mleku on Nostr: just sayin, they also left out the koblitz version of P256, which is our known and ...
just sayin, they also left out the koblitz version of P256, which is our known and loved secp256k1
the propaganda campaign against the koblitz curve was incredible, yet somehow they have given ed25519 a pass... which smells pretty fishy to me, almost like, they KNOW that the koblitz curve is even more secure than the edwards twisted curve
the only solution, as i see it, is a noise protocol implementation that uses sha256 and secp256k1 for HMAC, and i started on building one for #golang
i already spotted this egregiously obvious manipulation in the "academic" scene years ago, and i'm pretty sure that
fiatjaf (npub180c…h6w6) picked bip-340 secp256k1 X-only schnorr signatures for #nostr
you know why i don't trust edwards?
because all the shitcoins used it
because your precious fucking rust favorizes it
funny how still there is no viable shortcut to bruteforcing bitcoin's koblitz curve group now isn't it?
nice to see that you are thinking about this though, welcome to the NIST cryptography skeptics club
Published at
2025-04-07 10:13:01Event JSON
{
"id": "76df14cc266dec0e82b9e3914ac774802956f665cf75f92096d1d991a38d86b8",
"pubkey": "4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f",
"created_at": 1744020781,
"kind": 1,
"tags": [
[
"t",
"golang"
],
[
"t",
"nostr"
],
[
"e",
"0a8f44d66aa2ceb06000cea92283b9e086677872ed0e76e3624a24035b2a93be",
"wss://theforest.nostr1.com/",
"root",
"ee11a5dff40c19a555f41fe42b48f00e618c91225622ae37b6c2bb67b76c4e49"
],
[
"p",
"3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"
],
[
"p",
"ee11a5dff40c19a555f41fe42b48f00e618c91225622ae37b6c2bb67b76c4e49"
],
[
"client",
"jumble"
]
],
"content": "just sayin, they also left out the koblitz version of P256, which is our known and loved secp256k1\n\nthe propaganda campaign against the koblitz curve was incredible, yet somehow they have given ed25519 a pass... which smells pretty fishy to me, almost like, they KNOW that the koblitz curve is even more secure than the edwards twisted curve\n\nthe only solution, as i see it, is a noise protocol implementation that uses sha256 and secp256k1 for HMAC, and i started on building one for #golang\n\ni already spotted this egregiously obvious manipulation in the \"academic\" scene years ago, and i'm pretty sure that nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 picked bip-340 secp256k1 X-only schnorr signatures for #nostr\n\nyou know why i don't trust edwards?\n\nbecause all the shitcoins used it\n\nbecause your precious fucking rust favorizes it\n\nfunny how still there is no viable shortcut to bruteforcing bitcoin's koblitz curve group now isn't it?\n\nnice to see that you are thinking about this though, welcome to the NIST cryptography skeptics club",
"sig": "b534e0d248a808aa013d028a5c8a422f95994d26fe8c272da8d918c949242be18bc7c4241fbf8c1540518167f20cd43b0ab3dded7779f47b1aac25d914ff0141"
}