Usage
First, load the package:
import NistyPQC
Then, pick a seeded pseudorandom number generator:
import Random
NistyPQC.set_rng(Random.MersenneTwister(4711))
Random.MersenneTwister(4711)
This last step is only necessary to guarantee reproducible outputs below.
KEM
The key encapsulation mechanisms in this package all implement the following common interface:
(; ek, dk) = generate_keys()
(; K, c) = encapsulate_secret(ek)
K = decapsulate_secret(c, dk)
Here, all of ek
, dk
, K
, and c
are byte vectors.
Example
For instance, to work with ML-KEM in security category 5 define:
KEM = NistyPQC.MLKEM.Category5
NistyPQC.MLKEM.Category5
Generate a key pair for encapsulation and decapsulation:
(; ek, dk) = KEM.generate_keys()
(ek = UInt8[0x1e, 0xf7, 0x9d, 0xc3, 0x3a, 0xbe, 0x57, 0x23, 0xa5, 0x9c … 0x91, 0x59, 0x27, 0x07, 0x94, 0xb4, 0x88, 0xd8, 0x67, 0x1d], dk = UInt8[0x4a, 0x79, 0xa3, 0x5c, 0xc6, 0x9c, 0xd9, 0x70, 0x3c, 0x63 … 0x3c, 0x39, 0xc6, 0xc7, 0x2c, 0xdd, 0xb3, 0x54, 0x41, 0x09])
Use the encapsulation key ek
to produce a shared secret K
and a ciphertext c
:
(; K, c) = KEM.encapsulate_secret(ek)
(K = UInt8[0x1a, 0x2a, 0xe9, 0x9c, 0xd9, 0x5b, 0x35, 0xc3, 0xe6, 0x3e … 0xac, 0x0c, 0x28, 0xe6, 0xf5, 0x37, 0xc1, 0x66, 0x95, 0xb8], c = UInt8[0x66, 0xca, 0x48, 0x05, 0xe1, 0x4f, 0xd3, 0x77, 0xa7, 0xa1 … 0xbb, 0x44, 0xf3, 0x98, 0x52, 0xa6, 0x58, 0xab, 0x7f, 0xb4])
With the knowledge of the decapsulation key dk
alone, it is then possible to compute K
from c
:
K == KEM.decapsulate_secret(c, dk)
true
DSA
The digital signature algorithms in this package all implement the following common interface:
(; sk, pk) = generate_keys()
sig = sign_message(msg, sk)
verify_signature(msg, sig, pk)
Here, all of sk
, pk
, msg
, and sig
are byte vectors.
Example
For instance, to work with ML-DSA in security category 5 define:
DSA = NistyPQC.MLDSA.Category5
NistyPQC.MLDSA.Category5
Generate a key pair for signature generation and verification:
(; sk, pk) = DSA.generate_keys()
(sk = UInt8[0x6f, 0xde, 0x80, 0x88, 0x11, 0xed, 0x6d, 0x3f, 0x4a, 0xab … 0xb2, 0x4f, 0x22, 0x9c, 0x91, 0x91, 0xf8, 0xda, 0x38, 0x8e], pk = UInt8[0x6f, 0xde, 0x80, 0x88, 0x11, 0xed, 0x6d, 0x3f, 0x4a, 0xab … 0xed, 0x22, 0xbb, 0xf2, 0xa9, 0xdc, 0xfd, 0xbc, 0xe6, 0x46])
Use the secret key sk
to generate a signature for some message msg
:
msg = b"Sign me!"
sig = DSA.sign_message(msg, sk)
4627-element Vector{UInt8}:
0x23
0xf1
0x4a
0xdb
0x2a
0xe7
0x0d
0x78
0xb6
0x69
⋮
0x00
0x08
0x0a
0x10
0x17
0x1e
0x25
0x2e
0x33
With the public key pk
alone, it is then possible to check whether the signature for a message was indeed generated with the secret key sk
:
DSA.verify_signature(msg, sig, pk)
true
DSA.verify_signature(b"another message", sig, pk)
false
DSA.verify_signature(msg, b"invalid signature", pk)
false