mlkem
3 分钟阅读
注意
从go1.24.0开始才可以使用该包。
Overview
Package mlkem implements the quantum-resistant key encapsulation method ML-KEM (formerly known as Kyber), as specified in NIST FIPS 203.
Most applications should use the ML-KEM-768 parameter set, as implemented by DecapsulationKey768 and EncapsulationKey768.
Example
|
|
常量
|
|
变量
This section is empty.
函数
This section is empty.
类型
type DecapsulationKey1024
|
|
DecapsulationKey1024 is the secret key used to decapsulate a shared key from a ciphertext. It includes various precomputed values.
func GenerateKey1024
|
|
GenerateKey1024 generates a new decapsulation key, drawing random bytes from the default crypto/rand source. The decapsulation key must be kept secret.
func NewDecapsulationKey1024
|
|
NewDecapsulationKey1024 expands a decapsulation key from a 64-byte seed in the “d || z” form. The seed must be uniformly random.
(*DecapsulationKey1024) Bytes
|
|
Bytes returns the decapsulation key as a 64-byte seed in the “d || z” form.
The decapsulation key must be kept secret.
(*DecapsulationKey1024) Decapsulate
|
|
Decapsulate generates a shared key from a ciphertext and a decapsulation key. If the ciphertext is not valid, Decapsulate returns an error.
The shared key must be kept secret.
(*DecapsulationKey1024) EncapsulationKey
|
|
EncapsulationKey returns the public encapsulation key necessary to produce ciphertexts.
type DecapsulationKey768
|
|
DecapsulationKey768 is the secret key used to decapsulate a shared key from a ciphertext. It includes various precomputed values.
func GenerateKey768
|
|
GenerateKey768 generates a new decapsulation key, drawing random bytes from the default crypto/rand source. The decapsulation key must be kept secret.
func NewDecapsulationKey768
func NewDecapsulationKey768(seed []byte) (*DecapsulationKey768, error)
NewDecapsulationKey768 expands a decapsulation key from a 64-byte seed in the “d || z” form. The seed must be uniformly random.
(*DecapsulationKey768) Bytes
|
|
Bytes returns the decapsulation key as a 64-byte seed in the “d || z” form.
The decapsulation key must be kept secret.
(*DecapsulationKey768) Decapsulate
|
|
Decapsulate generates a shared key from a ciphertext and a decapsulation key. If the ciphertext is not valid, Decapsulate returns an error.
The shared key must be kept secret.
(*DecapsulationKey768) EncapsulationKey
|
|
EncapsulationKey returns the public encapsulation key necessary to produce ciphertexts.
type EncapsulationKey1024
|
|
An EncapsulationKey1024 is the public key used to produce ciphertexts to be decapsulated by the corresponding DecapsulationKey1024.
func NewEncapsulationKey1024
|
|
NewEncapsulationKey1024 parses an encapsulation key from its encoded form. If the encapsulation key is not valid, NewEncapsulationKey1024 returns an error.
(*EncapsulationKey1024) Bytes
|
|
Bytes returns the encapsulation key as a byte slice.
(*EncapsulationKey1024) Encapsulate
|
|
Encapsulate generates a shared key and an associated ciphertext from an encapsulation key, drawing random bytes from the default crypto/rand source.
The shared key must be kept secret.
type EncapsulationKey768
|
|
An EncapsulationKey768 is the public key used to produce ciphertexts to be decapsulated by the corresponding DecapsulationKey768.
func NewEncapsulationKey768
|
|
NewEncapsulationKey768 parses an encapsulation key from its encoded form. If the encapsulation key is not valid, NewEncapsulationKey768 returns an error.
(*EncapsulationKey768) Bytes
|
|
Bytes returns the encapsulation key as a byte slice.
(*EncapsulationKey768) Encapsulate
|
|
Encapsulate generates a shared key and an associated ciphertext from an encapsulation key, drawing random bytes from the default crypto/rand source.
The shared key must be kept secret.