ECC Encryption / Decryption

Jesper Louis Andersen jesper.louis.andersen@REDACTED
Wed May 12 13:43:20 CEST 2021


I'm not your Oracle.

On Wed, May 12, 2021 at 1:07 PM Sanath Prasanna <ahe.sanath@REDACTED>
wrote:

> Jesper, any comment regarding my problem ?
> Br,
> Robert
>
> On Fri, May 7, 2021 at 8:39 AM Sanath Prasanna <ahe.sanath@REDACTED>
> wrote:
>
>> Tx Jsesper for your guidance. But still I cannot do that & error came for
>> below line
>> EncryptMsg = crypto:private_encrypt(rsa, Msg, ECPrivateKey,
>> rsa_no_padding),
>> here attached sample file.
>>
>> On Wed, May 5, 2021 at 7:39 PM Jesper Louis Andersen <
>> jesper.louis.andersen@REDACTED> wrote:
>>
>>> One particular problem is that `public_key:encrypt_private` is the RSA
>>> algorithm, and not ECC. You need `crypto:private_encrypt/4` if you want to
>>> do ECC.
>>>
>>> On Wed, May 5, 2021 at 4:38 AM Sanath Prasanna <ahe.sanath@REDACTED>
>>> wrote:
>>>
>>>> Tx Jesper for your kind response.  Here attached my sample test file &
>>>> following one is not working. That is the expected other Encoding scheme.
>>>> (ShaXxxx)
>>>> EncryptMsg = public_key:encrypt_private(Msg, ECPublicKey), (line 64)
>>>> Can you give some guide to over come this ?
>>>> br,
>>>> Robert
>>>>
>>>> On Tue, May 4, 2021 at 8:48 PM Jesper Louis Andersen <
>>>> jesper.louis.andersen@REDACTED> wrote:
>>>>
>>>>> On Sun, May 2, 2021 at 1:33 PM Sanath Prasanna <ahe.sanath@REDACTED>
>>>>> wrote:
>>>>>
>>>>>> Hi,
>>>>>> I want to encrypt a text message using ECC & need to decrypt. Can
>>>>>> someone give me a sample for that process ?
>>>>>>
>>>>>
>>>>> You will probably have to give more information.
>>>>>
>>>>> There are several different types of ECC methods, and inside these,
>>>>> there are a couple of different elliptic curves you can choose from, and
>>>>> some of them are standardized requirements for certain applications.
>>>>>
>>>>> Furthermore, ECC is often used as a tool in a larger toolbox. It's
>>>>> used to agree on a (shared) secret key for an underlying block or stream
>>>>> cipher, and in some situations also for agreeing on message authentication
>>>>> (which protects the message integrity against tampering).
>>>>> Getting this toolbox / tooling construction wrong can result in the
>>>>> proposed solution being insecure, so beware.
>>>>>
>>>>>
>>>>> --
>>>>> J.
>>>>>
>>>>
>>>
>>> --
>>> J.
>>>
>>

-- 
J.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20210512/a5241317/attachment.htm>


More information about the erlang-questions mailing list