José da Cruz
IT Architect: a blog about the daily life of

Hybrid Encryption

Hybrid Encryption

is a cryptographic approach that combines the benefits of both symmetric and asymmetric encryption.

  • Symmetric: the same secret key is used for both encryption and decryption.
  • Asymmetric: uses a pair of keys; public (encrypt) and private (decrypt).
  • Common steps:
    1. The sender obtains the recipient’s public key (ex: Browser from a web server).
    1. A random and temporary symmetric key is generated by the sender (to encrypt the data).
    1. The sender encrypts the data with the symmetric key.
    1. The symmetric key is encrypted with the recipient’s public key.
    1. The encrypted data and the encrypted symmetric key are sent to the recipient.
    1. The recipient decrypts the symmetric key using their private key and uses it to decrypt the data.
  • Examples: SSL/TLS (HTTPS), PGP, SSH, IPsec, S/MIME





Leave a Reply

Your email address will not be published. Required fields are marked *