cryptonite-0.30: Cryptography Primitives sink
LicenseBSD-style
MaintainerJohn Galt <jgalt@centromere.net>
Stabilityexperimental
Portabilityunknown
Safe HaskellSafe-Inferred
LanguageHaskell2010

Crypto.PubKey.Curve448

Description

Curve448 support

Internally uses Decaf point compression to omit the cofactor and implementation by Mike Hamburg. Externally API and data types are compatible with the encoding specified in RFC 7748.

Synopsis

Documentation

data SecretKey Source #

A Curve448 Secret key

Instances

Instances details
Show SecretKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

NFData SecretKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

Methods

rnf :: SecretKey -> () #

Eq SecretKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

ByteArrayAccess SecretKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

data PublicKey Source #

A Curve448 public key

Instances

Instances details
Show PublicKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

NFData PublicKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

Methods

rnf :: PublicKey -> () #

Eq PublicKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

ByteArrayAccess PublicKey Source # 
Instance details

Defined in Crypto.PubKey.Curve448

data DhSecret Source #

A Curve448 Diffie Hellman secret related to a public key and a secret key.

Instances

Instances details
Show DhSecret Source # 
Instance details

Defined in Crypto.PubKey.Curve448

NFData DhSecret Source # 
Instance details

Defined in Crypto.PubKey.Curve448

Methods

rnf :: DhSecret -> () #

Eq DhSecret Source # 
Instance details

Defined in Crypto.PubKey.Curve448

ByteArrayAccess DhSecret Source # 
Instance details

Defined in Crypto.PubKey.Curve448

Smart constructors

dhSecret :: ByteArrayAccess b => b -> CryptoFailable DhSecret Source #

Create a DhSecret from a bytearray object

publicKey :: ByteArrayAccess bs => bs -> CryptoFailable PublicKey Source #

Try to build a public key from a bytearray

secretKey :: ByteArrayAccess bs => bs -> CryptoFailable SecretKey Source #

Try to build a secret key from a bytearray

Methods

dh :: PublicKey -> SecretKey -> DhSecret Source #

Compute the Diffie Hellman secret from a public key and a secret key.

This implementation may return an all-zero value as it does not check for the condition.

toPublic :: SecretKey -> PublicKey Source #

Create a public key from a secret key

generateSecretKey :: MonadRandom m => m SecretKey Source #

Generate a secret key.