It’s 2023 and you’re designing a decentralised system based on public-key cryptography where a person’s identity(ies) are their public key(s).
Do you…
#cryptography #postQuantumCryptography #pqc #pq #ed25519 #curve25519 #x25519 #SmallWeb #Kitten
#kitten #SmallWeb #x25519 #curve25519 #ed25519 #pq #pqc #postquantumcryptography #cryptography
Implementing Curve25519/X25519: A Tutorial on Elliptic Curve Cryptography by @martin
A very accessible text; highly recommended if you want to understand the concepts underpinning the encryption used in TLS, Signal, etc.
Starts at modular arithmetic and covers Diffie-Hellman key exchange with clear explanations of cyclic groups and finite field and elliptic curve arithmetic within the context of the Montgomery curve used in Curve25519.
In case anybody wants to play with the PQC key agreement #Google is currently using between internal systems (in addition to classic #X25519) as published at https://cloud.google.com/blog/products/identity-security/why-google-now-uses-post-quantum-cryptography-for-internal-comms, the code is available as open source: https://github.com/google/boringssl/blob/master/ssl/test/runner/key_agreement.go
Funny when you think I was hanging out with Daniel ages ago without a clue who he was or what he’d done.
And to think how important his work is to the Small Web (and to privacy in general in the digital and networked age)…
PS. He also happens to be a lovely, humble guy and a very engaging and funny presenter. You can do far worse than to watch his talk from the conference we met at:
https://projectbullrun.org/surveillance/2015/video-2015.html
#cryptography #ed25519 #curve25519 #x25519 #DanielJBernstein #SmallWeb
#SmallWeb #danieljbernstein #x25519 #curve25519 #ed25519 #cryptography
Why isn’t this in every browser?
#cryptography #x25519 #ed25519