Questions tagged [ecies]

Elliptic Curve Integrated Encryption Scheme (ECIES) is a public key encryption system proposed by Victor Shoup in 2001. It uses hybrid cryptography using ephemeral-static Diffie-Hellman together with an unspecified symmetric cipher.

Elliptic Curve Integrated Encryption Scheme (ECIES) is a public key encryption system proposed by Victor Shoup in 2001.

ECIES is part of a family of schemes known as Diffie-Hellman Integrated Encryption Scheme (DHIES). In 2001 these schemes were known as Diffie-Hellman Authenticates Encryption Schemes (DHAES), and proposed by Abdalla, Bellare, and Rogaway.

A specific description of ECIES can be found in chapter 5.1 of the Certicom specification of ECC based schemes in the SEC-1 document.

60 questions
6
votes
2 answers

ECIES need for KDF

Reading the ECIES algorithms (and elgamal in general), the general wisdom is to use a KDF and MAC on the shared secret before using it for encryption of ciphertext. I suspect, however, this was because the encryption used was XOR (for data sizes…
Erik Aronesty
  • 440
  • 2
  • 14
2
votes
1 answer

How does the UE communicate its ephemeral public key to the HN in 5G networks?

I have been taking a look at ETSI TS 133 501 V16.3.0 to see how exactly does a User Equipment actually authenticates itself to the Home Network. This is supposed to be done during the AKA procedure, but when I look at it, the HN is able to retrieve…
0
votes
0 answers

Could be generated a symmetric key for every message?

I would like to use IES (x25519 and AES-GCM), but every message used a new session key, does that affect the performance of the system? do I need to used session key to refer to the key that used by previous session? For example, Assume Alice…
Aymn Alaney
  • 461
  • 7
  • 18
0
votes
1 answer

ECIES is must with Symmetric?(ECIES-AES or ECIES-TDES)

I can't understand the ECIES algorithm. I saw two different ECIES algorithms: Using only Public key Key generation: $A_{pri} : n_A$ $A_{pub} : n_A G$ $B_{pri} : n_B$ $B_{pub} : n_B G$ Encryption: Select a random $k$. A -> B to Cipher C : $\{kG,…
pftpmlp
  • 77
  • 1
  • 4
0
votes
0 answers

BouncyCastle -- Sending ECDH Derivation and Encoding Vectors in the Clear

So Alice is sending a one-way message to Bob. Alice and Bob both, of course, have their own ECDH private keys, as well as each other's public keys. I am using BouncyCastle 2.2.1 (BC) in this code. It appears (am I wrong?) that Alice and Bob must…