Differences
This shows you the differences between the selected revisions of the page.
2023-05-24 | 2025-01-28 | ||
6.1 stable released (martin) | 6.4.2 Implement the post-quantum ML-KEM key encapsulation method. ml-kem (martin) | ||
Line 24: | Line 24: | ||
* //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks. | * //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks. | ||
+ | * //ML-KEM / Curve25519 hybrid// and //ML-KEM NIST ECDH hybrid//: similar hybrid constructs of //ML-KEM//, another lattice-based key exchange method intended to be quantum-resistant. In the former, ML-KEM is hybridised with Curve25519; in the latter, with NIST P384 or P256. &beta_feature | ||
* //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes: | * //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes: | ||
* //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function. | * //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function. |