1

At the moment I have an EC private key in my possession and also some traffic that was encrypted using the aforementioned private key. I have been trying to use OpenSSL to turn the private key into something Wireshark can work with. For example, going from the original:

-----BEGIN EC PRIVATE KEY-----
/* BASE 64 ENCODED *\
-----END EC PRIVATE KEY-----

To the following:

-----BEGIN CERTIFICATE-----
/* BASE 64 ENCODED */
-----END CERTIFICATE-----

Via the command:

openssl req -new -x509 -key private_key.pem -out server.pem -days 730

However Wireshark doesn't seem to enjoy this either. Is there a way to decrypt ECDSA traffic using wireshark?

2 Answers2

1

ECDSA

You're out of luck, elliptic curve provides perfect forward security. this means that having the private key does not help.

Jasen
  • 1,216
  • 8
  • 10
0

No isn’t.

Basically the private key is used to verify the identity of the server, but the encryption keys are independent and negotiated in a mathematical way such that nothing on the wire can be used to determine them.

The client and server throw them away after use. So unless you had logging of these ephemeral keys by the software in each end, there is no way to decrypt the traffic.

Secto Kia
  • 101