Just as Abdoul pointed out, the efficiency of public key cryptography is much lower than the classical (symmetric) encryption and decryption. Therefore, in practice, public key cryptography such as ECC is only used for key distribution or in many cryptographic protocols for specified purpose. To encrypt/decrypt a database, you should use symmetric algorithm. Both block system or stream on would be OK.
Hello sir, the encryption technique you need to use for a database is depend on the data you store inside the database.
If the data is username and passwords, you can use Hash function instead of ECC. But beware of Rainbow table attack(if you chose Hash). This attack can be rectified by using SALT to the hash function.
If you store some important data/value/message that possibly more than 20 characters, you can use multilevel/multistage encryption techniques, that is you can combine two algorithms/ two whole new algorithms. All the best for your work.
If you insist to use ECC in your implementation you should find a cryptographic provider to add in your software, such as Bouncy Castle.
https://www.bouncycastle.org/
Otherwise, use as stated above symmetric encryption*, which is more effective. Choose a key length as big as the importance of the data that your are storing.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.
The well-established way to public-key encrypt using elliptic curves is the ElGamal scheme, known as ECIES-KEM in standards. Just Google ECIES, you will find 4 different standards that specify it. It is trivial to implement once you have a scalar multiplication working.