3 releases (breaking)

0.3.0-pre.0 Apr 17, 2024
0.2.0 May 26, 2022
0.1.0 Jan 3, 2022
0.0.0 Feb 9, 2021

#2649 in Cryptography

Download history 247/week @ 2024-08-01 240/week @ 2024-08-08 184/week @ 2024-08-15 96/week @ 2024-08-22 107/week @ 2024-08-29 110/week @ 2024-09-05 264/week @ 2024-09-12 239/week @ 2024-09-19 155/week @ 2024-09-26 152/week @ 2024-10-03 1222/week @ 2024-10-10 4907/week @ 2024-10-17 3899/week @ 2024-10-24 2634/week @ 2024-10-31 4072/week @ 2024-11-07 3503/week @ 2024-11-14

15,217 downloads per month
Used in 11 crates (9 directly)

Apache-2.0 OR MIT

9KB

RustCrypto: Key Encapsulation Mechanisms (KEMs)

crate Docs Apache2/MIT licensed Rust Version Project Chat Build Status

This crate provides a common set of traits for key encapsulation mechanisms—algorithms for non-interactively establishing secrets between peers. This is intended to be implemented by libraries which produce or contain implementations of key encapsulation mechanisms, and used by libraries which want to produce or consume encapsulated secrets while generically supporting any compatible backend.

The crate exposes two traits, Encapsulate and Decapsulate, which are both generic over the encapsulated key type and the shared secret type. They are also agnostic about the structure of Self. For example, a simple Saber implementation may just impl Encapsulate for a single public key:

// Must make a newtype to implement the trait
struct MyPubkey(SaberPublicKey);

impl Encapsulate<SaberEncappedKey, SaberSharedSecret> for MyPubkey {
    // Encapsulation is infallible
    type Error = !;

    fn encapsulate(
        &self,
        csprng: impl CryptoRngCore,
    ) -> Result<(SaberEncappedKey, SaberSharedSecret), !> {
        let (ss, ek) = saber_encapsulate(&csprng, &self.0);
        Ok((ek, ss))
    }
}

And on the other end of complexity, an X3DH implementation might impl Encapsulate for a public key bundle plus a sender identity key:

struct PubkeyBundle {
    ik: IdentityPubkey,
    spk: SignedPrePubkey,
    sig: Signature,
    opk: OneTimePrePubkey,
}

// Encap context is the recipient's pubkeys and the sender's identity key
struct EncapContext(PubkeyBundle, IdentityPrivkey);

impl Encapsulate<EphemeralKey, SharedSecret> for EncapContext {
    // Encapsulation fails if signature verification fails
    type Error = SigError;

    fn encapsulate(
        &self,
        csprng: impl CryptoRngCore,
    ) -> Result<(EphemeralKey, SharedSecret), Self::Error> {
        // Make a new ephemeral key. This will be the encapped key
        let ek = EphemeralKey::gen(&mut csprng);

        // Deconstruct the recipient's pubkey bundle
        let PubkeyBundle {
            ref ik,
            ref spk,
            ref sig,
            ref opk,
        } = self.0;
        let my_ik = &self.1;

        // Verify the signature
        self.0.verify(&sig, &some_sig_pubkey)?;

        // Do the X3DH operation to get the shared secret
        let shared_secret = x3dh_a(sig, my_ik, spk, &ek, ik, opk)?;

        Ok((ek, shared_secret))
    }
}

Documentation

Minimum Supported Rust Version

Rust 1.66 or higher.

Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump.

SemVer Policy

  • All on-by-default features of this library are covered by SemVer
  • MSRV is considered exempt from SemVer as noted above

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~78KB