27:
199:
241:
are limited to small messages and are almost always used to encrypt a short random secret key in a hybrid cryptosystem anyway. And although a public-key encryption scheme can conversely be converted to a KEM by choosing a random secret key and encrypting it as a message, it is easier to design and
3898:
3761:
937:, IND-CCA, which is loosely how much better an adversary can do than a coin toss to tell whether, given a random key and an encapsulation, the key is encapsulated by that encapsulation or is an independent random key.
4887:
Traditional
Elgamal encryption can be adapted to the elliptic-curve setting, but it requires some way to reversibly encode messages as points on the curve, which is less trivial than encoding messages as integers mod
4117:
2388:
5433:
3142:
1663:
1003:
592:
321:
1177:
4312:
4227:
210:
scheme and a KEM is that a public-key encryption scheme allows a sender to choose an arbitrary message from some space of possible messages, while a KEM chooses a short secret key at random for the sender.
1340:
1085:
5133:
3707:
2865:
2126:
849:
438:
5538:
920:
190:
know the private key from recovering any information about the encapsulated secret keys, even after eavesdropping or submitting other encapsulations to the receiver to study how the receiver reacts.
4526:
4459:
3766:
5645:
4023:
3206:
2452:
5179:
3753:
3623:
3459:
3413:
752:
1901:
5736:
4882:
4565:
3313:
2735:
242:
analyze a secure KEM than to design a secure public-key encryption scheme as a basis. So most modern public-key encryption schemes are based on KEMs rather than the other way around.
222:
whose ciphertext is sent alongside the encapsulation to the receiver. This serves to compose a public-key encryption scheme out of a KEM and a symmetric-key authenticated cipher in a
4764:
4808:
1982:
1810:
1760:
3081:
2327:
1538:
772:
5693:
5306:
5225:
3505:
3254:
3003:
2249:
1435:
3574:
3541:
1937:
5372:
5076:
4056:
3952:
3656:
2808:
2075:
4684:
1032:
619:
465:
375:
348:
2922:
2203:
1245:
4372:
4342:
1839:
1466:
1287:
5563:
5339:
5263:
3036:
2960:
2505:
2480:
2282:
1365:
1110:
669:
644:
5458:
5007:
4142:
2022:
1204:
689:
5738:
in this case, and not a reversible encoding of messages, it is easy to extend to more compact and efficient elliptic curve groups for the same security, as in the
2594:
114:
71:
5583:
5030:
4980:
4960:
4929:
4906:
4828:
4704:
4625:
4605:
4585:
4392:
3353:
3333:
2890:
2762:
2689:
2666:
2634:
2614:
2568:
2544:
2171:
2151:
2042:
1708:
1688:
1595:
1575:
1389:
869:
792:
525:
505:
485:
134:
91:
48:
179:. The receiver who knows the private key corresponding to the public key can recover the same random secret key from the encapsulation by the KEM's
6162:
5926:
5895:
1540:, that is, the probability beyond a fair coin toss at correctly distinguishing an encapsulated key from an independently randomly chosen key.
1607:
947:
265:
6158:
6598:
5739:
3893:{\displaystyle {\begin{aligned}t&:=y^{r}{\bmod {p}}\\c_{1}&:=g^{r}{\bmod {p}}\\c_{2}&:=(t\cdot m){\bmod {p}}\end{aligned}}}
1118:
4061:
2332:
5377:
5081:
3661:
3086:
2813:
2080:
797:
536:
386:
50:
from a sender to a receiver, consists of three algorithms: Gen, Encap, and Decap. Circles shaded blue—the receiver's public key
4232:
4147:
874:
6665:
1295:
1040:
6645:
6578:
6526:
6475:
6426:
6378:
6367:Švenda, Petr; Nemec, Matúš; Sekan, Peter; Kvašňovský, Rudolf; Formánek, David; Komárek, David; Matyáš, Vashek (August 2016).
6304:
6271:
6239:
6097:
5844:
5781:
3265:
234:
6368:
5463:
5703:. Since this KEM only requires a one-way key derivation function to hash random elements of the group it is defined over,
5699:
When combined with an authenticated cipher to encrypt arbitrary bit string messages, the combination is essentially the
6058:
5143:
3717:
3587:
3423:
3365:
711:
1851:
2511:
This naive approach is totally insecure. For example, since it is nonrandomized, it cannot be secure against even
6127:
6117:
6002:
5961:
5884:"Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack"
4631:
4467:
4400:
2637:
934:
6563:. Lecture Notes in Computer Science. Vol. 196. Santa Barbara, CA, United States: Springer. pp. 10–18.
6411:. Lecture Notes in Computer Science. Vol. 1462. Santa Barbara, CA, United States: Springer. pp. 1–12.
6224:. Lecture Notes in Computer Science. Vol. 10677. Baltimore, MD, United States: Springer. pp. 341–371.
5706:
4535:
3283:
2705:
6613:
5591:
3152:
2398:
5700:
4833:
2547:
1942:
1765:
1713:
3041:
2287:
1984:
as the private key. (Many variations on key generation algorithms and private key formats are available.)
1479:
757:
5268:
5187:
3467:
2965:
2211:
167:
A KEM allows a sender who knows a public key to simultaneously generate a short random secret key and an
6214:
Hofheinz, Dennis; Hövelmanns, Kathrin; Kiltz, Eike (November 2017). Kalai, Yael; Reyzin, Leonid (eds.).
4709:
3965:
156:
that allows a sender to generate a short secret key and transmit it to a receiver securely, in spite of
4769:
3546:
3513:
2641:
1909:
5344:
5048:
4028:
3905:
3628:
2780:
2047:
4637:
1010:
597:
443:
353:
326:
6373:. 25th USENIX Security Symposium. Austin, TX, United States: USENIX Association. pp. 893–910.
4935:
2695:
1397:
219:
161:
6460:. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 369–381.
5829:. Lecture Notes in Computer Science. Vol. 1807. Bruges, Belgium: Springer. pp. 275–288.
2895:
2176:
1212:
6670:
6215:
5010:
2742:
1815:
153:
6166:
5653:
3214:
2512:
1253:
6451:
6394:
5820:
5233:
4532:
This meets the syntax of a public-key encryption scheme, restricted to messages in the space
2930:
207:
157:
6554:
4347:
4317:
6221:
6141:
6016:
5975:
5917:
5443:
4985:
4127:
1995:
1182:
674:
93:—can be safely revealed to an adversary, while boxes shaded red—the receiver's private key
1440:
8:
6650:
2573:
1842:
223:
6404:
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
5543:
5319:
3016:
2485:
2460:
2262:
1345:
1090:
649:
624:
96:
53:
6560:
6457:
6402:
5883:
5826:
5568:
5015:
4965:
4945:
4914:
4891:
4813:
4706:
can trivially decrypt it by querying the decryption oracle for the distinct ciphertext
4689:
4610:
4590:
4570:
4377:
3338:
3318:
3277:
2875:
2747:
2674:
2651:
2619:
2599:
2553:
2529:
2156:
2136:
2027:
1693:
1673:
1580:
1560:
1374:
1115:
The encapsulation algorithm is run to randomly generate a secret key and encapsulation
854:
777:
510:
490:
470:
238:
119:
76:
33:
6622:
6045:
4587:). By validating ciphertexts in decryption, it avoids leaking bits of the private key
6574:
6522:
6471:
6422:
6374:
6300:
6267:
6235:
6093:
6054:
6037:
5840:
5777:
6408:
6617:
6564:
6461:
6412:
6347:
6332:
6225:
6131:
6006:
5965:
5930:
5899:
5830:
6328:
6230:
6081:
6144:
6121:
6019:
5996:
5978:
5955:
6546:
6503:, Cryptology ePrint Archive, International Association for Cryptologic Research
6443:
6435:
6198:, Cryptology ePrint Archive, International Association for Cryptologic Research
6085:
6077:
6041:
6033:
3260:
This approach is simpler to implement, and provides a tighter reduction to the
1554:
6072:
6070:
5903:
6659:
6556:
A Public Key
Cryptosystem and a Signature Scheme Based on Discrete Logarithms
6542:
6466:
6398:
5875:
5835:
4932:
2692:
215:
6569:
214:
The sender may take the random secret key produced by a KEM and use it as a
6594:
6494:
6447:
6292:
6067:
5992:
5879:
5816:
5812:
2698:
used to encrypt an arbitrary bit string message, a simpler approach called
141:
6352:
5935:
4938:
used to encrypt an arbitrary bit string message, a simpler approach is to
6550:
6209:
6207:
6205:
4567:(which limits it to message of a few hundred bytes for typical values of
3261:
6333:"A method for obtaining digital signatures and public-key cryptosystems"
6417:
6324:
6320:
6113:
1658:{\displaystyle ({\mathit {pk}},{\mathit {sk}}):=\operatorname {Gen} ()}
998:{\displaystyle ({\mathit {pk}},{\mathit {sk}}):=\operatorname {Gen} ()}
316:{\displaystyle ({\mathit {pk}},{\mathit {sk}}):=\operatorname {Gen} ()}
6500:
A Proposal for an ISO Standard for Public Key
Encryption (version 2.1)
6287:
6285:
6283:
6202:
4607:
through maliciously chosen ciphertexts outside the group generated by
6370:
The
Million-Key Question—Investigating the Origins of RSA Public Keys
6136:
6011:
5970:
6640:
6512:
6510:
6498:
6280:
6264:
Serious
Cryptography: A Practical Introduction to Modern Encryption
6193:
6026:
5919:
FIPS 203: Module-Lattice-Based Key-Encapsulation
Mechanism Standard
20:
2636:
simply by taking real number cube roots, and there are many other
2523:
simply by encrypting those messages and comparing the ciphertext.
30:
A key encapsulation mechanism, to securely transport a secret key
5767:
5765:
5763:
5761:
5759:
5757:
5755:
2515:—an adversary can tell whether the sender is sending the message
1172:{\displaystyle (k_{0},c):=\operatorname {Encap} ({\mathit {pk}})}
692:
6517:
Galbraith, Steven (2012). "§20.3: Textbook
Elgamal encryption".
6507:
5822:
Using Hash
Functions as a Hedge against Chosen Ciphertext Attack
5995:; Jonsson, J.; Rusch, A. (November 2016). Moriarity, K. (ed.).
5954:
Barnes, R.; Bhargavan, K.; Lipp, B.; Wood, C. (February 2022).
4112:{\displaystyle m':=\operatorname {Decrypt} ({\mathit {sk}},c')}
2645:
2383:{\displaystyle m':=\operatorname {Decrypt} ({\mathit {sk}},c')}
230:
5752:
3280:
is defined over a multiplicative subgroup of the finite field
5628:
5428:{\displaystyle k':=\operatorname {Decap} ({\mathit {sk}},c')}
5289:
5208:
5128:{\displaystyle (k,c):=\operatorname {Encap} ({\mathit {pk}})}
4865:
4791:
4509:
4442:
3877:
3831:
3790:
3702:{\displaystyle c:=\operatorname {Encrypt} ({\mathit {pk}},m)}
3488:
3189:
3137:{\displaystyle k':=\operatorname {Decap} ({\mathit {sk}},c')}
2986:
2860:{\displaystyle (k,c):=\operatorname {Encap} ({\mathit {pk}})}
2435:
2232:
2121:{\displaystyle c:=\operatorname {Encrypt} ({\mathit {pk}},m)}
1875:
844:{\displaystyle (k,c):=\operatorname {Encap} ({\mathit {pk}})}
587:{\displaystyle k':=\operatorname {Decap} ({\mathit {sk}},c')}
433:{\displaystyle (k,c):=\operatorname {Encap} ({\mathit {pk}})}
6257:
6255:
6253:
6251:
6112:
6032:
5772:
Galbraith, Steven (2012). "§23.1.1: The KEM/DEM paradigm".
6387:
6366:
6299:(3rd ed.). Chapman & Hall/CRC. pp. 161–232.
6295:(2006). "5. The RSA Cryptosystem and Factoring Integers".
4307:{\displaystyle (c'_{2})^{(p-1)/q}\not \equiv 1{\pmod {p}}}
4222:{\displaystyle (c'_{1})^{(p-1)/q}\not \equiv 1{\pmod {p}}}
915:{\displaystyle \operatorname {Decap} ({\mathit {sk}},c)=k}
6441:
6248:
6217:
A Modular
Analysis of the Fujisaki-Okamoto Transformation
5406:
5353:
5117:
5057:
4090:
4037:
3685:
3637:
3555:
3522:
3115:
3050:
2849:
2789:
2361:
2296:
2104:
2056:
1951:
1918:
1632:
1619:
1335:{\displaystyle \operatorname {Decap} ({\mathit {sk}},c')}
1313:
1161:
1080:{\displaystyle \operatorname {Decap} ({\mathit {sk}},c')}
1058:
1019:
972:
959:
892:
833:
736:
723:
606:
565:
452:
422:
362:
335:
290:
277:
5870:
5868:
5866:
5864:
5862:
5860:
5858:
5856:
193:
6489:
6487:
6213:
5953:
5807:
5805:
5803:
5801:
5799:
5797:
5795:
5793:
6187:
6185:
6183:
5533:{\displaystyle (c')^{(p-1)/q}\not \equiv 1{\pmod {p}}}
198:
26:
6076:
5853:
5709:
5656:
5594:
5571:
5546:
5466:
5446:
5380:
5347:
5322:
5271:
5236:
5190:
5146:
5084:
5051:
5018:
4988:
4968:
4948:
4917:
4894:
4836:
4816:
4772:
4712:
4692:
4640:
4632:
indistinguishability against chosen ciphertext attack
4613:
4593:
4573:
4538:
4470:
4403:
4380:
4350:
4320:
4235:
4150:
4130:
4064:
4031:
3968:
3908:
3764:
3720:
3664:
3631:
3590:
3549:
3516:
3470:
3426:
3368:
3341:
3321:
3286:
3217:
3155:
3089:
3044:
3019:
2968:
2933:
2898:
2878:
2816:
2783:
2750:
2708:
2677:
2654:
2644:
have been devised in attempts—sometimes failed, like
2622:
2602:
2576:
2556:
2532:
2488:
2463:
2401:
2335:
2290:
2265:
2214:
2179:
2159:
2139:
2083:
2050:
2030:
1998:
1945:
1912:
1854:
1818:
1768:
1716:
1696:
1676:
1610:
1583:
1563:
1482:
1443:
1400:
1377:
1348:
1298:
1256:
1215:
1185:
1121:
1093:
1043:
1013:
950:
935:
indistinguishability against chosen-ciphertext attack
877:
857:
800:
780:
760:
714:
677:
652:
627:
600:
539:
513:
493:
473:
446:
389:
356:
329:
323:, takes no inputs and returns a pair of a public key
268:
122:
99:
79:
56:
36:
6484:
5998:
5790:
186:
The security goal of a KEM is to prevent anyone who
6319:
6180:
5991:
6346:(2). Association for Computer Machinery: 120–126.
5740:ECIES, Elliptic Curve Integrated Encryption Scheme
5730:
5687:
5639:
5577:
5557:
5532:
5452:
5427:
5366:
5333:
5300:
5257:
5219:
5173:
5127:
5070:
5024:
5001:
4974:
4954:
4923:
4900:
4876:
4822:
4802:
4758:
4698:
4678:
4619:
4599:
4579:
4559:
4520:
4453:
4386:
4366:
4336:
4306:
4221:
4136:
4111:
4050:
4017:
3946:
3892:
3747:
3701:
3650:
3617:
3568:
3535:
3499:
3453:
3407:
3347:
3327:
3307:
3248:
3200:
3136:
3075:
3030:
2997:
2954:
2916:
2884:
2859:
2802:
2756:
2729:
2683:
2660:
2628:
2608:
2588:
2562:
2538:
2499:
2474:
2446:
2382:
2321:
2276:
2243:
2197:
2165:
2145:
2120:
2069:
2036:
2016:
1976:
1931:
1895:
1833:
1804:
1754:
1702:
1682:
1657:
1589:
1569:
1532:
1460:
1429:
1383:
1359:
1334:
1281:
1239:
1198:
1171:
1104:
1079:
1026:
997:
914:
863:
843:
786:
766:
746:
683:
663:
638:
613:
586:
519:
499:
479:
459:
432:
369:
342:
315:
128:
108:
85:
65:
42:
2546:is always a random secret key, such as a 256-bit
6657:
6521:. Cambridge University Press. pp. 471–478.
5776:. Cambridge University Press. pp. 471–478.
4634:. For example, an adversary having a ciphertext
2648:—to make it secure for arbitrary short messages
1769:
1488:
944:The key generation algorithm is run to generate
646:, and either returns an encapsulated secret key
5174:{\displaystyle r\in \mathbb {Z} /q\mathbb {Z} }
3748:{\displaystyle r\in \mathbb {Z} /q\mathbb {Z} }
3618:{\displaystyle m\in \mathbb {Z} /p\mathbb {Z} }
3454:{\displaystyle x\in \mathbb {Z} /q\mathbb {Z} }
3408:{\displaystyle (pk,sk):=\operatorname {Gen} ()}
747:{\displaystyle ({\mathit {pk}},{\mathit {sk}})}
6587:
6535:
6393:
6163:National Institute of Standards and Technology
5927:National Institute of Standards and Technology
5896:Society for Industrial and Applied Mathematics
1896:{\displaystyle d:=e^{-1}{\bmod {\lambda }}(n)}
6360:
6313:
6151:
6044:(October 1996). "8. Public-Key Encryption".
1424:
1412:
1234:
1222:
6262:Aumasson, Jean-Philippe (2018). "10. RSA".
5874:
4521:{\displaystyle m':=t^{-1}c'_{2}{\bmod {p}}}
4454:{\displaystyle t':=(c'_{1})^{x}{\bmod {p}}}
229:Most public-key encryption schemes such as
5731:{\displaystyle \mathbb {Z} /p\mathbb {Z} }
4931:is almost always a short secret key for a
4560:{\displaystyle \mathbb {Z} /p\mathbb {Z} }
3308:{\displaystyle \mathbb {Z} /p\mathbb {Z} }
2730:{\displaystyle \mathbb {Z} /n\mathbb {Z} }
2691:is almost always a short secret key for a
1543:
851:with high probability yields the same key
6621:
6568:
6516:
6465:
6416:
6351:
6229:
6135:
6010:
5969:
5949:
5947:
5945:
5934:
5834:
5771:
5724:
5711:
5167:
5154:
4553:
4540:
3741:
3728:
3611:
3598:
3447:
3434:
3301:
3288:
2723:
2710:
1209:A fair coin is tossed, giving an outcome
671:or fails, sometimes denoted by returning
6261:
6120:; Shaw, D.; Thayer, R. (November 2007).
197:
25:
6593:
6541:
6458:Advances in Cryptology – EUROCRYPT 2000
6291:
5827:Advances in Cryptology – EUROCRYPT 2000
5640:{\displaystyle t':=(c')^{x}{\bmod {p}}}
3201:{\displaystyle r':=(c')^{d}{\bmod {n}}}
2447:{\displaystyle r':=(c')^{d}{\bmod {n}}}
6658:
6519:Mathematics of Public-Key Cryptography
6106:
5942:
5910:
5774:Mathematics of Public-Key Cryptography
6646:Optimal Asymmetric Encryption Padding
6493:
6453:New Attacks on PKCS#1 v1.5 Encryption
6266:. No Starch Press. pp. 181–199.
5811:
4877:{\displaystyle m=m'g^{-1}{\bmod {p}}}
1977:{\displaystyle {\mathit {sk}}:=(n,d)}
1805:{\displaystyle \gcd(e,\lambda (n))=1}
1755:{\displaystyle 2^{t-1}<n<2^{t}}
1206:is generated independently at random.
194:Difference from public-key encryption
6561:Advances in Cryptology – CRYPTO 1984
6191:
5985:
5565:is not in the subgroup generated by
4374:is not in the subgroup generated by
3076:{\displaystyle {\mathit {sk}}=(n,d)}
2616:can be computed from the ciphertext
2570:is chosen to optimize efficiency as
2322:{\displaystyle {\mathit {sk}}=(n,d)}
1533:{\displaystyle \left|\Pr-1/2\right|}
925:
767:{\displaystyle \operatorname {Gen} }
255:A KEM consists of three algorithms:
6442:Coron, Jean-Sébastien; Joye, Marc;
6409:Advances in Cryptology – CRYPTO '98
5522:
5301:{\displaystyle c:=g^{r}{\bmod {p}}}
5220:{\displaystyle t:=y^{r}{\bmod {p}}}
4296:
4211:
3500:{\displaystyle y:=g^{x}{\bmod {p}}}
2998:{\displaystyle c:=r^{e}{\bmod {n}}}
2244:{\displaystyle c:=r^{e}{\bmod {n}}}
940:Specifically, in the IND-CCA game:
13:
5447:
5403:
5350:
5114:
5054:
4759:{\displaystyle c':=(c_{1},c_{2}g)}
4131:
4087:
4034:
4018:{\displaystyle c'=(c'_{1},c'_{2})}
3682:
3634:
3552:
3519:
3112:
3047:
2846:
2786:
2358:
2293:
2101:
2053:
1948:
1915:
1629:
1616:
1310:
1158:
1055:
1016:
969:
956:
889:
830:
733:
720:
678:
603:
562:
449:
419:
359:
332:
287:
274:
14:
6682:
6623:10.1090/S0025-5718-1987-0866109-5
6222:Theory of Cryptography – TCC 2017
6159:"Post-Quantum Cryptography: FAQs"
4803:{\displaystyle m':=mg{\bmod {p}}}
4766:, yielding the related plaintext
3569:{\displaystyle {\mathit {pk}}:=y}
3536:{\displaystyle {\mathit {sk}}:=x}
1932:{\displaystyle {\mathit {pk}}:=n}
774:, decapsulating an encapsulation
6297:Cryptography Theory and Practice
6047:Handbook of Applied Cryptography
5367:{\displaystyle {\mathit {sk}}=x}
5071:{\displaystyle {\mathit {pk}}=y}
4051:{\displaystyle {\mathit {sk}}=x}
3947:{\displaystyle c:=(c_{1},c_{2})}
3651:{\displaystyle {\mathit {pk}}=y}
2803:{\displaystyle {\mathit {pk}}=n}
2070:{\displaystyle {\mathit {pk}}=n}
467:, randomly chooses a secret key
116:and the encapsulated secret key
6446:; Paillier, Pascal (May 2000).
6128:Internet Engineering Task Force
6053:. CRC Press. pp. 283–319.
6003:Internet Engineering Task Force
5962:Internet Engineering Task Force
5515:
4679:{\displaystyle c=(c_{1},c_{2})}
4630:However, this fails to achieve
4289:
4204:
202:A public-key encryption scheme.
175:of the secret key by the KEM's
6599:"Elliptic Curve Cryptosystems"
5682:
5671:
5618:
5606:
5526:
5516:
5495:
5483:
5479:
5467:
5422:
5398:
5252:
5246:
5122:
5109:
5097:
5085:
5009:altogether, as a KEM, using a
4753:
4724:
4673:
4647:
4432:
4415:
4300:
4290:
4269:
4257:
4253:
4236:
4215:
4205:
4184:
4172:
4168:
4151:
4106:
4082:
4012:
3980:
3941:
3915:
3873:
3861:
3696:
3677:
3402:
3399:
3387:
3369:
3243:
3232:
3179:
3167:
3131:
3107:
3070:
3058:
2949:
2943:
2854:
2841:
2829:
2817:
2425:
2413:
2377:
2353:
2316:
2304:
2115:
2096:
2011:
1999:
1971:
1959:
1890:
1884:
1828:
1822:
1793:
1790:
1784:
1772:
1652:
1649:
1637:
1611:
1508:
1491:
1394:The adversary returns a guess
1329:
1305:
1292:The adversary can again query
1276:
1257:
1166:
1153:
1141:
1122:
1074:
1050:
1027:{\displaystyle {\mathit {pk}}}
992:
989:
977:
951:
933:of a KEM is quantified by its
903:
884:
838:
825:
813:
801:
741:
715:
699:
614:{\displaystyle {\mathit {sk}}}
581:
557:
460:{\displaystyle {\mathit {pk}}}
427:
414:
402:
390:
370:{\displaystyle {\mathit {sk}}}
343:{\displaystyle {\mathit {pk}}}
310:
307:
295:
269:
1:
6666:Public-key encryption schemes
6614:American Mathematical Society
5745:
1430:{\displaystyle b'\in \{0,1\}}
1342:for arbitrary encapsulations
1289:is revealed to the adversary.
1087:for arbitrary encapsulations
1034:is revealed to the adversary.
507:along with its encapsulation
245:
6231:10.1007/978-3-319-70500-2_12
6165:. 2024-07-19. Archived from
5957:Hybrid Public Key Encryption
5701:Integrated Encryption Scheme
3264:, than padding schemes like
2917:{\displaystyle 0\leq r<n}
2198:{\displaystyle 0\leq r<n}
1240:{\displaystyle b\in \{0,1\}}
7:
6634:
6192:Dent, Alexander W. (2002),
6092:. Wiley. pp. 195–211.
2702:is to choose an element of
1834:{\displaystyle \lambda (n)}
1367:of the adversary's choice,
146:key encapsulation mechanism
10:
6687:
6606:Mathematics of Computation
6195:A Designer’s Guide to KEMs
3271:
2737:at random and use that to
2642:randomized padding schemes
1112:of the adversary's choice.
18:
6340:Communications of the ACM
5904:10.1137/S0097539702403773
5888:SIAM Journal on Computing
5688:{\displaystyle k':=H(t')}
3249:{\displaystyle k':=H(r')}
2638:attacks against plain RSA
1597:, is defined as follows:
1577:-bit moduli and exponent
1282:{\displaystyle (k_{b},c)}
1179:, and another secret key
250:
206:The difference between a
6467:10.1007/3-540-45539-6_25
6090:Cryptography Engineering
5836:10.1007/3-540-45539-6_19
1037:The adversary can query
19:Not to be confused with
6570:10.1007/3-540-39568-7_2
5258:{\displaystyle k:=H(t)}
5011:key derivation function
4686:for an unknown message
3543:as the private key and
2955:{\displaystyle k:=H(r)}
2743:key derivation function
1544:Examples and motivation
1437:, and wins the game if
181:decapsulation algorithm
177:encapsulation algorithm
154:public-key cryptosystem
16:Public-key cryptosystem
6547:Blakley, George Robert
6395:Bleichenbacher, Daniel
6123:OpenPGP Message Format
5732:
5689:
5641:
5579:
5559:
5534:
5454:
5429:
5368:
5335:
5302:
5259:
5221:
5175:
5129:
5072:
5026:
5003:
4976:
4956:
4925:
4902:
4878:
4824:
4804:
4760:
4700:
4680:
4621:
4601:
4581:
4561:
4522:
4455:
4388:
4368:
4367:{\displaystyle c'_{2}}
4338:
4337:{\displaystyle c'_{1}}
4308:
4223:
4138:
4113:
4052:
4019:
3948:
3902:Return the ciphertext
3894:
3749:
3703:
3652:
3619:
3570:
3537:
3501:
3455:
3409:
3349:
3329:
3309:
3250:
3202:
3138:
3077:
3032:
2999:
2956:
2918:
2886:
2861:
2804:
2764:, roughly as follows:
2758:
2731:
2685:
2662:
2630:
2610:
2590:
2564:
2540:
2513:known-plaintext attack
2501:
2476:
2448:
2384:
2323:
2278:
2245:
2199:
2167:
2147:
2133:Encode the bit string
2122:
2071:
2038:
2018:
1978:
1939:as the public key and
1933:
1897:
1835:
1806:
1756:
1704:
1684:
1659:
1591:
1571:
1548:
1534:
1462:
1431:
1385:
1361:
1336:
1283:
1241:
1200:
1173:
1106:
1081:
1028:
999:
916:
865:
845:
788:
768:
748:
685:
665:
640:
615:
594:, takes a private key
588:
521:
501:
481:
461:
434:
371:
344:
317:
203:
137:
130:
110:
87:
73:and the encapsulation
67:
44:
6353:10.1145/359340.359342
6038:van Oorschot, Paul C.
5936:10.6028/NIST.FIPS.203
5733:
5690:
5642:
5580:
5560:
5535:
5455:
5453:{\displaystyle \bot }
5430:
5369:
5336:
5308:as its encapsulation.
5303:
5260:
5222:
5176:
5130:
5073:
5027:
5004:
5002:{\displaystyle c_{2}}
4977:
4957:
4926:
4903:
4879:
4825:
4805:
4761:
4701:
4681:
4622:
4602:
4582:
4562:
4523:
4456:
4389:
4369:
4339:
4309:
4224:
4139:
4137:{\displaystyle \bot }
4114:
4053:
4020:
3949:
3895:
3750:
3704:
3653:
3620:
3571:
3538:
3502:
3456:
3410:
3350:
3330:
3310:
3251:
3203:
3139:
3078:
3033:
3005:as its encapsulation.
3000:
2957:
2919:
2887:
2862:
2805:
2759:
2741:a secret key using a
2732:
2686:
2663:
2631:
2611:
2591:
2565:
2541:
2502:
2477:
2449:
2385:
2324:
2279:
2246:
2200:
2168:
2148:
2123:
2072:
2039:
2019:
2017:{\displaystyle (t-1)}
1979:
1934:
1898:
1836:
1807:
1762:at random satisfying
1757:
1705:
1685:
1660:
1592:
1572:
1535:
1463:
1432:
1386:
1362:
1337:
1284:
1242:
1201:
1199:{\displaystyle k_{1}}
1174:
1107:
1082:
1029:
1000:
917:
866:
846:
789:
769:
749:
708:if, for any key pair
686:
684:{\displaystyle \bot }
666:
641:
621:and an encapsulation
616:
589:
522:
502:
482:
462:
440:, takes a public key
435:
372:
345:
318:
208:public-key encryption
201:
136:—must be kept secret.
131:
111:
88:
68:
45:
29:
5707:
5654:
5592:
5569:
5544:
5464:
5444:
5378:
5345:
5320:
5269:
5234:
5188:
5181:uniformly at random.
5144:
5082:
5049:
5016:
4986:
4966:
4946:
4942:the secret key from
4936:authenticated cipher
4915:
4892:
4834:
4830:can be recovered by
4814:
4770:
4710:
4690:
4638:
4611:
4591:
4571:
4536:
4468:
4401:
4378:
4348:
4318:
4233:
4148:
4128:
4062:
4029:
3966:
3906:
3762:
3755:uniformly at random.
3718:
3662:
3629:
3588:
3547:
3514:
3468:
3461:uniformly at random.
3424:
3366:
3339:
3319:
3284:
3215:
3153:
3087:
3042:
3017:
2966:
2931:
2924:uniformly at random.
2896:
2876:
2814:
2781:
2748:
2706:
2696:authenticated cipher
2675:
2652:
2620:
2600:
2574:
2554:
2530:
2486:
2461:
2399:
2333:
2288:
2263:
2212:
2177:
2157:
2137:
2081:
2048:
2028:
1996:
1943:
1910:
1852:
1816:
1766:
1714:
1694:
1674:
1608:
1581:
1561:
1480:
1476:of the adversary is
1461:{\displaystyle b=b'}
1441:
1398:
1375:
1346:
1296:
1254:
1213:
1183:
1119:
1091:
1041:
1011:
948:
875:
855:
798:
778:
758:
712:
675:
650:
625:
598:
537:
511:
491:
471:
444:
387:
354:
327:
266:
220:authenticated cipher
120:
97:
77:
54:
34:
6651:Hybrid Cryptosystem
6293:Stinson, Douglas R.
6116:; Donnerhacke, L.;
6088:(2010). "12. RSA".
4507:
4430:
4363:
4333:
4251:
4166:
4011:
3995:
2589:{\displaystyle e=3}
2519:versus the message
2457:Decode the integer
1843:Carmichael function
224:hybrid cryptosystem
6418:10.1007/BFb0055716
6042:Vanstone, Scott A.
6034:Menezes, Alfred J.
5728:
5685:
5637:
5575:
5558:{\displaystyle c'}
5555:
5530:
5450:
5425:
5364:
5334:{\displaystyle c'}
5331:
5298:
5255:
5217:
5171:
5125:
5068:
5022:
4999:
4972:
4962:and dispense with
4952:
4921:
4911:Since the message
4898:
4874:
4820:
4800:
4756:
4696:
4676:
4617:
4597:
4577:
4557:
4518:
4495:
4451:
4418:
4384:
4364:
4351:
4334:
4321:
4304:
4239:
4219:
4154:
4134:
4109:
4048:
4025:for a private key
4015:
3999:
3983:
3944:
3890:
3888:
3745:
3699:
3648:
3615:
3576:as the public key.
3566:
3533:
3497:
3451:
3405:
3345:
3325:
3305:
3278:Elgamal encryption
3246:
3198:
3134:
3073:
3031:{\displaystyle c'}
3028:
2995:
2952:
2914:
2882:
2872:Choose an integer
2857:
2800:
2754:
2727:
2681:
2671:Since the message
2658:
2626:
2606:
2586:
2560:
2536:
2500:{\displaystyle m'}
2497:
2475:{\displaystyle r'}
2472:
2444:
2380:
2319:
2277:{\displaystyle c'}
2274:
2241:
2195:
2163:
2143:
2118:
2067:
2034:
2014:
1974:
1929:
1893:
1831:
1802:
1752:
1700:
1680:
1655:
1587:
1567:
1530:
1458:
1427:
1381:
1360:{\displaystyle c'}
1357:
1332:
1279:
1237:
1196:
1169:
1105:{\displaystyle c'}
1102:
1077:
1024:
995:
912:
861:
841:
784:
764:
744:
681:
664:{\displaystyle k'}
661:
639:{\displaystyle c'}
636:
611:
584:
517:
497:
477:
457:
430:
367:
350:and a private key
340:
313:
239:Elgamal encryption
204:
138:
126:
109:{\displaystyle sk}
106:
83:
66:{\displaystyle pk}
63:
40:
6580:978-3-540-15658-1
6528:978-1-107-01392-6
6477:978-3-540-67517-4
6428:978-3-540-64892-5
6380:978-1-931971-32-4
6306:978-1-58488-508-5
6273:978-1-59327-826-7
6241:978-3-319-70499-9
6099:978-0-470-47424-2
5846:978-3-540-67517-4
5783:978-1-107-01392-6
5578:{\displaystyle g}
5341:with private key
5045:for a public key
5025:{\displaystyle H}
4975:{\displaystyle m}
4955:{\displaystyle t}
4924:{\displaystyle m}
4901:{\displaystyle p}
4823:{\displaystyle m}
4699:{\displaystyle m}
4620:{\displaystyle g}
4600:{\displaystyle x}
4580:{\displaystyle p}
4387:{\displaystyle g}
3348:{\displaystyle q}
3328:{\displaystyle g}
3038:with private key
2885:{\displaystyle r}
2777:for a public key
2757:{\displaystyle H}
2684:{\displaystyle m}
2661:{\displaystyle m}
2629:{\displaystyle c}
2609:{\displaystyle m}
2563:{\displaystyle e}
2539:{\displaystyle m}
2284:with private key
2166:{\displaystyle r}
2146:{\displaystyle m}
2037:{\displaystyle m}
1703:{\displaystyle n}
1683:{\displaystyle t}
1590:{\displaystyle e}
1570:{\displaystyle t}
1474:IND-CCA advantage
1384:{\displaystyle c}
926:Security: IND-CCA
864:{\displaystyle k}
787:{\displaystyle c}
520:{\displaystyle c}
500:{\displaystyle k}
480:{\displaystyle k}
129:{\displaystyle k}
86:{\displaystyle c}
43:{\displaystyle k}
6678:
6628:
6627:
6625:
6603:
6597:(January 1987).
6591:
6585:
6584:
6572:
6539:
6533:
6532:
6514:
6505:
6504:
6491:
6482:
6481:
6469:
6439:
6433:
6432:
6420:
6391:
6385:
6384:
6364:
6358:
6357:
6355:
6337:
6317:
6311:
6310:
6289:
6278:
6277:
6259:
6246:
6245:
6233:
6211:
6200:
6199:
6189:
6178:
6177:
6175:
6174:
6155:
6149:
6148:
6139:
6137:10.17487/RFC4880
6110:
6104:
6103:
6082:Kohno, Tadayoshi
6074:
6065:
6064:
6052:
6030:
6024:
6023:
6014:
6012:10.17487/RFC8017
5989:
5983:
5982:
5973:
5971:10.17487/RFC9180
5951:
5940:
5939:
5938:
5924:
5914:
5908:
5907:
5872:
5851:
5850:
5838:
5809:
5788:
5787:
5769:
5737:
5735:
5734:
5729:
5727:
5719:
5714:
5694:
5692:
5691:
5686:
5681:
5664:
5646:
5644:
5643:
5638:
5636:
5635:
5626:
5625:
5616:
5602:
5584:
5582:
5581:
5576:
5564:
5562:
5561:
5556:
5554:
5539:
5537:
5536:
5531:
5529:
5507:
5506:
5502:
5477:
5459:
5457:
5456:
5451:
5440:Fail and return
5434:
5432:
5431:
5426:
5421:
5410:
5409:
5388:
5373:
5371:
5370:
5365:
5357:
5356:
5340:
5338:
5337:
5332:
5330:
5307:
5305:
5304:
5299:
5297:
5296:
5287:
5286:
5264:
5262:
5261:
5256:
5226:
5224:
5223:
5218:
5216:
5215:
5206:
5205:
5180:
5178:
5177:
5172:
5170:
5162:
5157:
5134:
5132:
5131:
5126:
5121:
5120:
5077:
5075:
5074:
5069:
5061:
5060:
5031:
5029:
5028:
5023:
5008:
5006:
5005:
5000:
4998:
4997:
4981:
4979:
4978:
4973:
4961:
4959:
4958:
4953:
4930:
4928:
4927:
4922:
4907:
4905:
4904:
4899:
4883:
4881:
4880:
4875:
4873:
4872:
4863:
4862:
4850:
4829:
4827:
4826:
4821:
4809:
4807:
4806:
4801:
4799:
4798:
4780:
4765:
4763:
4762:
4757:
4749:
4748:
4736:
4735:
4720:
4705:
4703:
4702:
4697:
4685:
4683:
4682:
4677:
4672:
4671:
4659:
4658:
4626:
4624:
4623:
4618:
4606:
4604:
4603:
4598:
4586:
4584:
4583:
4578:
4566:
4564:
4563:
4558:
4556:
4548:
4543:
4527:
4525:
4524:
4519:
4517:
4516:
4503:
4494:
4493:
4478:
4460:
4458:
4457:
4452:
4450:
4449:
4440:
4439:
4426:
4411:
4393:
4391:
4390:
4385:
4373:
4371:
4370:
4365:
4359:
4343:
4341:
4340:
4335:
4329:
4313:
4311:
4310:
4305:
4303:
4281:
4280:
4276:
4247:
4228:
4226:
4225:
4220:
4218:
4196:
4195:
4191:
4162:
4143:
4141:
4140:
4135:
4124:Fail and return
4118:
4116:
4115:
4110:
4105:
4094:
4093:
4072:
4057:
4055:
4054:
4049:
4041:
4040:
4024:
4022:
4021:
4016:
4007:
3991:
3976:
3962:of a ciphertext
3953:
3951:
3950:
3945:
3940:
3939:
3927:
3926:
3899:
3897:
3896:
3891:
3889:
3885:
3884:
3853:
3852:
3839:
3838:
3829:
3828:
3812:
3811:
3798:
3797:
3788:
3787:
3754:
3752:
3751:
3746:
3744:
3736:
3731:
3708:
3706:
3705:
3700:
3689:
3688:
3657:
3655:
3654:
3649:
3641:
3640:
3624:
3622:
3621:
3616:
3614:
3606:
3601:
3575:
3573:
3572:
3567:
3559:
3558:
3542:
3540:
3539:
3534:
3526:
3525:
3506:
3504:
3503:
3498:
3496:
3495:
3486:
3485:
3460:
3458:
3457:
3452:
3450:
3442:
3437:
3414:
3412:
3411:
3406:
3354:
3352:
3351:
3346:
3334:
3332:
3331:
3326:
3314:
3312:
3311:
3306:
3304:
3296:
3291:
3255:
3253:
3252:
3247:
3242:
3225:
3207:
3205:
3204:
3199:
3197:
3196:
3187:
3186:
3177:
3163:
3143:
3141:
3140:
3135:
3130:
3119:
3118:
3097:
3082:
3080:
3079:
3074:
3054:
3053:
3037:
3035:
3034:
3029:
3027:
3004:
3002:
3001:
2996:
2994:
2993:
2984:
2983:
2961:
2959:
2958:
2953:
2923:
2921:
2920:
2915:
2891:
2889:
2888:
2883:
2866:
2864:
2863:
2858:
2853:
2852:
2809:
2807:
2806:
2801:
2793:
2792:
2763:
2761:
2760:
2755:
2736:
2734:
2733:
2728:
2726:
2718:
2713:
2690:
2688:
2687:
2682:
2667:
2665:
2664:
2659:
2646:RSAES-PKCS1-v1_5
2635:
2633:
2632:
2627:
2615:
2613:
2612:
2607:
2595:
2593:
2592:
2587:
2569:
2567:
2566:
2561:
2545:
2543:
2542:
2537:
2522:
2518:
2506:
2504:
2503:
2498:
2496:
2482:as a bit string
2481:
2479:
2478:
2473:
2471:
2453:
2451:
2450:
2445:
2443:
2442:
2433:
2432:
2423:
2409:
2389:
2387:
2386:
2381:
2376:
2365:
2364:
2343:
2328:
2326:
2325:
2320:
2300:
2299:
2283:
2281:
2280:
2275:
2273:
2250:
2248:
2247:
2242:
2240:
2239:
2230:
2229:
2204:
2202:
2201:
2196:
2172:
2170:
2169:
2164:
2152:
2150:
2149:
2144:
2127:
2125:
2124:
2119:
2108:
2107:
2076:
2074:
2073:
2068:
2060:
2059:
2043:
2041:
2040:
2035:
2023:
2021:
2020:
2015:
1983:
1981:
1980:
1975:
1955:
1954:
1938:
1936:
1935:
1930:
1922:
1921:
1902:
1900:
1899:
1894:
1883:
1882:
1873:
1872:
1840:
1838:
1837:
1832:
1811:
1809:
1808:
1803:
1761:
1759:
1758:
1753:
1751:
1750:
1732:
1731:
1709:
1707:
1706:
1701:
1689:
1687:
1686:
1681:
1664:
1662:
1661:
1656:
1636:
1635:
1623:
1622:
1596:
1594:
1593:
1588:
1576:
1574:
1573:
1568:
1539:
1537:
1536:
1531:
1529:
1525:
1521:
1501:
1467:
1465:
1464:
1459:
1457:
1436:
1434:
1433:
1428:
1408:
1390:
1388:
1387:
1382:
1366:
1364:
1363:
1358:
1356:
1341:
1339:
1338:
1333:
1328:
1317:
1316:
1288:
1286:
1285:
1280:
1269:
1268:
1246:
1244:
1243:
1238:
1205:
1203:
1202:
1197:
1195:
1194:
1178:
1176:
1175:
1170:
1165:
1164:
1134:
1133:
1111:
1109:
1108:
1103:
1101:
1086:
1084:
1083:
1078:
1073:
1062:
1061:
1033:
1031:
1030:
1025:
1023:
1022:
1004:
1002:
1001:
996:
976:
975:
963:
962:
921:
919:
918:
913:
896:
895:
870:
868:
867:
862:
850:
848:
847:
842:
837:
836:
793:
791:
790:
785:
773:
771:
770:
765:
753:
751:
750:
745:
740:
739:
727:
726:
690:
688:
687:
682:
670:
668:
667:
662:
660:
645:
643:
642:
637:
635:
620:
618:
617:
612:
610:
609:
593:
591:
590:
585:
580:
569:
568:
547:
526:
524:
523:
518:
506:
504:
503:
498:
486:
484:
483:
478:
466:
464:
463:
458:
456:
455:
439:
437:
436:
431:
426:
425:
376:
374:
373:
368:
366:
365:
349:
347:
346:
341:
339:
338:
322:
320:
319:
314:
294:
293:
281:
280:
231:RSAES-PKCS1-v1_5
135:
133:
132:
127:
115:
113:
112:
107:
92:
90:
89:
84:
72:
70:
69:
64:
49:
47:
46:
41:
6686:
6685:
6681:
6680:
6679:
6677:
6676:
6675:
6656:
6655:
6637:
6632:
6631:
6601:
6592:
6588:
6581:
6545:(August 1984).
6540:
6536:
6529:
6515:
6508:
6492:
6485:
6478:
6444:Naccache, David
6440:
6436:
6429:
6397:(August 1998).
6392:
6388:
6381:
6365:
6361:
6335:
6318:
6314:
6307:
6290:
6281:
6274:
6260:
6249:
6242:
6212:
6203:
6190:
6181:
6172:
6170:
6157:
6156:
6152:
6111:
6107:
6100:
6086:Schneier, Bruce
6078:Ferguson, Niels
6075:
6068:
6061:
6050:
6031:
6027:
5990:
5986:
5952:
5943:
5922:
5916:
5915:
5911:
5873:
5854:
5847:
5810:
5791:
5784:
5770:
5753:
5748:
5723:
5715:
5710:
5708:
5705:
5704:
5674:
5657:
5655:
5652:
5651:
5631:
5627:
5621:
5617:
5609:
5595:
5593:
5590:
5589:
5570:
5567:
5566:
5547:
5545:
5542:
5541:
5514:
5498:
5482:
5478:
5470:
5465:
5462:
5461:
5445:
5442:
5441:
5414:
5402:
5401:
5381:
5379:
5376:
5375:
5349:
5348:
5346:
5343:
5342:
5323:
5321:
5318:
5317:
5292:
5288:
5282:
5278:
5270:
5267:
5266:
5235:
5232:
5231:
5211:
5207:
5201:
5197:
5189:
5186:
5185:
5166:
5158:
5153:
5145:
5142:
5141:
5113:
5112:
5083:
5080:
5079:
5053:
5052:
5050:
5047:
5046:
5017:
5014:
5013:
4993:
4989:
4987:
4984:
4983:
4967:
4964:
4963:
4947:
4944:
4943:
4916:
4913:
4912:
4893:
4890:
4889:
4868:
4864:
4855:
4851:
4843:
4835:
4832:
4831:
4815:
4812:
4811:
4794:
4790:
4773:
4771:
4768:
4767:
4744:
4740:
4731:
4727:
4713:
4711:
4708:
4707:
4691:
4688:
4687:
4667:
4663:
4654:
4650:
4639:
4636:
4635:
4612:
4609:
4608:
4592:
4589:
4588:
4572:
4569:
4568:
4552:
4544:
4539:
4537:
4534:
4533:
4512:
4508:
4499:
4486:
4482:
4471:
4469:
4466:
4465:
4445:
4441:
4435:
4431:
4422:
4404:
4402:
4399:
4398:
4379:
4376:
4375:
4355:
4349:
4346:
4345:
4325:
4319:
4316:
4315:
4288:
4272:
4256:
4252:
4243:
4234:
4231:
4230:
4203:
4187:
4171:
4167:
4158:
4149:
4146:
4145:
4129:
4126:
4125:
4098:
4086:
4085:
4065:
4063:
4060:
4059:
4033:
4032:
4030:
4027:
4026:
4003:
3987:
3969:
3967:
3964:
3963:
3935:
3931:
3922:
3918:
3907:
3904:
3903:
3887:
3886:
3880:
3876:
3854:
3848:
3844:
3841:
3840:
3834:
3830:
3824:
3820:
3813:
3807:
3803:
3800:
3799:
3793:
3789:
3783:
3779:
3772:
3765:
3763:
3760:
3759:
3740:
3732:
3727:
3719:
3716:
3715:
3681:
3680:
3663:
3660:
3659:
3633:
3632:
3630:
3627:
3626:
3610:
3602:
3597:
3589:
3586:
3585:
3551:
3550:
3548:
3545:
3544:
3518:
3517:
3515:
3512:
3511:
3491:
3487:
3481:
3477:
3469:
3466:
3465:
3446:
3438:
3433:
3425:
3422:
3421:
3367:
3364:
3363:
3340:
3337:
3336:
3320:
3317:
3316:
3315:with generator
3300:
3292:
3287:
3285:
3282:
3281:
3274:
3235:
3218:
3216:
3213:
3212:
3192:
3188:
3182:
3178:
3170:
3156:
3154:
3151:
3150:
3123:
3111:
3110:
3090:
3088:
3085:
3084:
3046:
3045:
3043:
3040:
3039:
3020:
3018:
3015:
3014:
2989:
2985:
2979:
2975:
2967:
2964:
2963:
2932:
2929:
2928:
2897:
2894:
2893:
2877:
2874:
2873:
2845:
2844:
2815:
2812:
2811:
2785:
2784:
2782:
2779:
2778:
2749:
2746:
2745:
2722:
2714:
2709:
2707:
2704:
2703:
2676:
2673:
2672:
2653:
2650:
2649:
2621:
2618:
2617:
2601:
2598:
2597:
2575:
2572:
2571:
2555:
2552:
2551:
2531:
2528:
2527:
2520:
2516:
2489:
2487:
2484:
2483:
2464:
2462:
2459:
2458:
2438:
2434:
2428:
2424:
2416:
2402:
2400:
2397:
2396:
2369:
2357:
2356:
2336:
2334:
2331:
2330:
2292:
2291:
2289:
2286:
2285:
2266:
2264:
2261:
2260:
2235:
2231:
2225:
2221:
2213:
2210:
2209:
2178:
2175:
2174:
2158:
2155:
2154:
2138:
2135:
2134:
2100:
2099:
2082:
2079:
2078:
2052:
2051:
2049:
2046:
2045:
2029:
2026:
2025:
1997:
1994:
1993:
1947:
1946:
1944:
1941:
1940:
1914:
1913:
1911:
1908:
1907:
1878:
1874:
1865:
1861:
1853:
1850:
1849:
1817:
1814:
1813:
1767:
1764:
1763:
1746:
1742:
1721:
1717:
1715:
1712:
1711:
1695:
1692:
1691:
1690:-bit semiprime
1675:
1672:
1671:
1628:
1627:
1615:
1614:
1609:
1606:
1605:
1582:
1579:
1578:
1562:
1559:
1558:
1551:
1546:
1517:
1494:
1487:
1483:
1481:
1478:
1477:
1450:
1442:
1439:
1438:
1401:
1399:
1396:
1395:
1376:
1373:
1372:
1349:
1347:
1344:
1343:
1321:
1309:
1308:
1297:
1294:
1293:
1264:
1260:
1255:
1252:
1251:
1214:
1211:
1210:
1190:
1186:
1184:
1181:
1180:
1157:
1156:
1129:
1125:
1120:
1117:
1116:
1094:
1092:
1089:
1088:
1066:
1054:
1053:
1042:
1039:
1038:
1015:
1014:
1012:
1009:
1008:
968:
967:
955:
954:
949:
946:
945:
928:
888:
887:
876:
873:
872:
856:
853:
852:
829:
828:
799:
796:
795:
779:
776:
775:
759:
756:
755:
732:
731:
719:
718:
713:
710:
709:
702:
676:
673:
672:
653:
651:
648:
647:
628:
626:
623:
622:
602:
601:
599:
596:
595:
573:
561:
560:
540:
538:
535:
534:
512:
509:
508:
492:
489:
488:
472:
469:
468:
448:
447:
445:
442:
441:
418:
417:
388:
385:
384:
358:
357:
355:
352:
351:
331:
330:
328:
325:
324:
286:
285:
273:
272:
267:
264:
263:
253:
248:
196:
121:
118:
117:
98:
95:
94:
78:
75:
74:
55:
52:
51:
35:
32:
31:
24:
17:
12:
11:
5:
6684:
6674:
6673:
6671:Key management
6668:
6654:
6653:
6648:
6643:
6636:
6633:
6630:
6629:
6586:
6579:
6543:Elgamal, Taher
6534:
6527:
6506:
6483:
6476:
6434:
6427:
6399:Krawczyk, Hugo
6386:
6379:
6359:
6331:(1978-02-01).
6312:
6305:
6279:
6272:
6247:
6240:
6201:
6179:
6150:
6105:
6098:
6066:
6059:
6025:
5984:
5941:
5929:, 2024-08-13,
5909:
5876:Cramer, Ronald
5852:
5845:
5789:
5782:
5750:
5749:
5747:
5744:
5726:
5722:
5718:
5713:
5697:
5696:
5684:
5680:
5677:
5673:
5670:
5667:
5663:
5660:
5648:
5634:
5630:
5624:
5620:
5615:
5612:
5608:
5605:
5601:
5598:
5586:
5574:
5553:
5550:
5528:
5525:
5521:
5518:
5513:
5510:
5505:
5501:
5497:
5494:
5491:
5488:
5485:
5481:
5476:
5473:
5469:
5449:
5437:
5436:
5424:
5420:
5417:
5413:
5408:
5405:
5400:
5397:
5394:
5391:
5387:
5384:
5363:
5360:
5355:
5352:
5329:
5326:
5310:
5309:
5295:
5291:
5285:
5281:
5277:
5274:
5254:
5251:
5248:
5245:
5242:
5239:
5228:
5214:
5210:
5204:
5200:
5196:
5193:
5182:
5169:
5165:
5161:
5156:
5152:
5149:
5137:
5136:
5124:
5119:
5116:
5111:
5108:
5105:
5102:
5099:
5096:
5093:
5090:
5087:
5067:
5064:
5059:
5056:
5040:
5037:Key generation
5021:
4996:
4992:
4971:
4951:
4920:
4897:
4871:
4867:
4861:
4858:
4854:
4849:
4846:
4842:
4839:
4819:
4797:
4793:
4789:
4786:
4783:
4779:
4776:
4755:
4752:
4747:
4743:
4739:
4734:
4730:
4726:
4723:
4719:
4716:
4695:
4675:
4670:
4666:
4662:
4657:
4653:
4649:
4646:
4643:
4616:
4596:
4576:
4555:
4551:
4547:
4542:
4530:
4529:
4515:
4511:
4506:
4502:
4498:
4492:
4489:
4485:
4481:
4477:
4474:
4462:
4448:
4444:
4438:
4434:
4429:
4425:
4421:
4417:
4414:
4410:
4407:
4395:
4383:
4362:
4358:
4354:
4332:
4328:
4324:
4302:
4299:
4295:
4292:
4287:
4284:
4279:
4275:
4271:
4268:
4265:
4262:
4259:
4255:
4250:
4246:
4242:
4238:
4217:
4214:
4210:
4207:
4202:
4199:
4194:
4190:
4186:
4183:
4180:
4177:
4174:
4170:
4165:
4161:
4157:
4153:
4133:
4121:
4120:
4108:
4104:
4101:
4097:
4092:
4089:
4084:
4081:
4078:
4075:
4071:
4068:
4047:
4044:
4039:
4036:
4014:
4010:
4006:
4002:
3998:
3994:
3990:
3986:
3982:
3979:
3975:
3972:
3956:
3955:
3943:
3938:
3934:
3930:
3925:
3921:
3917:
3914:
3911:
3900:
3883:
3879:
3875:
3872:
3869:
3866:
3863:
3860:
3857:
3855:
3851:
3847:
3843:
3842:
3837:
3833:
3827:
3823:
3819:
3816:
3814:
3810:
3806:
3802:
3801:
3796:
3792:
3786:
3782:
3778:
3775:
3773:
3771:
3768:
3767:
3756:
3743:
3739:
3735:
3730:
3726:
3723:
3711:
3710:
3698:
3695:
3692:
3687:
3684:
3679:
3676:
3673:
3670:
3667:
3647:
3644:
3639:
3636:
3625:to public key
3613:
3609:
3605:
3600:
3596:
3593:
3578:
3577:
3565:
3562:
3557:
3554:
3532:
3529:
3524:
3521:
3508:
3494:
3490:
3484:
3480:
3476:
3473:
3462:
3449:
3445:
3441:
3436:
3432:
3429:
3417:
3416:
3404:
3401:
3398:
3395:
3392:
3389:
3386:
3383:
3380:
3377:
3374:
3371:
3360:Key generation
3344:
3324:
3303:
3299:
3295:
3290:
3273:
3270:
3258:
3257:
3245:
3241:
3238:
3234:
3231:
3228:
3224:
3221:
3209:
3195:
3191:
3185:
3181:
3176:
3173:
3169:
3166:
3162:
3159:
3146:
3145:
3133:
3129:
3126:
3122:
3117:
3114:
3109:
3106:
3103:
3100:
3096:
3093:
3072:
3069:
3066:
3063:
3060:
3057:
3052:
3049:
3026:
3023:
3007:
3006:
2992:
2988:
2982:
2978:
2974:
2971:
2951:
2948:
2945:
2942:
2939:
2936:
2925:
2913:
2910:
2907:
2904:
2901:
2881:
2869:
2868:
2856:
2851:
2848:
2843:
2840:
2837:
2834:
2831:
2828:
2825:
2822:
2819:
2799:
2796:
2791:
2788:
2772:
2769:Key generation
2753:
2725:
2721:
2717:
2712:
2680:
2657:
2625:
2605:
2596:, the message
2585:
2582:
2579:
2559:
2535:
2521:ATTACK AT DUSK
2517:ATTACK AT DAWN
2509:
2508:
2495:
2492:
2470:
2467:
2455:
2441:
2437:
2431:
2427:
2422:
2419:
2415:
2412:
2408:
2405:
2392:
2391:
2379:
2375:
2372:
2368:
2363:
2360:
2355:
2352:
2349:
2346:
2342:
2339:
2318:
2315:
2312:
2309:
2306:
2303:
2298:
2295:
2272:
2269:
2259:of ciphertext
2253:
2252:
2238:
2234:
2228:
2224:
2220:
2217:
2206:
2194:
2191:
2188:
2185:
2182:
2162:
2153:as an integer
2142:
2130:
2129:
2117:
2114:
2111:
2106:
2103:
2098:
2095:
2092:
2089:
2086:
2066:
2063:
2058:
2055:
2044:to public key
2033:
2013:
2010:
2007:
2004:
2001:
1986:
1985:
1973:
1970:
1967:
1964:
1961:
1958:
1953:
1950:
1928:
1925:
1920:
1917:
1904:
1892:
1889:
1886:
1881:
1877:
1871:
1868:
1864:
1860:
1857:
1846:
1830:
1827:
1824:
1821:
1801:
1798:
1795:
1792:
1789:
1786:
1783:
1780:
1777:
1774:
1771:
1749:
1745:
1741:
1738:
1735:
1730:
1727:
1724:
1720:
1699:
1679:
1667:
1666:
1654:
1651:
1648:
1645:
1642:
1639:
1634:
1631:
1626:
1621:
1618:
1613:
1602:Key generation
1586:
1566:
1555:RSA encryption
1550:
1547:
1545:
1542:
1528:
1524:
1520:
1516:
1513:
1510:
1507:
1504:
1500:
1497:
1493:
1490:
1486:
1470:
1469:
1456:
1453:
1449:
1446:
1426:
1423:
1420:
1417:
1414:
1411:
1407:
1404:
1392:
1380:
1355:
1352:
1331:
1327:
1324:
1320:
1315:
1312:
1307:
1304:
1301:
1290:
1278:
1275:
1272:
1267:
1263:
1259:
1248:
1236:
1233:
1230:
1227:
1224:
1221:
1218:
1207:
1193:
1189:
1168:
1163:
1160:
1155:
1152:
1149:
1146:
1143:
1140:
1137:
1132:
1128:
1124:
1113:
1100:
1097:
1076:
1072:
1069:
1065:
1060:
1057:
1052:
1049:
1046:
1035:
1021:
1018:
1006:
994:
991:
988:
985:
982:
979:
974:
971:
966:
961:
958:
953:
927:
924:
911:
908:
905:
902:
899:
894:
891:
886:
883:
880:
860:
840:
835:
832:
827:
824:
821:
818:
815:
812:
809:
806:
803:
783:
763:
743:
738:
735:
730:
725:
722:
717:
701:
698:
697:
696:
680:
659:
656:
634:
631:
608:
605:
583:
579:
576:
572:
567:
564:
559:
556:
553:
550:
546:
543:
528:
516:
496:
487:, and returns
476:
454:
451:
429:
424:
421:
416:
413:
410:
407:
404:
401:
398:
395:
392:
378:
364:
361:
337:
334:
312:
309:
306:
303:
300:
297:
292:
289:
284:
279:
276:
271:
260:Key generation
252:
249:
247:
244:
195:
192:
125:
105:
102:
82:
62:
59:
39:
15:
9:
6:
4:
3:
2:
6683:
6672:
6669:
6667:
6664:
6663:
6661:
6652:
6649:
6647:
6644:
6642:
6639:
6638:
6624:
6619:
6615:
6611:
6607:
6600:
6596:
6595:Koblitz, Neal
6590:
6582:
6576:
6571:
6566:
6562:
6558:
6557:
6552:
6548:
6544:
6538:
6530:
6524:
6520:
6513:
6511:
6502:
6501:
6496:
6495:Shoup, Victor
6490:
6488:
6479:
6473:
6468:
6463:
6459:
6455:
6454:
6449:
6448:Preneel, Bart
6445:
6438:
6430:
6424:
6419:
6414:
6410:
6406:
6405:
6400:
6396:
6390:
6382:
6376:
6372:
6371:
6363:
6354:
6349:
6345:
6341:
6334:
6330:
6326:
6322:
6316:
6308:
6302:
6298:
6294:
6288:
6286:
6284:
6275:
6269:
6265:
6258:
6256:
6254:
6252:
6243:
6237:
6232:
6227:
6223:
6219:
6218:
6210:
6208:
6206:
6197:
6196:
6188:
6186:
6184:
6169:on 2024-06-26
6168:
6164:
6160:
6154:
6146:
6143:
6138:
6133:
6129:
6125:
6124:
6119:
6115:
6109:
6101:
6095:
6091:
6087:
6083:
6079:
6073:
6071:
6062:
6060:0-8493-8523-7
6056:
6049:
6048:
6043:
6039:
6035:
6029:
6021:
6018:
6013:
6008:
6004:
6000:
5999:
5994:
5988:
5980:
5977:
5972:
5967:
5963:
5959:
5958:
5950:
5948:
5946:
5937:
5932:
5928:
5921:
5920:
5913:
5905:
5901:
5897:
5893:
5889:
5885:
5881:
5880:Shoup, Victor
5877:
5871:
5869:
5867:
5865:
5863:
5861:
5859:
5857:
5848:
5842:
5837:
5832:
5828:
5824:
5823:
5818:
5817:Preneel, Bart
5814:
5813:Shoup, Victor
5808:
5806:
5804:
5802:
5800:
5798:
5796:
5794:
5785:
5779:
5775:
5768:
5766:
5764:
5762:
5760:
5758:
5756:
5751:
5743:
5741:
5720:
5716:
5702:
5678:
5675:
5668:
5665:
5661:
5658:
5649:
5632:
5622:
5613:
5610:
5603:
5599:
5596:
5587:
5572:
5551:
5548:
5523:
5519:
5511:
5508:
5503:
5499:
5492:
5489:
5486:
5474:
5471:
5439:
5438:
5418:
5415:
5411:
5395:
5392:
5389:
5385:
5382:
5361:
5358:
5327:
5324:
5315:
5314:Decapsulation
5312:
5311:
5293:
5283:
5279:
5275:
5272:
5249:
5243:
5240:
5237:
5229:
5212:
5202:
5198:
5194:
5191:
5183:
5163:
5159:
5150:
5147:
5139:
5138:
5106:
5103:
5100:
5094:
5091:
5088:
5065:
5062:
5044:
5043:Encapsulation
5041:
5038:
5035:
5034:
5033:
5019:
5012:
4994:
4990:
4969:
4949:
4941:
4937:
4934:
4933:symmetric-key
4918:
4909:
4895:
4885:
4869:
4859:
4856:
4852:
4847:
4844:
4840:
4837:
4817:
4810:, from which
4795:
4787:
4784:
4781:
4777:
4774:
4750:
4745:
4741:
4737:
4732:
4728:
4721:
4717:
4714:
4693:
4668:
4664:
4660:
4655:
4651:
4644:
4641:
4633:
4628:
4614:
4594:
4574:
4549:
4545:
4513:
4504:
4500:
4496:
4490:
4487:
4483:
4479:
4475:
4472:
4463:
4446:
4436:
4427:
4423:
4419:
4412:
4408:
4405:
4396:
4381:
4360:
4356:
4352:
4330:
4326:
4322:
4297:
4293:
4285:
4282:
4277:
4273:
4266:
4263:
4260:
4248:
4244:
4240:
4212:
4208:
4200:
4197:
4192:
4188:
4181:
4178:
4175:
4163:
4159:
4155:
4123:
4122:
4102:
4099:
4095:
4079:
4076:
4073:
4069:
4066:
4045:
4042:
4008:
4004:
4000:
3996:
3992:
3988:
3984:
3977:
3973:
3970:
3961:
3958:
3957:
3936:
3932:
3928:
3923:
3919:
3912:
3909:
3901:
3881:
3870:
3867:
3864:
3858:
3856:
3849:
3845:
3835:
3825:
3821:
3817:
3815:
3808:
3804:
3794:
3784:
3780:
3776:
3774:
3769:
3757:
3737:
3733:
3724:
3721:
3713:
3712:
3693:
3690:
3674:
3671:
3668:
3665:
3645:
3642:
3607:
3603:
3594:
3591:
3584:of a message
3583:
3580:
3579:
3563:
3560:
3530:
3527:
3509:
3492:
3482:
3478:
3474:
3471:
3463:
3443:
3439:
3430:
3427:
3419:
3418:
3396:
3393:
3390:
3384:
3381:
3378:
3375:
3372:
3361:
3358:
3357:
3356:
3342:
3322:
3297:
3293:
3279:
3269:
3267:
3263:
3239:
3236:
3229:
3226:
3222:
3219:
3210:
3193:
3183:
3174:
3171:
3164:
3160:
3157:
3148:
3147:
3127:
3124:
3120:
3104:
3101:
3098:
3094:
3091:
3067:
3064:
3061:
3055:
3024:
3021:
3012:
3011:Decapsulation
3009:
3008:
2990:
2980:
2976:
2972:
2969:
2946:
2940:
2937:
2934:
2926:
2911:
2908:
2905:
2902:
2899:
2879:
2871:
2870:
2838:
2835:
2832:
2826:
2823:
2820:
2797:
2794:
2776:
2775:Encapsulation
2773:
2770:
2767:
2766:
2765:
2751:
2744:
2740:
2719:
2715:
2701:
2697:
2694:
2693:symmetric-key
2678:
2669:
2655:
2647:
2643:
2639:
2623:
2603:
2583:
2580:
2577:
2557:
2549:
2533:
2524:
2514:
2493:
2490:
2468:
2465:
2456:
2439:
2429:
2420:
2417:
2410:
2406:
2403:
2394:
2393:
2373:
2370:
2366:
2350:
2347:
2344:
2340:
2337:
2313:
2310:
2307:
2301:
2270:
2267:
2258:
2255:
2254:
2236:
2226:
2222:
2218:
2215:
2207:
2192:
2189:
2186:
2183:
2180:
2160:
2140:
2132:
2131:
2112:
2109:
2093:
2090:
2087:
2084:
2064:
2061:
2031:
2024:-bit message
2008:
2005:
2002:
1991:
1988:
1987:
1968:
1965:
1962:
1956:
1926:
1923:
1905:
1887:
1879:
1869:
1866:
1862:
1858:
1855:
1847:
1844:
1825:
1819:
1799:
1796:
1787:
1781:
1778:
1775:
1747:
1743:
1739:
1736:
1733:
1728:
1725:
1722:
1718:
1697:
1677:
1669:
1668:
1646:
1643:
1640:
1624:
1603:
1600:
1599:
1598:
1584:
1564:
1556:
1541:
1526:
1522:
1518:
1514:
1511:
1505:
1502:
1498:
1495:
1484:
1475:
1454:
1451:
1447:
1444:
1421:
1418:
1415:
1409:
1405:
1402:
1393:
1378:
1370:
1353:
1350:
1325:
1322:
1318:
1302:
1299:
1291:
1273:
1270:
1265:
1261:
1249:
1231:
1228:
1225:
1219:
1216:
1208:
1191:
1187:
1150:
1147:
1144:
1138:
1135:
1130:
1126:
1114:
1098:
1095:
1070:
1067:
1063:
1047:
1044:
1036:
1007:
986:
983:
980:
964:
943:
942:
941:
938:
936:
932:
923:
909:
906:
900:
897:
881:
878:
858:
822:
819:
816:
810:
807:
804:
781:
761:
754:generated by
728:
707:
694:
657:
654:
632:
629:
577:
574:
570:
554:
551:
548:
544:
541:
532:
531:Decapsulation
529:
514:
494:
474:
411:
408:
405:
399:
396:
393:
382:
381:Encapsulation
379:
304:
301:
298:
282:
261:
258:
257:
256:
243:
240:
236:
232:
227:
225:
221:
217:
216:symmetric key
212:
209:
200:
191:
189:
184:
182:
178:
174:
170:
169:encapsulation
165:
164:adversaries.
163:
159:
158:eavesdropping
155:
151:
147:
143:
123:
103:
100:
80:
60:
57:
37:
28:
22:
6609:
6605:
6589:
6555:
6551:Chaum, David
6537:
6518:
6499:
6452:
6437:
6403:
6389:
6369:
6362:
6343:
6339:
6321:Rivest, R.L.
6315:
6296:
6263:
6216:
6194:
6171:. Retrieved
6167:the original
6153:
6122:
6108:
6089:
6046:
6028:
5997:
5987:
5956:
5918:
5912:
5891:
5887:
5821:
5815:(May 2000).
5773:
5698:
5313:
5042:
5036:
4939:
4910:
4886:
4629:
4531:
3959:
3581:
3359:
3355:as follows:
3276:Traditional
3275:
3259:
3010:
2774:
2768:
2738:
2699:
2670:
2525:
2510:
2256:
1989:
1601:
1553:Traditional
1552:
1473:
1471:
1368:
939:
930:
929:
794:returned by
705:
703:
530:
380:
259:
254:
228:
213:
205:
187:
185:
180:
176:
172:
168:
166:
162:intercepting
149:
145:
142:cryptography
139:
6616:: 203–209.
6329:Adleman, L.
5993:Kaliski, B.
5898:: 167–226.
5540:, i.e., if
5039:: As above.
4314:, i.e., if
3262:RSA problem
2771:: As above.
1670:Generate a
871:, that is,
700:Correctness
6660:Categories
6325:Shamir, A.
6173:2024-07-20
6118:Finney, H.
6114:Callas, J.
5746:References
3960:Decryption
3582:Encryption
3266:RSAES-OAEP
2640:. Various
2550:key, when
2257:Decryption
1990:Encryption
246:Definition
235:RSAES-OAEP
173:ciphertext
5490:−
5448:⊥
5396:
5374:, giving
5151:∈
5107:
5078:, giving
4857:−
4488:−
4264:−
4179:−
4132:⊥
4080:
4058:, giving
3868:⋅
3758:Compute:
3725:∈
3675:
3658:, giving
3595:∈
3431:∈
3397:
3335:of order
3105:
3083:, giving
2903:≤
2839:
2810:, giving
2351:
2329:, giving
2184:≤
2094:
2077:, giving
2006:−
1880:λ
1867:−
1820:λ
1782:λ
1726:−
1647:
1512:−
1410:∈
1303:
1250:The pair
1220:∈
1151:
1048:
987:
882:
823:
704:A KEM is
691:(called ‘
679:⊥
555:
412:
305:
6641:Key Wrap
6635:See also
6553:(eds.).
6497:(2001),
5882:(2003).
5679:′
5662:′
5614:′
5600:′
5588:Compute
5552:′
5509:≢
5475:′
5419:′
5386:′
5328:′
5184:Compute
4848:′
4778:′
4718:′
4505:′
4476:′
4428:′
4409:′
4397:Compute
4361:′
4331:′
4283:≢
4249:′
4198:≢
4164:′
4103:′
4070:′
4009:′
3993:′
3974:′
3464:Compute
3240:′
3223:′
3175:′
3161:′
3149:Compute
3128:′
3095:′
3025:′
2526:Even if
2494:′
2469:′
2421:′
2407:′
2395:Compute
2374:′
2341:′
2271:′
1848:Compute
1812:, where
1499:′
1455:′
1406:′
1354:′
1326:′
1099:′
1071:′
931:Security
658:′
633:′
578:′
545:′
21:key wrap
6612:(177).
6450:(ed.).
6401:(ed.).
5819:(ed.).
5650:Return
5230:Return
5140:Choose
4464:Return
4077:Decrypt
3714:Choose
3672:Encrypt
3510:Return
3420:Choose
3272:Elgamal
3211:Return
2927:Return
2700:RSA-KEM
2348:Decrypt
2208:Return
2091:Encrypt
1906:Return
1841:is the
1557:, with
706:correct
218:for an
188:doesn't
152:, is a
6577:
6525:
6474:
6425:
6377:
6303:
6270:
6238:
6096:
6057:
5843:
5780:
4940:derive
4229:or if
2739:derive
1369:except
693:bottom
251:Syntax
237:, and
6602:(PDF)
6336:(PDF)
6051:(PDF)
5923:(PDF)
5894:(1).
5393:Decap
5104:Encap
3102:Decap
2892:with
2836:Encap
2173:with
1710:with
1300:Decap
1148:Encap
1045:Decap
879:Decap
820:Encap
552:Decap
409:Encap
148:, or
6575:ISBN
6523:ISBN
6472:ISBN
6423:ISBN
6375:ISBN
6301:ISBN
6268:ISBN
6236:ISBN
6145:4880
6094:ISBN
6055:ISBN
6020:8017
5979:9180
5841:ISBN
5778:ISBN
5265:and
4982:and
2962:and
2909:<
2190:<
1740:<
1734:<
1472:The
1371:for
160:and
144:, a
6618:doi
6565:doi
6462:doi
6413:doi
6348:doi
6226:doi
6142:RFC
6132:doi
6017:RFC
6007:doi
5976:RFC
5966:doi
5931:doi
5900:doi
5831:doi
5629:mod
5520:mod
5460:if
5316:of
5290:mod
5209:mod
4866:mod
4792:mod
4510:mod
4443:mod
4344:or
4294:mod
4209:mod
4144:if
3878:mod
3832:mod
3791:mod
3489:mod
3394:Gen
3190:mod
3013:of
2987:mod
2548:AES
2436:mod
2233:mod
1992:of
1876:mod
1770:gcd
1644:Gen
1549:RSA
984:Gen
762:Gen
695:’).
302:Gen
171:or
150:KEM
140:In
6662::
6610:48
6608:.
6604:.
6573:.
6559:.
6549:;
6509:^
6486:^
6470:.
6456:.
6421:.
6407:.
6344:21
6342:.
6338:.
6327:;
6323:;
6282:^
6250:^
6234:.
6220:.
6204:^
6182:^
6161:.
6140:.
6130:.
6126:.
6084:;
6080:;
6069:^
6040:;
6036:;
6015:.
6005:.
6001:.
5974:.
5964:.
5960:.
5944:^
5925:,
5892:33
5890:.
5886:.
5878:;
5855:^
5839:.
5825:.
5792:^
5754:^
5742:.
5666::=
5604::=
5390::=
5276::=
5241::=
5195::=
5101::=
5032::
4908:.
4884:.
4782::=
4722::=
4627:.
4480::=
4413::=
4074::=
3913::=
3859::=
3818::=
3777::=
3669::=
3561::=
3528::=
3475::=
3391::=
3362:,
3268:.
3227::=
3165::=
3099::=
2973::=
2938::=
2833::=
2668:.
2411::=
2345::=
2219::=
2088::=
1957::=
1924::=
1859::=
1641::=
1604:,
1489:Pr
1145::=
981::=
922:.
817::=
549::=
533:,
406::=
383:,
299::=
262:,
233:,
226:.
183:.
6626:.
6620::
6583:.
6567::
6531:.
6480:.
6464::
6431:.
6415::
6383:.
6356:.
6350::
6309:.
6276:.
6244:.
6228::
6176:.
6147:.
6134::
6102:.
6063:.
6022:.
6009::
5981:.
5968::
5933::
5906:.
5902::
5849:.
5833::
5786:.
5725:Z
5721:p
5717:/
5712:Z
5695:.
5683:)
5676:t
5672:(
5669:H
5659:k
5647:.
5633:p
5623:x
5619:)
5611:c
5607:(
5597:t
5585:.
5573:g
5549:c
5527:)
5524:p
5517:(
5512:1
5504:q
5500:/
5496:)
5493:1
5487:p
5484:(
5480:)
5472:c
5468:(
5435::
5423:)
5416:c
5412:,
5407:k
5404:s
5399:(
5383:k
5362:x
5359:=
5354:k
5351:s
5325:c
5294:p
5284:r
5280:g
5273:c
5253:)
5250:t
5247:(
5244:H
5238:k
5227:.
5213:p
5203:r
5199:y
5192:t
5168:Z
5164:q
5160:/
5155:Z
5148:r
5135::
5123:)
5118:k
5115:p
5110:(
5098:)
5095:c
5092:,
5089:k
5086:(
5066:y
5063:=
5058:k
5055:p
5020:H
4995:2
4991:c
4970:m
4950:t
4919:m
4896:p
4870:p
4860:1
4853:g
4845:m
4841:=
4838:m
4818:m
4796:p
4788:g
4785:m
4775:m
4754:)
4751:g
4746:2
4742:c
4738:,
4733:1
4729:c
4725:(
4715:c
4694:m
4674:)
4669:2
4665:c
4661:,
4656:1
4652:c
4648:(
4645:=
4642:c
4615:g
4595:x
4575:p
4554:Z
4550:p
4546:/
4541:Z
4528:.
4514:p
4501:2
4497:c
4491:1
4484:t
4473:m
4461:.
4447:p
4437:x
4433:)
4424:1
4420:c
4416:(
4406:t
4394:.
4382:g
4357:2
4353:c
4327:1
4323:c
4301:)
4298:p
4291:(
4286:1
4278:q
4274:/
4270:)
4267:1
4261:p
4258:(
4254:)
4245:2
4241:c
4237:(
4216:)
4213:p
4206:(
4201:1
4193:q
4189:/
4185:)
4182:1
4176:p
4173:(
4169:)
4160:1
4156:c
4152:(
4119::
4107:)
4100:c
4096:,
4091:k
4088:s
4083:(
4067:m
4046:x
4043:=
4038:k
4035:s
4013:)
4005:2
4001:c
3997:,
3989:1
3985:c
3981:(
3978:=
3971:c
3954:.
3942:)
3937:2
3933:c
3929:,
3924:1
3920:c
3916:(
3910:c
3882:p
3874:)
3871:m
3865:t
3862:(
3850:2
3846:c
3836:p
3826:r
3822:g
3809:1
3805:c
3795:p
3785:r
3781:y
3770:t
3742:Z
3738:q
3734:/
3729:Z
3722:r
3709::
3697:)
3694:m
3691:,
3686:k
3683:p
3678:(
3666:c
3646:y
3643:=
3638:k
3635:p
3612:Z
3608:p
3604:/
3599:Z
3592:m
3564:y
3556:k
3553:p
3531:x
3523:k
3520:s
3507:.
3493:p
3483:x
3479:g
3472:y
3448:Z
3444:q
3440:/
3435:Z
3428:x
3415::
3403:)
3400:(
3388:)
3385:k
3382:s
3379:,
3376:k
3373:p
3370:(
3343:q
3323:g
3302:Z
3298:p
3294:/
3289:Z
3256:.
3244:)
3237:r
3233:(
3230:H
3220:k
3208:.
3194:n
3184:d
3180:)
3172:c
3168:(
3158:r
3144::
3132:)
3125:c
3121:,
3116:k
3113:s
3108:(
3092:k
3071:)
3068:d
3065:,
3062:n
3059:(
3056:=
3051:k
3048:s
3022:c
2991:n
2981:e
2977:r
2970:c
2950:)
2947:r
2944:(
2941:H
2935:k
2912:n
2906:r
2900:0
2880:r
2867::
2855:)
2850:k
2847:p
2842:(
2830:)
2827:c
2824:,
2821:k
2818:(
2798:n
2795:=
2790:k
2787:p
2752:H
2724:Z
2720:n
2716:/
2711:Z
2679:m
2656:m
2624:c
2604:m
2584:3
2581:=
2578:e
2558:e
2534:m
2507:.
2491:m
2466:r
2454:.
2440:n
2430:d
2426:)
2418:c
2414:(
2404:r
2390::
2378:)
2371:c
2367:,
2362:k
2359:s
2354:(
2338:m
2317:)
2314:d
2311:,
2308:n
2305:(
2302:=
2297:k
2294:s
2268:c
2251:.
2237:n
2227:e
2223:r
2216:c
2205:.
2193:n
2187:r
2181:0
2161:r
2141:m
2128::
2116:)
2113:m
2110:,
2105:k
2102:p
2097:(
2085:c
2065:n
2062:=
2057:k
2054:p
2032:m
2012:)
2009:1
2003:t
2000:(
1972:)
1969:d
1966:,
1963:n
1960:(
1952:k
1949:s
1927:n
1919:k
1916:p
1903:.
1891:)
1888:n
1885:(
1870:1
1863:e
1856:d
1845:.
1829:)
1826:n
1823:(
1800:1
1797:=
1794:)
1791:)
1788:n
1785:(
1779:,
1776:e
1773:(
1748:t
1744:2
1737:n
1729:1
1723:t
1719:2
1698:n
1678:t
1665::
1653:)
1650:(
1638:)
1633:k
1630:s
1625:,
1620:k
1617:p
1612:(
1585:e
1565:t
1527:|
1523:2
1519:/
1515:1
1509:]
1506:b
1503:=
1496:b
1492:[
1485:|
1468:.
1452:b
1448:=
1445:b
1425:}
1422:1
1419:,
1416:0
1413:{
1403:b
1391:.
1379:c
1351:c
1330:)
1323:c
1319:,
1314:k
1311:s
1306:(
1277:)
1274:c
1271:,
1266:b
1262:k
1258:(
1247:.
1235:}
1232:1
1229:,
1226:0
1223:{
1217:b
1192:1
1188:k
1167:)
1162:k
1159:p
1154:(
1142:)
1139:c
1136:,
1131:0
1127:k
1123:(
1096:c
1075:)
1068:c
1064:,
1059:k
1056:s
1051:(
1020:k
1017:p
1005:.
993:)
990:(
978:)
973:k
970:s
965:,
960:k
957:p
952:(
910:k
907:=
904:)
901:c
898:,
893:k
890:s
885:(
859:k
839:)
834:k
831:p
826:(
814:)
811:c
808:,
805:k
802:(
782:c
742:)
737:k
734:s
729:,
724:k
721:p
716:(
655:k
630:c
607:k
604:s
582:)
575:c
571:,
566:k
563:s
558:(
542:k
527:.
515:c
495:k
475:k
453:k
450:p
428:)
423:k
420:p
415:(
403:)
400:c
397:,
394:k
391:(
377:.
363:k
360:s
336:k
333:p
311:)
308:(
296:)
291:k
288:s
283:,
278:k
275:p
270:(
124:k
104:k
101:s
81:c
61:k
58:p
38:k
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.