On 18 December 2012 05:30, jeetendra gangele gangele...@gmail.com wrote:
Ok,
can you expain me how ec_compute_key work and specially this last argument.
Why its need hash value to calculate the secret key.
I need to generate the 56 BYtes shred key.
A KDF (Key Derivation Function) is
char b1[] =
18679335321211177614181391980475641049275229937844945546185683145837;
Where did you get this value from? Is this a private key you have been
provided with that you *must* use?
Unless you particularly need to use a specific private key it is better to
use
EC_KEY_generate_key
On 14 December 2012 10:32, jeetendra gangele gangele...@gmail.com wrote:
But why we need to load the public key for signing the data?
for signing I need only private key.
When I load the public and private both key I could sign the data.
but when I load only private key and calling Key_check
On 14 December 2012 11:14, jeetendra gangele gangele...@gmail.com wrote:
Okay,
Thankd for ur reply.
If i have only private key in my ECC_key object Will be able to sign the
data?.
I've not tried it, so I'm not sure. I've had a quick review of the code and
I can't see any reason why not,
On 14 December 2012 11:47, jeetendra gangele gangele...@gmail.com wrote:
Thanks
But i have these parameters and I wanted to load them p,a,b,q
Do u know how can i load them?
The parameters are related to the definition of the curve. Where did you
get the parameters from? Are you sure they are
On 14 December 2012 12:37, jeetendra gangele gangele...@gmail.com wrote:
I got these parameters from marlin and I wanted to load these parameter.
Its must for me to load these parameters.
I am not familiar with what marlin is, so I cannot advise on that. I would
double check that the
these parameter.
Its must for me to load these parameters.
On 14 December 2012 17:37, Matt Caswell (fr...@baggins.org)
fr...@baggins.org wrote:
On 14 December 2012 11:47, jeetendra gangele gangele...@gmail.com
wrote:
Thanks
But i have these parameters and I wanted to load them p,a,b,q
On 14 December 2012 13:36, jeetendra gangele gangele...@gmail.com wrote:
Ok,
So is there any way after setting these parameters I can get the
public key(point) on curve.?
Setting the parameters just gets you a curve, not a private/public key
pair. To create a private/public key pair create
On 14 December 2012 14:20, jeetendra gangele gangele...@gmail.com wrote:
it looks very odd loading of public key during sign operation.
Ok tell me one thing I can load any valid point on the curve during sign.
An ECDSA sign operates on the curve and associated parameters, the private
key, and
On 14 December 2012 15:02, jeetendra gangele gangele...@gmail.com wrote:
On 14 December 2012 20:18, Matt Caswell (fr...@baggins.org)
fr...@baggins.org wrote:
On 14 December 2012 14:20, jeetendra gangele gangele...@gmail.com
wrote:
it looks very odd loading of public key during sign
Yes i did same thanks for all ur support.
Is there any relation between curve parameter and private key or
private key can be any random number?
Yes there is a relationship. The private key must be a random number
between 0 and the order of the curve.
As far I remeber there is relation
See:
http://marc.info/?l=openssl-usersm=134867395821086w=2
On 11 October 2012 17:19, e...@mit.edu e...@mit.edu wrote:
Hello,
I am trying to encrypt and decrypt a string using command-line openssl
(1.0.1c) with the id-aes256-GCM algorithm, but every time it fails
echo -n bla | openssl enc
Username is guest, password is guest.
Matt
On 12 September 2012 14:12, Kenneth Goldman kgold...@us.ibm.com wrote:
All I get is an (ironically unsecured) log in page. Do you have a link to
the actual documentation?
--
Ken Goldman kgold...@us.ibm.com
914-945-2415 (862-2415)
From:
On Wed, 2012-09-12 at 00:28 +0300, farmdve data.bg wrote:
I have seen a lot of applications that utilize the OpenSSL library,
however I see that the majority of the documentation is incomplete.
In particular, I need some documentation for the EC package in the
'crypto' sub-folder, I mean,
As Andrey has said the output from encryption is binary and so can be any
character (prinatable and non-printable). Therefore you are going to have
to do some kind of encoding of the output to force it to be
printablethis is going to increase the length no matter what.
What is the allowed set
is if the encrypted data is 18 bytes long. The encrypted data will only
be 18 bytes if the non-encrypted data is 18 btyes. Hence my suggestion that
you look at compressing the input.
Thank you all.
Tarun.
Matt Caswell (fr...@baggins.org) wrote:
As Andrey has said the output from
On 21 August 2012 14:14, Charles Mills charl...@mcn.org wrote:
Actually, there IS *almost* a general solution to this problem.
The input consists of characters from some set of 'n' characters. (Perhaps
'n' is 94 -- 0x21 through 0x7e inclusive -- but it does not matter.) You
need to pack
As an alternative have you considered using the GMP library? That
library is much more focussed on providing multi-precision arithmetic
as opposed to crypto , so I would expect it to be a lot smaller.
http://gmplib.org/
Matt
On 22 June 2012 12:57, chip...@gmx.de wrote:
Hi,
I have to create
On 29/05/12 22:52, Matt Caswell (fr...@baggins.org) wrote:
On 29/05/12 16:55, chip...@gmx.de wrote:
Now I set for every variable the BN_FLG_CONSTIME Flag, so that I can
be sure, that they will need the same time.
I measured the time the BN_nnmod operation in the BN_mod_add function
needs
On 29/05/12 16:55, chip...@gmx.de wrote:
Hi,
thank you again for your answer.
Now I set for every variable the BN_FLG_CONSTIME Flag, so that I can be sure,
that they will need the same time.
I measured the time the BN_nnmod operation in the BN_mod_add function needs for
the modulo operation
.
Thank you for your answer.
Original-Nachricht
Datum: Tue, 15 May 2012 00:04:16 +0100
Von: Matt Caswell (fr...@baggins.org)fr...@baggins.org
An: openssl-users@openssl.org
Betreff: Re: Problems with OpenSSl BN
On 14/05/12 15:48, chip...@gmx.de wrote:
Hello,
I am using the OpenSSL
On 25/05/12 14:41, Khuc, Chuong D. wrote:
Wow, that is a lot of good information. Thanks, Matt. And I am still trying to
digest the first paragraph. So do you mean the R value that I mentioned is
actually the public key?
No, R is just a random point...different for every signature. The public
On 25/05/12 18:35, Khuc, Chuong D. wrote:
Hi,
Does anyone knows there is a way to implement accelerated verification
of ECDSA like in this paper:
http://www.mathnet.or.kr/mathnet/preprint_file/cacr/2005/cacr2005-28.pdf
Specifically instead of generating ECDSA signature with (r,s), I have
to
On 24/05/12 14:40, Khuc, Chuong D. wrote:
Hello,
I was able to sign my message using the ECDSA 256 function from openssl:
ECDSA_SIG *signature = ECDSA_do_sign( message[0], message_length, eckey);
And the sign is verified to be valid also. And my question is about
the compression of the
On 22/05/12 17:35, Khuc, Chuong D. wrote:
Hello,
Thank you so much for your response. I already sent an email to ask my colleague to find
out what curve I should use. However, when I tried using either NID_secp256k1 or
NID_X9_62_prime256v1 (because they are the only two curves of 256 bit). I
find
EVP_aes_256_gcm
- David
-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Matt Caswell
(fr...@baggins.org)
Sent: Tuesday, May 22, 2012 10:49 AM
To: openssl-users@openssl.org
Subject: Re: Where is EVP_aes_256_gcm?
On 22/05
NID_ecdsa_with_SHA256 is not the name of a curve.
NID_secp256k1 is probably a good choice. Refer to the following
document for a discussion on recommended curves (appendix d), and then
find the related NID name for the curve you want in OpenSSL:
Sorry one other point. Just noticed that in one of your other posts,
you have been provided with a previously existing private key. In that
case you need to find out what curve that private key was associated
with.
Matt
On 22 May 2012 17:04, Matt Caswell (fr...@baggins.org)
fr...@baggins.org
On 22/05/12 17:35, Li, David wrote:
Hi All,
I can't find this function in the source tree? It seems pointing to
FIPS_aes_256_gcm. All I see is:
grep -r FIPS_evp_aes_256_gcm .
./crypto/evp/evp_fips.c:const EVP_CIPHER *EVP_aes_256_gcm(void) {
return FIPS_evp_aes_256_gcm(); }
Anyone know
On 15 May 2012 15:22, Fábio Resner fabiu...@gmail.com wrote:
Hi,
I'm trying to write an app to generate public/private/shared key for ECDH.
Here is what I was able to build based on examples:
#include openssl/ssl.h
#define ECDH_SIZE 67
int main() {
EC_KEY *ecdh = EC_KEY_new();
const
On 15/05/12 20:21, Fábio Resner wrote:
I don`t know if this is the correct place to make this conceptual
question but here it goes:
In DH you must exchange the parameters in order to generate the keys
for the algorithm to work properly. (Am I wrong?)
But in ECDH (accordingly to the code
On 14/05/12 15:48, chip...@gmx.de wrote:
Hello,
I am using the OpenSSL BN functions. Wenn I measure the time which a BN
function needs, then I see that for example BN_mod_add, needs for every calling
different times. Shouldn't it be the same timeconsumption, every time I call
for example
TLS = Transport Layer Security
DHE = Diffie Hellman Ephemeral
RSA = Public Key Cryptography algorithm named after inventors, Rivest,
Shamir Adleman
AES_128 = Advanced Encryption Standard using 128bit key
CBC = Cipher Block Chaining (a block cipher mode of operation)
SHA = Secure Hash Algorithm
On 29/04/12 05:23, MauMau wrote:
Q2: Is AES-XTS slower than AES-CBC? Does AES-NI speed up AES-XTS
like AES-CBC?
Yes it is slower because there is an additional encryption operation
on the tweak.
I think AES-NI speeds up the implementation of the underlying AES
cipher, and therefore would be
On 25/04/12 15:03, MauMau wrote:
Q1: Is AES-XTS officially supported by OpenSSL 1.0.1? I'm wondering if
XTS is still an experimental feature in OpenSSL, because the file
Changes in the OpenSSL 1.0.1 tarball does not refer to XTS.
Well 1.0.1 is the latest stable version, and I have seen
On 23/04/12 13:16, MauMau wrote:
Apart from that, let me go back to my original question 4 in my first
mail.
Q4: Do I have to call EVP_EncryptInit_ex/EVP_DecryptInit_ex for each
block/record? I'm concerned about the overhead of those functions. For
On 23 April 2012 13:16, MauMau maumau...@gmail.com wrote:
/* encrypt first block */
EVP_EncryptUpdate(enc_ctx, block1, outlen, block1, 4096);
/* encrypt second block */
EVP_EncryptInit_ex(enc_ctx, NULL, NULL, NULL, NULL);
EVP_EncryptUpdate(enc_ctx, block2, outlen, block2, 4096);
I believe
On 17/04/12 06:57, toredhiddenu...@tormail.net wrote:
The library only supports Fp and F2^m custom curves. The easiest way to
construct a custom curve is by using one of:
EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const
BIGNUM *b, BN_CTX *ctx);
EC_GROUP
On 17/04/12 15:31, MauMau wrote:
Hello, Edward, Jakob, Ken,
Thanks for lots of ideas and information. I'll investigate Edward's
block-number-based iv and Ken's CTR mode. Let me consult you if I get
stuck again. I'll consider some way to eliminate the need to call
On 15/04/12 23:33, Dr. Stephen Henson wrote:
On Sun, Apr 15, 2012, Jeffrey Walton wrote:
On Sun, Apr 15, 2012 at 12:01 PM,toredhiddenu...@tormail.net wrote:
Hello guyz and cryptobrains! :P
One of the main disadvantages of EC on openssl seems to be the inability
to create arbitrary-sized
On 14/04/12 11:32, opensshelpmeplz wrote:
I need to generate a public EC key given a private EC key that I provide
myself. Is it possible to do this with OpenSSL? I have no problems to
generate a key pair , and I know how to set private and public key to
specific values, but is there some way to
On 15/04/12 17:01, toredhiddenu...@tormail.net wrote:
Hello guyz and cryptobrains! :P
One of the main disadvantages of EC on openssl seems to be the inability
to create arbitrary-sized keys and advantage for RSA: you can create 32768
bit RSA key but... not greater than 521 bits on ECC.
Will
Hi Sai
Looking at the source code it seems that AES-CTR is #defined out in
1.0.0a. It is there in the latest 1.0.1 version however.
Make sure you are using the EVP interface, and the following CTR modes
are available (as defined in evp.h):
const EVP_CIPHER *EVP_aes_256_ctr(void);
const
I think that the stream that it writes to is platform specific.
The default implementation for ui_write_string is in ui_openssl.c:
static int write_string(UI *ui, UI_STRING *uis)
{
switch (UI_get_string_type(uis))
{
case UIT_ERROR:
case UIT_INFO:
Hi
There's quite a good description of the key negotiation here:
http://technet.microsoft.com/en-us/library/cc785811%28WS.10%29.aspx
Matt
On 07/01/12 16:12, Manish Jain wrote:
Hello Michael/Anyone Else,
Can you be kind enough to please point me to some place/URL where I
can get a bit
The semantics of EC_KEY_generate_key are to generate a new private and
public key pair. It does this regardless of whether or not a private or
public key was previously set in the EC_KEY structure. It *will* reuse
the existing BIGNUM/EC_POINT structures if they were previously set -
but it
EVP_sha1 is a function. Try:
EVP_DigestInit_ex(mdctx, EVP_sha1(), NULL);
Matt
On 8 December 2011 16:45, Rainer Gerhards rgerha...@gmail.com wrote:
Hi all,
I intend to use the EVP interface in order to prepare for future
changes, but currently need only SHA1 hashes. I have taken the code
47 matches
Mail list logo