Differences

This shows you the differences between the selected revisions of the page.

2023-05-24 2025-01-28
6.1 stable released (martin) 6.4.2 Implement the post-quantum ML-KEM key encapsulation method. ml-kem (martin)
Line 24: Line 24:
  * //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks.   * //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks.
 +  * //ML-KEM / Curve25519 hybrid// and //ML-KEM NIST ECDH hybrid//: similar hybrid constructs of //ML-KEM//, another lattice-based key exchange method intended to be quantum-resistant. In the former, ML-KEM is hybridised with Curve25519; in the latter, with NIST P384 or P256. &beta_feature
  * //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:   * //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:
    * //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function.     * //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function.

Last modified: by martin