Question

The new SQRL authentication scheme relies on Curve Ed25519 encryption developed by Daniel Bernstein. However, in order to start implementing this scheme there needs to be a mature implementation of Curve Ed25519 first.

Does anyone know of any mature, implementations? For Java, .NET or any other popular platform?

Was it helpful?

Solution

Curve25519 vs. Ed25519

First of all, Curve25519 and Ed25519 aren't exactly the same thing. They're based on the same underlying curve, but use different representations. Most implementations are either for Curve25519 or Ed25519, but it's possible to reuse some code between them.

It is possible to convert Ed25519 public keys to Curve25519, but the other way round misses a sign bit. i.e. two Ed25519 public keys correspond to a single Curve25519 public key. Private keys are very similar as well.


Concerning implementations it's important to distinguish between the actual implementation, and libraries that package them in usable form.

Actual implementations

djb's implementations in SUPERCOP

  • Ref written in c, very slow
  • djb's Ref10 written in c, decent performance
  • djb's amd64-64-24k and amd64-51-30k, written in assembly, about twice as fast as Ref10

He also wrote an earlier, incompatible, prototype in NaCl, don't use that one

Floodyberry's donna implementation

Contains several variants, both assembly and c. Some optimized for 64 bit, some optimized for 32 bit.

Libraries

  • LibSodium

    C library, currently uses Ref10 implementation

    Has bindings for many programming languages. It's probably the most popular version and what I recommend to most people.

    Contains a bunch of other crypto functions from NaCl, such authenticated encryption (XSalsa20Poly1305), hashes, Curve25519 key-exchange.

  • Nightcracker's Ed25519

    C library, uses Ref10 implementation.

    Most interesting feature of this library is that it supports key-exchange using Ed25519 public keys. But it doesn't hash the shared key, so it doesn't produce the same shared secret as Curve25519.

    Contains pre-built binaries for Win32 and Win64.

  • My C# port

    Pure managed code and works unchanged on 32 and 64 bit platforms. Based on Ref10. A bit slower than c implementations, but the difference is surprisingly small.

    Supports key-exchange compatible with NaCl using both Curve25519 and Ed25519 key and contains a bunch of other crypto functions from NaCl. I'm aiming for a similar feature set as LibSodium.

    The Ed25519 signature functions work and have seen a reasonable amount of tests, but other parts of the library are a bit rough.

  • Directly using an implementation from SUPERCOP or Floodyberry's code.

    Probably requires a bit more work for building, but you'll get higher performance (~2x) and don't need to carry around code you don't need.


I recommend going with LibSodium for now. It's relatively popular and well maintained. Performance is decent, should only cause performance issues in really signature heavy applications.

OTHER TIPS

Adding to CodesInChaos' answer:

Libraries

  • My Java port

    Based on Ref 10, and provides the standard JCA APIs so it can be added to a crypto Provider.

By far the most mature and performant one is the one written by Daniel Bernstein himself. It can be found within SUPERCOP.

However, the API of it is quite awkward, and it takes quite some digging/extracting to get what you want. To save other people work I have done this myself and put my code on Github.

Beware your exact terms though, Ed25519 and Curve25519 are related, but different things. What you should know is that Ed25519 is a public/private key signature system and Curve25519 is a key exchange. Ed25519 keypairs can be converted to Curve25519 keypairs, the other way around I'm not so sure about. What my library on Github does is keep everything in Ed25519 keypairs and convert to Curve25519 for key exchanging.

Embedded implementations

Go 1.17 (Q3 2021) will come with a new and faster implementation, done by Filo Sottile.

See golang commit b0c49ae:

This change replaces the crypto/ed25519/internal/edwards25519 package with code from filippo.io/edwards25519, a significantly faster, safer, well tested (over 1600 lines of new tests, 99% test coverage), and better documented (600 lines of new comments) implementation.

Some highlights:

  • an unsaturated 51-bit limb field implementation optimized for 64-bit architectures and math/bits.Mul64 intrinsics
  • more efficient variable time scalar multiplication using multi-width non-adjacent form with a larger lookup table for fixed-base
  • a safe math/big.Int-like API for the Scalar, Point, and field.Element types with fully abstracted reduction invariants
  • a test suite including a testing/quick fuzzer that explores edge case values that would be impossible to hit randomly, and systematic tests for arguments and receiver aliasing
  • point decoding rules that strictly match the original logic of crypto/ed25519/internal/edwards25519, to avoid consensus issues
  • AssemblyPolicy-compliant assembly cores for arm64 and amd64, the former under 20 lines, and the latter generated by a program based on github.com/mmcloughlin/avo that can be reviewed line-by-line against the generic implementation
Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top