难为你了是什么意思| 霍启刚家族做什么生意| 伊始什么意思| 返图是什么意思| 红豆和什么搭配最好| 人品好是什么意思| 吃槟榔有什么好处| 5月5号什么星座| 什么样的树木| 我俩太不公平这是什么歌| 锚什么意思| 孕晚期脚肿是什么原因| 尿检4个加号什么意思| 嘴巴苦是什么原因引起的| 大天真香是什么意思| 鬼画符是什么意思| 知了喜欢吃什么| 上午九点多是什么时辰| 码子是什么意思| 碳酸氢钠是什么东西| 炖鸭汤放什么食材最好| 零四年属什么| lam是什么意思| 血糖偏高能吃什么水果| 鹅蛋有什么营养| 一九九七年属什么生肖| 做梦吃鱼是什么意思| 人为什么会抽筋| none是什么意思| 双侧胸膜增厚是什么病| 孕妇吸二手烟对胎儿有什么影响| 胸闷憋气是什么原因| 怀孕哭对宝宝有什么影响| 糖尿病人不能吃什么水果| 补体c3偏高说明什么| 绝对值什么意思| 什么是民间故事| prc是什么意思| 楞严经讲的是什么| 董字五行属什么| 3a是什么意思| 德巴金是什么药| 吃什么头发长的快| 一什么床| 牛吃什么| 怎么判断自己什么脸型| 做一半就软了是什么原因| 阳光明媚是什么意思| 肝血虚吃什么中成药| 什么是唐氏儿| 足跟痛是什么原因| 大快朵颐是什么意思| 宠溺是什么意思| 27属相是什么生肖| 什么是贡菜| 万字第二笔是什么| twice是什么意思| 心境情感障碍是什么病| 叹气是什么意思| 16588a是什么尺码女装| 什么大专好就业| 志字五行属什么| 梦见好多鱼是什么意思| 四月四号什么星座| 绝经有什么症状| 尿酮体是什么| 汉城为什么改名叫首尔| 多吃蓝莓有什么好处| 黄精为什么要九蒸九晒| 性功能障碍吃什么药| 向日葵为什么会随着太阳转动| 中风吃什么药最有效| 狡兔三窟什么意思| 枕神经痛吃什么药| 心脏彩超可以检查什么| 三头六臂指什么生肖| 助力车是什么车| 硬下疳是什么| 金银满堂是什么生肖| 右手中指指尖麻木是什么原因| 手术后喝什么汤恢复快| 大条是什么意思| 六月二七是什么星座| 减肥吃什么菜| 有什么病| 麻风病是什么症状图片| 糖链抗原高是什么原因| 国潮是什么| 耳朵发炎吃什么药| 什么是管制| 蜘蛛的血液是什么颜色| 仙女下凡是什么生肖| 褥疮用什么药膏| 吃什么有利于排便| 心病有什么症状| 中暑什么症状表现| 哥哥的老婆叫什么| 木樨是什么意思| 咽炎吃什么药效果好| 到底是什么| 为什么会做噩梦| 心肌供血不足是什么原因造成的| 过敏性鼻炎喷什么药| 网线长什么样| 大牙什么时候换| 王炸是什么意思| 垢是什么意思| 加盟店是什么意思| 微信为什么不能转账| 树冠是什么| 细菌性结膜炎用什么眼药水| 猪血不能和什么一起吃| 一姐是什么意思| 什么样的枫叶| 庚什么意思| 兵马未动粮草先行是什么意思| 胳膊上的花是打了什么疫苗| 一九八八年属什么生肖| 外露什么意思| 看输卵管是否堵塞做什么检查| 元首是什么意思| 头重脚轻是什么生肖| 兔子跟什么生肖最配对| 逆钟向转位什么意思| 高压150低压100吃什么药| ppd试验是什么意思| 十月底是什么星座| 血小板低有什么危害| ana谱是查什么病的| 农历9月17日是什么星座| 味精的主要成分是什么| lv的全称是什么| 衣原体支原体感染有什么症状| 万马奔腾是什么意思| 肌红蛋白高是什么意思| 世界上最贵的车是什么车| 检出限是什么意思| 升血小板吃什么药| 最高位是什么位| 夏末是什么时候| 4p是什么意思| 小便赤黄是什么原因| c14检查前需要注意什么| 线索细胞阳性什么意思| 丑时是什么时候| 黄瓜长什么样| 文五行属什么| 女命七杀代表什么| 龙马精神代表什么生肖| 7.2什么星座| 身上经常出汗是什么原因| 格局什么意思| 嗓子疼吃什么食物好| 西瓜对人体有什么好处| 左眼角有痣代表什么| 逍遥丸什么人不能吃| 什么是品牌| 肺结节钙化是什么意思| 瘘管是什么症状| 招风耳是什么意思| 流产后吃什么食物| 骨折可以吃什么| 什么叫假性发烧| 自由基是什么东西| 肾结石吃什么药止疼| mico是什么意思| 脚板肿是什么原因引起的| 承上启下是什么意思| 久卧伤气是什么意思| 乌冬面为什么叫乌冬面| 梦见自己出嫁是什么意思| b超fl是什么意思| 看胸部挂什么科| 梅干菜是什么菜做成的| 茶禅一味是什么意思| 日本打工需要什么条件| 睡莲和碗莲有什么区别| 化疗恶心吃什么可以缓解| 生殖疱疹用什么药效果好| 夫妻相是什么意思| 女人每天吃什么抗衰老| 用甲硝唑栓有什么反应| 腿毛有什么用| 补气补血吃什么好| 苎麻是什么面料| 梦见狗死了是什么预兆| 蛋糕粉是什么面粉| 左下腹部是什么器官| 0206是什么星座| 打嗝不停是什么原因| 淋巴发炎吃什么药好| 清分日期是什么意思| 巨是什么结构| 梅子是什么| 看正月初一是什么生肖| 皮疹是什么| 追悔莫及什么意思| 痛风吃什么中药最有效| 早上八点半是什么时辰| 杨桃长什么样| 什么叫佛| 考试前吃什么好| 升阳举陷是什么意思| 类固醇是什么东西| 攻是什么意思| 送锦旗有什么讲究| 剪刀手什么意思| 儿童流鼻血什么原因引起的| 叶公好龙是什么故事| 口子念什么| 肠梗阻是什么病| 日柱将星是什么意思| 双鱼座和什么座最配| 有结石不能吃什么东西| 什么样的人容易得结石| 金銮殿是什么意思| 藩台是什么官| 空调出的水是什么水| 矫正视力是什么意思| 专著是什么| 肝介入治疗是什么意思| 士字五行属什么| 孕妇建档是什么意思| 精索静脉曲张什么症状| 多巴胺是什么| 三季人是什么意思| 滥竽充数的滥是什么意思| 什么人适合吃红参| 很会放屁是什么原因| 心脏下边是什么器官| 4月6号是什么星座| 神经性头痛吃什么药效果好| 新疆是什么气候| 年终奖一般什么时候发| 红艳桃花是什么意思| 男孩过生日送什么礼物好| 我能说什么| 什么花不能浇硫酸亚铁| 羊肉馅饺子放什么菜| 狗狗流鼻涕吃什么药| 左手臂有痣代表什么| 四月初八是什么星座| 舌头发白是什么原因| 66年属什么| 强调是什么意思| 更年期出虚汗吃什么药| 穿什么颜色显白| hcg偏高是什么原因| kt什么意思| 肠上皮化生是什么意思| 因祸得福是什么意思| 振水音阳性提示什么| love是什么词性| 祛痘用什么药膏| 十一月十一号是什么星座| 相得益彰是什么意思| 窦性心律逆钟向转位是什么意思| 原始鳞状上皮成熟是什么意思| 阴道痒是什么原因| 为什么老是说梦话| 火车硬卧代硬座是什么意思| 得不偿失是什么意思| 什么是挠脚心| 什么是盐| 百度Jump to content

e2是什么意思

From Wikipedia, the free encyclopedia
Flow diagram of a key encapsulation mechanism, relating the inputs and outputs of the Gen, Encap, and Decap algorithms of a KEM
A key encapsulation mechanism, to securely transport a secret key from a sender to a receiver, consists of three algorithms: Gen, Encap, and Decap. Circles shaded blue—the receiver's public key and the encapsulation —can be safely revealed to an adversary, while boxes shaded red—the receiver's private key and the encapsulated secret key —must be kept secret.
百度 确认过眼神青岛有我想要的红|有一种蓝,叫大海蓝有人说,记忆里,青岛最赏心悦目的景色,是透过观光直升机的舷窗,是坐在浴场的沙滩的上,看海天一色,蔚蓝无边。

In cryptography, a key encapsulation mechanism (KEM) is a public-key cryptosystem that allows a sender to generate a short secret key and transmit it to a receiver securely, in spite of eavesdropping and intercepting adversaries.[1][2][3] Modern standards for public-key encryption of arbitrary messages are usually based on KEMs.[4][5]

A KEM allows a sender who knows a public key to simultaneously generate a short random secret key and an encapsulation or ciphertext of the secret key by the KEM's encapsulation algorithm. The receiver who knows the private key corresponding to the public key can recover the same random secret key from the encapsulation by the KEM's decapsulation algorithm.[1][2][3]

The security goal of a KEM is to prevent anyone who does not know the private key from recovering any information about the encapsulated secret keys, even after eavesdropping or submitting other encapsulations to the receiver to study how the receiver reacts.[1][2][3]

Difference from public-key encryption

[edit]
Flow diagram of a public-ken encryption scheme, relating the inputs and outputs of its Gen, Encrypt, and Decrypt algorithms
A public-key encryption scheme.

The difference between a public-key encryption scheme and a KEM is that a public-key encryption scheme allows a sender to choose an arbitrary message from some space of possible messages, while a KEM chooses a short secret key at random for the sender.[1][2][3]

The sender may take the random secret key produced by a KEM and use it as a symmetric key for an authenticated cipher whose ciphertext is sent alongside the encapsulation to the receiver. This serves to compose a public-key encryption scheme out of a KEM and a symmetric-key authenticated cipher in a hybrid cryptosystem.[1][2][3][5]

Most public-key encryption schemes such as RSAES-PKCS1-v1_5, RSAES-OAEP, and Elgamal encryption are limited to small messages[6][7] and are almost always used to encrypt a short random secret key in a hybrid cryptosystem anyway.[8][9][5] And although a public-key encryption scheme can conversely be converted to a KEM by choosing a random secret key and encrypting it as a message, it is easier to design and analyze a secure KEM than to design a secure public-key encryption scheme as a basis. So most modern public-key encryption schemes are based on KEMs rather than the other way around.[10][5]

Definition

[edit]

Syntax

[edit]

A KEM consists of three algorithms:[1][2][3][11][12]

  1. Key generation, , takes no inputs and returns a pair of a public key and a private key .
  2. Encapsulation, , takes a public key , randomly chooses a secret key , and returns along with its encapsulation .
  3. Decapsulation, , takes a private key and an encapsulation , and either returns an encapsulated secret key or fails, sometimes denoted by returning (called ‘bottom’).

Correctness

[edit]

A KEM is correct if, for any key pair generated by , decapsulating an encapsulation returned by with high probability yields the same key , that is, .[2][3][11][12]

Security: IND-CCA

[edit]

Security of a KEM is quantified by its indistinguishability against chosen-ciphertext attack, IND-CCA, which is loosely how much better an adversary can do than a coin toss to tell whether, given a random key and an encapsulation, the key is encapsulated by that encapsulation or is an independent random key.[2][3][11][12]

Specifically, in the IND-CCA game:

  1. The key generation algorithm is run to generate .
  2. is revealed to the adversary.
  3. The adversary can query for arbitrary encapsulations of the adversary's choice.
  4. The encapsulation algorithm is run to randomly generate a secret key and encapsulation , and another secret key is generated independently at random.
  5. A fair coin is tossed, giving an outcome .
  6. The pair is revealed to the adversary.
  7. The adversary can again query for arbitrary encapsulations of the adversary's choice, except for .
  8. The adversary returns a guess , and wins the game if .

The IND-CCA advantage of the adversary is , that is, the probability beyond a fair coin toss at correctly distinguishing an encapsulated key from an independently randomly chosen key.

Examples and motivation

[edit]

RSA

[edit]

Traditional RSA encryption, with -bit moduli and exponent , is defined as follows:[13][14][15]

  • Key generation, :
  1. Generate a -bit semiprime with at random satisfying , where is the Carmichael function.
  2. Compute .
  3. Return as the public key and as the private key. (Many variations on key generation algorithms and private key formats are available.[16])
  • Encryption of -bit message to public key , giving :
  1. Encode the bit string as an integer with .
  2. Return .
  • Decryption of ciphertext with private key , giving :
  1. Compute .
  2. Decode the integer as a bit string .

This naive approach is totally insecure. For example, since it is nonrandomized, it cannot be secure against even known-plaintext attack—an adversary can tell whether the sender is sending the message ATTACK AT DAWN versus the message ATTACK AT DUSK simply by encrypting those messages and comparing the ciphertext.

Even if is always a random secret key, such as a 256-bit AES key, when is chosen to optimize efficiency as , the message can be computed from the ciphertext simply by taking real number cube roots, and there are many other attacks against plain RSA.[13][14] Various randomized padding schemes have been devised in attempts—sometimes failed, like RSAES-PKCS1-v1_5[13][17][18]—to make it secure for arbitrary short messages .[13][14]

Since the message is almost always a short secret key for a symmetric-key authenticated cipher used to encrypt an arbitrary bit string message, a simpler approach called RSA-KEM is to choose an element of at random and use that to derive a secret key using a key derivation function , roughly as follows:[19][8]

  • Key generation: As above.
  • Encapsulation for a public key , giving :
  1. Choose an integer with uniformly at random.
  2. Return and as its encapsulation.
  • Decapsulation of with private key , giving :
  1. Compute .
  2. Return .

This approach is simpler to implement, and provides a tighter reduction to the RSA problem, than padding schemes like RSAES-OAEP.[19]

Elgamal

[edit]

Traditional Elgamal encryption is defined over a multiplicative subgroup of the finite field with generator of order as follows:[20][21]

  • Key generation, :
  1. Choose uniformly at random.
  2. Compute .
  3. Return as the private key and as the public key.
  • Encryption of a message to public key , giving :
  1. Choose uniformly at random.
  2. Compute:
  3. Return the ciphertext .
  • Decryption of a ciphertext for a private key , giving :
  1. Fail and return if or if , i.e., if or is not in the subgroup generated by .
  2. Compute .
  3. Return .

This meets the syntax of a public-key encryption scheme, restricted to messages in the space (which limits it to message of a few hundred bytes for typical values of ). By validating ciphertexts in decryption, it avoids leaking bits of the private key through maliciously chosen ciphertexts outside the group generated by .

However, this fails to achieve indistinguishability against chosen ciphertext attack. For example, an adversary having a ciphertext for an unknown message can trivially decrypt it by querying the decryption oracle for the distinct ciphertext , yielding the related plaintext , from which can be recovered by .[20]

Traditional Elgamal encryption can be adapted to the elliptic-curve setting, but it requires some way to reversibly encode messages as points on the curve, which is less trivial than encoding messages as integers mod .[22]

Since the message is almost always a short secret key for a symmetric-key authenticated cipher used to encrypt an arbitrary bit string message, a simpler approach is to derive the secret key from and dispense with and altogether, as a KEM, using a key derivation function :[1]

  • Key generation: As above.
  • Encapsulation for a public key , giving :
  1. Choose uniformly at random.
  2. Compute .
  3. Return and as its encapsulation.
  • Decapsulation of with private key , giving :
  1. Fail and return if , i.e., if is not in the subgroup generated by .
  2. Compute .
  3. Return .

When combined with an authenticated cipher to encrypt arbitrary bit string messages, the combination is essentially the Integrated Encryption Scheme. Since this KEM only requires a one-way key derivation function to hash random elements of the group it is defined over, in this case, and not a reversible encoding of messages, it is easy to extend to more compact and efficient elliptic curve groups for the same security, as in the ECIES, Elliptic Curve Integrated Encryption Scheme.

See also

[edit]

References

[edit]
  1. ^ a b c d e f g Galbraith, Steven (2012). "§23.1.1: The KEM/DEM paradigm". Mathematics of Public-Key Cryptography. Cambridge University Press. pp. 471–478. ISBN 978-1-107-01392-6.
  2. ^ a b c d e f g h Shoup, Victor (May 2000). Preneel, Bart (ed.). Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288. doi:10.1007/3-540-45539-6_19. ISBN 978-3-540-67517-4.
  3. ^ a b c d e f g h Cramer, Ronald; Shoup, Victor (2003). "Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack". SIAM Journal on Computing. 33 (1). Society for Industrial and Applied Mathematics: 167–226. doi:10.1137/S0097539702403773.
  4. ^ FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard (PDF), National Institute of Standards and Technology, 2025-08-06, doi:10.6028/NIST.FIPS.203
  5. ^ a b c d Barnes, R.; Bhargavan, K.; Lipp, B.; Wood, C. (February 2022). Hybrid Public Key Encryption. Internet Engineering Task Force. doi:10.17487/RFC9180. RFC 9180.
  6. ^ Kaliski, B.; Jonsson, J.; Rusch, A. (November 2016). Moriarity, K. (ed.). PKCS #1: RSA Cryptography Specifications Version 2.2. Internet Engineering Task Force. doi:10.17487/RFC8017. RFC 8017.
  7. ^ Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (October 1996). "8. Public-Key Encryption" (PDF). Handbook of Applied Cryptography. CRC Press. pp. 283–319. ISBN 0-8493-8523-7.
  8. ^ a b Ferguson, Niels; Kohno, Tadayoshi; Schneier, Bruce (2010). "12. RSA". Cryptography Engineering. Wiley. pp. 195–211. ISBN 978-0-470-47424-2.
  9. ^ Callas, J.; Donnerhacke, L.; Finney, H.; Shaw, D.; Thayer, R. (November 2007). OpenPGP Message Format. Internet Engineering Task Force. doi:10.17487/RFC4880. RFC 4880.
  10. ^ "Post-Quantum Cryptography: FAQs". National Institute of Standards and Technology. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  11. ^ a b c Dent, Alexander W. (2002), A Designer’s Guide to KEMs, Cryptology ePrint Archive, International Association for Cryptologic Research
  12. ^ a b c Hofheinz, Dennis; H?velmanns, Kathrin; Kiltz, Eike (November 2017). Kalai, Yael; Reyzin, Leonid (eds.). A Modular Analysis of the Fujisaki-Okamoto Transformation. Theory of Cryptography – TCC 2017. Lecture Notes in Computer Science. Vol. 10677. Baltimore, MD, United States: Springer. pp. 341–371. doi:10.1007/978-3-319-70500-2_12. ISBN 978-3-319-70499-9.
  13. ^ a b c d Aumasson, Jean-Philippe (2018). "10. RSA". Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press. pp. 181–199. ISBN 978-1-59327-826-7.
  14. ^ a b c Stinson, Douglas R. (2006). "5. The RSA Cryptosystem and Factoring Integers". Cryptography Theory and Practice (3rd ed.). Chapman & Hall/CRC. pp. 161–232. ISBN 978-1-58488-508-5.
  15. ^ Rivest, R.L.; Shamir, A.; Adleman, L. (2025-08-06). "A method for obtaining digital signatures and public-key cryptosystems" (PDF). Communications of the ACM. 21 (2). Association for Computer Machinery: 120–126. doi:10.1145/359340.359342.
  16. ^ ?venda, Petr; Nemec, Matú?; Sekan, Peter; Kva?ňovsky, Rudolf; Formánek, David; Komárek, David; Matyá?, Vashek (August 2016). The Million-Key Question—Investigating the Origins of RSA Public Keys. 25th USENIX Security Symposium. Austin, TX, United States: USENIX Association. pp. 893–910. ISBN 978-1-931971-32-4.
  17. ^ Bleichenbacher, Daniel (August 1998). Krawczyk, Hugo (ed.). Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. Advances in Cryptology – CRYPTO '98. Lecture Notes in Computer Science. Vol. 1462. Santa Barbara, CA, United States: Springer. pp. 1–12. doi:10.1007/BFb0055716. ISBN 978-3-540-64892-5.
  18. ^ Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal (May 2000). Preneel, Bart (ed.). New Attacks on PKCS#1 v1.5 Encryption. Advances in Cryptology – EUROCRYPT 2000. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 369–381. doi:10.1007/3-540-45539-6_25. ISBN 978-3-540-67517-4.
  19. ^ a b Shoup, Victor (2001), A Proposal for an ISO Standard for Public Key Encryption (version 2.1), Cryptology ePrint Archive, International Association for Cryptologic Research
  20. ^ a b Galbraith, Steven (2012). "§20.3: Textbook Elgamal encryption". Mathematics of Public-Key Cryptography. Cambridge University Press. pp. 471–478. ISBN 978-1-107-01392-6.
  21. ^ Elgamal, Taher (August 1984). Blakley, George Robert; Chaum, David (eds.). A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Advances in Cryptology – CRYPTO 1984. Lecture Notes in Computer Science. Vol. 196. Santa Barbara, CA, United States: Springer. pp. 10–18. doi:10.1007/3-540-39568-7_2. ISBN 978-3-540-15658-1.
  22. ^ Koblitz, Neal (January 1987). "Elliptic Curve Cryptosystems" (PDF). Mathematics of Computation. 48 (177). American Mathematical Society: 203–209. doi:10.1090/S0025-5718-1987-0866109-5.
月经提前来是什么原因 自负什么意思 拉痢疾是什么症状 这是什么虫子 肠功能紊乱吃什么药
纯粹的人是什么性格 鸡冠油是什么 胎元是什么意思 茄子与什么相克 跑团是什么
茄子吃了有什么好处 多巴胺是什么意思 厥阴病是什么意思 脑梗需要注意什么 眼睛充血是什么原因造成的
为什么精液是流出来的 红烧肉可以放什么配菜 打嗝什么原因 初中老师需要什么学历 世界上最小的国家是什么
心悸是什么意思啊hcv9jop7ns2r.cn 蛊惑是什么意思hcv8jop9ns7r.cn 尿道感染挂什么科ff14chat.com 六月十二号是什么星座hcv9jop0ns7r.cn 明月照沟渠是什么意思hcv8jop0ns0r.cn
阴虚吃什么食物hcv9jop8ns1r.cn 肚脐眼周围疼是什么原因hcv8jop6ns2r.cn 什么是菊粉hcv9jop0ns3r.cn 吃什么可以护肝养肝liaochangning.com 胃热吃什么食物好hcv9jop7ns1r.cn
得意忘形是什么意思hcv8jop0ns6r.cn 酒后吃什么水果好hebeidezhi.com 脱盐乳清粉是什么hcv7jop6ns6r.cn 画画可以画什么zhiyanzhang.com 九月底是什么星座hcv9jop3ns3r.cn
七夕送什么hcv9jop7ns5r.cn 一什么野菜hcv9jop5ns2r.cn 滑胎是什么意思hcv8jop8ns0r.cn 头晕头疼挂什么科hcv7jop9ns3r.cn 一周年祭日有什么讲究hcv7jop9ns0r.cn
百度