A dead simple tool to sign files and verify digital signatures. https://jedisct1.github.io/minisign/
Find a file
Maxim Ivanov 5e81e5a3c6 fix "new.key: Is a directory" and a memleak when generating a keypair
Test: minisign -G -p new.pub -s new.key
Expected: new.pub and new.key appears in CWD
Actual: error "new.key: Is a directory" and no keys
2017-12-14 14:37:18 +02:00
share/man/man1 No need to manually move the secret key to ~/.minisign any more 2016-08-01 01:17:25 +02:00
src fix "new.key: Is a directory" and a memleak when generating a keypair 2017-12-14 14:37:18 +02:00
.gitignore Initial import 2015-06-07 21:06:23 +02:00
.travis.yml Travis: build with non-deterministic signatures 2017-10-18 09:02:57 +02:00
CMakeLists.txt Version bump 2016-08-01 00:47:33 +02:00
LICENSE 2017 2017-07-07 22:14:43 +02:00
README.md Add a note on ED25519_NONDETERMINISTIC 2017-10-18 09:30:46 +02:00

Minisign

Minisign is a dead simple tool to sign files and verify signatures.

For more information, please refer to the Minisign documentation

Tarballs and pre-compiled binaries can be verified with the following public key:

RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3

Compilation / installation

Dependencies:

Compilation:

$ mkdir build
$ cd build
$ cmake ..
$ make
# make install

Minisign is also available in Homebrew:

$ brew install minisign

Minisign is also available in Scoop on Windows:

$ scoop install minisign

Minisign is also available in chocolatey on Windows:

$ choco install minisign

Additional tools

  • minisign-misc is a very nice set of workflows and scripts for macOS to verify and sign files with minisign.

Alternative implementations

  • rsign is a minisign implementation written in Rust.

Faults injections

Minisign uses the EdDSA signature system, and deterministic signature schemes are fragile against fault attacks. However, conducting these requires physical access or the attacker having access to the same physical host.

More importantly, this requires a significant amount of time, and messages being signed endlessly while the attack is being conducted.

If such a scenario ever happens to be part of your threat model, libsodium should be compiled with the ED25519_NONDETERMINISTIC macro defined. This will add random noise to the computation of EdDSA nonces.