Correct method to generate a Curve25519 keypair

Stef Bon stefbon at gmail.com
Wed Jul 18 08:33:39 CEST 2018


Op vr 29 jun. 2018 om 05:09 schreef Alexander Lyon <arlyon at me.com>:

> djb-tweak and comp are necessary to generate the key. I have not found out
> how to make it work without those flags. In fact, changing comp
> (compressed) to nocomp causes the program to crash.
>
>
the flag "comp" is not required. See in the tests/t-cv25519.c line +-  176.

Futher hwo do you create the shared secret k. This is described in
https://git.libssh.org/projects/libssh.git/tree/doc/curve25519-sha256@libssh.org.txt
4.3 Shared secret generation.
It goes via scalar multiplication of the "other side's public key and the
local private key scalar".
Both are available, but scalar multiplaction of q_s and d_c?

Stef
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gcrypt-devel/attachments/20180718/500e0906/attachment.html>


More information about the Gcrypt-devel mailing list