I had just read a primer about ECC, I see how it can be complicated.
Something I haven't been able to determine is what information does the client machine get to help decrypt the data?
The whole exchange part I'm not sure about.
I had just read a primer about ECC, I see how it can be complicated.
Something I haven't been able to determine is what information does the client machine get to help decrypt the data?
The whole exchange part I'm not sure about.
On
I don't think this is an answer, but really a comment, but I don't have a high enough reputation to comment:
If you're talking about ECIES then, the client Bob, would already have the private key (which is a secret that is kept to himself) to decrypt data that was sent by Alice.
Note the that private and public key are related to each other, the public key can be given to anyone (namely, Alice); the private key is kept secret.
As an example, lets look at Elliptic-Curve-Diffie-Hellman (ECDH).
Alice
Bob
Each party calculates shared key
Notice that they each keep their private key to themselves.
Also note, in order to break this scheme, you would have to solve the Elliptic-Curve-Discrete-Log-Problem (ECDLP).
Elliptic Curve Discrete Logarithm Problem (ECDLP):
Let $E$ be an elliptic curve over a finite field $F_q$. Suppose $P$ is some point of $E( F_q )$ and let $Q$ be a point in $\left< P \right>$. Find an integer $t$ such that $Q = [t] P$.