digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

In cryptography, public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely (among other useful properties). However, they often rely on complicated mathematical computations and are thus generally much more inefficient than comparable symmetric-key cryptosystems. In many applications, the high cost of encrypting long messages in a public-key cryptosystem can be prohibitive. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem.

A hybrid cryptosystem can be constructed using any two separate cryptosystems:

• a key encapsulation scheme, which is a public-key cryptosystem, and
• a data encapsulation scheme, which is a symmetric-key cryptosystem.

The hybrid cryptosystem is itself a public-key system, whose public and private keys are the same as in the key encapsulation scheme.

Note that for very long messages the bulk of the work in encryption/decryption is done by the more efficient symmetric-key scheme, while the inefficient public-key scheme is used only to encrypt/decrypt a short key value.

Perhaps the most commonly used hybrid cryptosystems are the OpenPGP (RFC 4880) file format and the PKCS #7 (RFC 2315) file format, both used by many different systems.

## Example

To encrypt a message addressed to Alice in a hybrid cryptosystem, Bob does the following:

1. Obtains Alice's public key.
2. Generates a fresh symmetric key for the data encapsulation scheme.
3. Encrypts the message under the data encapsulation scheme, using the symmetric key just generated.
4. Encrypt the symmetric key under the key encapsulation scheme, using Alice's public key.
5. Send both of these encryptions to Alice.

To decrypt this hybrid ciphertext, Alice does the following:

1. uses her private key to decrypt the symmetric key contained in the key encapsulation segment.
2. uses this symmetric key to decrypt the message contained in the data encapsulation segment.

## Security

If both the key encapsulation and data encapsulation schemes are secure against adaptive chosen ciphertext attacks, then the hybrid scheme inherits that property as well.[1] However, it is possible to construct a hybrid scheme secure against adaptive chosen ciphertext attack even if the key encapsulation has a slightly weakened security definition (though the security of the data encapsulation must be slightly stronger).[2]

## References

1. ^ Cramer, Ronald; Shoup, Victor (2004). "Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack" (PDF). SIAM Journal on Computing 33 (1): 167–226. doi:10.1137/S0097539702403773.
2. ^ Hofheinz, Dennis; Kiltz, Eike (2007). "Secure Hybrid Encryption from Weakened Key Encapsulation" (PDF). Advances in Cryptology -- CRYPTO 2007. Springer. pp. 553–571.

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Hybrid_cryptosystem — Please support Wikipedia.
 281 videos foundNext >
 Analisis Hybrid Crypto System pada HTTPS RESEARCH PROJECT NS2 PERFORMANCE ANALYSIS OF HYBRID CRYPTOGRAPHY FOR SECUREDPG Embedded Systems www.pgembeddedsystems.com #197 B, Surandai Road Pavoorchatram,Tenkasi Tirunelveli Tamil Nadu India 627 808 ... Symmetric Key and Public Key EncryptionCheck out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. Modern day encryption is performed in two ... ระบบ Hybrid Cryptography Systemสื่อการสอน รายวิชา network society เรื่อง ระบบ Hybrid Cryptography System หรือระบบเข้ารหัสแบบผสม... HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONSTO GET THIS PROJECT THROUGH ONLINE OR TRAINING SESSION CONTACT: LansA Informatics Pvt Ltd No 165, 5th Street, Crosscut road, Gandhipuram, ... Chapter 4, part 11, Information Security: Principles and PracticeInformation Security: Principles and Practice, 2nd edition, by Mark Stamp Chapter 4: Public Key Crypto Section 4.8, PKI trust models, hybrid cryptosystem. Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile ApplicationsTO GET THIS PROJECT THROUGH ONLINE OR TRAINING SESSION CONTACT: LansA Informatics Pvt Ltd No 165, 5th Street, Crosscut road, Gandhipuram, ... Proofs in Cryptography: Lecture 9 Hybrid Proofs - Defining HybridsProofs in Cryptography Lecture 9 Hybrid Proofs - Defining Hybrids ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Koç University ... Proofs in Cryptography: Lecture 10 Hybrid Proof Example - PRG Output ExpansionProofs in Cryptography Lecture 10 Hybrid Proof Example - PRG Output Expansion ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and ... Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable DelegationCircuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing To get this project in ONLINE or through TRAINING ...
 281 videos foundNext >
 1 news items
 BestCrypt 正式版9.02.5 天极网 Fri, 17 Aug 2012 12:15:29 -0700 结合秘密金匙密码系统与公开金匙密码系统，为俱有双重功能及优点的混合型密码系统（Hybrid Cryptosystem），使您的文件得到最完整的保护，轻易达成文件传输的保密性（非法窥视）、完整性（非法拦截并窜改）、辨识性（有对方 ...
 Limit to books that you can completely read online Include partial books (book previews) .gsc-branding { display:block; }

Oops, we seem to be having trouble contacting Twitter