Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Cryptography

Posted on 2009-12-30
7
Medium Priority
?
427 Views
Last Modified: 2012-05-08
how to encrypt a message using public key and decrypt that using private key in Eliptic Curve Cryptography
0
Comment
Question by:sunda2010
7 Comments
 

Author Comment

by:sunda2010
ID: 26152070
sample code
0
 
LVL 40

Accepted Solution

by:
Gurvinder Pal Singh earned 168 total points
ID: 26152113
0
 
LVL 53

Expert Comment

by:Infinity08
ID: 26152846
I recommend using an existing library that implements ECC. What language are you using ? For C++ eg., I recommend the Crypto++ library (http://www.cryptopp.com/).
0
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

 
LVL 18

Assisted Solution

by:Jose Parrot
Jose Parrot earned 332 total points
ID: 26164078
So you are looking for Elliptic Curve Digital Signature Algorithm (ECDSA).  As you are looking for source code, it is interesting to understand that there is no one source code, but a number instead. Take a look at the RFC 4754 (http://www.h-online.com/nettools/rfc/rfcs/rfc4754.shtml) to see the specification.
A simple ECDSA implementation can be found at http://en.pudn.com/downloads90/sourcecode/crypt/detail344353_en.html
Probably that Visual C++ source code fits your needs.
Jose
0
 
LVL 53

Expert Comment

by:Infinity08
ID: 26165079
>> So you are looking for Elliptic Curve Digital Signature Algorithm (ECDSA).

Note that that's only one of the existing ECC algorithms. There's also ECDH, ECMQV, etc.

sunda2010, if you tell us what language you need this for, we can give you better assistance.
0
 
LVL 18

Expert Comment

by:Jose Parrot
ID: 26165454
Yes, as previously stated:
>> it is interesting to understand that there is no one source code, but a number instead.
0
 
LVL 18

Assisted Solution

by:Jose Parrot
Jose Parrot earned 332 total points
ID: 26165520
Besides the sample code provided at answer 26164078 above, on can use also the sample code for ECDSA with the library suggested by Infinity08 ,Cripto++ lib, as proposed at
http://old.nabble.com/ECDSA-Example-td24545876.html
You don't need go so far from Microsoft, if you are programming in Windows .NET, which provides the tools you need. Take a look at http://msdn.microsoft.com/pt-br/library/system.security.cryptography.ecdsa.aspx
If you want that in Java, you need Java Version 6: http://java.sun.com/javase/6/docs/technotes/guides/security/SunProviders.html .
If you're interested in to understand how it works, the short tutorial at http://csrc.nist.gov/groups/ST/key_mgmt/documents/June09_Presentations/rene.struik.KMWJune09_5Min.pdf will help a lot.
Jose
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question