en.unionpedia.org

EdDSA, the Glossary

Index EdDSA

In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves.[1]

Table of Contents

  1. 61 relations: Apple Watch, Assembly language, Birational geometry, Botan (programming library), C (programming language), Chaos Communication Congress, Concatenation, Crypto++, Cryptocurrency, Cryptographic hash function, Cryptographic nonce, Cryptographic protocol, CryptoNote, Curve25519, Curve448, Daniel J. Bernstein, Digital signature, Digital Signature Algorithm, Dropbear (software), Elliptic Curve Digital Signature Algorithm, Elliptic-curve cryptography, Endianness, Federal Information Processing Standards, Finite field, GitHub, GNU Privacy Guard, Hasse's theorem on elliptic curves, Internet Engineering Task Force, Internet Key Exchange, Internet Research Task Force, IPhone, Java Development Kit, Libgcrypt, MacOS, Medium (website), Montgomery curve, NaCl (software), National Institute of Standards and Technology, Nehalem (microarchitecture), OpenBSD, OpenBSD security features, OpenSSH, OpenSSL, PlayStation 3, Pollard's rho algorithm for logarithms, Public-domain software, Public-key cryptography, Python (programming language), Random oracle, Rational point, ... Expand index (11 more) »

  2. Digital signature schemes
  3. Elliptic curve cryptography

Apple Watch

The Apple Watch is a brand of smartwatch products produced by Apple.

See EdDSA and Apple Watch

Assembly language

In computer programming, assembly language (alternatively assembler language or symbolic machine code), often referred to simply as assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence between the instructions in the language and the architecture's machine code instructions.

See EdDSA and Assembly language

Birational geometry

In mathematics, birational geometry is a field of algebraic geometry in which the goal is to determine when two algebraic varieties are isomorphic outside lower-dimensional subsets.

See EdDSA and Birational geometry

Botan (programming library)

Botan is a BSD-licensed cryptographic and TLS library written in C++11.

See EdDSA and Botan (programming library)

C (programming language)

C (pronounced – like the letter c) is a general-purpose programming language.

See EdDSA and C (programming language)

Chaos Communication Congress

The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club.

See EdDSA and Chaos Communication Congress

Concatenation

In formal language theory and computer programming, string concatenation is the operation of joining character strings end-to-end.

See EdDSA and Concatenation

Crypto++

Crypto++ (also known as CryptoPP, libcrypto++, and libcryptopp) is a free and open-source C++ class library of cryptographic algorithms and schemes written by Wei Dai. EdDSA and Crypto++ are public-domain software with source code.

See EdDSA and Crypto++

Cryptocurrency

A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.

See EdDSA and Cryptocurrency

Cryptographic hash function

A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptographic application.

See EdDSA and Cryptographic hash function

Cryptographic nonce

In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication.

See EdDSA and Cryptographic nonce

Cryptographic protocol

A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

See EdDSA and Cryptographic protocol

CryptoNote

CryptoNote is an application layer protocol designed for use with cryptocurrencies that aims to solve specific problems identified in Bitcoin.

See EdDSA and CryptoNote

Curve25519

In cryptography, Curve25519 is an elliptic curve used in elliptic-curve cryptography (ECC) offering 128 bits of security (256-bit key size) and designed for use with the Elliptic-curve Diffie–Hellman (ECDH) key agreement scheme.

See EdDSA and Curve25519

Curve448

In cryptography, Curve448 or Curve448-Goldilocks is an elliptic curve potentially offering 224 bits of security and designed for use with the elliptic-curve Diffie–Hellman (ECDH) key agreement scheme.

See EdDSA and Curve448

Daniel J. Bernstein

Daniel Julius Bernstein (sometimes known as djb; born October 29, 1971) is an American mathematician, cryptologist, and computer scientist.

See EdDSA and Daniel J. Bernstein

Digital signature

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. EdDSA and digital signature are public-key cryptography.

See EdDSA and Digital signature

Digital Signature Algorithm

The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. EdDSA and digital Signature Algorithm are digital signature schemes and public-key cryptography.

See EdDSA and Digital Signature Algorithm

Dropbear (software)

Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client.

See EdDSA and Dropbear (software)

Elliptic Curve Digital Signature Algorithm

In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve cryptography. EdDSA and elliptic Curve Digital Signature Algorithm are digital signature schemes, elliptic curve cryptography and public-key cryptography.

See EdDSA and Elliptic Curve Digital Signature Algorithm

Elliptic-curve cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. EdDSA and elliptic-curve cryptography are elliptic curve cryptography and public-key cryptography.

See EdDSA and Elliptic-curve cryptography

Endianness

''Gulliver's Travels'' by Jonathan Swift, the novel from which the term was coined In computing, endianness is the order in which bytes within a word of digital data are transmitted over a data communication medium or addressed (by rising addresses) in computer memory, counting only byte significance compared to earliness.

See EdDSA and Endianness

Federal Information Processing Standards

The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors.

See EdDSA and Federal Information Processing Standards

Finite field

In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements.

See EdDSA and Finite field

GitHub

GitHub is a developer platform that allows developers to create, store, manage and share their code.

See EdDSA and GitHub

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's cryptographic software suite PGP.

See EdDSA and GNU Privacy Guard

Hasse's theorem on elliptic curves

Hasse's theorem on elliptic curves, also referred to as the Hasse bound, provides an estimate of the number of points on an elliptic curve over a finite field, bounding the value both above and below.

See EdDSA and Hasse's theorem on elliptic curves

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP).

See EdDSA and Internet Engineering Task Force

Internet Key Exchange

In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

See EdDSA and Internet Key Exchange

Internet Research Task Force

The Internet Research Task Force (IRTF) is an organization, overseen by the Internet Architecture Board, that focuses on longer-term research issues related to the Internet.

See EdDSA and Internet Research Task Force

IPhone

The iPhone is a smartphone produced by Apple that uses Apple's own iOS mobile operating system.

See EdDSA and IPhone

Java Development Kit

The Java Development Kit (JDK) is a distribution of Java technology by Oracle Corporation.

See EdDSA and Java Development Kit

Libgcrypt

Libgcrypt is a cryptography library developed as a separated module of GnuPG.

See EdDSA and Libgcrypt

MacOS

macOS, originally Mac OS X, previously shortened as OS X, is an operating system developed and marketed by Apple since 2001.

See EdDSA and MacOS

Medium (website)

Medium is an American online publishing platform developed by Evan Williams and launched in August 2012.

See EdDSA and Medium (website)

Montgomery curve

In mathematics, the Montgomery curve is a form of elliptic curve introduced by Peter L. Montgomery in 1987, different from the usual Weierstrass form. EdDSA and Montgomery curve are elliptic curve cryptography.

See EdDSA and Montgomery curve

NaCl (software)

NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography.

See EdDSA and NaCl (software)

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.

See EdDSA and National Institute of Standards and Technology

Nehalem (microarchitecture)

Nehalem is the codename for Intel's 45 nm microarchitecture released in November 2008.

See EdDSA and Nehalem (microarchitecture)

OpenBSD

OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD).

See EdDSA and OpenBSD

OpenBSD security features

The OpenBSD operating system focuses on security and the development of security features.

See EdDSA and OpenBSD security features

OpenSSH

OpenSSH (also known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client–server architecture.

See EdDSA and OpenSSH

OpenSSL

OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end.

See EdDSA and OpenSSL

PlayStation 3

The PlayStation 3 (PS3) is a home video game console developed and marketed by Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on November 11, 2006, in Japan, November 17, 2006, in North America, and March 23, 2007, in Europe and Australasia.

See EdDSA and PlayStation 3

Pollard's rho algorithm for logarithms

Pollard's rho algorithm for logarithms is an algorithm introduced by John Pollard in 1978 to solve the discrete logarithm problem, analogous to Pollard's rho algorithm to solve the integer factorization problem.

See EdDSA and Pollard's rho algorithm for logarithms

Public-domain software

Public-domain software is software that has been placed in the public domain, in other words, software for which there is absolutely no ownership such as copyright, trademark, or patent.

See EdDSA and Public-domain software

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys.

See EdDSA and Public-key cryptography

Python (programming language)

Python is a high-level, general-purpose programming language.

See EdDSA and Python (programming language)

Random oracle

In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly from its output domain.

See EdDSA and Random oracle

Rational point

In number theory and algebraic geometry, a rational point of an algebraic variety is a point whose coordinates belong to a given field.

See EdDSA and Rational point

Reference implementation

In the software development process, a reference implementation (or, less frequently, sample implementation or model implementation) is a program that implements all requirements from a corresponding specification.

See EdDSA and Reference implementation

Schnorr signature

In cryptography, a Schnorr signature is a digital signature produced by the Schnorr signature algorithm that was described by Claus Schnorr. EdDSA and Schnorr signature are digital signature schemes.

See EdDSA and Schnorr signature

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001.

See EdDSA and SHA-2

SHA-3

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. EdDSA and SHA-3 are public-domain software with source code.

See EdDSA and SHA-3

Side-channel attack

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation.

See EdDSA and Side-channel attack

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext.

See EdDSA and Symmetric-key algorithm

Tanja Lange

Tanja Lange is a German cryptographer and number theorist at the Eindhoven University of Technology.

See EdDSA and Tanja Lange

Twisted Edwards curve

In algebraic geometry, the twisted Edwards curves are plane models of elliptic curves, a generalisation of Edwards curves introduced by Bernstein, Birkner, Joye, Lange and Peters in 2008. EdDSA and twisted Edwards curve are elliptic curve cryptography.

See EdDSA and Twisted Edwards curve

Westmere (microarchitecture)

Westmere (formerly Nehalem-C) is the code name given to the 32 nm die shrink of Nehalem.

See EdDSA and Westmere (microarchitecture)

WolfSSL

wolfSSL is a small, portable, embedded SSL/TLS library targeted for use by embedded systems developers.

See EdDSA and WolfSSL

X86-64

x86-64 (also known as x64, x86_64, AMD64, and Intel 64) is a 64-bit version of the x86 instruction set, first announced in 1999.

See EdDSA and X86-64

See also

Digital signature schemes

Elliptic curve cryptography

References

[1] https://en.wikipedia.org/wiki/EdDSA

Also known as Ed25519, Ed448, Edwards-Curve Digital Signature Algorithm.

, Reference implementation, Schnorr signature, SHA-2, SHA-3, Side-channel attack, Symmetric-key algorithm, Tanja Lange, Twisted Edwards curve, Westmere (microarchitecture), WolfSSL, X86-64.