Is EC integrated encryption scheme used in practice?
I know ECDSA and ECDH are used a lot but what about the ECIES? Is it used or specified as an option in any protocol?
Continue reading Is EC integrated encryption scheme used in practice?
Collaborate Disseminate
I know ECDSA and ECDH are used a lot but what about the ECIES? Is it used or specified as an option in any protocol?
Continue reading Is EC integrated encryption scheme used in practice?
I try to encrypt 16 bytes (for an AES symmetric key) using EC in Java. However, I only succeed using ECIES which I understand is a hybrid crypto system that uses AES internally:
Cipher asymmCipher = Cipher.getInstance(“ECIES… Continue reading EC (non-ECIES) encryption in Java
I know it should be impossible (or at least infeasible hard) to extract a ECDSA Private Key from a given Public Key (discrete logarithm problem). But I’m not deep enough into ECC to find an answer to this question:
is it pos… Continue reading Find ECDSA PrivKey to PubKey = 0
I’m using OpenSSL to generate EC key pairs. I notice that the length of the keys as displayed by OpenSSL are exactly one byte longer than expected for both private and public Key.
The 00 (first Byte of private key) is ASN.1… Continue reading Wrong size for EC key pair
Situation: within a mobile application, we’re generating and storing a private key (RSA or ECC) which we use to sign miscellaneous requests with (to authenticate using the mobile as a 2nd factor, or to sign transactions).
We… Continue reading How to securely store a PIN-encrypted prime number?
I’m trying to aggregate different BLS signatures into one so that I can perform only one verification over all aggregated signature, what I found in the internet is I just need to perform multiplication, In my case, the signa… Continue reading BLS short signature aggregation and verification
As I am a security newbie, this post might have lots of misconceptions about security. If so, please let me know
I’ve heard that ECDH is preferable to DH because its smaller key size and lower computational overhead.
Then t… Continue reading Is ECDH easier than DH to be broken?
Suppose I have a secret ‘X’. Which can be use as a seed to a deterministic random number generator to generate a number ‘Y’. Is there any way to prove to others, that I have the secret ‘X’ which generated this number ‘Y’ with… Continue reading zero knowledge proof application
CVE-2015-2730: Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curv… Continue reading Can ECC correctness issues in CVE-2015-2730 allow "remote attackers to spoof ECDSA signatures"?
I want to generate a key pair with gpg2 2.1.11 and libgcrypt 1.6.5.
I use the command gpg2 –expert –full-key-gen. This allows me to choose an ECC:
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elg… Continue reading Which Elliptic curve cryptography (ECC) algorithm to choose with GPG?