What is EdDSA? (2024)

Skip to content

Welcome to Bit2Me Academy

NEW: We have unified Bit2Me and Bit2Me Academy accounts! 🎉 It's now easier than ever to learn about Bitcoin and Web3.

If you already have a Bit2Me account:

Log in

If you don't have a Bit2Me account:

Register on Bit2Me

⚠️ Remember that your Bit2Me Academy credentials will no longer be used to access, you must use your Bit2Me credentials to access Bit2Me Academy.

Do you have problems accessing? FAQs

Home > Security > What is EdDSA?

Table of Contents

Table of Contents

Table of Contents

6 June, 2019

Advanced min reading

What is EdDSA? (11)

The EdDSA cryptographic signature scheme is one of the most secure cryptographic digital signature systems of the moment and whose evolution does not stop. Today EdDSA is clearly demonstrating what it promises: safety, efficiency and speed.

EThere are several cryptographic signature schemes and among them one of the most important is EdDSA. This scheme was created to digitally and unequivocally sign a document or information. This in order to recognize its authenticity or origin. To achieve this, EdDSA makes use of very powerful asymmetric cryptographic techniques. All this in order to ensure that this digital signature cannot be duplicated.

To make it easier, think of EdDSA as a letter stamp that cannot be duplicated. A stamp that at the same time generates a different imprint for each letter that you issue and address to your recipients. An imprint that allows its recipients to verify that this letter was indeed made and signed by their person. Do you like the idea? Well, that is precisely what EdDSA does and hence its enormous power and usability.

For example, EdDSA can be used to guarantee the authenticity of digital documents. Once a digital document is created and signed, the digital signature creates a unique footprint for that document. A manipulation of it no matter how small the signature is invalid. In this way, the document is protected against manipulation and its authenticity is guaranteed in all situations.

The creation of EdDSA was the result of the work of Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe and Bo-Yin Yang. They brought together DSA technology and ECDSA, to which they applied a new elliptical curve that guarantees safety and performance. The first EdDSA document was presented in 2011 and its entire technical specification is in the public domain.

Technical characteristics

EdDSA is packed with features that make it unique compared to other options. Among these we can highlight:

  1. It offers a much faster and computationally efficient signature verification system. This means that it requires little computing power to carry out verifications and can be used on less powerful devices.
  2. It has a faster batch verification capability. This is a characteristics related to the previous one. Consuming little power to perform a verification makes a lot much less expensive to verify. But it is also related to efficiency. EdDSA's algorithm is very friendly with CPU caches. This allows the impact on them to be minimal and the verification speed increases.
  3. The digital signature system is very fast. The document reading, verification and signing process is almost instantaneous.
  4. It offers a fast generation of public and private keys. Key generation is almost as fast as signing.
  5. The signature scheme offers a high level of security. EdDSA's security level is comparable to that of systems such as RSA and ECDSA. For example, breaking a well-built EdDSA signature could take about 4 million years or require a quantum computer.
  6. Collision resistance. Hash function collisions do not break this system. This adds a layer of defense against the possibility of weakness in the selected hash function.
  7. The signatures and keys generated by EdDSA are small. An EdDSA signature occupies about 64 bytes of data. On the other hand, the keys occupy half that size, which makes the system perfect to be applied in systems with reduced bandwidth, storage and power.

How do EdDSA signatures work?

The EdDSA operating process is divided into several stages, among which we have:

Choice of algorithm

First of all we must choose the algorithm to use to create and use our EdDSA signature. Broadly speaking, there are two algorithms whose majority difference is framed in the elliptic curve that it uses. These elliptical curves are the Ed25519 y Ed448. In the case of Ed25519, its security level is very high and comparable with options such as RSA y ECDSA. But Ed448 goes a little further by delivering a clearly higher level of security. However, Ed448 is incompatible with Ed25519 and is more complex to implement.

In any case, the EdDSA operating pillar is the choice of its curve and the level of security required.

Key generation

Once we choose our curve we start the generation of the public key y private key. If EdDSA is a asymmetric cryptography and it is precisely this model that allows its potential to be exploited. At this point, key generation follows the same generation scheme as any asymmetric system. First, the environment must have a random number generator and a safe entropy pool. This ensures the quality of the random numbers applied to the elliptic curve and its unique result.

Once this point has been verified, the generation of the private key begins. This key is what will allow the user to create secure cryptographic signatures at all times. After generating the private key, the creation of the public key begins. The latter is generated in a process of hash the private key using SHA-512. Once the hash is performed, an octal encoding is made to the number generated by the elliptic curve. The result is the public key that we can have so that others can verify the documents that we sign. In this way, we maintain the security of the system and our private key, the origin of our digital signature.

Signed and Verification

Signed using EdDSA is quite simple but effective and secure. The process consists of taking the information that we want to sign and creating a hash of it. This hash guarantees that the random key to generate the public key is completely different at all times. This random key is then applied to the formulation of the elliptic curve which produces the document signature.

This guarantees:

  1. Each document generates a unique "fingerprint" in the form of a SHA-512 hash. SHA-512 is used to add additional security and avoid repeated collisions or hashes. This fingerprint or hash is then used to generate the random key that will be used to generate the digital signature of said document.
  2. The process of using SHA-512 and generating a unique random key for each document increases security. In this way, each signature is unique to each document and remains publicly verifiable.

As you can see, the operation of EdDSA is not complicated at all and in fact offers security that other systems do not. This makes EdDSA a very powerful and secure digital signing system.

Differences between EdDSA and ECDSA

  1. The curves used by both systems are different. EdDSA uses the so-called Edwards elliptic curves, while ECDSA uses more varied elliptic curves.
  2. The signature generation process is completely different. ECDSA generates a unique cryptographically verifiable signature. But EdDSA generates different signatures for each document and are equally verifiable. This is a clearly observable leap in security. In fact, ECDSA can be fully exploited due to this flaw, as happened with the PlayStation 3 hack.
  3. EdDSA signatures and keys are computationally less expensive than ECDSA's. Furthermore both elements in EdDSA are smaller in size than their ECDSA counterpart. This gives EdDSA the advantage of being very user friendly with computing power and bandwidth.

Uses in blockchain technology

EdDSA technology is not very widely spread in blockchain technology. However, many projects have begun to consider a technological migration towards EdDSA due to its potential.

E.g. Rope de R3 It is one of the big blockchain projects that EdDSA firms use. Similarly, other projects prefer to use EdDSA over ECDSA for security and optimization reasons. And the reasons for this choice are quite obvious considering EdDSA's capabilities.

Certainly the EdDSA technology is not as proven against options like RSA and ECDSA, but it has made room. A site that we can see expanded in the not too distant future in the next evolution of blockchain technology.

How much do you know, cryptonuta?

Is EdDSA a symmetric cryptography system?

FALSE!

EdDSA is a crypto system asymmetric. Remember that in these systems public-private key pairs are used and therefore the key to encrypt and the key to decrypt are different. And not only that, it is also capable of generating a public key in each signature.

Advantages and disadvantages

Advantages

  1. They offer a high level of speed, optimization and security in a single application.
  2. EdDSA firms are completely deterministic. This means that firms will always have the same properties and values ​​at all times.
  3. The system offers resistance to side channel attack. This is a security measure that prevents signatures from being broken by this type of brute force attack.
  4. The formulas are valid for all points on the curve, without exceptions. This avoids the need for EdDSA to perform costly point validation on unreliable public values.
  5. EdDSA also provides collision resistance, which means that hash function collisions do not break this system (only applies to PureEdDSA).

Disadvantages

  1. It lacks the level of testing and standardization of other options known as RSA and ECDSA.
  2. Its understanding of use and algorithmic analysis is a little more complex, making software design difficult.
  3. They are incompatible with firms such as ECDSA and RSA. This prevents signature mixes from being possible within a blockchain structure without bookmarks.

Continue the journey in ...

  • What is EdDSA? (12)

Share this article!

What is EdDSA? (13)

What is EdDSA? (14) Author

Washington Gomez

CISO (Chief Information Security Officer)

Washington Gómez is an information security professional with extensive experience in the field of Information Technology and Security. He currently serves as a CISO at Bit2Me.

Read more

Open an account now and receive €5 in prizes

Register on the easiest, safest and most complete platform in the world

Buy Bitcoin Now

What is EdDSA? (2024)

FAQs

What is the full form of EdDSA? ›

In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves. It is designed to be faster than existing digital signature schemes without sacrificing security.

Is Ed25519 the same as EdDSA? ›

Its name can be deceiving though, as it is not based on the Digital Signature Algorithm (DSA) but on Schnorr signatures! Ed25519 is the name given to the algorithm combining EdDSA and the Edwards25519 curve (a curve somewhat equivalent to Curve25519 but discovered later, and much more performant).

What are the benefits of EdDSA? ›

High performance across platforms. You don't need to use a unique random number for each signature (avoiding the PS3 problem, where a reused random number exposed Sony's signing key) Side channel resistance. Small public keys and signatures (32 and 64 bytes respectively for Ed25519)

What is the key length of EdDSA? ›

Introduction to EdDSA

There are two main variants: Ed25519 and Ed448 which are the names of the underlying Edwards Curves. One of the reasons for EdDSA's performance, is the small size of the public keys (32 or 57 bytes) and signatures (64 or 114 bytes).

What type of key is EdDSA? ›

EdDSA keys are much smaller than RSA keys. FAPI 1.0 requires 2048-bits or more for RSA keys and at least 160-bits for elliptic curve keys. The key length, that is the length of the private key, for Ed25519 is 256-bits and 456-bits for Ed448. Thus, EdDSA is suitable for Financial-Grade security.

Is EdDSA Quantum safe? ›

Symmetric ciphers (like AES-256, Twofish-256) are quantum-safe. Most popular public-key cryptosystems (like RSA, DSA, ECDSA, EdDSA, DHKE, ECDH, ElGamal) are quantum-broken! Most digital signature algorithms (like RSA, ECDSA, EdDSA) are quantum-broken!

Is Ed25519 faster than RSA? ›

Compared to traditional RSA keys, Ed25519 key generation is significantly faster. This advantage is especially valuable when dealing with systems that require frequent key generation, such as in large-scale infrastructure setups or automated processes.

Is Ed25519 safer than RSA? ›

Both are widely used for secure data transmission, but they have some key differences in terms of security, efficiency, and key size. Security: ED25519 is based on elliptic curve cryptography, which is considered more secure than RSA.

Is it safe to use Ed25519? ›

The Ed25519 key is much shorter, so initially you might think it is less secure. But these keys use a totally different algorithm, so although the key has fewer characters, it is, for all practical purposes, as secure as the RSA key above.

Is EdDSA deterministic? ›

EdDSA (Edwards-curve Digital Signature Algorithm)

Generates deterministic signatures (same message and key always yield the same signature). Commonly used with Curve25519, a popular and efficient elliptic curve.

What is the difference between ECDSA and EdDSA? ›

The key sizes used in ECDSA and EdDSA are different. Generally, EdDSA keys are smaller compared to ECDSA keys for equivalent security levels, which means that EdDSA can provide equivalent security with smaller key sizes, making it more efficient in terms of storage and bandwidth requirements.

What are the benefits of Ed25519? ›

Ed25519 offers advantages over older signature algorithms like RSA and DSA. It has shorter key lengths, making it more efficient in terms of computation and storage. Additionally, Ed25519 is resistant to many types of attacks, including those based on side-channel information leakage.

Is Ed25519 a cipher? ›

Two things: ed25519 is a signature scheme using public key cryptography, AES is a block cipher using symmetric keys. Public key cryptography is used to safely and conveniently share the symmetric key.

How does Ed25519 signing work? ›

An ED25519 key pair consists of a private key and a corresponding public key. The private key is used to generate digital signatures, while the public key is used to verify the signatures. The ED25519 algorithm is based on the elliptic curve defined over the prime field of 2²⁵⁵-19.

Is Ed25519 better than ECDSA? ›

EdDSA Keys (Ed25519 & Ed448)

It provides equivalent and usually better security than ECDSA and longer key length RSA keys. Its main advantages are small key sizes, fast key generation times, high performance and is resistance against side-channel attacks. Something to note though is its compatibility.

What is the difference between EdDSA and Ecdsa? ›

Performance: EdDSA is often faster than ECDSA, especially for signature generation. Compatibility: ECDSA is more widely adopted in some areas, particularly in cryptocurrencies. Specific requirements: Consider the specific needs of your application when making a choice.

What is the difference between Ecdsa and EdDSA? ›

The key sizes used in ECDSA and EdDSA are different. Generally, EdDSA keys are smaller compared to ECDSA keys for equivalent security levels, which means that EdDSA can provide equivalent security with smaller key sizes, making it more efficient in terms of storage and bandwidth requirements.

What is the difference between EdDSA 255 and 448? ›

It is standardized RFC [RFC 8032] and is based on the Schnorr's signature scheme and uses (possibly twisted) Edwards curves. For Ed25519 we use 32 byte values for both the private key and the public key, and for X448 we use 57 byte values for both the private key and the public key.

What is ECDH and Ecdsa? ›

ECDH: Elliptic Curve Diffie Hellman. Key-sharing algorithm used for asymmetric encryption. ECDSA: Elliptic Curve Digital Signing Algorithm. Digital signing algorithm using elliptic curves (makes sense right?)

Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6101

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.