Elliptic Curve Cryptography (ECC) is gaining popularity among many security experts as an alternative to RSA for implementing cryptography with public keys. ECC is an encryption technique with public keys based on the theory of the elliptical curve and capable of creating faster, smaller and more efficient cryptographic keys. ECC generates keys through the properties of the elliptical curve equation. The release of a KEM-based hybrid encryption scheme consists of the KEM block which contains the encrypted symmetrical key (or certain parameters used for derivation) and the DEM block (data encapsulation mechanism), which contains encapsulated symmetrical encrypted data (figure-text setting – optional authentication tag). Key encapsulation (KEY) refers to the encryption of another key with a public key (symmetrical or asymmetrical). It is used to create reliable hybrid encryption schemes, such as.B. to encrypt a secret AES key by the stated public ECC key. Many protocols are based on asymmetric cryptography, including Transport Layer Security (TLS) and SSL (Secure Sockets Layer) protocols that allow access to HTTPS. The encryption process is also used in software – such as browsers — that must establish a secure connection via a secure network such as the Internet or validate a digital signature. In some advanced Man-in-the-Middle attacks, one side of the communication will see the original data, while the other will receive a malicious variant.
Man-in-middle asymmetrical attacks can prevent users from realizing that their connection is compromised. This also applies if one knows that one user`s data is compromised, because the data appears to be correct for the other user. This can lead to confusing disagreements between users, such as.B. “It must be at your end!”, if none of the users are responsible. Therefore, Man-in-the-Middle attacks can only be completely avoided if the communication infrastructure is physically controlled by one or both parties; z.B. by a wired route inside the sender`s building. In short, public keys are easier to change if the communications material used by a sender is controlled by an attacker.   In such a system, each person can encrypt a message with the recipient`s public key, but that encrypted message can only be deciphered with the recipient`s private key. For example, a server can generate z.B. a cryptographic key for cryptography with symmetrical keys, and then use a client`s utility key to encrypt that newly generated symmetrical key.
Now, the server can send this encrypted symmetrical key to the client on unsecured channels, and only the client can decipher it using the client`s pair of private keys with the public key used by the server to encrypt that message. Now that both the client and the server have the same symmetrical key, they can certainly switch to symmetrical key encryption to communicate safely across otherwise uncertain channels. The advantage is that symmetrical keys do not need manual advantages, while increasing the advantage of Kryptonian cryptography data flow with symmetrical keys compared to asymmetrical key cryptography. Examples of remarkable – but uncertain – key asymmetrical algorithms are that encryption should not be seen as the ultimate answer to an information security problem, but only as part of the security equation. This approach should always be taken into account when selecting a key public algorithm. However, before you look at an encryption project, you do a thorough analysis of the risks of your data and systems to determine what you need. It is obvious that high-risk data, such as sensitive customer data. B, require better encryption than marketing plans that, if passed down, would have a much smaller impact on the business. Lipiski, z. symmetrical and asymmetrical clutter of cryptographic keys