23 releases (7 stable)
| 1.2.2 | Dec 10, 2025 |
|---|---|
| 1.1.0 | Nov 24, 2025 |
| 0.14.0-beta.7 | Sep 2, 2025 |
| 0.12.0-beta.1 | Jul 27, 2025 |
#446 in Cryptography
Used in 2 crates
2MB
40K
SLoC
Key Encapsulation Mechanisms
The dcrypt-kem crate provides a unified interface for various Key Encapsulation Mechanisms (KEMs), including both traditional and post-quantum cryptographic algorithms. It is designed with a strong focus on security, type safety, and ease of use, leveraging the dcrypt::api trait system.
This crate is part of the dcrypt cryptographic library.
Features
- Broad Algorithm Support: Includes classic ECDH-based KEMs over multiple standard curves and the NIST-standardized post-quantum KEM, CRYSTALS-Kyber.
- Security-First Design:
- Strongly-Typed Keys: Utilizes distinct types for public keys, secret keys, and ciphertexts (e.g.,
EcdhP256PublicKey,KyberSecretKey) to prevent misuse. - Zeroization: Secret key and shared secret materials are automatically zeroized on drop to minimize their lifetime in memory.
- Controlled Byte Access: Deliberately avoids generic
AsRef<[u8]>implementations on sensitive types, requiring explicit serialization calls. - Validation: Incoming keys and ciphertexts are validated to prevent common attacks, such as those involving invalid curve points.
- Strongly-Typed Keys: Utilizes distinct types for public keys, secret keys, and ciphertexts (e.g.,
no_stdCompatibility: Fully operational inno_stdenvironments with theallocfeature for heap-allocated types.- Extensive Testing: Comes with a comprehensive test suite and performance benchmarks for all implemented algorithms.
- Optional Serde Support: Provides
serdeintegration for key serialization and deserialization when theserdefeature is enabled.
Implemented Algorithms
The crate provides implementations for the following KEMs, accessible via the dcrypt::api::Kem trait.
| Category | Algorithm | Struct Name | Security Level | Status |
|---|---|---|---|---|
| Elliptic Curve | ECDH over NIST P-192 | EcdhP192 |
~80-bit | Implemented |
| Elliptic Curve | ECDH over NIST P-224 | EcdhP224 |
~112-bit | Implemented |
| Elliptic Curve | ECDH over NIST P-256 | EcdhP256 |
~128-bit | Implemented |
| Elliptic Curve | ECDH over NIST P-384 | EcdhP384 |
~192-bit | Implemented |
| Elliptic Curve | ECDH over NIST P-521 | EcdhP521 |
~256-bit | Implemented |
| Elliptic Curve | ECDH over secp256k1 | EcdhK256 |
~128-bit | Implemented |
| Elliptic Curve | ECDH over sect283k1 | EcdhB283k |
~142-bit | Implemented |
| Post-Quantum | CRYSTALS-Kyber-512 | Kyber512 |
NIST Level 1 | Implemented |
| Post-Quantum | CRYSTALS-Kyber-768 | Kyber768 |
NIST Level 3 | Implemented |
| Post-Quantum | CRYSTALS-Kyber-1024 | Kyber1024 |
NIST Level 5 | Implemented |
| Post-Quantum | LightSaber | LightSaber |
- | Placeholder |
| Post-Quantum | Saber | Saber |
- | Placeholder |
| Post-Quantum | FireSaber | FireSaber |
- | Placeholder |
| Post-Quantum | Classic McEliece 348864 | McEliece348864 |
NIST Level 1 | Placeholder |
| Post-Quantum | Classic McEliece 6960119 | McEliece6960119 |
NIST Level 5 | Placeholder |
| Traditional | Diffie-Hellman (2048-bit) | Dh2048 |
- | Placeholder |
Note: Algorithms marked as Placeholder are exposed in the API but do not yet contain a full cryptographic implementation.
Installation
Add the main dcrypt crate to your Cargo.toml:
[dependencies]
dcrypt = "0.12.0-beta.1"
rand = "0.8"
Usage Example
All KEMs in this crate implement the dcrypt::api::Kem trait, providing a consistent workflow.
Here is an example using EcdhP256:
use dcrypt::api::Kem;
use dcrypt::kem::ecdh::EcdhP256;
use rand::rngs::OsRng;
fn main() -> Result<(), Box<dyn std::error::Error>> {
let mut rng = OsRng;
// 1. A recipient generates a key pair.
let (public_key, secret_key) = EcdhP256::keypair(&mut rng)?;
// The recipient can now share `public_key` with senders.
// For example, by serializing it:
let pk_bytes = public_key.to_bytes();
// 2. A sender uses the recipient's public key to generate a
// shared secret and a ciphertext for transport.
let (ciphertext, shared_secret_sender) = EcdhP256::encapsulate(&mut rng, &public_key)?;
// The sender sends `ciphertext` to the recipient.
let ct_bytes = ciphertext.to_bytes();
// 3. The recipient uses their secret key to decapsulate the
// ciphertext and derive the same shared secret.
let shared_secret_recipient = EcdhP256::decapsulate(&secret_key, &ciphertext)?;
// 4. Both parties now possess the same shared secret.
assert_eq!(shared_secret_sender.to_bytes(), shared_secret_recipient.to_bytes());
println!("Successfully derived a shared secret!");
println!("Shared Secret Length: {} bytes", shared_secret_sender.to_bytes().len());
println!("Ciphertext Length: {} bytes", ct_bytes.len());
Ok(())
}
The same pattern applies to post-quantum algorithms like Kyber768:
use dcrypt::api::Kem;
use dcrypt::kem::kyber::Kyber768;
use rand::rngs::OsRng;
// --- snip ---
let mut rng = OsRng;
let (pk, sk) = Kyber768::keypair(&mut rng)?;
let (ct, ss1) = Kyber768::encapsulate(&mut rng, &pk)?;
let ss2 = Kyber768::decapsulate(&sk, &ct)?;
assert_eq!(ss1.to_bytes(), ss2.to_bytes());
println!("Kyber-768 shared secret derived successfully!");
// --- snip ---
Cargo Features
The dcrypt-kem crate provides the following features:
std(default): Enables functionality that depends on the Rust standard library.alloc: Enables usage of heap-allocated types. This is required forno_stdenvironments that have a heap allocator.no_std: Disablesstdsupport for use in bare-metal and embedded environments.serde: Enables serialization and deserialization of public key types via the Serde framework.
Benchmarks
The crate includes a comprehensive benchmark suite using criterion. To run the benchmarks and view the results:
cargo bench
The results will be available in the target/criterion/ directory. The benchmarks cover key generation, encapsulation, and decapsulation for all implemented algorithms, providing a clear view of their relative performance.
An ecdh_comparison suite is also included to directly compare the performance of the different elliptic curves.
License
This crate is licensed under the Apache License, Version 2.0.
Dependencies
~1.8–2.6MB
~50K SLoC