Ed25519 is a high-speed public-key
ed25519.py is based on the original Python
implementation published on the Ed25519 website, with major
optimizations to make it run reasonably fast.
This code is not safe for use with secret data. Even operating on public data (i.e., verifying public signatures on public messages), it is slower than alternatives.
The issue is that our computations may behave differently depending on their inputs in ways that could reveal those inputs to an attacker; they may take different amounts of time, and may have different memory access patterns. These side-channel attacks are difficult to avoid in Python, except perhaps with major sacrifice of efficiency.
This code may be useful in cases where you absolutely cannot have any C code dependencies. Otherwise, PyNaCl provides a version of the original author's C implementation, which runs faster and is carefully engineered to avoid side-channel attacks.
Running the tests
ed25519.py uses tox to run the test suite. You can run all the tests by using:
- IRC (#cryptography-dev - irc.freenode.net)