ECC Encryption / Decryption

Jesper Louis Andersen jesper.louis.andersen@REDACTED
Tue May 4 17:17:42 CEST 2021


On Sun, May 2, 2021 at 1:33 PM Sanath Prasanna <ahe.sanath@REDACTED> wrote:

> Hi,
> I want to encrypt a text message using ECC & need to decrypt. Can someone
> give me a sample for that process ?
>

You will probably have to give more information.

There are several different types of ECC methods, and inside these, there
are a couple of different elliptic curves you can choose from, and some of
them are standardized requirements for certain applications.

Furthermore, ECC is often used as a tool in a larger toolbox. It's used to
agree on a (shared) secret key for an underlying block or stream cipher,
and in some situations also for agreeing on message authentication (which
protects the message integrity against tampering).
Getting this toolbox / tooling construction wrong can result in the
proposed solution being insecure, so beware.


-- 
J.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20210504/0216c85c/attachment.htm>


More information about the erlang-questions mailing list