This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 206 lines
!!! Overview [1] [2]
[{$pagename}] ([KEM] also seen as Key Encapsulation Scheme) are a class of encryption techniques designed to secure [Symmetric Key Cryptography] [key] material for transmission using [Asymmetric Key Cryptography].
In practice, public key systems are clumsy to use in transmitting long messages. Instead they are often used for [Key-Exchange] of [Symmetric Keys], which are relatively short. The [Symmetric Key] is then used for the [Data Encapsulation Method] the longer message.
The traditional approach to sending a symmetric key with public key systems is to first generate a random symmetric key and then encrypt it using the chosen public key algorithm. The recipient then decrypts the public key message to recover the symmetric key. As the symmetric key is generally short, padding is required for full security and proofs of security for padding schemes are often less than complete.[1] KEMs simplify the process by generating a random element in the finite group underlying the public key system and deriving the symmetric key by hashing that element, eliminating the need for padding.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Key_encapsulation|Wikipedia:Key_encapsulation|target='_blank'] - based on information obtained 2018-08-12-
* [#2] - [KEM/DEM technique for hybrid encryption|http://cryptowiki.net/index.php?title=KEM/DEM_technique_for_hybrid_encryption|target='_blank'] - based on information obtained 2018-08-12-