Skip to content

Update README.md #60

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion asymmetric-key-ciphers/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Examples of such asymmetric encryption schemes are: [**RSA-OAEP**](https://en.wi

### Integrated Encryption Schemes

[**Integrated encryption schemes \(IES\)**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) are modern public key encryption schemes, which combine symmetric ciphers, asymmetric ciphers and key-derivation algorithms to provide secure **public-key based encryption** \(PKE\). In EIS scheme asymmetric algorithms \(like RSA or ECC\) are used to encrypt or encapsulate a symmetric key, used later by symmetric ciphers \(like AES or ChaCha20\) to encrypt the input message. Some EIS schemes provide also message authentication. Examples of EIS schemes are [**DLIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Discrete Logarithm Integrated Encryption Scheme\) and [**ECIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Elliptic Curve Integrated Encryption Scheme\).
[**Integrated encryption schemes \(IES\)**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) are modern public key encryption schemes, which combine symmetric ciphers, asymmetric ciphers and key-derivation algorithms to provide secure **public-key based encryption** \(PKE\). In IES scheme asymmetric algorithms \(like RSA or ECC\) are used to encrypt or encapsulate a symmetric key, used later by symmetric ciphers \(like AES or ChaCha20\) to encrypt the input message. Some IES schemes provide also message authentication. Examples of IES schemes are [**DLIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Discrete Logarithm Integrated Encryption Scheme\) and [**ECIES**](https://en.wikipedia.org/wiki/Integrated_Encryption_Scheme) \(Elliptic Curve Integrated Encryption Scheme\).

### Key Encapsulation Mechanisms \(KEMs\)

Expand Down