digplanet beta 1: Athena
Share digplanet:


Applied sciences






















In cryptography, public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely (among other useful properties). However, they often rely on complicated mathematical computations and are thus generally much more inefficient than comparable symmetric-key cryptosystems. In many applications, the high cost of encrypting long messages in a public-key cryptosystem can be prohibitive. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem.

A hybrid cryptosystem can be constructed using any two separate cryptosystems:

  • a key encapsulation scheme, which is a public-key cryptosystem, and
  • a data encapsulation scheme, which is a symmetric-key cryptosystem.

The hybrid cryptosystem is itself a public-key system, whose public and private keys are the same as in the key encapsulation scheme.

Note that for very long messages the bulk of the work in encryption/decryption is done by the more efficient symmetric-key scheme, while the inefficient public-key scheme is used only to encrypt/decrypt a short key value.

Perhaps the most commonly used hybrid cryptosystems are the OpenPGP (RFC 4880) file format and the PKCS #7 (RFC 2315) file format, both used by many different systems.


To encrypt a message addressed to Alice in a hybrid cryptosystem, Bob does the following:

  1. Obtains Alice's public key.
  2. Generates a fresh symmetric key for the data encapsulation scheme.
  3. Encrypts the message under the data encapsulation scheme, using the symmetric key just generated.
  4. Encrypt the symmetric key under the key encapsulation scheme, using Alice's public key.
  5. Send both of these encryptions to Alice.

To decrypt this hybrid ciphertext, Alice does the following:

  1. uses her private key to decrypt the symmetric key contained in the key encapsulation segment.
  2. uses this symmetric key to decrypt the message contained in the data encapsulation segment.


If both the key encapsulation and data encapsulation schemes are secure against adaptive chosen ciphertext attacks, then the hybrid scheme inherits that property as well.[1] However, it is possible to construct a hybrid scheme secure against adaptive chosen ciphertext attack even if the key encapsulation has a slightly weakened security definition (though the security of the data encapsulation must be slightly stronger).[2]


  1. ^ Cramer, Ronald; Shoup, Victor (2004). "Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack". SIAM Journal on Computing 33 (1): 167–226. doi:10.1137/S0097539702403773. 
  2. ^ Dennis, Hofheinz; Kiltz, Eike (2007). "Secure Hybrid Encryption from Weakened Key Encapsulation". Advances in Cryptology -- CRYPTO 2007. Springer. pp. 553–571. 

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Hybrid_cryptosystem — Please support Wikipedia.
A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
92 videos foundNext > 

Analisis Hybrid Crypto System pada HTTPS

Chapter 4, part 11, Information Security: Principles and Practice

Information Security: Principles and Practice, 2nd edition, by Mark Stamp Chapter 4: Public Key Crypto Section 4.8, PKI trust models, hybrid cryptosystem.

Extreme Threshold Cryptosystems

Crypto 2011 Rump session presentation for Benoit Libert and Moti Yung, talk given by Moti Yung.

Elliptic Curve Cryptography - Master Class

Elliptic-curve-based protocols, it is assumed that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base po...

Tesi Cryptree e Threshold Cryptography

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 2012 IEEE JAVA PROJECT

To get this project in ONLINE or through TRAINING Sessions, Contact: JP INFOTECH, 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY-9 Landmark: Opposite to Thatt...

CSE571-11-14A: Key Management and Distribution (Part 1 of 2)

First part of Audio/Video Recording of Professor Raj Jain's class lecture on Key Management and Distribution. It covers Key Distribution, Key Distribution Us...

Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience

Crypto 2011 Rump session presentation for Megumi Ando and Moses Liskov, talk given by Moses Liskov.

A hybrid fault detection and correction AES for space application

Secret data transmission using AES algorithm as well as detecting and correcting the single event upset error which occur during transmission.

Embedded Extended Visual Cryptography Schemes

For Further Details Contact K.Manjunath - 09535866270 http://www.tmksinfotech.com Bangalore - Karnataka.

92 videos foundNext > 

We're sorry, but there's no news about "Hybrid cryptosystem" right now.


Oops, we seem to be having trouble contacting Twitter

Talk About Hybrid cryptosystem

You can talk about Hybrid cryptosystem with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!