Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion asymmetric-key-ciphers/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Examples of such asymmetric encryption schemes are: [**RSA-OAEP**](https://en.wi

### Integrated Encryption Schemes

[**Integrated encryption schemes \(IES\)**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) are modern public key encryption schemes, which combine symmetric ciphers, asymmetric ciphers and key-derivation algorithms to provide secure **public-key based encryption** \(PKE\). In EIS scheme asymmetric algorithms \(like RSA or ECC\) are used to encrypt or encapsulate a symmetric key, used later by symmetric ciphers \(like AES or ChaCha20\) to encrypt the input message. Some EIS schemes provide also message authentication. Examples of EIS schemes are [**DLIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Discrete Logarithm Integrated Encryption Scheme\) and [**ECIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Elliptic Curve Integrated Encryption Scheme\).
[**Integrated encryption schemes \(IES\)**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) are modern public key encryption schemes, which combine symmetric ciphers, asymmetric ciphers and key-derivation algorithms to provide secure **public-key based encryption** \(PKE\). In IES scheme asymmetric algorithms \(like RSA or ECC\) are used to encrypt or encapsulate a symmetric key, used later by symmetric ciphers \(like AES or ChaCha20\) to encrypt the input message. Some IES schemes provide also message authentication. Examples of IES schemes are [**DLIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Discrete Logarithm Integrated Encryption Scheme\) and [**ECIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Elliptic Curve Integrated Encryption Scheme\).

### Key Encapsulation Mechanisms \(KEMs\)

Expand Down