Transformers Chain Network Explained (4)

in LeoFinance5 months ago

Screenshot_2024-01-03-15-12-16-764-edit_com.miui.gallery.jpg

Elliptic curve encryption

Elliptic curve encryption technology is a public key cryptography method based on the discrete logarithm problem between points on the elliptic curve and integers. Compared to traditional RSA and DSA algorithms, elliptic curve encryption has higher security and lower computational complexity.

Ed25519 algorithm

Ed25519 is a high-performance digital signature algorithm based on elliptic curve encryption (ECC) technology in the field of cryptography. It was jointly designed by Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe and Bo Yin Yang in 2011. Ed25519 aims to provide shorter signatures and public keys while maintaining high security and performance. Ed25519 is widely used in many scenarios, such as SSH keys, TLS certificates, cryptocurrencies, etc. It plays an important role in internet security, blockchain technology, and various encryption applications.

The safety of ED25519 conic curve has been widely recognized in both mathematics and practice, and it also has extremely fast generation and verification speed, improving the verification speed of transactions while ensuring security.

Features of Ed25519

  1. High performance: Ed25519 performs excellently in terms of signature and verification speed. Compared to other signature algorithms such as RSA, DSA, and ECDSA, Ed25519 can provide faster signature and verification speeds in most scenarios. This makes Ed25519 perform well in blockchain systems with high throughput and low latency.

  2. Short Key and Signature Length: Ed25519 uses efficient elliptic curve cryptography, with relatively short key and signature lengths. Shorter key and signature lengths mean lower storage and transmission costs, which are crucial for blockchain systems as they require broadcasting a large number of transactions on the network.

  3. High Security: Ed25519 is based on the Edwards curve Digital Signature Algorithm (EdDSA), which has high security. Compared to other signature algorithms, Ed25519 is competitive in terms of cryptographic strength and has strong resistance to quantum computing attacks.

  4. Anti side channel attacks: Ed25519 has taken into account the characteristics of anti side channel attacks in its design. Side channel attacks refer to attacks that recover keys by analyzing information leaks (such as time, power consumption, etc.) in hardware or software implementations. The anti side channel attack feature of Ed25519 helps to improve the security of blockchain systems.

  5. Simple and easy to implement: The design of Ed25519 is relatively simple, easy to implement and review. This helps to reduce implementation errors and potential security vulnerabilities. In addition, Ed25519 has been widely used in many open source libraries and projects, making it highly available and interoperable in practical applications

That's all for part three, stay tuned for part four
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain