Differences

This shows you the differences between the selected revisions of the page.

2025-01-28 2025-03-31 (current)
dash for better rendering (martin) stable 6.5 released (martin)
Line 24: Line 24:
  * //NTRU Prime / Curve25519 hybrid// – Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks.   * //NTRU Prime / Curve25519 hybrid// – Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks.
-  * //ML-KEM / Curve25519 hybrid// and //ML-KEM NIST ECDH hybrid// – similar hybrid constructs of //ML-KEM//, another lattice-based key exchange method intended to be quantum-resistant. In the former, ML-KEM is hybridised with Curve25519; in the latter, with NIST P384 or P256. &beta_feature+  * //ML-KEM / Curve25519 hybrid// and //ML-KEM NIST ECDH hybrid// – similar hybrid constructs of //ML-KEM//, another lattice-based key exchange method intended to be quantum-resistant. In the former, ML-KEM is hybridised with Curve25519; in the latter, with NIST P384 or P256.
  * //ECDH// – elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:   * //ECDH// – elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:
    * //Group 18// – a well-known 8192-bit group, used with the SHA-512 hash function.     * //Group 18// – a well-known 8192-bit group, used with the SHA-512 hash function.

Last modified: by martin