Post by Sanath PrasannaHi,
I want to encrypt a text message using ECC & need to decrypt. Can someone
give me a sample for that process ?
You will probably have to give more information.
There are several different types of ECC methods, and inside these, there
are a couple of different elliptic curves you can choose from, and some of
them are standardized requirements for certain applications.
Furthermore, ECC is often used as a tool in a larger toolbox. It's used to
agree on a (shared) secret key for an underlying block or stream cipher,
and in some situations also for agreeing on message authentication (which
protects the message integrity against tampering).
Getting this toolbox / tooling construction wrong can result in the
proposed solution being insecure, so beware.
--
J.