@noble/curves
Version:
Audited & minimal JS implementation of elliptic curve cryptography
185 lines • 7.07 kB
TypeScript
import type { AffinePoint } from './abstract/curve.ts';
import { PrimeEdwardsPoint, type EdDSA, type EdwardsPoint, type EdwardsPointCons } from './abstract/edwards.ts';
import { type FROST } from './abstract/frost.ts';
import { type H2CHasher, type H2CHasherBase } from './abstract/hash-to-curve.ts';
import { type IField } from './abstract/modular.ts';
import { type MontgomeryECDH } from './abstract/montgomery.ts';
import { type OPRF } from './abstract/oprf.ts';
import { type TArg, type TRet } from './utils.ts';
/**
* ed448 EdDSA curve and methods.
* @example
* Generate one Ed448 keypair, sign a message, and verify it.
*
* ```js
* import { ed448 } from '@noble/curves/ed448.js';
* const { secretKey, publicKey } = ed448.keygen();
* // const publicKey = ed448.getPublicKey(secretKey);
* const msg = new TextEncoder().encode('hello noble');
* const sig = ed448.sign(msg, secretKey);
* const isValid = ed448.verify(sig, msg, publicKey);
* ```
*/
export declare const ed448: EdDSA;
/**
* Prehashed version of ed448. See {@link ed448}
* @example
* Use the prehashed Ed448 variant for one message.
*
* ```ts
* const { secretKey, publicKey } = ed448ph.keygen();
* const msg = new TextEncoder().encode('hello noble');
* const sig = ed448ph.sign(msg, secretKey);
* const isValid = ed448ph.verify(sig, msg, publicKey);
* ```
*/
export declare const ed448ph: EdDSA;
/**
* E448 here is NIST SP 800-186 §3.2.3.3 E448, the Edwards representation of
* Curve448, not RFC 8032 edwards448 / Goldilocks.
* Goldilocks is the separate 4-isogenous curve exposed as `ed448`.
* We keep the corrected prime-order base here; RFC 7748's literal Edwards
* point / map are wrong for this curve model, and the literal point is the
* wrong-sign order-2*n variant.
* @param X - Projective X coordinate.
* @param Y - Projective Y coordinate.
* @param Z - Projective Z coordinate.
* @param T - Projective T coordinate.
* @example
* Multiply the E448 base point.
*
* ```ts
* const point = E448.BASE.multiply(2n);
* ```
*/
export declare const E448: EdwardsPointCons;
/**
* ECDH using curve448 aka x448.
* The wrapper aborts on all-zero shared secrets by default, and seeded
* `keygen(seed)` reuses the provided 56-byte seed buffer instead of copying it.
*
* @example
* Derive one shared secret between two X448 peers.
*
* ```js
* import { x448 } from '@noble/curves/ed448.js';
* const alice = x448.keygen();
* const bob = x448.keygen();
* const shared = x448.getSharedSecret(alice.secretKey, bob.publicKey);
* ```
*/
export declare const x448: TRet<MontgomeryECDH>;
/**
* Hashing / encoding to ed448 points / field. RFC 9380 methods.
* Public `mapToCurve()` consumes one field element bigint for `m = 1`, and RFC
* Appendix J vectors use the special `QUUX-V01-*` test DST overrides rather
* than the default suite IDs below.
* @example
* Hash one message onto the ed448 curve.
*
* ```ts
* const point = ed448_hasher.hashToCurve(new TextEncoder().encode('hello noble'));
* ```
*/
export declare const ed448_hasher: H2CHasher<EdwardsPointCons>;
/**
* FROST threshold signatures over ed448. RFC 9591.
* @example
* Create one trusted-dealer package for 2-of-3 ed448 signing.
*
* ```ts
* const alice = ed448_FROST.Identifier.derive('alice@example.com');
* const bob = ed448_FROST.Identifier.derive('bob@example.com');
* const carol = ed448_FROST.Identifier.derive('carol@example.com');
* const deal = ed448_FROST.trustedDealer({ min: 2, max: 3 }, [alice, bob, carol]);
* ```
*/
export declare const ed448_FROST: TRet<FROST>;
/**
* Each ed448/EdwardsPoint has 4 different equivalent points. This can be
* a source of bugs for protocols like ring signatures. Decaf was created to solve this.
* Decaf point operates in X:Y:Z:T extended coordinates like EdwardsPoint,
* but it should work in its own namespace: do not combine those two.
* See [RFC9496](https://www.rfc-editor.org/rfc/rfc9496).
*/
declare class _DecafPoint extends PrimeEdwardsPoint<_DecafPoint> {
static BASE: _DecafPoint;
static ZERO: _DecafPoint;
static Fp: IField<bigint>;
static Fn: IField<bigint>;
constructor(ep: EdwardsPoint);
/**
* Create one Decaf448 point from affine Edwards coordinates.
* This wraps the internal Edwards representative directly and is not a
* canonical decaf448 decoding path.
* Use `toBytes()` / `fromBytes()` if canonical decaf448 bytes matter.
*/
static fromAffine(ap: AffinePoint<bigint>): _DecafPoint;
protected assertSame(other: _DecafPoint): void;
protected init(ep: EdwardsPoint): _DecafPoint;
static fromBytes(bytes: TArg<Uint8Array>): _DecafPoint;
/**
* Converts decaf-encoded string to decaf point.
* Described in [RFC9496](https://www.rfc-editor.org/rfc/rfc9496#name-decode-2).
* @param hex - Decaf-encoded 56 bytes. Not every 56-byte string is valid decaf encoding
*/
static fromHex(hex: string): _DecafPoint;
/**
* Encodes decaf point to Uint8Array.
* Described in [RFC9496](https://www.rfc-editor.org/rfc/rfc9496#name-encode-2).
*/
toBytes(): TRet<Uint8Array>;
/**
* Compare one point to another.
* Described in [RFC9496](https://www.rfc-editor.org/rfc/rfc9496#name-equals-2).
*/
equals(other: _DecafPoint): boolean;
is0(): boolean;
}
/** Prime-order Decaf448 group bundle. */
export declare const decaf448: {
Point: typeof _DecafPoint;
};
/**
* Hashing to decaf448 points / field. RFC 9380 methods.
* `hashToCurve()` is RFC 9380 `hash_to_decaf448`, `deriveToCurve()` is RFC
* 9496 element derivation, and `hashToScalar()` is a library helper layered on
* top of RFC 9496 scalar reduction.
* @example
* Hash one message onto decaf448.
*
* ```ts
* const point = decaf448_hasher.hashToCurve(new TextEncoder().encode('hello noble'));
* ```
*/
export declare const decaf448_hasher: H2CHasherBase<typeof _DecafPoint>;
/**
* decaf448 OPRF, defined in RFC 9497.
* @example
* Run one blind/evaluate/finalize OPRF round over decaf448.
*
* ```ts
* const input = new TextEncoder().encode('hello noble');
* const keys = decaf448_oprf.oprf.generateKeyPair();
* const blind = decaf448_oprf.oprf.blind(input);
* const evaluated = decaf448_oprf.oprf.blindEvaluate(keys.secretKey, blind.blinded);
* const output = decaf448_oprf.oprf.finalize(input, blind.blind, evaluated);
* ```
*/
export declare const decaf448_oprf: TRet<OPRF>;
/**
* Weird / bogus points, useful for debugging.
* Unlike ed25519, there is no ed448 generator point which can produce full T subgroup.
* Instead, the torsion subgroup here is cyclic of order 4, generated by
* `(1, 0)`, and the array below lists that subgroup set (Klein four-group).
* @example
* Decode one known torsion point for debugging.
*
* ```ts
* import { ED448_TORSION_SUBGROUP, ed448 } from '@noble/curves/ed448.js';
* const point = ed448.Point.fromHex(ED448_TORSION_SUBGROUP[1]);
* ```
*/
export declare const ED448_TORSION_SUBGROUP: readonly string[];
export {};
//# sourceMappingURL=ed448.d.ts.map