Cryptology ePrint Archive: Report 2020/823

The Provable Security of Ed25519: Theory and Practice

Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao

Abstract: A standard requirement for a signature scheme is that it is existentially unforgeable under chosen message attacks (EUF-CMA), alongside other properties of interest such as strong unforgeability (SUF-CMA), and resilience against key substitution attacks.

Remarkably, no detailed proofs have ever been given for these security properties for EdDSA, and in particular its Ed25519 instantiations. Ed25519 is one of the most efficient and widely used signature schemes, and different instantiations of Ed25519 are used in protocols such as TLS 1.3, SSH, Tor, Zcash, and WhatsApp/Signal. The differences between these instantiations are subtle, and only supported by informal arguments, with many works assuming results can be directly transferred from Schnorr signatures. Similarly, several proofs of protocol security simply assume that Ed25519 satisfies properties such as EUF-CMA or SUF-CMA.

In this work we provide the first detailed analysis and security proofs of Ed25519 signature schemes. While the design of the schemes follows the well-established Fiat-Shamir paradigm, which should guarantee existential unforgeability, there are many side cases and encoding details that complicate the proofs, and all other security properties needed to be proven independently.

Our work provides scientific rationale for choosing among several Ed25519 variants and understanding their properties, fills a much needed proof gap in modern protocol proofs that use these signatures, and supports further standardisation efforts.

Category / Keywords: public-key cryptography / digital signatures, applications, provable security

Original Publication (with minor differences): IEEE Symposium on Security and Privacy (S&P 2021)

Date: received 3 Jul 2020, last revised 14 Oct 2020

Contact author: cremers at cispa saarland

Available format(s): PDF | BibTeX Citation

Version: 20201014:152715 (All versions of this report)

Short URL: ia.cr/2020/823


[ Cryptology ePrint archive ]