International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption

Authors:
Javier Herranz
Dennis Hofheinz
Eike Kiltz
Download:
URL: http://eprint.iacr.org/2006/265
Search ePrint
Search Google
Abstract: The KEM/DEM hybrid encryption paradigm combines the efficiency and large message space of secret key encryption with the advantages of public key cryptography. Due to its simplicity and flexibility, the approach has ever since gained increased popularity and has been successfully adapted in encryption standards. In hybrid public key encryption (PKE), first a key encapsulation mechanism (KEM) is used to fix a random session key that is then fed into a highly efficient data encapsulation mechanism (DEM) to encrypt the actual message. A composition theorem states that if both the KEM and the DEM have the highest level of security (i.e. security against chosen-ciphertext attacks), then so does the hybrid PKE scheme. It is not known if these strong security requirements on the KEM and DEM are also neccessary, nor if such general composition theorems exist for weaker levels of security. In this work we study neccessary and sufficient conditions on the security of the KEM and the DEM in order to guarantee a hybrid PKE scheme with a certain given level of security. More precisely, using nine different security notions for KEMs, ten for DEMs, and six for PKE schemes we completely characterize which combinations lead to a secure hybrid PKE scheme (by proving a composition theorem) and which do not (by providing counterexamples). Furthermore, as an independent result, we revisit and extend prior work on the relation among security notions for KEMs and DEMs.
BibTeX
@misc{eprint-2006-21757,
  title={KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / key encapsulation mechanism, data encapsulation mechanism, hybrid encryption},
  url={http://eprint.iacr.org/2006/265},
  note={ kiltz@cwi.nl 13368 received 8 Aug 2006},
  author={Javier Herranz and Dennis Hofheinz and Eike Kiltz},
  year=2006
}