-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I am wondering if it is okay to use the same asymmetric ECC key for
ECDSA and ECIES. Given that the signing and encryption algorithms are
not related like in RSA, I assume it is okay to use the same key for
both operations.
Are there any things I
Hi
On 20/09/2013 16:07, Alan Braggins alan.bragg...@gmail.com wrote:
On 20/09/13 13:22, Dominik Schürmann wrote:
I am wondering if it is okay to use the same asymmetric ECC key for
ECDSA and ECIES. Given that the signing and encryption algorithms are
not related like in RSA, I assume it is
On 20/09/13 16:17, Paterson, Kenny wrote:
It is technically secure. See:
http://eprint.iacr.org/2011/615
especially Section 4.
Thanks. I wish I'd known that back in 2008
https://bugzilla.mozilla.org/show_bug.cgi?id=344179#c6
With a pointer to a security proof, I might have got the
firmware
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20.09.2013 17:17, Paterson, Kenny wrote:
It is technically secure. See:
http://eprint.iacr.org/2011/615
Thanks you so much for this paper, it's even mostly understandable
with some basic knowledge of attack models :)
Even so, I would not
Dominik,
You can certainly do it safely in this instance, because we have a
security analysis that says it's OK, but in general it's a bad idea to use
the same key-pair for more than one purpose, and, as the RSA-based example
in the paper shows, it can sometimes get you into serious trouble.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20.09.2013 22:09, Jeffrey Walton wrote:
Crypto++ has the schemes and Dr. Bernstein's curve. The library is
available on all major Linux and BSD platforms.
I am using Crypto++ already, but I can't find ed25519 anywhere in the
library. FYI: The
On Fri, Sep 20, 2013 at 2:35 PM, Dominik Schürmann
domi...@dominikschuermann.de wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
...
After reading related literature, I came to the conclusion to use
ECDSA and ECIES (Both with Koblitz curves, as I am sceptical about the
random curves ;),