From 3c6a51390620926e50c0617e422819f5a804defa Mon Sep 17 00:00:00 2001 From: Jacob Nevins Date: Sun, 8 Dec 2024 11:41:02 +0000 Subject: [PATCH] Minimally document ML-KEM key exchange methods. --- doc/config.but | 6 ++++++ doc/index.but | 3 ++- 2 files changed, 8 insertions(+), 1 deletion(-) diff --git a/doc/config.but b/doc/config.but index a28e866c..fb836ec2 100644 --- a/doc/config.but +++ b/doc/config.but @@ -2385,6 +2385,12 @@ Curve25519-based method (one of those included in \q{ECDH}), in such a way that it should be no \e{less} secure than that commonly-used method, and hopefully also resistant to a new class of attacks. +\b \q{ML-KEM / Curve25519 hybrid} and \q{ML-KEM NIST ECDH hybrid}: +similar hybrid constructs of \i{ML-KEM}, another lattice-based key +exchange method intended to be \i{quantum-resistant}. In the former, +ML-KEM is hybridised with Curve25519; in the latter, with NIST P384 +or P256. + \b \q{\i{ECDH}}: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. diff --git a/doc/index.but b/doc/index.but index 35c479ff..94e2a477 100644 --- a/doc/index.but +++ b/doc/index.but @@ -699,7 +699,8 @@ saved sessions from \IM{Streamlined NTRU Prime} Streamlined NTRU Prime \IM{Streamlined NTRU Prime} NTRU Prime -\IM{quantum attacks} quantum attacks, resistance to +\IM{quantum attacks}{quantum-resistant} quantum attacks, resistance to +\IM{quantum attacks}{quantum-resistant} post-quantum algorithm \IM{repeat key exchange} repeat key exchange \IM{repeat key exchange} key exchange, repeat