What cryptographic librairies will help calculate shared point and derive keys?2019 Community Moderator ElectionHow to wrap Microsoft RSA key blob in HSMIs there public key initialization API with point compression?How to derive a key with JCA/JCE and with an HSMNeed help implementing key management schemeWhat is the format of this private key?How to use Pkcs11Interop with an NitroKey HSM to derive an shared secret with an ECDeriving an ECDSA uncompressed public key from a compressed onedo sunpkcs11 supports CK_sensitive attribute for derived key using ECDHECDSA How to convert the private and public byte to single Shared key in c#Need help reading/writing ECDSA Keys in GoLang

Can the druid cantrip Thorn Whip really defeat a water weird this easily?

Examples of odd-dimensional manifolds that do not admit contact structure

Counter-example to the existence of left Bousfield localization of combinatorial model category

Coworker uses her breast-pump everywhere in the office

Sword in the Stone story where the sword was held in place by electromagnets

Does Linux have system calls to access all the features of the file systems it supports?

What is the definition of "Natural Selection"?

My adviser wants to be the first author

validation vs test vs training accuracy, which one to compare for claiming overfit?

Unreachable code, but reachable with exception

Is "history" a male-biased word ("his+story")?

Why don't MCU characters ever seem to have language issues?

Time dilation for a moving electronic clock

Can you reject a postdoc offer after the PI has paid a large sum for flights/accommodation for your visit?

Replacing Windows 7 security updates with anti-virus?

Welcoming 2019 Pi day: How to draw the letter π?

When two POV characters meet

Is all copper pipe pretty much the same?

Is King K. Rool's down throw to up-special a true combo?

Is a lawful good "antagonist" effective?

US to Europe trip with Montreal layover - is 52 minutes enough?

Making a sword in the stone, in a medieval world without magic

Do I need to leave some extra space available on the disk which my database log files reside, for log backup operations to successfully occur?

Provisioning profile doesn't include the application-identifier and keychain-access-groups entitlements



What cryptographic librairies will help calculate shared point and derive keys?



2019 Community Moderator ElectionHow to wrap Microsoft RSA key blob in HSMIs there public key initialization API with point compression?How to derive a key with JCA/JCE and with an HSMNeed help implementing key management schemeWhat is the format of this private key?How to use Pkcs11Interop with an NitroKey HSM to derive an shared secret with an ECDeriving an ECDSA uncompressed public key from a compressed onedo sunpkcs11 supports CK_sensitive attribute for derived key using ECDHECDSA How to convert the private and public byte to single Shared key in c#Need help reading/writing ECDSA Keys in GoLang










0















We need to perform some cryptographic operations and I want to know what cryptographic librairies can fit my need.



The following is the context:



Given the fact that we have:



  • An EC Private Key stored in the HSM

  • An EC Public Key (public point)

  • Encrypted AES key

  • MAC calculated with the EC public key ECDH

We need to perform the following:




  • Calculate a shared point (K~X~, K~Y~) using ECKA-DH algorithm from the EC Private and EC Public Keys. (See BSI TR 03111)


  • Derive K~ENC~ and K~MAC~ using KDF2(x, l) with SHA-256. K~ENC~ is first 8 bytes of output. K~MAC~ is last 8 bytes of output. (See ISO/IEC 18033-2)

  • Verify the MAC over the encrypted AES key against MAC ==> MAC = AES-CMAC(Encrypted AES key || ValueA || ValueB, K~MAC~).

  • Decrypt the encrypted AES key ==> AES key = AES-CBC(encrypted AES key, K~ENC~).


What cryptographic librairies will help calculate shared point baed on
the fact that the Private key is stored in the HSM?



Can Bouncy Castle be used jointly with IAIK PKCS#11 wrapper?



Can IAIK-JCE a commercial product from IAIK help on that?




Thank you for your help.



Best regards.










share|improve this question


























    0















    We need to perform some cryptographic operations and I want to know what cryptographic librairies can fit my need.



    The following is the context:



    Given the fact that we have:



    • An EC Private Key stored in the HSM

    • An EC Public Key (public point)

    • Encrypted AES key

    • MAC calculated with the EC public key ECDH

    We need to perform the following:




    • Calculate a shared point (K~X~, K~Y~) using ECKA-DH algorithm from the EC Private and EC Public Keys. (See BSI TR 03111)


    • Derive K~ENC~ and K~MAC~ using KDF2(x, l) with SHA-256. K~ENC~ is first 8 bytes of output. K~MAC~ is last 8 bytes of output. (See ISO/IEC 18033-2)

    • Verify the MAC over the encrypted AES key against MAC ==> MAC = AES-CMAC(Encrypted AES key || ValueA || ValueB, K~MAC~).

    • Decrypt the encrypted AES key ==> AES key = AES-CBC(encrypted AES key, K~ENC~).


    What cryptographic librairies will help calculate shared point baed on
    the fact that the Private key is stored in the HSM?



    Can Bouncy Castle be used jointly with IAIK PKCS#11 wrapper?



    Can IAIK-JCE a commercial product from IAIK help on that?




    Thank you for your help.



    Best regards.










    share|improve this question
























      0












      0








      0








      We need to perform some cryptographic operations and I want to know what cryptographic librairies can fit my need.



      The following is the context:



      Given the fact that we have:



      • An EC Private Key stored in the HSM

      • An EC Public Key (public point)

      • Encrypted AES key

      • MAC calculated with the EC public key ECDH

      We need to perform the following:




      • Calculate a shared point (K~X~, K~Y~) using ECKA-DH algorithm from the EC Private and EC Public Keys. (See BSI TR 03111)


      • Derive K~ENC~ and K~MAC~ using KDF2(x, l) with SHA-256. K~ENC~ is first 8 bytes of output. K~MAC~ is last 8 bytes of output. (See ISO/IEC 18033-2)

      • Verify the MAC over the encrypted AES key against MAC ==> MAC = AES-CMAC(Encrypted AES key || ValueA || ValueB, K~MAC~).

      • Decrypt the encrypted AES key ==> AES key = AES-CBC(encrypted AES key, K~ENC~).


      What cryptographic librairies will help calculate shared point baed on
      the fact that the Private key is stored in the HSM?



      Can Bouncy Castle be used jointly with IAIK PKCS#11 wrapper?



      Can IAIK-JCE a commercial product from IAIK help on that?




      Thank you for your help.



      Best regards.










      share|improve this question














      We need to perform some cryptographic operations and I want to know what cryptographic librairies can fit my need.



      The following is the context:



      Given the fact that we have:



      • An EC Private Key stored in the HSM

      • An EC Public Key (public point)

      • Encrypted AES key

      • MAC calculated with the EC public key ECDH

      We need to perform the following:




      • Calculate a shared point (K~X~, K~Y~) using ECKA-DH algorithm from the EC Private and EC Public Keys. (See BSI TR 03111)


      • Derive K~ENC~ and K~MAC~ using KDF2(x, l) with SHA-256. K~ENC~ is first 8 bytes of output. K~MAC~ is last 8 bytes of output. (See ISO/IEC 18033-2)

      • Verify the MAC over the encrypted AES key against MAC ==> MAC = AES-CMAC(Encrypted AES key || ValueA || ValueB, K~MAC~).

      • Decrypt the encrypted AES key ==> AES key = AES-CBC(encrypted AES key, K~ENC~).


      What cryptographic librairies will help calculate shared point baed on
      the fact that the Private key is stored in the HSM?



      Can Bouncy Castle be used jointly with IAIK PKCS#11 wrapper?



      Can IAIK-JCE a commercial product from IAIK help on that?




      Thank you for your help.



      Best regards.







      ecdsa hsm ecdh






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Mar 7 at 11:06









      Ahmed MANSOURAhmed MANSOUR

      1,22611526




      1,22611526






















          0






          active

          oldest

          votes











          Your Answer






          StackExchange.ifUsing("editor", function ()
          StackExchange.using("externalEditor", function ()
          StackExchange.using("snippets", function ()
          StackExchange.snippets.init();
          );
          );
          , "code-snippets");

          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "1"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55042329%2fwhat-cryptographic-librairies-will-help-calculate-shared-point-and-derive-keys%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55042329%2fwhat-cryptographic-librairies-will-help-calculate-shared-point-and-derive-keys%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Identity Server 4 is not redirecting to Angular app after login2019 Community Moderator ElectionIdentity Server 4 and dockerIdentityserver implicit flow unauthorized_clientIdentityServer Hybrid Flow - Access Token is null after user successful loginIdentity Server to MVC client : Page Redirect After loginLogin with Steam OpenId(oidc-client-js)Identity Server 4+.NET Core 2.0 + IdentityIdentityServer4 post-login redirect not working in Edge browserCall to IdentityServer4 generates System.NullReferenceException: Object reference not set to an instance of an objectIdentityServer4 without HTTPS not workingHow to get Authorization code from identity server without login form

          2005 Ahvaz unrest Contents Background Causes Casualties Aftermath See also References Navigation menue"At Least 10 Are Killed by Bombs in Iran""Iran"Archived"Arab-Iranians in Iran to make April 15 'Day of Fury'"State of Mind, State of Order: Reactions to Ethnic Unrest in the Islamic Republic of Iran.10.1111/j.1754-9469.2008.00028.x"Iran hangs Arab separatists"Iran Overview from ArchivedConstitution of the Islamic Republic of Iran"Tehran puzzled by forged 'riots' letter""Iran and its minorities: Down in the second class""Iran: Handling Of Ahvaz Unrest Could End With Televised Confessions""Bombings Rock Iran Ahead of Election""Five die in Iran ethnic clashes""Iran: Need for restraint as anniversary of unrest in Khuzestan approaches"Archived"Iranian Sunni protesters killed in clashes with security forces"Archived

          Can't initialize raids on a new ASUS Prime B360M-A motherboard2019 Community Moderator ElectionSimilar to RAID config yet more like mirroring solution?Can't get motherboard serial numberWhy does the BIOS entry point start with a WBINVD instruction?UEFI performance Asus Maximus V Extreme