Podcast
Root Causes 270: What Is the Difference Between KEM and PKE?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 20, 2023
One of the little known changes that has come to the world of TLS is that the secret handshake and key exchange updated from Public Key Exchange (PKE) to Key Encapsulation Methods (KEM). In this episode we explain the difference between the two methods and why this change is taking place.
Podcast Transcript
Lightly edited for flow and brevity.
The problem with public private key encryption is that it’s not really efficient when you are trying to encrypt large blocks of data. So, in other words, a web stream such as communication between your browser and web server. That is best done by symmetric encryption. And so, therefore, whenever you are making these decisions, SSL, right, the traditional web server use case, there is initially a handshake - a TLS 1.3 currently handshake – but then, of course, all the rest of the communication that is occurring. So you get the best of both worlds. You get this we don’t know each other yet and then we get the now we have a very, very safely established encrypted communication between each other. That is efficient. Efficiently encrypted with symmetric key encryption. So you get the best of both worlds.
I think some of the reasons why you are starting to see a lot more of KEM within the postquantum algorithms that were selected for standardization is because of the fact that quantum is just different, Tim. Quantum is different so therefore there is a lot that has to be communicated between the process even of any kind of a handshake. And so therefore, that automatic generation of a symmetric key just made sense. Sometimes it’s just because of the constraints of the way that quantum algorithm works. But it’s typically because something needs to be communicated in order for the communication to occur and therefore a KEM just makes more sense.
So, in other words, we are starting to get now in these conversations – this is a great conversation, because we are starting to get into the guts of what’s it gonna take. What’s it gonna take for public trust to start using post quantum algorithms and, hey, that big use case of the TLS handshake that happens at the web browser, web server level, that has to be rethought out because of the fact that the cryptographic algorithm is fundamentally different.

