HPKE and Me
An intro into Hybrid Public Key Encryption
Asymmetric and Symmetric Key Encryption: A Refresher
In all of us lives two wolves: asymmetric and symmetric encryption.
Symmetric Key Encryption
Symmetric key encryption is the simplest and oldest form of secure communication. It dates back to the Caesar days.
The Caesar cipher is an encryption scheme that works by applying a fixed char "rotation" for each character in the plaintext. Messages can be decrypted by applying the reverse of the "rotation key". These days keys are a lot more complex, but the idea of sharing a single key to decrypt AND encrypt a message still stands.
Symmetric key encryption is cheap and efficient, but it has its drawbacks:
-
The biggest drawback is key distribution. Symmetric key schemes necessitate a way to communicate a key between two parties without interception from a third party. If the symmetric key gets out, all bets are off. Present and past communication (symmetric keys lack forward secrecy) could be decrypted.
-
There is no authentication that the sender is who they say they are. Anyone with the encryption key could send a message impersonating the sender and the recipient would have no clue.
This concept is known as "non-repudiation".
-
Scaling symmetric key communication is a nightmare. If one wanted to communicate with a group of individuals, each member of that group would need their own private key to communicate with each other. The number of keys needed scales non-linearly:
- 2 users (*1 key* A->B) - 3 users (*3 keys* {A->B, A->C, B->C}) - 4 users (*6 keys* {A->B, A->C, A->D, B->C, B->D, C->D})
Now imagine all of the infrastructure (storage AND distribution) needed to handle all of these keys. Every time a new member is added everyone needs their symmetric key. And if we need to do key rotation (which we do) then just forget about it.
You (Probably): "Uh, why don't they just all use the same symmetric key?"
If every individual in the party uses the same key and that key is compromised, everyone's communication is compromised. This is unacceptable in nearly every scenario. By giving every pair their own encrypted channel, one compromise doesn't invalidate our entire encryption model.
TLDR: Symmetric key encryption is cheap and easy to reason about on a small scale. However, it lacks the ability to provide a sufficient trust model (non-repudiation) and it scales poorly past a handful of messengers.
Asymmetric Key Encryption
Asymmetric encryption utilizes two keys: a private key and a public key. The two parties (Alice and Bob) both generate a private and public key pair. To communicate they distribute the public key to each other. Messages are encrypted via the public key and can only be decrypted via the private key.
While asymmetric key encryption is more computationally expensive, it provides a number of benefits:
-
Key distribution (the major problem with symmetric encryption) is easy now. Just advertise your public key to everyone. Malicious actors can't do much with the public key, aside from send encrypted messages. All of the prior, future, and present communication is still impenetrable, because the private key is needed to decrypt any traffic.
-
Using multiple non-symmetric keys provides the ability to authenticate the recipient. Only the person in possession of the private key is able to decrypt messages that were encrypted with the public key. This helps solve the non-repudiation aspect of the symmetric key scheme. Through some slightly more complicated magic, the sender's own private and public keypair could be used to authenticate the sender as well, but I won't be going into this here.
Hybrid Public Key Encryption (HPKE)
The astute among you may see where this is headed. Let's take a look at the lay of the land:
-
Symmetric key encryption is computationally cheap.
-
Symmetric keys are difficult to distribute.
-
Asymmetric keys are more computationally expensive.
-
Asymmetric keys are easy to distribute.
What if we put the proverbial PB with the J?
Enter HPKE:
Hybrid Public Key Encryption combines the inexpensiveness of symmetric key schemes with the robust security guarantees of asymmetric key schemes.
The flow is like this (I'll use a server <-> client model here):
-
The server generates a keypair{public_key, private_key}.
-
The public key is distributed in plaintext to everyone.
-
A client can use the public key to derive and encapsulate a symmetric key that is sent alongside its message (which is encrypted with the symmetric key).
-
The server can then use its private key to decap the symmetric key and decrypt the message.
Here we retain the encryption guarantees of asymmetric encryption, but without requiring the user to generate a keypair. This process allows for quick "one-shot" encryption messages to be sent with little overhead. A user can simply encrypt its message via the public key, do a small computation to generate the symmetric key, and then send. Most of the cryptographic computations are moved server-side, which is great for our current "mobile first" internet.
Key Encapsulation Mechanism
"A client can use the public key to derive and encapsulate a symmetric key that is sent alongside its message"
This point requires some nuance. Notice that I say derive and encapsulate, not just "encrypt". This is an important distinction.
The symmetric key is not just encrypted via the public key. Doing so voids any notion of forward secrecy. If the private key is ever compromised, all of the communication (past and present) can be decrypted.
KEMs (Key Encapsulation Mechanism) help us here. KEMs produce an ephemeral "encapsulation key" (EK). The EK is used to derive the symmetric key via a Key Derivation Function (KDF). The message is encrypted via the symmetric key and only the EK and the encrypted message is sent. The KDF typically contains some extra context about the communication itself. The context + public key is used to derive the symmetric key.
The important thing to note is that the symmetric key is never transmitted over the wire. Only the encapsulation key is. If the private key is ever compromised, only the information from the current session can be decrypted, since the EK is a random value that is generated per session. The EK is ephemeral and should never leave the system's memory.
Real-World Applications
HPKE forms the foundation for many modern secure communication protocols. For example, the Encrypted Client Hello TLS1.3 extension utilizes HPKE to provide encryption of the Client Hello TLS handshake message. The Signal protocol, which powers encrypted messaging in apps like WhatsApp and Signal, also uses HPKE techniques to provide secure communication. Both protocols are great examples of the modern cryptography landscape btw, I may write about them in the near future.
References:
- RFC9180 - The official HPKE specification
- Cloudflare Blog on HPKE - A more in-depth dive into HPKE