#jsDisabledContent { display:none; } My Account | Register | Help

# Integrated Encryption Scheme

Article Id: WHEBN0003530076
Reproduction Date:

 Title: Integrated Encryption Scheme Author: World Heritage Encyclopedia Language: English Subject: Collection: Publisher: World Heritage Encyclopedia Publication Date:

### Integrated Encryption Scheme

Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is allowed to use chosen-plaintext and chosen-ciphertext attacks. The security of the scheme is based on the Diffie–Hellman problem. Two incarnations of the IES are standardized: Discrete Logarithm Integrated Encryption Scheme (DLIES) and Elliptic Curve Integrated Encryption Scheme (ECIES), which is also known as the Elliptic Curve Augmented Encryption Scheme or simply the Elliptic Curve Encryption Scheme. These two incarnations are identical up to the change of an underlying group and so to be concrete we concentrate on the latter.

## Contents

• Information required 1
• Encryption 2
• Decryption 3
• References 4

## Information required

To send an encrypted message to Bob using ECIES, Alice needs the following information:

• cryptographic suite to be used, including a key derivation function (e.g., ANSI-X9.63-KDF with SHA-1 option), a message authentication code (e.g., HMAC-SHA-1-160 with 160-bit keys or HMAC-SHA-1-80 with 80-bit keys) and a symmetric encryption scheme (e.g., TDEA in CBC mode or XOR encryption scheme)—noted E;
• elliptic curve domain parameters: (p,a,b,G,n,h) for a curve over a prime field or (m,f(x),a,b,G,n,h) for a curve over a binary field;
• Bob's public key: K_B (Bob generates it as follows: K_B = k_B G, where k_B is the private key he chooses at random: k_B \in [1, n-1]);
• optional shared information: S_1 and S_2.

## Encryption

To encrypt a message m Alice does the following:

1. generates a random number r \in [1, n-1] and calculates R = r G;
2. derives a shared secret: S = P_x, where P = (P_x, P_y) = r K_B (and P \ne O);
3. uses KDF to derive a symmetric encryption and a MAC keys: k_E \| k_M = \textrm{KDF}(S\|S_1);
4. encrypts the message: c = E(k_E; m);
5. computes the tag of encrypted message and S_2: d = \textrm{MAC}(k_M; c \| S_2);
6. outputs R \| c \| d.

## Decryption

To decrypt the ciphertext R \| c \| d Bob does the following:

1. derives the shared secret: S = P_x, where P = (P_x, P_y) = k_B R (it is the same as the one Alice derived because P = k_B R = k_B r G = r k_B G = r K_B), or outputs failed if P=O;
2. derives keys the same way as Alice did: k_E \| k_M = \textrm{KDF}(S\|S_1);
3. uses MAC to check the tag and outputs failed if d \ne \textrm{MAC}(k_M; c \| S_2);
4. uses symmetric encryption scheme to decrypt the message m = E^{-1}(k_E; c).

## References

• Victor Shoup, A proposal for an ISO standard for public key encryption, Version 2.1, December 20, 2001.
• Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, May 21, 2009.
• Gayoso Martínez, Hernández Encinas, Sánchez Ávila: A Survey of the Elliptic Curve Integrated Encryption Scheme, Journal of Computer Science and Engineering, 2, 2 (2010), 7-13.
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.

Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.