Module asymmetric

Source
Expand description

Asymmetric cryptography algorithms and key management.

非对称密码算法和密钥管理。

§Overview | 概述

This module provides asymmetric (public-key) cryptographic algorithms that enable secure communication without prior key exchange. It includes both traditional algorithms and post-quantum cryptography for future security.

此模块提供非对称(公钥)密码算法,无需事先密钥交换即可实现安全通信。 它包括传统算法和后量子密码学以确保未来安全。

§Algorithm Categories | 算法分类

§Key Encapsulation Mechanisms (KEM) | 密钥封装机制

  • RSA: Traditional public-key cryptosystem
  • Kyber: Post-quantum lattice-based KEM (NIST standard)

§Digital Signatures | 数字签名

  • Ed25519: Edwards curve signatures (high performance)
  • ECDSA P-256: NIST standard elliptic curve signatures
  • Dilithium: Post-quantum lattice-based signatures (NIST standard)

§Key Agreement | 密钥协商

  • ECDH P-256: Elliptic Curve Diffie-Hellman

§Security Considerations | 安全考虑

§Traditional vs Post-Quantum | 传统 vs 后量子

  • Traditional algorithms (RSA, ECDSA, ECDH): Secure against classical computers

  • Post-quantum algorithms (Kyber, Dilithium): Secure against quantum computers

  • 传统算法(RSA、ECDSA、ECDH):对经典计算机安全

  • 后量子算法(Kyber、Dilithium):对量子计算机安全

§Migration Strategy | 迁移策略

For long-term security, consider hybrid approaches or gradual migration to post-quantum algorithms as they become more widely adopted.

为了长期安全,考虑混合方法或随着后量子算法更广泛采用而逐步迁移。

Modules§

kem
Key Encapsulation Mechanism (KEM) algorithms.
key_agreement
Key agreement algorithms for establishing shared secrets.
signature
Digital signature algorithms for authentication and non-repudiation.

Structs§

AsymmetricAlgorithmBuilder
Builder for constructing asymmetric algorithm instances.

Enums§

AsymmetricAlgorithm
Asymmetric cryptography algorithm enumeration.