Ok,

can you expain me how ec_compute_key work and specially this last argument.
Why its need hash value to calculate the secret key.
I need to generate the 56 BYtes shred key.

On 18 December 2012 10:32, Jeffrey Walton <noloa...@gmail.com> wrote:
> On Mon, Dec 17, 2012 at 11:50 PM, jeetendra gangele
> <gangele...@gmail.com> wrote:
>> U mean to say I can generate 64 bytes and then I can ignore last 8
>> bytes? so I will get 56 bytes.
>> This value then I have to use as secret key for ECDH
> https://www.google.com/#q=truncated+hash
>
> Be careful of ECDH because its anonymous or non-authenticated. NIST
> Special Publication 800-56A, Recommendation for Pair-Wise Key
> Establishment Schemes Using Discrete Logarithm Cryptography, might
> help guide you.
>
> Jeff
>
>> On 18 December 2012 09:57, Jeffrey Walton <noloa...@gmail.com> wrote:
>>> On Mon, Dec 17, 2012 at 11:16 PM, jeetendra gangele
>>> <gangele...@gmail.com> wrote:
>>>> Hi,
>>>> Do we have support for 448 bit hash value generation in openssl.?
>>>> I looked into the header file and I did not find functiobn related to that.
>>>>
>>>> Actually I need to compute shared key for ecdh and that should be 56 Bytes 
>>>> long.
>>>> I could genearte the 20 byte 32 bytes but I need 56 bytes only.
>>> 448 bits is 56 bytes. You will have to use a smaller hash and iterate
>>> in a KDF-like fashion; or a larger hash and truncate.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to