Re: Support for 448 bit hash value generation in opnessl.

2012-12-18 Thread Matt Caswell (fr...@baggins.org)
On 18 December 2012 05:30, jeetendra gangele gangele...@gmail.com wrote: Ok, can you expain me how ec_compute_key work and specially this last argument. Why its need hash value to calculate the secret key. I need to generate the 56 BYtes shred key. A KDF (Key Derivation Function) is

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
char b1[] = 18679335321211177614181391980475641049275229937844945546185683145837; Where did you get this value from? Is this a private key you have been provided with that you *must* use? Unless you particularly need to use a specific private key it is better to use EC_KEY_generate_key

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 10:32, jeetendra gangele gangele...@gmail.com wrote: But why we need to load the public key for signing the data? for signing I need only private key. When I load the public and private both key I could sign the data. but when I load only private key and calling Key_check

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 11:14, jeetendra gangele gangele...@gmail.com wrote: Okay, Thankd for ur reply. If i have only private key in my ECC_key object Will be able to sign the data?. I've not tried it, so I'm not sure. I've had a quick review of the code and I can't see any reason why not,

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 11:47, jeetendra gangele gangele...@gmail.com wrote: Thanks But i have these parameters and I wanted to load them p,a,b,q Do u know how can i load them? The parameters are related to the definition of the curve. Where did you get the parameters from? Are you sure they are

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 12:37, jeetendra gangele gangele...@gmail.com wrote: I got these parameters from marlin and I wanted to load these parameter. Its must for me to load these parameters. I am not familiar with what marlin is, so I cannot advise on that. I would double check that the

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
these parameter. Its must for me to load these parameters. On 14 December 2012 17:37, Matt Caswell (fr...@baggins.org) fr...@baggins.org wrote: On 14 December 2012 11:47, jeetendra gangele gangele...@gmail.com wrote: Thanks But i have these parameters and I wanted to load them p,a,b,q

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 13:36, jeetendra gangele gangele...@gmail.com wrote: Ok, So is there any way after setting these parameters I can get the public key(point) on curve.? Setting the parameters just gets you a curve, not a private/public key pair. To create a private/public key pair create

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 14:20, jeetendra gangele gangele...@gmail.com wrote: it looks very odd loading of public key during sign operation. Ok tell me one thing I can load any valid point on the curve during sign. An ECDSA sign operates on the curve and associated parameters, the private key, and

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
On 14 December 2012 15:02, jeetendra gangele gangele...@gmail.com wrote: On 14 December 2012 20:18, Matt Caswell (fr...@baggins.org) fr...@baggins.org wrote: On 14 December 2012 14:20, jeetendra gangele gangele...@gmail.com wrote: it looks very odd loading of public key during sign

Re: Need help in loading private key for ECDSA

2012-12-14 Thread Matt Caswell (fr...@baggins.org)
Yes i did same thanks for all ur support. Is there any relation between curve parameter and private key or private key can be any random number? Yes there is a relationship. The private key must be a random number between 0 and the order of the curve. As far I remeber there is relation

Re: id-aes256-GCM command line encrypt+decrypt fail

2012-10-11 Thread Matt Caswell (fr...@baggins.org)
See: http://marc.info/?l=openssl-usersm=134867395821086w=2 On 11 October 2012 17:19, e...@mit.edu e...@mit.edu wrote: Hello, I am trying to encrypt and decrypt a string using command-line openssl (1.0.1c) with the id-aes256-GCM algorithm, but every time it fails echo -n bla | openssl enc

Re: Why is the OpenSSL documentation incomplete?

2012-09-12 Thread Matt Caswell (fr...@baggins.org)
Username is guest, password is guest. Matt On 12 September 2012 14:12, Kenneth Goldman kgold...@us.ibm.com wrote: All I get is an (ironically unsecured) log in page. Do you have a link to the actual documentation? -- Ken Goldman kgold...@us.ibm.com 914-945-2415 (862-2415) From:

Re: Why is the OpenSSL documentation incomplete?

2012-09-11 Thread Matt Caswell (fr...@baggins.org)
On Wed, 2012-09-12 at 00:28 +0300, farmdve data.bg wrote: I have seen a lot of applications that utilize the OpenSSL library, however I see that the majority of the documentation is incomplete. In particular, I need some documentation for the EC package in the 'crypto' sub-folder, I mean,

Re: OpenSSL DES generates '\n' in encrypted code

2012-08-21 Thread Matt Caswell (fr...@baggins.org)
As Andrey has said the output from encryption is binary and so can be any character (prinatable and non-printable). Therefore you are going to have to do some kind of encoding of the output to force it to be printablethis is going to increase the length no matter what. What is the allowed set

Re: OpenSSL DES generates '\n' in encrypted code

2012-08-21 Thread Matt Caswell (fr...@baggins.org)
is if the encrypted data is 18 bytes long. The encrypted data will only be 18 bytes if the non-encrypted data is 18 btyes. Hence my suggestion that you look at compressing the input. Thank you all. Tarun. Matt Caswell (fr...@baggins.org) wrote: As Andrey has said the output from

Re: OpenSSL DES generates '\n' in encrypted code

2012-08-21 Thread Matt Caswell (fr...@baggins.org)
On 21 August 2012 14:14, Charles Mills charl...@mcn.org wrote: Actually, there IS *almost* a general solution to this problem. The input consists of characters from some set of 'n' characters. (Perhaps 'n' is 94 -- 0x21 through 0x7e inclusive -- but it does not matter.) You need to pack

Re: OpenSSL Library: Only BIGNUM functions

2012-06-22 Thread Matt Caswell (fr...@baggins.org)
As an alternative have you considered using the GMP library? That library is much more focussed on providing multi-precision arithmetic as opposed to crypto , so I would expect it to be a lot smaller. http://gmplib.org/ Matt On 22 June 2012 12:57, chip...@gmx.de wrote: Hi, I have to create

Re: Problems with OpenSSl BN

2012-05-31 Thread Matt Caswell (fr...@baggins.org)
On 29/05/12 22:52, Matt Caswell (fr...@baggins.org) wrote: On 29/05/12 16:55, chip...@gmx.de wrote: Now I set for every variable the BN_FLG_CONSTIME Flag, so that I can be sure, that they will need the same time. I measured the time the BN_nnmod operation in the BN_mod_add function needs

Re: Problems with OpenSSl BN

2012-05-29 Thread Matt Caswell (fr...@baggins.org)
On 29/05/12 16:55, chip...@gmx.de wrote: Hi, thank you again for your answer. Now I set for every variable the BN_FLG_CONSTIME Flag, so that I can be sure, that they will need the same time. I measured the time the BN_nnmod operation in the BN_mod_add function needs for the modulo operation

Re: Problems with OpenSSl BN

2012-05-28 Thread Matt Caswell (fr...@baggins.org)
. Thank you for your answer. Original-Nachricht Datum: Tue, 15 May 2012 00:04:16 +0100 Von: Matt Caswell (fr...@baggins.org)fr...@baggins.org An: openssl-users@openssl.org Betreff: Re: Problems with OpenSSl BN On 14/05/12 15:48, chip...@gmx.de wrote: Hello, I am using the OpenSSL

Re: Questions about method to compress ECDSA signatures

2012-05-25 Thread Matt Caswell (fr...@baggins.org)
On 25/05/12 14:41, Khuc, Chuong D. wrote: Wow, that is a lot of good information. Thanks, Matt. And I am still trying to digest the first paragraph. So do you mean the R value that I mentioned is actually the public key? No, R is just a random point...different for every signature. The public

Re: Accelerated verification of ECDSA

2012-05-25 Thread Matt Caswell (fr...@baggins.org)
On 25/05/12 18:35, Khuc, Chuong D. wrote: Hi, Does anyone knows there is a way to implement accelerated verification of ECDSA like in this paper: http://www.mathnet.or.kr/mathnet/preprint_file/cacr/2005/cacr2005-28.pdf Specifically instead of generating ECDSA signature with (r,s), I have to

Re: Questions about method to compress ECDSA signatures

2012-05-24 Thread Matt Caswell (fr...@baggins.org)
On 24/05/12 14:40, Khuc, Chuong D. wrote: Hello, I was able to sign my message using the ECDSA 256 function from openssl: ECDSA_SIG *signature = ECDSA_do_sign( message[0], message_length, eckey); And the sign is verified to be valid also. And my question is about the compression of the

Re: EC_KEY_new_by_curve_name returns NULL

2012-05-23 Thread Matt Caswell (fr...@baggins.org)
On 22/05/12 17:35, Khuc, Chuong D. wrote: Hello, Thank you so much for your response. I already sent an email to ask my colleague to find out what curve I should use. However, when I tried using either NID_secp256k1 or NID_X9_62_prime256v1 (because they are the only two curves of 256 bit). I

Re: Where is EVP_aes_256_gcm?

2012-05-23 Thread Matt Caswell (fr...@baggins.org)
find EVP_aes_256_gcm -  David - From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Matt Caswell (fr...@baggins.org) Sent: Tuesday, May 22, 2012 10:49 AM To: openssl-users@openssl.org Subject: Re: Where is EVP_aes_256_gcm? On 22/05

Re: EC_KEY_new_by_curve_name returns NULL

2012-05-22 Thread Matt Caswell (fr...@baggins.org)
NID_ecdsa_with_SHA256 is not the name of a curve. NID_secp256k1 is probably a good choice. Refer to the following document for a discussion on recommended curves (appendix d), and then find the related NID name for the curve you want in OpenSSL:

Re: EC_KEY_new_by_curve_name returns NULL

2012-05-22 Thread Matt Caswell (fr...@baggins.org)
Sorry one other point. Just noticed that in one of your other posts, you have been provided with a previously existing private key. In that case you need to find out what curve that private key was associated with. Matt On 22 May 2012 17:04, Matt Caswell (fr...@baggins.org) fr...@baggins.org

Re: Where is EVP_aes_256_gcm?

2012-05-22 Thread Matt Caswell (fr...@baggins.org)
On 22/05/12 17:35, Li, David wrote: Hi All, I can't find this function in the source tree? It seems pointing to FIPS_aes_256_gcm. All I see is: grep -r FIPS_evp_aes_256_gcm . ./crypto/evp/evp_fips.c:const EVP_CIPHER *EVP_aes_256_gcm(void) { return FIPS_evp_aes_256_gcm(); } Anyone know

Re: ECDH

2012-05-15 Thread Matt Caswell (fr...@baggins.org)
On 15 May 2012 15:22, Fábio Resner fabiu...@gmail.com wrote: Hi, I'm trying to write an app to generate public/private/shared key for ECDH. Here is what I was able to build based on examples: #include openssl/ssl.h #define ECDH_SIZE 67 int main() { EC_KEY *ecdh = EC_KEY_new(); const

Re: ECDH

2012-05-15 Thread Matt Caswell (fr...@baggins.org)
On 15/05/12 20:21, Fábio Resner wrote: I don`t know if this is the correct place to make this conceptual question but here it goes: In DH you must exchange the parameters in order to generate the keys for the algorithm to work properly. (Am I wrong?) But in ECDH (accordingly to the code

Re: Problems with OpenSSl BN

2012-05-14 Thread Matt Caswell (fr...@baggins.org)
On 14/05/12 15:48, chip...@gmx.de wrote: Hello, I am using the OpenSSL BN functions. Wenn I measure the time which a BN function needs, then I see that for example BN_mod_add, needs for every calling different times. Shouldn't it be the same timeconsumption, every time I call for example

Re: A Question on Cipher Format.

2012-05-11 Thread Matt Caswell (fr...@baggins.org)
TLS = Transport Layer Security DHE = Diffie Hellman Ephemeral RSA = Public Key Cryptography algorithm named after inventors, Rivest, Shamir Adleman AES_128 = Advanced Encryption Standard using 128bit key CBC = Cipher Block Chaining (a block cipher mode of operation) SHA = Secure Hash Algorithm

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-29 Thread Matt Caswell (fr...@baggins.org)
On 29/04/12 05:23, MauMau wrote: Q2: Is AES-XTS slower than AES-CBC? Does AES-NI speed up AES-XTS like AES-CBC? Yes it is slower because there is an additional encryption operation on the tweak. I think AES-NI speeds up the implementation of the underlying AES cipher, and therefore would be

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-25 Thread Matt Caswell (fr...@baggins.org)
On 25/04/12 15:03, MauMau wrote: Q1: Is AES-XTS officially supported by OpenSSL 1.0.1? I'm wondering if XTS is still an experimental feature in OpenSSL, because the file Changes in the OpenSSL 1.0.1 tarball does not refer to XTS. Well 1.0.1 is the latest stable version, and I have seen

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-24 Thread Matt Caswell (fr...@baggins.org)
On 23/04/12 13:16, MauMau wrote: Apart from that, let me go back to my original question 4 in my first mail. Q4: Do I have to call EVP_EncryptInit_ex/EVP_DecryptInit_ex for each block/record? I'm concerned about the overhead of those functions. For

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread Matt Caswell (fr...@baggins.org)
On 23 April 2012 13:16, MauMau maumau...@gmail.com wrote: /* encrypt first block */ EVP_EncryptUpdate(enc_ctx, block1, outlen, block1, 4096); /* encrypt second block */ EVP_EncryptInit_ex(enc_ctx, NULL, NULL, NULL, NULL); EVP_EncryptUpdate(enc_ctx, block2, outlen, block2, 4096); I believe

Re: Hello guyz and cryptobrains! :P

2012-04-17 Thread Matt Caswell (fr...@baggins.org)
On 17/04/12 06:57, toredhiddenu...@tormail.net wrote: The library only supports Fp and F2^m custom curves. The easiest way to construct a custom curve is by using one of: EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); EC_GROUP

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Matt Caswell (fr...@baggins.org)
On 17/04/12 15:31, MauMau wrote: Hello, Edward, Jakob, Ken, Thanks for lots of ideas and information. I'll investigate Edward's block-number-based iv and Ken's CTR mode. Let me consult you if I get stuck again. I'll consider some way to eliminate the need to call

Re: Hello guyz and cryptobrains! :P

2012-04-16 Thread Matt Caswell (fr...@baggins.org)
On 15/04/12 23:33, Dr. Stephen Henson wrote: On Sun, Apr 15, 2012, Jeffrey Walton wrote: On Sun, Apr 15, 2012 at 12:01 PM,toredhiddenu...@tormail.net wrote: Hello guyz and cryptobrains! :P One of the main disadvantages of EC on openssl seems to be the inability to create arbitrary-sized

Re: ECC generate public key with given private key

2012-04-15 Thread Matt Caswell (fr...@baggins.org)
On 14/04/12 11:32, opensshelpmeplz wrote: I need to generate a public EC key given a private EC key that I provide myself. Is it possible to do this with OpenSSL? I have no problems to generate a key pair , and I know how to set private and public key to specific values, but is there some way to

Re: Hello guyz and cryptobrains! :P

2012-04-15 Thread Matt Caswell (fr...@baggins.org)
On 15/04/12 17:01, toredhiddenu...@tormail.net wrote: Hello guyz and cryptobrains! :P One of the main disadvantages of EC on openssl seems to be the inability to create arbitrary-sized keys and advantage for RSA: you can create 32768 bit RSA key but... not greater than 521 bits on ECC. Will

Re: AES in counter mode support in openssl

2012-04-13 Thread Matt Caswell (fr...@baggins.org)
Hi Sai Looking at the source code it seems that AES-CTR is #defined out in 1.0.0a. It is there in the latest 1.0.1 version however. Make sure you are using the EVP interface, and the following CTR modes are available (as defined in evp.h): const EVP_CIPHER *EVP_aes_256_ctr(void); const

Re: Capturing Enter PEM pass phrase prompt

2012-01-26 Thread Matt Caswell (fr...@baggins.org)
I think that the stream that it writes to is platform specific. The default implementation for ui_write_string is in ui_openssl.c: static int write_string(UI *ui, UI_STRING *uis) { switch (UI_get_string_type(uis)) { case UIT_ERROR: case UIT_INFO:

Re: Question on OpenSSL encryption

2012-01-07 Thread Matt Caswell (fr...@baggins.org)
Hi There's quite a good description of the key negotiation here: http://technet.microsoft.com/en-us/library/cc785811%28WS.10%29.aspx Matt On 07/01/12 16:12, Manish Jain wrote: Hello Michael/Anyone Else, Can you be kind enough to please point me to some place/URL where I can get a bit

Re: Question on EC_KEY_generate_key

2012-01-06 Thread Matt Caswell (fr...@baggins.org)
The semantics of EC_KEY_generate_key are to generate a new private and public key pair. It does this regardless of whether or not a private or public key was previously set in the EC_KEY structure. It *will* reuse the existing BIGNUM/EC_POINT structures if they were previously set - but it

Re: segfault when using EVP_sha1

2011-12-08 Thread Matt Caswell (fr...@baggins.org)
EVP_sha1 is a function. Try: EVP_DigestInit_ex(mdctx, EVP_sha1(), NULL); Matt On 8 December 2011 16:45, Rainer Gerhards rgerha...@gmail.com wrote: Hi all, I intend to use the EVP interface in order to prepare for future changes, but currently need only SHA1 hashes. I have taken the code