Elliptic Curve Integrated Encryption Scheme
The integrated encryption scheme (ECIES) is a hybrid encryption method , the elliptic curves are based. As a hybrid process , it combines an asymmetrical process , which is used to send a symmetrical key, with a symmetrical encryption process , which encrypts the message with this symmetrical key. In the Random Oracle model, ECIES is secure against chosen ciphertext attacks .
Establishing the scheme
The following resources are required:
- KDF ( Key Derivation Function ): a cryptographic hash function that can generate keys of any length
- MAC ( Message Authentication Code )
- A symmetrical encryption method with an encryption algorithm and a decryption algorithm
System parameters
- , Prime number
- Elliptic curve E: above the body
- with prim
Key generation
A participant chooses a secret key at random and calculates his public key from it .
Encryption
To encrypt a message with a public key , a Diffie-Hellman key exchange is combined in an elliptical curve with a symmetrical method.
- Pick a random number
- Calculate and
- Find the symmetric keys . is the x-coordinate of
- Calculate and
- send
Decryption
In order to decrypt a cipher with a secret key , the following steps are carried out.
- Calculate
- Determine the two keys
- Check if is
- Get
Conclusion
ECIES works correctly if it is calculated correctly. There is, this is validated.
swell
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography . CRC Press, ISBN 0-8493-8523-7 ( uwaterloo.ca ).
- Victor Shoup: A proposal for an ISO standard for public key encryption , Version 2.1, December 20, 2001 (PDF, 384 kB).