2 unstable releases
0.2.0 | Jun 23, 2024 |
---|---|
0.1.0 | Jun 22, 2024 |
#1358 in Cryptography
22KB
371 lines
PQX
Exchange keys using X25519 and PQC-Kyber to be quantum-resistant.
Usage
# Cargo.toml
[dependencies]
pqx = "0.1"
// main.rs
use std::sync::mpsc::channel;
use std::time::Duration;
use std::thread;
use pqx::*;
let (sender1, receiver1) = channel();
let (sender2, receiver2) = channel();
let thread = thread::spawn(move || {
let bob_s = Combinedkey::default();
let bob_p = Combinedpub::new(&bob_s);
sender1.send(bob_p).unwrap();
let cipher = receiver2.recv_timeout(Duration::new(60,0)).unwrap();
let cipher = Combinedcipher::from(cipher);
Combinedshared::new(bob_s, cipher).unwrap()
});
let alice_s = Combinedkey::default();
let pubkey = receiver1.recv_timeout(Duration::new(60,0)).unwrap();
let kyberelem = Combinedcipher::new(&alice_s,&pubkey).unwrap();
sender2.send(kyberelem.getcipher()).unwrap();
let shared = Combinedshared::getfromshared(kyberelem, pubkey, alice_s).unwrap().getshared(SHAREDSIZE::Med);
let result = thread.join().unwrap().getshared(SHAREDSIZE::Med);
assert!(shared==result,"Invalid shared, got {:#?} and {:#?}",shared,result);
//println!("Valid shared, got {}",hex::encode(shared.get()))
Informations
This crate has not undergone any security audit and should be used with caution.
Dependencies
~2–11MB
~150K SLoC