I would like to be able to generate a key pair private and public key in command line with openssl, but I don't know exactly how to do it. What I have done so far was to do the following command line but this only prints me this which I don't know exactly what it is:s. FROM OPENSSL PAGE: To create EC parameters with explicit parameters. Is there a openssl command that can generate an ECC key pair. Openssl command that can generate an ECC key pair. Generate ECC key with password protection. That generates a 2048-bit RSA key pair, encrypts them with a password you provide and writes them to a file. You need to next extract the public key file. You will use this, for instance, on your web server to encrypt content so that it can only be read with the private key. ECDSA sample generating EC keypair, signing and verifying ECDSA signature. (Step1) choose supported EC curve name and generate key pair ECC curve name: EC private key (hex): EC public key (hex): (Step2) Sign message Signature Algorithm: Message string to be signed: Signature value (hex). NOTE: To use key pairs generated by OpenSSL.
-->To sign an assembly with a strong name, you must have a public/private key pair. This public and private cryptographic key pair is used during compilation to create a strong-named assembly. You can create a key pair using the Strong Name tool (Sn.exe). Key pair files usually have an .snk extension.
Note
In Visual Studio, the C# and Visual Basic project property pages include a Signing tab that enables you to select existing key files or to generate new key files without using Sn.exe. In Visual C++, you can specify the location of an existing key file in the Advanced property page in the Linker section of the Configuration Properties section of the Property Pages window. The use of the AssemblyKeyFileAttribute attribute to identify key file pairs was made obsolete beginning with Visual Studio 2005.
Create a key pair
To create a key pair, at a command prompt, type the following command:
sn –k <file name>
Openssl Generate Private Key
In this command, file name is the name of the output file containing the key pair.
The following example creates a key pair called sgKey.snk.
If you intend to delay sign an assembly and you control the whole key pair (which is unlikely outside test scenarios), you can use the following commands to generate a key pair and then extract the public key from it into a separate file. First, create the key pair:
Next, extract the public key from the key pair and copy it to a separate file:
Once you create the key pair, you must put the file where the strong name signing tools can find it.
When signing an assembly with a strong name, the Assembly Linker (Al.exe) looks for the key file relative to the current directory and to the output directory. When using command-line compilers, you can simply copy the key to the current directory containing your code modules.
If you are using an earlier version of Visual Studio that does not have a Signing tab in the project properties, the recommended key file location is the project directory with the file attribute specified as follows:
See also
Generate Ecc Key Pair Openssl
As of version 2.6.2 DidiSoft OpenPGP Library for Java fully supports Elliptic Curve cryptography (ECC) in OpenPGP as defined in RFC 6637.
In this chapter we are going to make a short introduction to the new ECC encryption and illustrate how to generate your first ECC OpenPGP key pair.
1. What is Elliptic Curve cryptography?
2. Generating an ECC OpenPGP key pair
3. Industry support
2. Generating an ECC OpenPGP key pair
3. Industry support
What is Elliptic Curve cryptography?
Elliptic Curve cryptography provides asymmetric (public key) cryptography based on mathematic operations with Elliptic Curves over finite fields.
An ECC OpenPGP key consists of a master key which is used for EC DSA signing and an encryption sub key which is used for EC Diffie-Hellman (ECDH) encryption.
Currently the standard for ECC in OpenPGP (RFC 6637) defines three elliptic curves over the finite field of prime numbers introduced by the National Security Agency (NSA) during the 2005 RSA conference: NIST P-256, NIST P-384, NIST-521 (the number shows the finite field of prime numbers with the same size in bits).
Some OpenPGP implementations like GnuPG/gpg has added support for Brainpool curves as well, which we support too as of version 3.1.3. Ms office 2010 key generator.
Comparison with RSA and ElGamal (DH/DSS)
The weakest ECC OpenPGP key pairs (over curve NIST-256) can be compared with a 3072 bit ElGamal or 3072 bit RSA key pair.
Please check section “Security considerations” for more information.
Generating an ECC OpenPGP key pair
Creating an ECC OpenPGP key pair is done with a new set of methods with common name generateEccKeyPair, available in the KeyStore and PGPKeyPair classes.
The supported values for the ECC curve are :
Below is an example that shows how to generate an ECC key pair with no expiration date and default cipher, compression and hashing key preferences.
Industry support
The following software products are known to support ECC in OpenPGP as of the time of this writing:
Symantec PGP Command line 10.2.+
![Key Key](/uploads/1/2/6/0/126049444/542008285.png)
GnuPG 2.1+
Summary
This chapter introduced the new Elliptic Curve (ECC) OpenPGP keys defined in RFC 6637 . As of version 2.6.2 DidiSoft OpenPGP Library for Java fully supports this extension of the OpenPGP standard.
Usage of the new type of OpenPGP keys is transparent once you upgrade to version 2.6.2 or above.
Key generation is done though the methods generateEccKeyPair available in the KeyStore and PGPKeyPair classes.