@hpke/hybridkem-x25519-kyber768

@hpke/hybridkem-x25519-kyber768

A TypeScript Hybrid Public Key Encryption (HPKE) module extension for the hybrid post-quantum KEM(X25519, Kyber768) compliant with X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE. The kyber implementation included in this module is based on ntontutoveanu/crystals-kyber-javascript published under the MIT license. Note that this module is EXPERIMENTAL and the referred specification has not been standardized yet.

Documentation: deno.land | pages (only for the latest ver.)

Index

Installation

Node.js

Using npm:

npm install @hpke/hybridkem-x25519-kyber768

Using yarn:

yarn add @hpke/hybridkem-x25519-kyber768

Deno

Using deno.land:

// use a specific version
import * as hpke from "https://deno.land/x/hpke@1.2.7/core/mod.ts";
import * as kyber from "https://deno.land/x/hpke@1.2.7/x/hybridkem-x25519-kyber768/mod.ts";

// use the latest stable version
import * as hpke from "https://deno.land/x/hpke/core/mod.ts";
import * as kyber from "https://deno.land/x/hpke/x/hybridkem-x25519-kyber768/mod.ts";

Web Browsers

Followings are how to use this module with typical CDNs. Other CDNs can be used as well.

Using esm.sh:

<!-- use a specific version -->
<script type="module">
import * as hpke from "https://esm.sh/@hpke/core@1.2.7";
import * as kyber from "https://esm.sh/@hpke/hybridkem-x25519-kyber768@1.2.7";
// ...
</script>

<!-- use the latest stable version -->
<script type="module">
import * as hpke from "https://esm.sh/@hpke/core";
import * as kyber from "https://esm.sh/@hpke/hybridkem-x25519-kyber768";
// ...
</script>

Using unpkg:

<!-- use a specific version -->
<script type="module">
import * as hpke from "https://unpkg.com/@hpke/core@1.2.7/esm/mod.js";
import * as kyber from "https://unpkg.com/@hpke/hybridkem-x25519-kyber768@1.2.7/esm/mod.js";
// ...
</script>

Cloudflare Workers

git clone git@github.com:dajiaji/hpke-js.git
cd hpke-js/x/hybridkem-x25519-kyber768
npm install -g esbuild
deno task dnt
deno task minify > $YOUR_SRC_PATH/hpke-hybridkem-x25519-kyber768.js

Usage

This section shows some typical usage examples.

Node.js

import { Aes128Gcm, CipherSuite, HkdfSha256 } from "@hpke/core";
import { HybridkemX25519Kyber768 } from "@hpke/hybridkem-x25519-kyber768";
// const { HybridkemX25519Kyber768 } = require("@hpke/hybridkem-x25519-kyber768");

async function doHpke() {
// setup
const suite = new CipherSuite({
kem: new HybridkemX25519Kyber768(),
kdf: new HkdfSha256(),
aead: new Aes128Gcm(),
});

const rkp = await suite.kem.generateKeyPair();

const sender = await suite.createSenderContext({
recipientPublicKey: rkp.publicKey,
});

// encrypt
const ct = await sender.seal(new TextEncoder().encode("Hello world!"));

const recipient = await suite.createRecipientContext({
recipientKey: rkp.privateKey,
enc: sender.enc,
});

// decrypt
const pt = await recipient.open(ct);

// Hello world!
console.log(new TextDecoder().decode(pt));
}

try {
doHpke();
} catch (err) {
console.log("failed:", err.message);
}

Deno

import { Aes128Gcm, CipherSuite, HkdfSha256 } from "https://deno.land/x/hpke@1.2.7/core/mod.ts";
import { HybridkemX25519Kyber768 } from "https://deno.land/x/hpke@1.2.7/x/hybridkem-x25519-kyber768/mod.ts";

async function doHpke() {
// setup
const suite = new CipherSuite({
kem: new HybridkemX25519Kyber768(),
kdf: new HkdfSha256(),
aead: new Aes128Gcm(),
});

const rkp = await suite.kem.generateKeyPair();

const sender = await suite.createSenderContext({
recipientPublicKey: rkp.publicKey,
});

// encrypt
const ct = await sender.seal(new TextEncoder().encode("Hello world!"));

const recipient = await suite.createRecipientContext({
recipientKey: rkp.privateKey,
enc: sender.enc,
});

// decrypt
const pt = await recipient.open(ct);

// Hello world!
console.log(new TextDecoder().decode(pt));
}

try {
doHpke();
} catch (_err: unknown) {
console.log("failed.");
}

Browsers

<html>
<head></head>
<body>
<script type="module">
import { Aes128Gcm, CipherSuite, HkdfSha256 } from "https://esm.sh/@hpke/core@1.2.7";
import { HybridkemX25519Kyber768 } from "https://esm.sh/@hpke/hybridkem-x25519-kyber768@1.2.7";

globalThis.doHpke = async () => {
try {
const suite = new CipherSuite({
kem: new HybridkemX25519Kyber768(),
kdf: new HkdfSha256(),
aead: new Aes128Gcm(),
});

const rkp = await suite.kem.generateKeyPair();

const sender = await suite.createSenderContext({
recipientPublicKey: rkp.publicKey
});
// encrypt
const ct = await sender.seal(new TextEncoder().encode("Hello world!"));

const recipient = await suite.createRecipientContext({
recipientKey: rkp.privateKey, // rkp (CryptoKeyPair) is also acceptable.
enc: sender.enc,
});

// decrypt
const pt = await recipient.open(ct);

// Hello world!
alert(new TextDecoder().decode(pt));
} catch (err) {
alert("failed:", err.message);
}
}
</script>
<button type="button" onclick="doHpke()">do HPKE</button>
</body>
</html>

Contributing

We welcome all kind of contributions, filing issues, suggesting new features or sending PRs.

Generated using TypeDoc