The @noble/curves package is a highly secure and thoroughly audited JavaScript library designed for elliptic curve cryptography (ECC). As a part of the noble cryptography suite, this package emphasizes security, minimalism, and ease of audit, all while maintaining zero or minimal dependencies. Its streamlined design and comprehensive feature set make it an ideal choice for a wide array of cryptographic applications, such as secure messaging, digital signatures, and key exchange protocols.
With its focus on robust security, straightforward auditability, and high performance, the @noble/curves package stands as a reliable solution for modern web and mobile applications that require strong cryptographic operations.
Paul is the founding developer behind @noble packages which are used by different web3 ecosystems. He is well known for his contributions via @noble/curves and @noble/hashes packages which are directly/indirectly being used by the majority of the modern web3 protocols/toolings/platforms which includes even the forum you’re currently reading this proposal on!
The Polkadot ecosystem currently lacks a well-maintained and audited sr25519 npm package in a pure JavaScript/TypeScript implementation. While the @noble/ed25519 package is already available and utilized by Polkadot-JS over @polkadot/wasm-crypto for handling BigInt operations, there is no equivalent for sr25519. This gap presents a challenge for developers who require a reliable and efficient way to work with sr25519 in native JS/TS within the Polkadot ecosystem, particularly when dealing with large numbers that exceed JavaScript's standard Number primitive. Filling this gap with a properly maintained package would enhance developer reach and flexibility across the ecosystem.
We came across the noble packages while preparing for our next project. We found that there is the ed25519 package which can be used with some patchy ways for our implementation. Then we came across the discussion on a closed issue by ntn-x2 where Paul showed interest in the integration of the sr25519 curve, subject to sponsorship availability. So we followed up with him and he wanted to pursue this further. Considering the impact of Paul’s work on the whole web3 space, we decided to voluntarily curate his proposal and take care of all the administrative work (as per his request). The entire amount corresponding to this proposal and the audit sponsorship proposal (yet to be proposed) will go to him and the auditing entity. In this whole process, Edgetributor SubDAO or Edgeware DAO or any Edgeware contributors are not getting financially benefited by any means.
Budget distribution:
Notable terms:
Requested amount: 20000 18000 USD
Fee buffer amount for fiat conversion(10%): 2000 1800 USD {unused amount will be refunded to the treasury}
Total: 22000 19800 USDT
Multisig: 14XNJmoUzkvmh9cYoqG4axBRR4BWzWRbnFP79oiZgKu7V9bz
Changelog:
Jeff Burdges suggested removing MuSig, considering its near-to-no adoption across the ecosystem. He also suggested supporting the upcoming OLAF protocol, which can be done through a separate proposal as it is currently in the WIP phase. The proposal has been updated as per the new estimation by Paul Miller after removing the MuSig from the development scope. Huge thanks to Shawn Tabrizi for the feedback on the AAG presentation and for advocating to take feedback from Jeff Burdges.
how long will this be maintained for? will there be continuous maintenance cost in the future?
I would 110% vouch for Cure53, there is a lot of talented security people working there such as Mario and Jesper.
Aye
~flipchan