Bitcoin Forum
May 26, 2024, 10:15:57 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: jeeq: ECDSA encryption  (Read 5491 times)
crypto_trader#43xzEXrP
Full Member
***
Offline Offline

Activity: 1589
Merit: 214


View Profile
October 29, 2019, 04:23:06 AM
 #21

Just leave here my implementation of Elliptic-Curve-Cryptography (ECC): https://github.com/username1565/mini_ecdsa/commit/54d2ba23973819806e85456941c3c1a099434bc7
Encrypt-decrypt messages, using elliptic curve bitcoin secp256k1. Draft code. Tests added, and working.

STOP RUSSIAN INVASION OF UKRAINE - SUPPORT UKRAINIAN DEMOS
Contact me in TOX: 653D6C2D13B6DF22C4CB93432586398858A608EE5457624A9A728BE1A9252C5DA12B894C54DB, or just crypto-trader@toxme.io.
Also, WAVES - SCAM! ;(
gmaxwell
Moderator
Legendary
*
expert
Offline Offline

Activity: 4186
Merit: 8426



View Profile WWW
October 30, 2019, 07:58:44 AM
Merited by Foxpup (4), ABCbits (1)
 #22

Just leave here my implementation of Elliptic-Curve-Cryptography (ECC):
The above posters archive implements a similar totally cryptographically busted technique as was originally discussed in this thread.

No one should ever use it, unless like.. you're trying to trick your enemies into using something insecure. Smiley

[See https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2014-March/004720.html and following posts.]
crypto_trader#43xzEXrP
Full Member
***
Offline Offline

Activity: 1589
Merit: 214


View Profile
October 31, 2019, 10:34:23 AM
 #23

Just leave here my implementation of Elliptic-Curve-Cryptography (ECC):
The above posters archive implements a similar totally cryptographically busted technique as was originally discussed in this thread.

No one should ever use it, unless like.. you're trying to trick your enemies into using something insecure. Smiley

[See https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2014-March/004720.html and following posts.]
Hm, I see the in text, the link on which you did provided,
there is info about ECIES, KDF-function, and some oracle value.

But the script which I'd posted earlier, there is not using any KDF-function and oracle.
There is using the multiplication of points (for encrypt) and division (to decrypt),
and this multiplication and division is making to secret skalar (priv_key),
which can be a long number (up to n, - the number of unique points on elliptic curve in finite field).
But, if the same value will be used to multiply many points,
in this case, maybe, there is some frequency analysis vulnerability,
if some values of original points will be known for attacker...

So I think will be better using some Key Derive Function (KDF) - to derive the key for each block...
For example, encrypt by next way:
Code:
encrypted_point = ( current_point * (priv_key XOR (hash( the coordinates from next not encrypted point) )
or NUL no any next point) ).
In this case:
Code:
decrypted point = ( current_point / (priv_key XOR (NULL if no privious point,
or hash( the coordinates from previous  decrypted point) ) ).
But, if attacker will know the original point, and know encrypted point,
he cann't get key, because point cann't be divided to the point, on elliptic curve in finite field:
Else:
Code:
Q = k*G; Q/G = k; where Q = pubkey, G - generator point (predefined for EC), k - privkey for bitcoin address;
Grin
And, as you can see, the second operation is impossible easy, because ECDLP.
But... For many points, with the same key, maybe, it will be mush easier.
That I meaning, with "frequency analysis vulnerability", so regullary changing the key will be not superfluous.

Also, as you can see, when message is encoding, the information redundancy appears.
This is probably why elliptic cryptography is not used anywhere and not developed,
because it is easier to use symmetric ciphers,
which have a ciphertext length equal to the length of the message.
Nevertheless, here is the code, you can research it, conduct an audit, start test, optimize and develop it.

STOP RUSSIAN INVASION OF UKRAINE - SUPPORT UKRAINIAN DEMOS
Contact me in TOX: 653D6C2D13B6DF22C4CB93432586398858A608EE5457624A9A728BE1A9252C5DA12B894C54DB, or just crypto-trader@toxme.io.
Also, WAVES - SCAM! ;(
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!