<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.ellipticcurve.info/Ed25519/history?feed=atom</id>
	<title>Ed25519 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.ellipticcurve.info/Ed25519/history?feed=atom"/>
	<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/Ed25519/history"/>
	<updated>2026-05-06T01:53:17Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=159&amp;oldid=prev</id>
		<title>Rational Point: cat</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=159&amp;oldid=prev"/>
		<updated>2025-01-02T08:58:04Z</updated>

		<summary type="html">&lt;p&gt;cat&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 08:58, 2 January 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Conic section cryptography]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Image:Ed25519.svg|frame|left|&amp;lt;tt&amp;gt;−x^2 + y^2 = 1 − (121665/121666) * x^2 * y^2&amp;lt;/tt&amp;gt; &amp;lt;ref&amp;gt;Monero Project: Monero docs: Edwards25519 Elliptic Curve https://docs.getmonero.org/cryptography/asymmetric/edwards25519/&amp;lt;/ref&amp;gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Image:Ed25519.svg|frame|left|&amp;lt;tt&amp;gt;−x^2 + y^2 = 1 − (121665/121666) * x^2 * y^2&amp;lt;/tt&amp;gt; &amp;lt;ref&amp;gt;Monero Project: Monero docs: Edwards25519 Elliptic Curve https://docs.getmonero.org/cryptography/asymmetric/edwards25519/&amp;lt;/ref&amp;gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Or is it “birationally equivalent?”&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Or is it “birationally equivalent?” &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;We need a dunce cap category for “elliptic curves” that are actually conic sections plotted by the square roots of their coördinates to appear as trivially reducible quartic curves.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is described perhaps most definitively on its author’s homepage &amp;lt;ref&amp;gt;Daniel Bernstein. https://ed25519.cr.yp.to/, last updated 2017.01.22.&amp;lt;/ref&amp;gt;. It has been extensively studied and reviewed &amp;lt;ref&amp;gt;Jacqueline Brendel, Cas Cremers, Dennis Jackson, and Mang Zhao. “The Provable Security of Ed25519: Theory and Practice.” &amp;#039;&amp;#039;Cryptology ePrint Archive,&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is described perhaps most definitively on its author’s homepage &amp;lt;ref&amp;gt;Daniel Bernstein. https://ed25519.cr.yp.to/, last updated 2017.01.22.&amp;lt;/ref&amp;gt;. It has been extensively studied and reviewed &amp;lt;ref&amp;gt;Jacqueline Brendel, Cas Cremers, Dennis Jackson, and Mang Zhao. “The Provable Security of Ed25519: Theory and Practice.” &amp;#039;&amp;#039;Cryptology ePrint Archive,&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot;&gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field. This particular choice of prime number is not difficult to explain &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;or justify &lt;/del&gt;as simply the largest suitable prime number that will not overflow a 256-bit or 8-byte array of memory allocated for the efficient machine implementation of arithmetic which is mentioned in the literature. The properties of the [[finite field]] &#039;&#039;GF&#039;&#039;(&#039;&#039;p&#039;&#039;), however, depend heavily on the prime factorization of &amp;lt;math&amp;gt;\phi(p)=p-1&amp;lt;/math&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field. This particular choice of prime number is not difficult to explain as simply the largest suitable prime number that will not overflow a 256-bit or 8-byte array of memory allocated for the efficient machine implementation of arithmetic which is mentioned in the literature. The properties of the [[finite field]] &#039;&#039;GF&#039;&#039;(&#039;&#039;p&#039;&#039;), however, depend heavily on the prime factorization of &amp;lt;math&amp;gt;\phi(p)=p-1&amp;lt;/math&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. Assuming quartic curves reducible to a degree of two are largely irrelevant, the only difficulty for cracking this scheme of public key encryption is the straight discrete [[logarithm problem]] modulo 2²⁵⁵–19&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=122&amp;oldid=prev</id>
		<title>Rational Point: illustration</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=122&amp;oldid=prev"/>
		<updated>2024-12-29T12:00:10Z</updated>

		<summary type="html">&lt;p&gt;illustration&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 12:00, 29 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Image:Ed25519.svg|frame|left|&amp;lt;tt&amp;gt;−x^2 + y^2 = 1 − (121665/121666) * x^2 * y^2&amp;lt;/tt&amp;gt; &amp;lt;ref&amp;gt;Monero Project: Monero docs: Edwards25519 Elliptic Curve https://docs.getmonero.org/cryptography/asymmetric/edwards25519/&amp;lt;/ref&amp;gt;]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot;&gt;Line 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;. Schneier &amp;lt;ref&amp;gt;Bruce Schneier. “Bounty to Recover NIST’s Elliptic Curve Seeds.” &amp;#039;&amp;#039;Schneier on Security,&amp;#039;&amp;#039; Oct 12, 2023. https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. “Announcing the $12K NIST elliptic curve seeds bounty.” &amp;#039;&amp;#039;Cryptography Dispatches,&amp;#039;&amp;#039; Oct 5, 2023. https://words.filippo.io/dispatches/seeds-bounty/&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified &amp;lt;ref&amp;gt;A. Langley, M. Hamburg and S. Turner. “Elliptic Curves for Security.” Technical Report RFC 7748, Jan. 2016. https://datatracker.ietf.org/doc/html/rfc7748&amp;lt;/ref&amp;gt;, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;. Schneier &amp;lt;ref&amp;gt;Bruce Schneier. “Bounty to Recover NIST’s Elliptic Curve Seeds.” &amp;#039;&amp;#039;Schneier on Security,&amp;#039;&amp;#039; Oct 12, 2023. https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. “Announcing the $12K NIST elliptic curve seeds bounty.” &amp;#039;&amp;#039;Cryptography Dispatches,&amp;#039;&amp;#039; Oct 5, 2023. https://words.filippo.io/dispatches/seeds-bounty/&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified &amp;lt;ref&amp;gt;A. Langley, M. Hamburg and S. Turner. “Elliptic Curves for Security.” Technical Report RFC 7748, Jan. 2016. https://datatracker.ietf.org/doc/html/rfc7748&amp;lt;/ref&amp;gt;, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The figure &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;25519 &lt;/del&gt;refers to the prime number 2&amp;lt;sup&amp;gt;255&amp;lt;/sup&amp;gt;&amp;amp;nbsp;–&amp;amp;nbsp;19&amp;amp;nbsp;=&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The figure &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;“25519” &lt;/ins&gt;refers to the prime number 2&amp;lt;sup&amp;gt;255&amp;lt;/sup&amp;gt;&amp;amp;nbsp;–&amp;amp;nbsp;19&amp;amp;nbsp;=&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field. This particular choice of prime number is not difficult to explain or justify as simply the largest suitable prime number that will not overflow a 256-bit or 8-byte array of memory allocated for the efficient machine implementation of arithmetic which is mentioned in the literature. The properties of the [[finite field]] &amp;#039;&amp;#039;GF&amp;#039;&amp;#039;(&amp;#039;&amp;#039;p&amp;#039;&amp;#039;), however, depend heavily on the prime factorization of &amp;lt;math&amp;gt;\phi(p)=p-1&amp;lt;/math&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field. This particular choice of prime number is not difficult to explain or justify as simply the largest suitable prime number that will not overflow a 256-bit or 8-byte array of memory allocated for the efficient machine implementation of arithmetic which is mentioned in the literature. The properties of the [[finite field]] &amp;#039;&amp;#039;GF&amp;#039;&amp;#039;(&amp;#039;&amp;#039;p&amp;#039;&amp;#039;), however, depend heavily on the prime factorization of &amp;lt;math&amp;gt;\phi(p)=p-1&amp;lt;/math&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=112&amp;oldid=prev</id>
		<title>Rational Point: properties of finite field</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=112&amp;oldid=prev"/>
		<updated>2024-12-28T21:41:42Z</updated>

		<summary type="html">&lt;p&gt;properties of finite field&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:41, 28 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l11&quot;&gt;Line 11:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 11:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. This particular choice of prime number is not difficult to explain or justify as simply the largest suitable prime number that will not overflow a 256-bit or 8-byte array of memory allocated for the efficient machine implementation of arithmetic which is mentioned in the literature. The properties of the [[finite field]] &#039;&#039;GF&#039;&#039;(&#039;&#039;p&#039;&#039;), however, depend heavily on the prime factorization of &amp;lt;math&amp;gt;\phi(p)=p-1&amp;lt;/math&amp;gt;&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=107&amp;oldid=prev</id>
		<title>Rational Point: the prime number</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=107&amp;oldid=prev"/>
		<updated>2024-12-28T13:19:03Z</updated>

		<summary type="html">&lt;p&gt;the prime number&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 13:19, 28 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot;&gt;Line 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;. Schneier &amp;lt;ref&amp;gt;Bruce Schneier. “Bounty to Recover NIST’s Elliptic Curve Seeds.” &amp;#039;&amp;#039;Schneier on Security,&amp;#039;&amp;#039; Oct 12, 2023. https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. “Announcing the $12K NIST elliptic curve seeds bounty.” &amp;#039;&amp;#039;Cryptography Dispatches,&amp;#039;&amp;#039; Oct 5, 2023. https://words.filippo.io/dispatches/seeds-bounty/&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified &amp;lt;ref&amp;gt;A. Langley, M. Hamburg and S. Turner. “Elliptic Curves for Security.” Technical Report RFC 7748, Jan. 2016. https://datatracker.ietf.org/doc/html/rfc7748&amp;lt;/ref&amp;gt;, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;. Schneier &amp;lt;ref&amp;gt;Bruce Schneier. “Bounty to Recover NIST’s Elliptic Curve Seeds.” &amp;#039;&amp;#039;Schneier on Security,&amp;#039;&amp;#039; Oct 12, 2023. https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. “Announcing the $12K NIST elliptic curve seeds bounty.” &amp;#039;&amp;#039;Cryptography Dispatches,&amp;#039;&amp;#039; Oct 5, 2023. https://words.filippo.io/dispatches/seeds-bounty/&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified &amp;lt;ref&amp;gt;A. Langley, M. Hamburg and S. Turner. “Elliptic Curves for Security.” Technical Report RFC 7748, Jan. 2016. https://datatracker.ietf.org/doc/html/rfc7748&amp;lt;/ref&amp;gt;, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The figure 25519 refers to the prime number 2&amp;lt;sup&amp;gt;255&amp;lt;/sup&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;–19 &lt;/del&gt;used as the modulus of the finite field.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The figure 25519 refers to the prime number 2&amp;lt;sup&amp;gt;255&amp;lt;/sup&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;amp;nbsp;–&amp;amp;nbsp;19&amp;amp;nbsp;=&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;57896044618658097711785492504343953926634992332820282019728792003956564819949&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;used as the modulus of the finite field.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=106&amp;oldid=prev</id>
		<title>Rational Point: more refs</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=106&amp;oldid=prev"/>
		<updated>2024-12-28T13:10:53Z</updated>

		<summary type="html">&lt;p&gt;more refs&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 13:10, 28 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is described perhaps most definitively on its author’s homepage&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, &lt;/del&gt;https://ed25519.cr.yp.to/, last updated 2017.01.22. Schneier&amp;lt;ref&amp;gt;Bruce Schneier. &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[&lt;/del&gt;https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;“Bounty to Recover NIST’s Elliptic Curve Seeds.”] &#039;&#039;Schneier on Security,&#039;&#039; Oct 12, 2023.&lt;/del&gt;&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[https://words.filippo.io/dispatches/seeds-bounty/ &lt;/del&gt;“Announcing the $12K NIST elliptic curve seeds bounty.”&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;] &lt;/del&gt;&#039;&#039;Cryptography Dispatches,&#039;&#039; Oct 5, 2023.&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Or is it “birationally equivalent?”&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It is described perhaps most definitively on its author’s homepage &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;Daniel Bernstein. &lt;/ins&gt;https://ed25519.cr.yp.to/, last updated 2017.01.22&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&amp;lt;/ref&amp;gt;. It has been extensively studied and reviewed &amp;lt;ref&amp;gt;Jacqueline Brendel, Cas Cremers, Dennis Jackson, and Mang Zhao. “The Provable Security of Ed25519: Theory and Practice.” &#039;&#039;Cryptology ePrint Archive,&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;vol. 2020, no. 823. https://eprint.iacr.org/2020/823.pdf&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/ref&amp;gt;&lt;/ins&gt;. Schneier &amp;lt;ref&amp;gt;Bruce Schneier. &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;“Bounty to Recover NIST’s Elliptic Curve Seeds.” &#039;&#039;Schneier on Security,&#039;&#039; Oct 12, 2023. &lt;/ins&gt;https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. “Announcing the $12K NIST elliptic curve seeds bounty.” &#039;&#039;Cryptography Dispatches,&#039;&#039; Oct 5, 2023. &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;https://words.filippo.io/dispatches/seeds-bounty/&lt;/ins&gt;&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;A. Langley, M. Hamburg and S. Turner. “Elliptic Curves for Security.” Technical Report RFC 7748, Jan. 2016. https://datatracker.ietf.org/doc/html/rfc7748&amp;lt;/ref&amp;gt;&lt;/ins&gt;, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;The figure 25519 refers to the prime number 2&amp;lt;sup&amp;gt;255&amp;lt;/sup&amp;gt;–19 used as the modulus of the finite field&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=60&amp;oldid=prev</id>
		<title>Rational Point: refs and links</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Ed25519&amp;diff=60&amp;oldid=prev"/>
		<updated>2024-12-21T11:35:37Z</updated>

		<summary type="html">&lt;p&gt;refs and links&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Ed25519&amp;#039;&amp;#039;&amp;#039; is a particular implementation of Elliptic Curve Digital Signature Algorithm ([[ECDSA]]) on a particular elliptic curve over a particular finite field, uniquely specified for the purpose, and named “Curve25519.”&lt;br /&gt;
&lt;br /&gt;
It is described perhaps most definitively on its author’s homepage, https://ed25519.cr.yp.to/, last updated 2017.01.22. Schneier&amp;lt;ref&amp;gt;Bruce Schneier. [https://www.schneier.com/blog/archives/2023/10/bounty-to-recover-nists-elliptic-curve-seeds.html “Bounty to Recover NIST’s Elliptic Curve Seeds.”] &amp;#039;&amp;#039;Schneier on Security,&amp;#039;&amp;#039; Oct 12, 2023.&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Filippo Valsorda. [https://words.filippo.io/dispatches/seeds-bounty/ “Announcing the $12K NIST elliptic curve seeds bounty.”] &amp;#039;&amp;#039;Cryptography Dispatches,&amp;#039;&amp;#039; Oct 5, 2023.&amp;lt;/ref&amp;gt; feels that some of these schemes are overspecified, and possibly backdoored by the NSA. For that matter we could just as easily pull a CIA [https://www.cia.gov/the-world-factbook/countries/tonga/factbook factbook on the Tonga], official registrant of the &amp;lt;tt&amp;gt;.to&amp;lt;/tt&amp;gt; top level country code domain.&lt;/div&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
</feed>