Difference between revisions of "Ed25519"
Jump to navigation
Jump to search
↑ Murenin, Constantine A. (2015-02-01). Soulskill (ed.). "OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519". Slashdot. Retrieved 2015-02-01.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
↑ https://lwn.net/Articles/637147/
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | [[wikipedia:Ed25519]] is the [[EdDSA]] signature scheme using [[SHA-512]] (SHA-2) and [[Curve25519]]. | + | [[wikipedia:Ed25519]] is the [[EdDSA]] [[signature scheme]] using [[SHA-512]] (SHA-2) and [[Curve25519]]. |
== OpenSSH == | == OpenSSH == | ||
Line 6: | Line 6: | ||
* [[OpenSSH]] 6.8: March 18, 2015 | * [[OpenSSH]] 6.8: March 18, 2015 | ||
** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref> | ** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref> | ||
− | ** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]]<ref>https://lwn.net/ | + | ** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]] <ref>https://lwn.net/Articles/637147/</ref> |
− | |||
== Key management == | == Key management == | ||
Line 23: | Line 22: | ||
* [[djb]] | * [[djb]] | ||
* [[Key size]] | * [[Key size]] | ||
+ | * <code>[[aws ec2 create-key-pair]]</code> | ||
== See also == | == See also == |
Latest revision as of 10:53, 27 February 2024
wikipedia:Ed25519 is the EdDSA signature scheme using SHA-512 (SHA-2) and Curve25519.
OpenSSH[edit]
- OpenSSH 6.8: March 18, 2015
- Added new [email protected] extension to facilitate public key discovery and rotation for trusted hosts (for transition from DSA to Ed25519 public host keys)[1]
AuthenticationMethods=publickey,publickey
to require that users authenticate using two different public keys [2]
Key management[edit]
Key generation:
ssh-keygen -t ed25519
ssh-keygen -t ed25519 -f your_new_ed25519_key
ssh-keygen -e -m PEM -f private_key_in_ed25519_format do_convert_to_pem: unsupported key type ED25519
Related terms[edit]
ssh-ed25519
in.authorized_keys
config filessh-copy-id
- EdDSA
- djb
- Key size
aws ec2 create-key-pair
See also[edit]
- OpenSSH (changelog):
/etc/ssh/sshd_config
|/etc/ssh/ssh_config
|~/.ssh/
|openSSL | sshd logs
|sftp
|scp
|authorized_keys
|ssh-keygen
|ssh-keyscan
|ssh-add
|ssh-agent
|ssh
|Ssh -O stop
|ssh-copy-id
|CheckHostIP
|UseKeychain
, OpenSSF - Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
, Signature, key length, Easyrsa, OAEP, Ron Rivest, Adi Shamir, Leonard Adleman
Advertising: