From 3a41b8304bfa5ce7be2dd0f9242e9b8dd807bc41 Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Thu, 18 Feb 2021 20:56:05 +0000 Subject: [PATCH] Update README.md --- unit04_public_key/lab/README.md | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/unit04_public_key/lab/README.md b/unit04_public_key/lab/README.md index 4ff25c5..373df94 100644 --- a/unit04_public_key/lab/README.md +++ b/unit04_public_key/lab/README.md @@ -268,7 +268,33 @@ What is the ECC method that you have used? -If you want to see an example of ECC, try here: https://asecuritysite.com/encryption/ecc +### C.4 +First we need to generate a private key with: + +``` +openssl ecparam -list_curves +``` + +Outline three curves supported: + +### C.5 + +Let’s select two other curves: +``` +openssl ecparam -name secp128r1 -genkey -out priv.pem +openssl ecparam -in priv.pem -text -param_enc explicit -noout +``` + +and: + +``` +openssl ecparam -name secp521r1 -genkey -out priv.pem +openssl ecparam -in priv.pem -text -param_enc explicit -noout +``` + +How does secp128k1, secp256k1 and secp512r1 different in the parameters used? Perhaps identify the length of the prime number used, and the size of the base point (G). + +If you want to see an example of ECC, try [here](https://asecuritysite.com/encryption/ecc) ## D Elliptic Curve Encryption ### D.1