Difference between revisions of "Ed25519"

From wikieduonline
Jump to navigation Jump to search
Line 6: Line 6:
 
* [[OpenSSH]] 6.8: March 18, 2015
 
* [[OpenSSH]] 6.8: March 18, 2015
 
** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref>
 
** Added new <kbd>[email protected]</kbd> extension to facilitate public key discovery and rotation for trusted hosts (for transition from [[Digital Signature Algorithm|DSA]] to [[Ed25519]] public host keys)<ref>{{cite web |url=http://it.slashdot.org/story/15/02/01/0533208/openssh-will-feature-key-discovery-and-rotation-for-easier-switching-to-ed25519 |title= OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519 |first=Constantine A. |last=Murenin |editor=Soulskill |date=2015-02-01 |accessdate=2015-02-01 |publisher=[[Slashdot]]}}</ref>
** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]]<ref>https://lwn.net/Article
+
** <code>AuthenticationMethods=publickey,publickey</code> to require that users authenticate using two different [[public keys]] <ref>https://lwn.net/Articles/637147/</ref>
s/637147/</ref>
 
  
 
== Key management ==
 
== Key management ==

Revision as of 10:24, 26 October 2021

wikipedia:Ed25519 is the EdDSA signature scheme using SHA-512 (SHA-2) and Curve25519.

OpenSSH

  • OpenSSH 8.5 March, 2021 changes the first-preference signature algorithm from ECDSA to ED25519.
  • OpenSSH 6.8: March 18, 2015
    • Added new [email protected] extension to facilitate public key discovery and rotation for trusted hosts (for transition from DSA to Ed25519 public host keys)[1]
    • AuthenticationMethods=publickey,publickey to require that users authenticate using two different public keys [2]

Key management

Key generation:

ssh-keygen -e -m PEM -f private_key_in_ed25519_format
do_convert_to_pem: unsupported key type ED25519

Related terms

See also

  • Murenin, Constantine A. (2015-02-01). Soulskill (ed.). "OpenSSH Will Feature Key Discovery and Rotation For Easier Switching To Ed25519". Slashdot. Retrieved 2015-02-01.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  • https://lwn.net/Articles/637147/
  • Advertising: