan Swift, the novel from which the term was coined In computing, endianness is the order in which bytes within a word of digital data are transmitted over a data communication medium or addressed (by rising addresses) in computer memory, counting only byte significance compared to earliness.
Federal Information Processing Standards
The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors.
See EdDSA and Federal Information Processing Standards
Finite field
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements.
GitHub
GitHub is a developer platform that allows developers to create, store, manage and share their code.
See EdDSA and GitHub
GNU Privacy Guard
GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's cryptographic software suite PGP.
See EdDSA and GNU Privacy Guard
Hasse's theorem on elliptic curves
Hasse's theorem on elliptic curves, also referred to as the Hasse bound, provides an estimate of the number of points on an elliptic curve over a finite field, bounding the value both above and below.
See EdDSA and Hasse's theorem on elliptic curves
Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP).
See EdDSA and Internet Engineering Task Force
Internet Key Exchange
In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite.
See EdDSA and Internet Key Exchange
Internet Research Task Force
The Internet Research Task Force (IRTF) is an organization, overseen by the Internet Architecture Board, that focuses on longer-term research issues related to the Internet.
See EdDSA and Internet Research Task Force
IPhone
The iPhone is a smartphone produced by Apple that uses Apple's own iOS mobile operating system.
See EdDSA and IPhone
Java Development Kit
The Java Development Kit (JDK) is a distribution of Java technology by Oracle Corporation.
See EdDSA and Java Development Kit
Libgcrypt
Libgcrypt is a cryptography library developed as a separated module of GnuPG.
MacOS
macOS, originally Mac OS X, previously shortened as OS X, is an operating system developed and marketed by Apple since 2001.
See EdDSA and MacOS
Medium (website)
Medium is an American online publishing platform developed by Evan Williams and launched in August 2012.
See EdDSA and Medium (website)
Montgomery curve
In mathematics, the Montgomery curve is a form of elliptic curve introduced by Peter L. Montgomery in 1987, different from the usual Weierstrass form. EdDSA and Montgomery curve are elliptic curve cryptography.
See EdDSA and Montgomery curve
NaCl (software)
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography.
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.
See EdDSA and National Institute of Standards and Technology
Nehalem (microarchitecture)
Nehalem is the codename for Intel's 45 nm microarchitecture released in November 2008.
See EdDSA and Nehalem (microarchitecture)
OpenBSD
OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD).
OpenBSD security features
The OpenBSD operating system focuses on security and the development of security features.
See EdDSA and OpenBSD security features
OpenSSH
OpenSSH (also known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client–server architecture.
OpenSSL
OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end.
PlayStation 3
The PlayStation 3 (PS3) is a home video game console developed and marketed by Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on November 11, 2006, in Japan, November 17, 2006, in North America, and March 23, 2007, in Europe and Australasia.
Pollard's rho algorithm for logarithms
Pollard's rho algorithm for logarithms is an algorithm introduced by John Pollard in 1978 to solve the discrete logarithm problem, analogous to Pollard's rho algorithm to solve the integer factorization problem.
See EdDSA and Pollard's rho algorithm for logarithms
Public-domain software
Public-domain software is software that has been placed in the public domain, in other words, software for which there is absolutely no ownership such as copyright, trademark, or patent.
See EdDSA and Public-domain software
Public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys.
See EdDSA and Public-key cryptography
Python (programming language)
Python is a high-level, general-purpose programming language.
See EdDSA and Python (programming language)
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly from its output domain.
Rational point
In number theory and algebraic geometry, a rational point of an algebraic variety is a point whose coordinates belong to a given field.
Reference implementation
In the software development process, a reference implementation (or, less frequently, sample implementation or model implementation) is a program that implements all requirements from a corresponding specification.
See EdDSA and Reference implementation
Schnorr signature
In cryptography, a Schnorr signature is a digital signature produced by the Schnorr signature algorithm that was described by Claus Schnorr. EdDSA and Schnorr signature are digital signature schemes.
See EdDSA and Schnorr signature
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001.
See EdDSA and SHA-2
SHA-3
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. EdDSA and SHA-3 are public-domain software with source code.
See EdDSA and SHA-3
Side-channel attack
In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation.
See EdDSA and Side-channel attack
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext.
See EdDSA and Symmetric-key algorithm
Tanja Lange
Tanja Lange is a German cryptographer and number theorist at the Eindhoven University of Technology.
Twisted Edwards curve
In algebraic geometry, the twisted Edwards curves are plane models of elliptic curves, a generalisation of Edwards curves introduced by Bernstein, Birkner, Joye, Lange and Peters in 2008. EdDSA and twisted Edwards curve are elliptic curve cryptography.
See EdDSA and Twisted Edwards curve
Westmere (microarchitecture)
Westmere (formerly Nehalem-C) is the code name given to the 32 nm die shrink of Nehalem.
See EdDSA and Westmere (microarchitecture)
WolfSSL
wolfSSL is a small, portable, embedded SSL/TLS library targeted for use by embedded systems developers.
X86-64
x86-64 (also known as x64, x86_64, AMD64, and Intel 64) is a 64-bit version of the x86 instruction set, first announced in 1999.
See EdDSA and X86-64
See also
Digital signature schemes
- BLS digital signature
- Blind signature
- Designated verifier signature
- Digital Signature Algorithm
- Digital Signature Standard
- EdDSA
- ElGamal signature scheme
- Elliptic Curve Digital Signature Algorithm
- Enhanced privacy ID
- Falcon (signature scheme)
- Full Domain Hash
- GGH signature scheme
- GMR (cryptography)
- Group signature
- KCDSA
- Lamport signature
- Merkle signature scheme
- NTRUSign
- Niederreiter cryptosystem
- PKCS 1
- Pointcheval–Stern signature algorithm
- Probabilistic signature scheme
- Quantum digital signature
- RSA (cryptosystem)
- Rabin signature algorithm
- Ring signature
- Schnorr signature
- Unbalanced oil and vinegar scheme
- Undeniable signature
Elliptic curve cryptography
- Bitcoin
- Boneh–Franklin scheme
- DNSCurve
- Decision Linear assumption
- Decisional Diffie–Hellman assumption
- Doubling-oriented Doche–Icart–Kohel curve
- ECC patents
- EdDSA
- Edwards curve
- Elliptic Curve Digital Signature Algorithm
- Elliptic-curve Diffie–Hellman
- Elliptic-curve cryptography
- Enhanced privacy ID
- FourQ
- Hessian form of an elliptic curve
- Hyperelliptic curve cryptography
- Jacobian curve
- KCDSA
- MQV
- Montgomery curve
- Pairing-based cryptography
- Sakai–Kasahara scheme
- Schoof's algorithm
- Schoof–Elkies–Atkin algorithm
- Sub-group hiding
- Supersingular isogeny graph
- Table of costs of operations in elliptic curves
- Tate pairing
- Tripling-oriented Doche–Icart–Kohel curve
- Twisted Edwards curve
- Twisted Hessian curves
- Twists of elliptic curves
- XDH assumption
References
[1] https://en.wikipedia.org/wiki/EdDSA
Also known as Ed25519, Ed448, Edwards-Curve Digital Signature Algorithm.
, Reference implementation, Schnorr signature, SHA-2, SHA-3, Side-channel attack, Symmetric-key algorithm, Tanja Lange, Twisted Edwards curve, Westmere (microarchitecture), WolfSSL, X86-64.