The private key must be generated first, and the public key generation is indispensable.
Pay attention to the encryption process, and be public and private when decrypting.
ECC (English full name: Elliptic Curve Cryptography) is a public key encryption algorithm, and its core clauses include:
Key Generation: Generate private keys for signature and decryption in a secure environment.
Public key generation: use private key to generate corresponding public key for verification and encryption.
Encryption: encrypt the message with the public key and send the ciphertext to the receiver.
Decryption: The receiver decrypts the original message with its own private key.
Private key generation refers to generating private keys for signature and decryption operations in a secure environment; Public key generation uses the private key to generate the corresponding public key for verification and encryption. In the encryption process, the message needs to be encrypted with the public key, and the ciphertext is sent to the receiver, and then the receiver decrypts it with its own private key to get the original information. Therefore, when using ECC encryption algorithm, it is necessary to strictly control the right to use the private key to prevent information from being stolen or tampered with due to the disclosure of the private key.
ECC algorithm uses point operation on elliptic curve to realize encryption and decryption. Compared with other public key encryption algorithms, it has higher security and shorter key length. Therefore, in modern cryptography, ECC has become an important encryption method, which is widely used in various occasions, such as e-commerce, mobile communication, Internet of Things and other fields.