If ed25519 is that attractive that it seems to be, can someone explain why adoption has been slow and if there are, if any, challenges with implementing ed25519.
Nathan Aw
If ed25519 is that attractive that it seems to be, can someone explain why adoption has been slow and if there are, if any, challenges with implementing ed25519.
Nathan Aw
In general, assumptions that have been around for a long time are considered far preferable to new ones. Although a new curve is not strictly a new assumption, these curves do have special structure and so may contain surprises. This is not to say that they do contain surprises, and indeed they are not vulnerable to any KNOWN attacks (but that is only what is known). Also, note that EdDSA may be less side-channel resistant than expected, as shown in Daniel Genkin's talk at RWC 2018.
Most CAs are business-oriented, meaning their certificate issuing software system are written under bureaucratic forces - the result of this type of software development, is that update to products often take years if not decades to occur.
So when the non-techy shareholders sitting around board table, the last thing they can understand is the advantageous properties of EdDSA such as misuse-resistant, side-channel safe, etc. No wonder why they can't move forward to invest in that.