Paul Miller's avatar
Paul Miller
paul@paulmillr.com
npub10jcn...3kag
Noble cryptography. OSS, infosec.
Paul Miller's avatar
paulmillr 4 months ago
noble cryptography v2 is out. Improvements include Schnorr implementation in 5kb noble-secp256k1, hybrid pq algorithms, OPRFs, friendly wrappers around native WebCrypto, better security, and much more. Live on GitHub, NPM & JSR.
Paul Miller's avatar
paulmillr 1 year ago
Announcing noble-post-quantum: minimal JS implementation of ML-KEM, ML-DSA and SLH-DSA. Also known as Kyber, Dilithium and SPHINCS+. Only 2000 lines of code - great learning resource for anyone who’s messing with PQ stuff. Check out README for algorithm comparison and usage guidelines.
Paul Miller's avatar
paulmillr 2 years ago
2023 progress on JS cryptography: - noble-hashes: 400K => 1.7M downloads per week - noble-curves: ~0 => 0.9M, got 2 audits - noble-ciphers: 0 => 25K - Finally adopted by ProtonMail, MetаMасk, Rainbow, Rabby, ethers, web3.js, viem Takes time, but we’re getting there.
Paul Miller's avatar
paulmillr 2 years ago
Signal is cool, but do you know what is cooler? Chatting on decentralized social network. We’ve implemented and audited end-to-end encrypted direct messaging for nostr. 
 
Thanks to Jon (npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn), OpenSats, Michael (npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c), ekzyis (npub16x07c4qz05yhqe2gy2q2u9ax359d2lc0tsh6wn3y70dmk8nv2j2s96s89d), Vitor (npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z), Cure53, Matthew Green and everyone else involved. 
https://github.com/nostr-protocol/nips/blob/master/44.md,
Paul Miller's avatar
paulmillr 2 years ago
New noble cryptography releases are out: - NPM provenance is now used for transparent builds, to strengthen supply chain security [1] - ed25519 and ed448 now provide non-repudiation (Strongly Binding Signatures). The feature is not present in most other libraries [2] - tweetnacl users (including DJB's C version): it's time to switch away. It does not provide SUF-CMA, meaning, in some circumstances, the signatures are malleable [3] 1. 2. https://csrc.nist.gov/csrc/media/Presentations/2023/crclub-2023-03-08/images-media/20230308-crypto-club-slides--taming-the-many-EdDSAs.pdf 3.
Paul Miller's avatar
paulmillr 2 years ago
4KB cryptography. Does that sound safe? Because it should. Announcing v2 of single-feature modules noble secp256k1 and noble ed25519. secp is just 430 lines of code (4KB gzipped), ed is only 330 lines (3.3KB gzipped) — 4x smaller than previous versions. Tweetnacl was a great idea. Smaller attack surface means less things that could go wrong. New libraries develop the concept further: there are tons of comments everywhere, describing how things work - makes it much easier for cryptography newcomers to read.
Paul Miller's avatar
paulmillr 2 years ago
@npub1teawtzxh6y02cnp9jphxm2q8u6xxfx85nguwg6ftuksgjctvavvqnsgq5u Verifying My Public Key: "paulmillr"
Paul Miller's avatar
paulmillr 2 years ago
Hello, world. Message made with #noble-crypto