Expand description
Asymmetric cryptography algorithms and key management.
非对称密码算法和密钥管理。
§Overview | 概述
This module provides asymmetric (public-key) cryptographic algorithms that enable secure communication without prior key exchange. It includes both traditional algorithms and post-quantum cryptography for future security.
此模块提供非对称(公钥)密码算法,无需事先密钥交换即可实现安全通信。 它包括传统算法和后量子密码学以确保未来安全。
§Algorithm Categories | 算法分类
§Key Encapsulation Mechanisms (KEM) | 密钥封装机制
- RSA: Traditional public-key cryptosystem
- Kyber: Post-quantum lattice-based KEM (NIST standard)
§Digital Signatures | 数字签名
- Ed25519: Edwards curve signatures (high performance)
- ECDSA P-256: NIST standard elliptic curve signatures
- Dilithium: Post-quantum lattice-based signatures (NIST standard)
§Key Agreement | 密钥协商
- ECDH P-256: Elliptic Curve Diffie-Hellman
§Security Considerations | 安全考虑
§Traditional vs Post-Quantum | 传统 vs 后量子
-
Traditional algorithms (RSA, ECDSA, ECDH): Secure against classical computers
-
Post-quantum algorithms (Kyber, Dilithium): Secure against quantum computers
-
传统算法(RSA、ECDSA、ECDH):对经典计算机安全
-
后量子算法(Kyber、Dilithium):对量子计算机安全
§Migration Strategy | 迁移策略
For long-term security, consider hybrid approaches or gradual migration to post-quantum algorithms as they become more widely adopted.
为了长期安全,考虑混合方法或随着后量子算法更广泛采用而逐步迁移。
Modules§
- kem
- Key Encapsulation Mechanism (KEM) algorithms.
- key_
agreement - Key agreement algorithms for establishing shared secrets.
- signature
- Digital signature algorithms for authentication and non-repudiation.
Structs§
- Asymmetric
Algorithm Builder - Builder for constructing asymmetric algorithm instances.
Enums§
- Asymmetric
Algorithm - Asymmetric cryptography algorithm enumeration.