<s>
Integrated	B-Protocol
Encryption	I-Protocol
Scheme	I-Protocol
(	O
IES	O
)	O
is	O
a	O
hybrid	O
encryption	O
scheme	O
which	O
provides	O
semantic	O
security	O
against	O
an	O
adversary	B-General_Concept
who	O
is	O
able	O
to	O
use	O
chosen-plaintext	O
or	O
chosen-ciphertext	O
attacks	O
.	O
</s>
<s>
Two	O
variants	O
of	O
IES	O
are	O
specified	O
:	O
Discrete	O
Logarithm	O
Integrated	B-Protocol
Encryption	I-Protocol
Scheme	I-Protocol
(	O
DLIES	B-Protocol
)	O
and	O
Elliptic	O
Curve	O
Integrated	B-Protocol
Encryption	I-Protocol
Scheme	I-Protocol
(	O
ECIES	B-Protocol
)	O
,	O
which	O
is	O
also	O
known	O
as	O
the	O
Elliptic	O
Curve	O
Augmented	O
Encryption	O
Scheme	O
or	O
simply	O
the	O
Elliptic	O
Curve	O
Encryption	O
Scheme	O
.	O
</s>
<s>
As	O
a	O
brief	O
and	O
informal	O
description	O
and	O
overview	O
of	O
how	O
IES	O
works	O
,	O
a	O
Discrete	O
Logarithm	O
Integrated	B-Protocol
Encryption	I-Protocol
Scheme	I-Protocol
(	O
DLIES	B-Protocol
)	O
is	O
used	O
,	O
focusing	O
on	O
illuminating	O
the	O
reader	O
's	O
understanding	O
,	O
rather	O
than	O
precise	O
technical	O
details	O
.	O
</s>
<s>
Alice	O
then	O
computes	O
a	O
symmetric	B-Algorithm
key	I-Algorithm
using	O
this	O
information	O
and	O
a	O
key	B-Algorithm
derivation	I-Algorithm
function	I-Algorithm
(	O
KDF	B-Algorithm
)	O
as	O
follows	O
:	O
</s>
<s>
Alice	O
computes	O
her	O
ciphertext	O
from	O
her	O
actual	O
message	O
(	O
by	O
symmetric	B-Algorithm
encryption	I-Algorithm
of	O
)	O
encrypted	O
with	O
the	O
key	O
(	O
using	O
an	O
authenticated	O
encryption	O
scheme	O
)	O
as	O
follows	O
:	O
</s>
<s>
To	O
send	O
an	O
encrypted	O
message	O
to	O
Bob	O
using	O
ECIES	B-Protocol
,	O
Alice	O
needs	O
the	O
following	O
information	O
:	O
</s>
<s>
The	O
cryptography	O
suite	O
to	O
be	O
used	O
,	O
including	O
a	O
key	B-Algorithm
derivation	I-Algorithm
function	I-Algorithm
(	O
e.g.	O
,	O
ANSI-X9.63-KDF	O
with	O
SHA-1	O
option	O
)	O
,	O
a	O
message	B-Algorithm
authentication	I-Algorithm
code	I-Algorithm
(	O
e.g.	O
,	O
HMAC-SHA-1-160	O
with	O
160-bit	O
keys	O
or	O
HMAC-SHA-1-80	O
with	O
80-bit	O
keys	O
)	O
and	O
a	O
symmetric	B-Algorithm
encryption	I-Algorithm
scheme	I-Algorithm
(	O
e.g.	O
,	O
TDEA	B-Algorithm
in	O
CBC	O
mode	O
or	O
XOR	O
encryption	O
scheme	O
)	O
—	O
noted	O
.	O
</s>
<s>
uses	O
a	O
KDF	B-Algorithm
to	O
derive	O
symmetric	B-Algorithm
encryption	I-Algorithm
keys	O
and	O
MAC	B-Algorithm
keys	O
:	O
</s>
