In
cryptographic protocols
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describe ...
, a key encapsulation mechanism (KEM) is used to secure
symmetric
Symmetry (from grc, συμμετρία "agreement in dimensions, due proportion, arrangement") in everyday language refers to a sense of harmonious and beautiful proportion and balance. In mathematics, "symmetry" has a more precise definiti ...
key material for transmission using
asymmetric (public-key) algorithms. It is commonly used in
hybrid cryptosystems. In practice, public key systems are clumsy to use in transmitting long messages. Instead they are often used to exchange symmetric keys, which are relatively short. The symmetric key is then used to encrypt the longer message.
The traditional approach to sending a symmetric key with public key systems is to first generate a random symmetric key and then encrypt it using the chosen public key algorithm. The recipient then decrypts the public key message to recover the symmetric key. As the symmetric key is generally short, padding is required for full security and proofs of security for padding schemes are often less than complete.
[An OAEP Variant With a Tight Security Proof – Draft 1.0](_blank)
Jakob Jonsson, 2002 KEMs simplify the process by generating a random element in the
finite group
Finite is the opposite of infinite. It may refer to:
* Finite number (disambiguation)
* Finite set, a set whose cardinality (number of elements) is some natural number
* Finite verb, a verb form that has a subject, usually being inflected or marked ...
underlying the public key system and deriving the symmetric key by hashing that element, eliminating the need for padding.
Example using RSA encryption
Using the same notation employed in the
RSA system article, say
Alice has transmitted her public key
to
Bob
Bob, BOB, or B.O.B. may refer to:
Places
* Mount Bob, New York, United States
*Bob Island, Palmer Archipelago, Antarctica
People, fictional characters, and named animals
*Bob (given name), a list of people and fictional characters
*Bob (surname ...
, while keeping her private key secret, as usual. Bob then wishes to send symmetric key M to Alice. M might be a 128 or 256-bit AES key, for example. Note that the public key
is typically 2048-bits or even longer, thus much larger than typical symmetric keys. If
is small enough that