aboutsummaryrefslogtreecommitdiffstats
path: root/security-utils/src/main/java/com/yahoo/security/hpke/Kem.java
blob: 9a26f147f3043c46c58b7aea7e5938a539f1a802 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
// Copyright Vespa.ai. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.security.hpke;

import com.yahoo.security.KeyUtils;

import java.security.KeyPair;
import java.security.interfaces.XECPrivateKey;
import java.security.interfaces.XECPublicKey;

/**
 * Key encapsulation mechanism (KEM)
 *
 * @author vekterli
 */
public interface Kem {

    record EncapResult(byte[] sharedSecret, byte[] enc) { }

    /**
     * Section 4 Cryptographic Dependencies:
     * <blockquote>
     * "Randomized algorithm to generate an ephemeral, fixed-length symmetric key
     * (the KEM shared secret) and a fixed-length encapsulation of that key that can
     * be decapsulated by the holder of the private key corresponding to <code>pkR</code>"
     * </blockquote>
     */
    EncapResult encap(XECPublicKey pkR);

    /**
     * Section 4: Cryptographic Dependencies:
     * <blockquote>
     * "Same as <code>Encap()</code>, and the outputs encode an assurance that the KEM
     * shared secret was generated by the holder of the private key <code>skS</code>."
     * </blockquote>
     */
    EncapResult authEncap(XECPublicKey pkR, XECPrivateKey skS);

    /**
     * Section 4 Cryptographic Dependencies:
     * <blockquote>
     * "Deterministic algorithm using the private key <code>skR</code> to recover the
     * ephemeral symmetric key (the KEM shared secret) from its encapsulated
     * representation <code>enc</code>."
     * </blockquote>
     */
    byte[] decap(byte[] enc, XECPrivateKey skR);

    /**
     * Section 4 Cryptographic Dependencies:
     * <blockquote>
     * "Same as <code>Decap()</code>, and the recipient is assured that the KEM shared
     * secret was generated by the holder of the private key <code>skS</code>."
     * </blockquote>
     */
    byte[] authDecap(byte[] enc, XECPrivateKey skR, XECPublicKey pkS);

    /** The length in bytes of a KEM shared secret produced by this KEM. */
    short nSecret();
    /** The length in bytes of an encapsulated key produced by this KEM. */
    short nEnc();
    /** The length in bytes of an encoded public key for this KEM. */
    short nPk();
    /** The length in bytes of an encoded private key for this KEM. */
    short nSk();
    /** Predefined KEM ID, as given in RFC 9180 section 7.1 */
    short kemId();

    /**
     * @return a <code>HKEM(X25519, HKDF-SHA256)</code> instance that generates new ephemeral X25519
     *         key pairs from a secure random source per {@link #encap(XECPublicKey)} invocation.
     */
    static Kem dHKemX25519HkdfSha256() {
        return new DHKemX25519HkdfSha256(KeyUtils::generateX25519KeyPair);
    }

    record UnsafeDeterminsticKeyPairOnlyUsedByTesting(KeyPair keyPair) {}

    /**
     * Returns an unsafe test KEM that returns a single fixed, deterministic key pair.
     *
     * As the name implies, this must only ever be used in the context of testing. If anyone tries
     * to be clever and use this anywhere else, I will find them and bite them in the ankles!
     */
    static Kem dHKemX25519HkdfSha256(UnsafeDeterminsticKeyPairOnlyUsedByTesting testingKP) {
        return new DHKemX25519HkdfSha256(() -> testingKP.keyPair);
    }

}