RSA-based KEMs

In advance of lecture (Thursday 4/12), in which we will introduce the idea of a key-encapsulation mechanism (KEM), I’ve prepared a video that shows how to build a KEM from RSA, and gives a proof that it is a secure KEM in the ROM.  We’ll see in lecture how to build an efficient PKE scheme from a KEM and a symmetric encryption scheme.  Thus, you’ll see how to build a provably secure PKE scheme from RSA, via this design paradigm and the results of this video.

I’m posting the video now also because it is a second example of doing proofs in the ROM, and will be useful for a problem on HW5.

Advertisements

Author: Tom Shrimpton

Associate Professor of Computer Science, University of Florida

2 thoughts on “RSA-based KEMs”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s