Skip to main content

Questions tagged [ecc]

ECC stands for Elliptic Curve Cryptography. Elliptic curves are a mathematical structure which allow to define cryptographic operations on them.

3 votes
1 answer
718 views

Within our organization, we are allowed to use the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm, with the requirement that key sizes be 384 bits or higher. In this context, I found that ...
Jozko Mrkvicka's user avatar
1 vote
3 answers
202 views

In experimenting with openssl on the Linux command line with elliptic curve secp256k1 I encountered a strange situation where on converting a DER private key file to PEM format using openssl pkey the ...
Crypto L Plate's user avatar
3 votes
1 answer
213 views

I have a number of NFC tags with the following metadata: ‍‍ [usb] pm3 --> hf mfu info [=] --- Tag Information -------------------------- [+] TYPE: NTAG 215 504bytes (NT2H1511G0DU) [+] ...
Lisbeth's user avatar
  • 131
2 votes
1 answer
374 views

I am a newcomer to GPG, and wanted to compare different ways of exporting keys, so I wrote the following shell script: #!/bin/bash for key in "FE..." "17.." "BB.."; do # ...
Alex.Kh's user avatar
  • 123
1 vote
0 answers
52 views

I've noted that SHA256 of CSRs for RSA keys, generated as openssl req -new -config leaf.conf -key rsa.key rsa.csr are always the same, given the same key and configuration. In the same time, every ...
simon's user avatar
  • 183
-1 votes
1 answer
205 views

Does anyone know what kind of keys are being generated when you make a Fido2/Webauthn passkey? rsa2048, rsa4096, Ed25519, or something else? Just worried if its rsa2048 it might soon be crackable, at ...
Mohamed Hafez's user avatar
5 votes
1 answer
666 views

Let's assume that authentication with certificates has been well performed, next step is to generate short-term private&public ECC keys for ECDH shared key computation. Alice: Generates keyA with ...
unalignedmemoryaccess's user avatar
0 votes
1 answer
940 views

The Subject Public Key Info field can have a value like ECDSA_P256 or ECDH_P256 when ECC is used. Why is it not sufficient to specify "ECC_P256"? In other words, why is it not enough to ...
Lemon Sky's user avatar
  • 195
0 votes
1 answer
269 views

I was talking to my friend who is building an AI startup, and his premise was Deep Learning, can somehow be used, to predict, when fed the correct data (input) and run for multiple (n; n = large) ...
fuzzy-rockies's user avatar
1 vote
1 answer
1k views

I'm setting up a client TLS CA for authenticating requests over the internet to an AWS API Gateway endpoint. It supports TLS 1.2 but not TLS 1.3, at least from what I can tell. Is there a minimum ...
Naftuli Kay's user avatar
  • 6,853
0 votes
2 answers
170 views

Our product stores voucher data in a database. These voucher data can be retrieved with our app to display a voucher that can be used for payments. Obviously, these voucher data are extremely ...
Erik Moldtmann's user avatar
4 votes
1 answer
280 views

I came across a PGP public key that seems invalid. The key is a secp256k1 public key that supported by GPG. In fact, GPG allows importing that key even if it has an invalid secp256k1 public key inside....
Andreas Tzionis's user avatar
2 votes
0 answers
377 views

I came across two ways of generating an ECC private key. Both create the key in pkcs8 format. Only the 2nd variant results in a pkcs8 file that contains the eccPublicKey OID 1.2.840.10045.2.1. Why do ...
tzippy's user avatar
  • 195
6 votes
1 answer
1k views

My understanding is that an ED25519-sk SSH key generated by OpenSSH generates a private key stub that lives on your host machine. This stub is just a reference to the actual private key that lives on ...
angryserver's user avatar
1 vote
0 answers
123 views

Having issue with x509 certificate verification. Steps I followed. Generated the root certificate. created the Intermediate certificate. signed the Intermediate certificate with root certificate. ...
chandu's user avatar
  • 171

15 30 50 per page
1
2 3 4 5
13