Skip to main content

Questions tagged [ecc]

ECC stands for Elliptic Curve Cryptography. Elliptic curves are a mathematical structure which allow to define cryptographic operations on them.

3 votes
1 answer
706 views

Is it possible to use ECDH in SSH without relying on NIST curves?

Within our organization, we are allowed to use the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm, with the requirement that key sizes be 384 bits or higher. In this context, I found that ...
Jozko Mrkvicka's user avatar
1 vote
3 answers
198 views

Why does PEM Base64 created by `openssl pkey` not match the DER file passed in?

In experimenting with openssl on the Linux command line with elliptic curve secp256k1 I encountered a strange situation where on converting a DER private key file to PEM format using openssl pkey the ...
Crypto L Plate's user avatar
3 votes
1 answer
206 views

Understanding and Troubleshooting TAG IC Signature Verification Failure

I have a number of NFC tags with the following metadata: ‍‍ [usb] pm3 --> hf mfu info [=] --- Tag Information -------------------------- [+] TYPE: NTAG 215 504bytes (NT2H1511G0DU) [+] ...
Lisbeth's user avatar
  • 131
2 votes
1 answer
359 views

Explaining output of GPG --export/--export-private-key key_id vs key_id!

I am a newcomer to GPG, and wanted to compare different ways of exporting keys, so I wrote the following shell script: #!/bin/bash for key in "FE..." "17.." "BB.."; do # ...
Alex.Kh's user avatar
  • 123
1 vote
0 answers
52 views

Are ECC CSR always different and if yes, why? [closed]

I've noted that SHA256 of CSRs for RSA keys, generated as openssl req -new -config leaf.conf -key rsa.key rsa.csr are always the same, given the same key and configuration. In the same time, every ...
simon's user avatar
  • 183
-1 votes
1 answer
198 views

Fido2/Webauthn Passkeys: rsa2048, rsa4096, or Ed25519?

Does anyone know what kind of keys are being generated when you make a Fido2/Webauthn passkey? rsa2048, rsa4096, Ed25519, or something else? Just worried if its rsa2048 it might soon be crackable, at ...
Mohamed Hafez's user avatar
5 votes
1 answer
661 views

Why do you need random number for ECDH shared key computation

Let's assume that authentication with certificates has been well performed, next step is to generate short-term private&public ECC keys for ECDH shared key computation. Alice: Generates keyA with ...
unalignedmemoryaccess's user avatar
0 votes
1 answer
928 views

Why does the Public Key Info field in an X509 certificate for EC indicate the algorithm

The Subject Public Key Info field can have a value like ECDSA_P256 or ECDH_P256 when ECC is used. Why is it not sufficient to specify "ECC_P256"? In other words, why is it not enough to ...
Lemon Sky's user avatar
  • 195
0 votes
1 answer
265 views

Can Deep Learning predict Encryption Keys in Elliptic Curve Diffie Hellman Ephemeral

I was talking to my friend who is building an AI startup, and his premise was Deep Learning, can somehow be used, to predict, when fed the correct data (input) and run for multiple (n; n = large) ...
fuzzy-rockies's user avatar
1 vote
1 answer
1k views

What is the minimum TLS version for support of Ed25519 Keys?

I'm setting up a client TLS CA for authenticating requests over the internet to an AWS API Gateway endpoint. It supports TLS 1.2 but not TLS 1.3, at least from what I can tell. Is there a minimum ...
Naftuli Kay's user avatar
  • 6,853
0 votes
2 answers
168 views

Asymmetric crypto algorithm for encryption with hardware token

Our product stores voucher data in a database. These voucher data can be retrieved with our app to display a voucher that can be used for payments. Obviously, these voucher data are extremely ...
Erik Moldtmann's user avatar
4 votes
1 answer
279 views

GPG allows importing an invalid secp256k1 public key

I came across a PGP public key that seems invalid. The key is a secp256k1 public key that supported by GPG. In fact, GPG allows importing that key even if it has an invalid secp256k1 public key inside....
Andreas Tzionis's user avatar
2 votes
0 answers
376 views

Difference in OpenSSL pkcs8 key generation

I came across two ways of generating an ECC private key. Both create the key in pkcs8 format. Only the 2nd variant results in a pkcs8 file that contains the eccPublicKey OID 1.2.840.10045.2.1. Why do ...
tzippy's user avatar
  • 195
6 votes
1 answer
1k views

Can someone with access to only my Yubikey gain access to my server that has SSH access via an ED25519-sk keypair?

My understanding is that an ED25519-sk SSH key generated by OpenSSH generates a private key stub that lives on your host machine. This stub is just a reference to the actual private key that lives on ...
angryserver's user avatar
1 vote
0 answers
122 views

x509 certificate verification issue [closed]

Having issue with x509 certificate verification. Steps I followed. Generated the root certificate. created the Intermediate certificate. signed the Intermediate certificate with root certificate. ...
chandu's user avatar
  • 171

15 30 50 per page
1
2 3 4 5
13