ECC Encryption / Decryption
Jesper Louis Andersen
jesper.louis.andersen@REDACTED
Tue May 4 17:17:42 CEST 2021
On Sun, May 2, 2021 at 1:33 PM Sanath Prasanna <ahe.sanath@REDACTED> wrote:
> Hi,
> I want to encrypt a text message using ECC & need to decrypt. Can someone
> give me a sample for that process ?
>
You will probably have to give more information.
There are several different types of ECC methods, and inside these, there
are a couple of different elliptic curves you can choose from, and some of
them are standardized requirements for certain applications.
Furthermore, ECC is often used as a tool in a larger toolbox. It's used to
agree on a (shared) secret key for an underlying block or stream cipher,
and in some situations also for agreeing on message authentication (which
protects the message integrity against tampering).
Getting this toolbox / tooling construction wrong can result in the
proposed solution being insecure, so beware.
--
J.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20210504/0216c85c/attachment.htm>
More information about the erlang-questions
mailing list