A fixed-length, random-access sequence of bytes that also provides random
and unaligned access to the fixed-width integers and floating point
numbers represented by those bytes.
Hash algorithms, Implements SHA-512, SHA-256 and Blake2b.
Cryptographic secure hash functions are irreversible transforms of input data to a fixed length digest.
The standard properties of a cryptographic hash make these functions useful both for standalone usage as data integrity checkers, as well as black-box building blocks of other kind of algorithms and data structures.
The PrivateKey implements the X25519 key agreement scheme (ECDH) using
Curve25519 that provides a fast, simple, constant time, and fast
variable-base scalar multiplication algorithm, which is is optimal for
ECDH
SigningKey implements the Ed25519 deterministic signature scheme (EdDSA)
using Curve25519, that provides a very fast fixed-base and double-base
scalar multiplications, which faster on most platform than the
variable-base algorithm of X25519, due to the fast and complete twisted
Edwards addition law.