Encapsulation Scheme

Some articles on encapsulation scheme, scheme:

Hybrid Cryptosystem
... can be constructed using any two separate cryptosystems a key encapsulation scheme, which is a public-key cryptosystem, and a data encapsulation scheme, which is a symmetric-key cryptosystem ... public and private keys are the same as in the key encapsulation scheme ... is done by the more efficient symmetric-key scheme, while the inefficient public-key scheme is used only to encrypt/decrypt a short key value ...
Hybrid Cryptosystem - Example
... a fresh symmetric key for the data encapsulation scheme ... Encrypts the message under the data encapsulation scheme, using the symmetric key just generated ... Encrypt the symmetric key under the key encapsulation scheme, using Alice's public key ...

Famous quotes containing the word scheme:

    The real security of Christianity is to be found in its benevolent morality, in its exquisite adaptation to the human heart, in the facility with which its scheme accommodates itself to the capacity of every human intellect, in the consolation which it bears to the house of mourning, in the light with which it brightens the great mystery of the grave.
    Thomas Babington Macaulay (1800–1859)