Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ed25519 #388

Closed
blizzardplus opened this issue Jan 9, 2016 · 16 comments
Closed

Ed25519 #388

blizzardplus opened this issue Jan 9, 2016 · 16 comments
Labels
component-crypto Crypto primitives and low-level interfaces enhancement

Comments

@blizzardplus
Copy link

Any plans to include Ed25519 in addition to Curve25519?

@ciarmcom
Copy link

ciarmcom commented Jan 9, 2016

ARM Internal Ref: IOTSSL-594

@mpg
Copy link
Contributor

mpg commented Jan 11, 2016

It's not faster. Actualy Ed25519 and Curve25519 are two ways to look at the same curve, and the main difference is, Ed25519 is more suited to signing, while Curve25519 is more suited for Diffie-Hellman.

@mpg mpg added the question label Jan 11, 2016
@carlescufi
Copy link

+1 on this one, would be great to have Ed25519/EdDSA support.

@nuket
Copy link

nuket commented Dec 6, 2016

+1, would be nice to have alternatives to the NIST curves.

@H3ik0
Copy link

H3ik0 commented Jan 15, 2017

+1 Please do for hiawatha-webserver, and also ChaCha20-Poly1305 for better mobile performance

@MalteJ
Copy link

MalteJ commented Feb 24, 2017

+1

@willderness
Copy link

+1 would be great to see Ed25519 as part of mbedTLS

@MalteJ
Copy link

MalteJ commented Feb 28, 2017

I'd love to see support for TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 using Ed25519

@samrg472
Copy link

+1

1 similar comment
@utzig
Copy link

utzig commented Nov 8, 2017

+1

@d3zd3z
Copy link
Contributor

d3zd3z commented Nov 8, 2017

+1 This indeed would be useful, not only for TLS, but for MCUboot and in general for signature verification.

@concatime
Copy link
Contributor

Please, stop adding +1, it's not helpful at all. There's a button for that, or a pull request if you're able.

@xicilion
Copy link

xicilion commented Apr 1, 2018

So, is there any plan now?

@James-E-A
Copy link

James-E-A commented Aug 15, 2019

Is there anything worth stealing in dunkelstern/mbedtls or dunkelstern/mbedtls-esp8266?

t. another Hiawatha user diligently lurking all the req'd software's progress to get (even non-CA-signed) Ed25519/X25519 certs running

@532910
Copy link

532910 commented Jul 12, 2020

Is any update there, through 4 years?
ed25519/ed448 are modern and widely supported schemes, it's strange to see the lack of support in mbedtls.

@gilles-peskine-arm
Copy link
Contributor

An external contributor has kindly volunteered to contribute an implementation of EdDSA. Unfortunately review bandwidth is a bottleneck, so it'll take us a few months to integrate the feature. You can track our progress through the milestone field of the pull requests (of which there is currently one of a planned 4).

Given that all the recent discussion on the topic is happening on #2452, I think this issue is no longer useful, so I'm closing it.

xkqian added a commit to xkqian/mbedtls that referenced this issue Jan 19, 2022
ronald-cron-arm pushed a commit to ronald-cron-arm/mbedtls that referenced this issue Feb 8, 2022
Fix Mbed-TLS#388 hrr test case failed in sha384 with openssl peer
iameli pushed a commit to livepeer/mbedtls that referenced this issue Dec 5, 2023
…pe_declarations

moved externs from crypto_kernel into its own header
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
component-crypto Crypto primitives and low-level interfaces enhancement
Projects
None yet
Development

No branches or pull requests