From d159b061924ef1250e4f1a90f398e95e8f6eeea5 Mon Sep 17 00:00:00 2001 From: elad121 Date: Tue, 29 Oct 2019 22:18:16 -0400 Subject: [PATCH] Update ecc-encryption-decryption.md --- asymmetric-key-ciphers/ecc-encryption-decryption.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/asymmetric-key-ciphers/ecc-encryption-decryption.md b/asymmetric-key-ciphers/ecc-encryption-decryption.md index b8018d2..791bd89 100644 --- a/asymmetric-key-ciphers/ecc-encryption-decryption.md +++ b/asymmetric-key-ciphers/ecc-encryption-decryption.md @@ -2,7 +2,7 @@ In this section we shall explain how to implement **elliptic-curve based public-key encryption / decryption** \(asymmetric encryption scheme based on ECC\). This is **non-trivial** and usually involves a design of hybrid encryption scheme, involving ECC cryptography, ECDH key exchange and symmetric encryption algorithm. -Assume we have a ECC **private-public key pair**. We want to encrypt and decrypt data using these keys. By definition, **asymmetric encryption** works as follows: if we **encrypt data by a private key**, we will be able to **decrypt** the ciphertext later by the corresponding **public key**: +Assume we have a ECC **private-public key pair**. We want to encrypt and decrypt data using these keys. By definition, **asymmetric encryption** works as follows: if we **encrypt data by a public key**, we will be able to **decrypt** the ciphertext later by the corresponding **private key**: ![](../.gitbook/assets/asymmetric-encryption-diagram.png)