What is Curve25519?
A widely-used elliptic curve for key agreement, designed by Daniel Bernstein for high security, speed, and resistance to implementation errors.
Curve25519 is the most popular elliptic curve for Diffie-Hellman key exchange, designed with security and simplicity as primary goals.
Why It's Preferred
- Constant-time by design: Naturally resistant to timing attacks
- No special cases: Unlike NIST curves, Curve25519 has no edge cases to check
- Fast: One of the fastest elliptic curves available
- Widely trusted: Created by a respected independent cryptographer, not a government agency
- Simple to implement correctly: Fewer ways to introduce bugs
Where It's Used
- Signal Protocol (WhatsApp, Signal)
- WireGuard VPN
- SSH (Ed25519 keys)
- Tor
- Age file encryption
- Noise protocol framework
Ed25519
Ed25519 is the signature scheme built on the same curve. Together, X25519 (key exchange) and Ed25519 (signatures) form the foundation of modern cryptographic systems.
Related Terms
Elliptic Curve Cryptography
A public-key cryptography approach based on the algebraic structure of elliptic curves. ECC provides equivalent security to RSA with much smaller key sizes, making it ideal for mobile devices, IoT, and performance-critical applications.
Key Exchange
A cryptographic protocol that allows two parties to establish a shared secret key over an insecure channel. This shared key can then be used for symmetric encryption, enabling secure communication without prior contact.
Signal Protocol
A cryptographic protocol that provides end-to-end encryption for voice and instant messaging conversations. Developed by Open Whisper Systems, it combines the Double Ratchet Algorithm, prekeys, and a triple Diffie-Hellman handshake to provide forward secrecy and future secrecy.
Have more questions?
Use our guided flow to get the right next privacy step for Curve25519.
Open Guided Flow