Crates.io | kem |
lib.rs | kem |
version | 0.3.0-pre.0 |
source | src |
created_at | 2021-02-09 15:11:10.232649 |
updated_at | 2024-04-17 15:01:27.548535 |
description | Traits for key encapsulation mechanisms |
homepage | |
repository | https://github.com/RustCrypto/traits/tree/master/kem |
max_upload_size | |
id | 352809 |
size | 17,613 |
This crate provides a common set of traits for key encapsulation mechanisms—algorithms for non-interactively establishing secrets between peers. This is intended to be implemented by libraries which produce or contain implementations of key encapsulation mechanisms, and used by libraries which want to produce or consume encapsulated secrets while generically supporting any compatible backend.
The crate exposes two traits, Encapsulate
and Decapsulate
, which are both generic over the encapsulated key type and the shared secret type. They are also agnostic about the structure of Self
. For example, a simple Saber implementation may just impl Encapsulate
for a single public key:
// Must make a newtype to implement the trait
struct MyPubkey(SaberPublicKey);
impl Encapsulate<SaberEncappedKey, SaberSharedSecret> for MyPubkey {
// Encapsulation is infallible
type Error = !;
fn encapsulate(
&self,
csprng: impl CryptoRngCore,
) -> Result<(SaberEncappedKey, SaberSharedSecret), !> {
let (ss, ek) = saber_encapsulate(&csprng, &self.0);
Ok((ek, ss))
}
}
And on the other end of complexity, an X3DH implementation might impl Encapsulate
for a public key bundle plus a sender identity key:
struct PubkeyBundle {
ik: IdentityPubkey,
spk: SignedPrePubkey,
sig: Signature,
opk: OneTimePrePubkey,
}
// Encap context is the recipient's pubkeys and the sender's identity key
struct EncapContext(PubkeyBundle, IdentityPrivkey);
impl Encapsulate<EphemeralKey, SharedSecret> for EncapContext {
// Encapsulation fails if signature verification fails
type Error = SigError;
fn encapsulate(
&self,
csprng: impl CryptoRngCore,
) -> Result<(EphemeralKey, SharedSecret), Self::Error> {
// Make a new ephemeral key. This will be the encapped key
let ek = EphemeralKey::gen(&mut csprng);
// Deconstruct the recipient's pubkey bundle
let PubkeyBundle {
ref ik,
ref spk,
ref sig,
ref opk,
} = self.0;
let my_ik = &self.1;
// Verify the signature
self.0.verify(&sig, &some_sig_pubkey)?;
// Do the X3DH operation to get the shared secret
let shared_secret = x3dh_a(sig, my_ik, spk, &ek, ik, opk)?;
Ok((ek, shared_secret))
}
}
Rust 1.66 or higher.
Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump.
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.