Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Aug 25, 2025

This PR contains the following updates:

Package Change Age Confidence
@noble/curves (source) ^1.0.0 -> ^2.0.0 age confidence

Release Notes

paulmillr/noble-curves (@​noble/curves)

v2.0.1

Compare Source

  • Disable extension-less imports. If you've used /ed25519, switch to /ed25519.js now. See 2.0.0 for more details.
  • package.json: specify exported submodules to ensure typescript autocompletion
  • package.json: bump hashes to 2.0.1 with scrypt & pkg.json changes
  • ed25519: export map_to_curve_elligator2_curve25519 #​211
  • bls: try-catch pairingBatch in bls12_381.verify() by @​MegaManSec in #​212
  • fft: expose extra info in rootsOfUnity

New Contributors

GitHub Immutable Releases

This GH release does not include standalone noble-curves.js: use 2.0.0 for now, until we upgrade to newly added Immutable Releases

Full Changelog: paulmillr/noble-curves@2.0.0...2.0.1

v2.0.0

Compare Source

High-level

v2 massively simplifies internals, improves security, reduces bundle size and lays path for the future. To simplify upgrading, upgrade first to curves 1.9.x. It would show deprecations in vscode-like text editor.

  • The package is now ESM-only. ESM can finally be loaded from common.js on node v20.19+
    • Node v20.19 is now the minimum required version
    • Package imports now work correctly in bundler-less environments, such as browsers
    • Reduces npm package size (traffic consumed): 354KB => 300KB
    • Reduces unpacked npm size (on-disk space): 2.1MB => 1.2MB
  • Make bundle sizes smaller, compared to v1.x: -4KB for schnorr, -5.3KB for ristretto255, -9.4KB for x448
  • .js extension must be used for all modules
    • Old: @noble/curves/ed25519
    • New: @noble/curves/ed25519.js
    • This simplifies working in browsers natively without transpilers
New features
  • webcrypto: create friendly noble-like wrapper over built-in WebCrypto
  • oprf: implement RFC 9497 OPRFs (oblivious pseudorandom functions)
    • We support p256, p384, p521, ristretto255 and decaf44
  • weierstrass, edwards: add isValidSecretKey, isValidPublicKey
  • misc: add Brainpool curves: brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Changes
  • Most methods now expect Uint8Array, string hex inputs are prohibited
    • The change simplifies reasoning, improves security and reduces malleability
    • Point.fromHex now expects string-only hex inputs, use Point.fromBytes for Uint8Array
  • Breaking changes of ECDSA (secp256k1, p256, p384...):
    • sign, verify: Switch to prehashed messages. Instead of
      messageHash, the methods now expect unhashed message.
      To bring back old behavior, use option {prehash: false}
    • sign, verify: Switch to lowS signatures by default.
      This change doesn't affect secp256k1, which has been using lowS since beginning.
      If you tested against specific sign / verify vectors, upgrading to v2 would fail, unless old behavior is brought back.
      To bring back old behavior, use option {lowS: false}
    • sign, verify: Switch to Uint8Array signatures (format: 'compact') by default.
    • verify: der format must be explicitly specified in {format: 'der'}.
      This reduces malleability
    • verify: prohibit Signature-instance signature. User must now always do
      signature.toBytes()
  • Breaking changes of BLS signatures (bls12-381, bn254):
    • Move getPublicKey, sign, verify, signShortSignature etc into two new namespaces:
      bls.longSignatures (G1 pubkeys, G2 sigs) and bls.shortSignatures (G1 sigs, G2 pubkeys).
    • verifyBatch now expects array of inputs {message: ..., publicKey: ...}[]
  • Curve changes:
    • Massively simplify curve creation, split it into point creation & sig generator creation
    • New methods are weierstrass() + ecdsa() / edwards() + eddsa()
    • weierstrass / edwards expect simplified curve params (Fp became p)
    • ecdsa / eddsa expect Point class and hash
    • Remove unnecessary Fn argument in pippenger
  • modular changes:
    • Field#fromBytes() now validates elements to be in 0..order-1 range
  • Upgrade typescript compilation env to ts5.9 and es2022
  • Massively improve error messages, make them more descriptive
Renamings
  • Module changes
    • p256, p384, p521 modules have been moved into nist
    • jubjub module has been moved into misc
  • Point changes
    • ExtendedPoint, ProjectivePoint => Point
    • Point coordinates (projective / extended) from px/ex, py/ey, pz/ez, et => X, Y, Z, T
    • Point.normalizeZ, Point.msm => separate methods in abstract/curve.js submodule
    • Point.fromPrivateKey() got removed, use Point.BASE.multiply() and Point.Fn.fromBytes(secretKey)
    • toRawBytes, fromRawBytes => toBytes, fromBytes
    • RistrettoPoint => ristretto255.Point, DecafPoiont => decaf44.Point
  • Signature (ECDSA) changes
    • toCompactRawBytes, toDERRawBytes => toBytes('compact'), toBytes('der')
    • toCompactHex, toDERHex => toHex('compact'), toHex('der')
    • fromCompact, fromDER => fromBytes(format), fromHex(format)
  • utils changes
    • randomPrivateKey => randomSecretKey
    • utils.precompute, Point#_setWindowSize => Point#precompute
    • edwardsToMontgomery => utils.toMontgomery
    • edwardsToMontgomeryPriv => utils.toMontgomerySecret
  • Rename all curve-specific hash-to-curve methods to *curve*_hasher.
    Example: secp256k1.hashToCurve => secp256k1_hasher.hashToCurve()
  • Massive type renamings and improvements
Removed features
  • Point#multiplyAndAddUnsafe, Point#hasEvenY
  • CURVE property with all kinds of random stuff. Point.CURVE() now replaces it, but only provides
    curve parameters
  • Remove pasta, bn254_weierstrass (NOT pairing-based bn254) curves
  • Field.MASK
  • utils.normPrivateKeyToScalar

Full Changelog: paulmillr/noble-curves@1.9.6...2.0.0

v1.9.7

Compare Source

  • edwards: rename newly introduced / experimental toMontgomeryPriv => toMontgomerySecret
  • weierstrass: Add back SignatureConstructor
  • More deprecations and preparations for v2

Full Changelog: paulmillr/noble-curves@1.9.6...1.9.7

v1.9.6

Compare Source

  • edwards: expose nBitLength, nByteLength
  • Experimental CurveLengths interface: rename secret, public to secretKey, publicKey
  • Point precomputes: initialize calculation earlier, within weierstrass() method (still lazy, waits for first call)
  • bls: new internal tower from v2
  • ed448: Ensure there are two different Fn fields with different BITS length for ed448 / decaf44

Full Changelog: paulmillr/noble-curves@1.9.5...1.9.6

v1.9.5

Compare Source

  • Fix rollup warnings from gh-205
  • add back aliases for secp256r1 / secp384r1 / secp521r1 from gh-203
  • bring back CURVE.nByteLength from gh-202
  • More preparations and deprecations for future v2 release

Full Changelog: paulmillr/noble-curves@1.9.4...1.9.5

v1.9.4

Compare Source

  • Fix gh-201: invalid renaming of ProjConstructor
  • Add more deprecations for the upcoming v2

Full Changelog: paulmillr/noble-curves@1.9.3...1.9.4

v1.9.3

Compare Source

The release contains bugfixes and a few improvements which pave the way for upcoming v2.0.

There are lots of renamings and API adjustments; but all old code would work as-is. The code would visually flagged as "deprecated" (using jsdoc flag) in typescript-supported code environments, which makes it easy to upgrade to new versions.

  • Rename *privateKey to *secretKey everywhere for consistency with post-quantum and non-noble libraries
  • Add keygen method to curves which creates both secret and public keys
  • weierstrass: make endomorphism generic and work for all Koblitz curves
  • weierstrass: add fromBytes and toBytes to Signature, deprecate fromDER, fromCompact, toDERRawBytes, toCompactRawBytes
  • edwards: move edwardsToMontgomery into utils.toMontgomery
  • decaf, ristretto: new interface which makes it more similar to other Points
  • ed448: add ED448_TORSION_GROUP
  • curve: add curve.info interface to all curves for better interop.
  • curve: change public wNAF API
  • modular: add sqrt9mod16
  • hash-to-curve: move all hashers into _hasher props. E.g. secp256k1_hasher
  • test: Add ACVP test vectors

Sensitive code changes

  • wNAF: mostly renamings
  • Field bound validation: for scalars (Fn) and curve fields (Fp)

Full Changelog: paulmillr/noble-curves@1.9.2...1.9.3


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the maintenance label Aug 25, 2025
@renovate
Copy link
Contributor Author

renovate bot commented Aug 25, 2025

Branch automerge failure

This PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.


  • Branch has one or more failed status checks

@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from 4307225 to df3fbd8 Compare August 25, 2025 22:30
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from 68ae5dc to 9350678 Compare September 8, 2025 05:11
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from 1560d50 to 92c403c Compare September 22, 2025 05:14
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch from 92c403c to 867ee91 Compare September 22, 2025 17:06
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch from 867ee91 to a2590f3 Compare October 6, 2025 04:39
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from 980fcf6 to 83263a0 Compare October 14, 2025 08:53
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from bb31ef2 to 99d31c4 Compare October 27, 2025 05:25
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch 2 times, most recently from 64da5c9 to 71bc722 Compare November 3, 2025 06:55
@renovate renovate bot force-pushed the renovate/noble-curves-2.x branch from 71bc722 to 14bc64f Compare November 17, 2025 04:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant