Difference between revisions of "Ed25519"

From wikieduonline
Jump to navigation Jump to search
(Created page with "* OpenSSH 6.8: March 18, 2015 ** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from D...")
Tags: Mobile web edit, Mobile edit
 
 
(27 intermediate revisions by the same user not shown)
Line 1: Line 1:
* OpenSSH 6.8: March 18, 2015
+
[[wikipedia:Ed25519]] is the [[EdDSA]] [[signature scheme]] using [[SHA-512]] (SHA-2) and [[Curve25519]].
 +
 
 +
== OpenSSH ==
 +
* [[OpenSSH]] 8.5 March, 2021 changes the first-preference signature algorithm from [[ECDSA]] to ED25519.
 +
 
 +
* [[OpenSSH]] 6.8: March 18, 2015
 
** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref>
 
** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref>
** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]]<ref>https://lwn.net/Article
+
** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]] <ref>https://lwn.net/Articles/637147/</ref>
s/637147/</ref>
 
  
 +
== Key management ==
 +
Key generation:
 +
* <code>[[ssh-keygen -t ed25519]]</code>
 +
* <code>ssh-keygen -t ed25519 -f your_new_ed25519_key</code>
  
 +
[[ssh-keygen]] -e -m [[PEM]] -f private_key_in_ed25519_format
 +
do_convert_to_pem: unsupported key type ED25519
  
 +
== Related terms ==
 +
* <code>ssh-ed25519</code> in <code>.[[authorized_keys]]</code> config file
 +
* <code>[[ssh-copy-id]]</code>
 +
* [[EdDSA]]
 +
* [[djb]]
 +
* [[Key size]]
 +
* <code>[[aws ec2 create-key-pair]]</code>
  
 
== See also ==
 
== See also ==
 
* {{OpenSSH}}
 
* {{OpenSSH}}
 +
* {{RSA}}
  
 
[[Category:ssh]]
 
[[Category:ssh]]

Latest revision as of 10:53, 27 February 2024

wikipedia:Ed25519 is the EdDSA signature scheme using SHA-512 (SHA-2) and Curve25519.

OpenSSH[edit]

  • OpenSSH 8.5 March, 2021 changes the first-preference signature algorithm from ECDSA to ED25519.
  • OpenSSH 6.8: March 18, 2015
    • Added new [email protected] extension to facilitate public key discovery and rotation for trusted hosts (for transition from DSA to Ed25519 public host keys)[1]
    • AuthenticationMethods=publickey,publickey to require that users authenticate using two different public keys [2]

Key management[edit]

Key generation:

ssh-keygen -e -m PEM -f private_key_in_ed25519_format
do_convert_to_pem: unsupported key type ED25519

Related terms[edit]

See also[edit]

  • Murenin, Constantine A. (2015-02-01). Soulskill (ed.). "OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519". Slashdot. Retrieved 2015-02-01.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  • https://lwn.net/Articles/637147/
  • Advertising: