ECC Encryption / Decryption

Sanath Prasanna ahe.sanath@REDACTED
Wed May 12 13:07:17 CEST 2021


Jesper, any comment regarding my problem ?
Br,
Robert

On Fri, May 7, 2021 at 8:39 AM Sanath Prasanna <ahe.sanath@REDACTED> wrote:

> Tx Jsesper for your guidance. But still I cannot do that & error came for
> below line
> EncryptMsg = crypto:private_encrypt(rsa, Msg, ECPrivateKey,
> rsa_no_padding),
> here attached sample file.
>
> On Wed, May 5, 2021 at 7:39 PM Jesper Louis Andersen <
> jesper.louis.andersen@REDACTED> wrote:
>
>> One particular problem is that `public_key:encrypt_private` is the RSA
>> algorithm, and not ECC. You need `crypto:private_encrypt/4` if you want to
>> do ECC.
>>
>> On Wed, May 5, 2021 at 4:38 AM Sanath Prasanna <ahe.sanath@REDACTED>
>> wrote:
>>
>>> Tx Jesper for your kind response.  Here attached my sample test file &
>>> following one is not working. That is the expected other Encoding scheme.
>>> (ShaXxxx)
>>> EncryptMsg = public_key:encrypt_private(Msg, ECPublicKey), (line 64)
>>> Can you give some guide to over come this ?
>>> br,
>>> Robert
>>>
>>> On Tue, May 4, 2021 at 8:48 PM Jesper Louis Andersen <
>>> jesper.louis.andersen@REDACTED> wrote:
>>>
>>>> On Sun, May 2, 2021 at 1:33 PM Sanath Prasanna <ahe.sanath@REDACTED>
>>>> wrote:
>>>>
>>>>> Hi,
>>>>> I want to encrypt a text message using ECC & need to decrypt. Can
>>>>> someone give me a sample for that process ?
>>>>>
>>>>
>>>> You will probably have to give more information.
>>>>
>>>> There are several different types of ECC methods, and inside these,
>>>> there are a couple of different elliptic curves you can choose from, and
>>>> some of them are standardized requirements for certain applications.
>>>>
>>>> Furthermore, ECC is often used as a tool in a larger toolbox. It's used
>>>> to agree on a (shared) secret key for an underlying block or stream cipher,
>>>> and in some situations also for agreeing on message authentication (which
>>>> protects the message integrity against tampering).
>>>> Getting this toolbox / tooling construction wrong can result in the
>>>> proposed solution being insecure, so beware.
>>>>
>>>>
>>>> --
>>>> J.
>>>>
>>>
>>
>> --
>> J.
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20210512/38e02b64/attachment.htm>


More information about the erlang-questions mailing list