Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 370

Ed25519

What is Ed25519?

Ed25519An EdDSA signature scheme over the twisted Edwards curve edwards25519, offering ~128-bit security with deterministic, fast, side-channel-resistant signing as defined in RFC 8032.


Ed25519 is the most widely deployed instance of the Edwards-curve Digital Signature Algorithm (EdDSA), specified in RFC 8032. It uses the twisted Edwards curve edwards25519 (birationally equivalent to Curve25519) over the prime field 2^255 - 19, producing 32-byte public keys and 64-byte signatures with approximately 128 bits of security. Signing is deterministic: the per-signature nonce is derived from the private key and message via SHA-512, eliminating the catastrophic nonce-reuse failure that affects ECDSA. Implementations are constant-time and complete-formula, making side-channel attacks much harder. Ed25519 is the default in OpenSSH, WireGuard, GnuPG, TLS 1.3, Signal, and modern code-signing systems.

Examples

  1. 01

    OpenSSH `ssh-keygen -t ed25519` host and user keys.

  2. 02

    Solana, Cardano, and other blockchains use Ed25519 for transaction signing.

Frequently asked questions

What is Ed25519?

An EdDSA signature scheme over the twisted Edwards curve edwards25519, offering ~128-bit security with deterministic, fast, side-channel-resistant signing as defined in RFC 8032. It belongs to the Cryptography category of cybersecurity.

What does Ed25519 mean?

An EdDSA signature scheme over the twisted Edwards curve edwards25519, offering ~128-bit security with deterministic, fast, side-channel-resistant signing as defined in RFC 8032.

How does Ed25519 work?

Ed25519 is the most widely deployed instance of the Edwards-curve Digital Signature Algorithm (EdDSA), specified in RFC 8032. It uses the twisted Edwards curve edwards25519 (birationally equivalent to Curve25519) over the prime field 2^255 - 19, producing 32-byte public keys and 64-byte signatures with approximately 128 bits of security. Signing is deterministic: the per-signature nonce is derived from the private key and message via SHA-512, eliminating the catastrophic nonce-reuse failure that affects ECDSA. Implementations are constant-time and complete-formula, making side-channel attacks much harder. Ed25519 is the default in OpenSSH, WireGuard, GnuPG, TLS 1.3, Signal, and modern code-signing systems.

How do you defend against Ed25519?

Defences for Ed25519 typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Ed25519?

Common alternative names include: EdDSA over edwards25519, RFC 8032 Ed25519.

Related terms

See also