@openforge-sh/liboqs - v0.14.3
    Preparing search index...

    Class FrodoKEM976AES

    FrodoKEM-976-AES key encapsulation mechanism wrapper class

    FrodoKEM976AES

    High-level wrapper for FrodoKEM-976-AES KEM operations. Provides secure key generation, encapsulation, and decapsulation with automatic memory management.

    Memory Management:

    • All WASM memory is managed internally
    • Call destroy() when finished to free resources
    • Do not use instance after calling destroy()
    const kem = await createFrodoKEM976AES();

    // Generate keypair
    const { publicKey, secretKey } = kem.generateKeyPair();

    // Encapsulate
    const { ciphertext, sharedSecret } = kem.encapsulate(publicKey);

    // Decapsulate
    const recoveredSecret = kem.decapsulate(ciphertext, secretKey);

    // Cleanup
    kem.destroy();
    Index

    Accessors

    • get info(): {
          name: "FrodoKEM-976-AES";
          identifier: "FrodoKEM-976-AES";
          type: "kem";
          securityLevel: 3;
          standardized: false;
          description: string;
          keySize: {
              publicKey: 15632;
              secretKey: 31296;
              ciphertext: 15744;
              sharedSecret: 24;
          };
      }

      Get algorithm information

      Returns {
          name: "FrodoKEM-976-AES";
          identifier: "FrodoKEM-976-AES";
          type: "kem";
          securityLevel: 3;
          standardized: false;
          description: string;
          keySize: {
              publicKey: 15632;
              secretKey: 31296;
              ciphertext: 15744;
              sharedSecret: 24;
          };
      }

      Algorithm metadata

      console.log(kem.info.name);           // 'FrodoKEM-976-AES'
      console.log(kem.info.securityLevel); // 3
      console.log(kem.info.keySize); // { publicKey: 15632, secretKey: 31296, ciphertext: 15744, sharedSecret: 24 }

    Methods

    • Generate a new FrodoKEM-976-AES keypair

      Returns { publicKey: Uint8Array; secretKey: Uint8Array }

      If instance is destroyed

      If key generation fails

      const { publicKey, secretKey } = kem.generateKeyPair();
      console.log('Public key:', publicKey.length); // 15632 bytes
      console.log('Secret key:', secretKey.length); // 31296 bytes
    • Encapsulate a shared secret using a public key

      Parameters

      • publicKey: Uint8Array<ArrayBufferLike>

        Public key (15632 bytes)

      Returns { ciphertext: Uint8Array; sharedSecret: Uint8Array }

      If instance is destroyed

      If public key size is invalid

      If encapsulation fails

      const { ciphertext, sharedSecret } = kem.encapsulate(publicKey);
      console.log('Ciphertext:', ciphertext.length); // 15744 bytes
      console.log('Shared secret:', sharedSecret.length); // 24 bytes
    • Decapsulate a shared secret using a secret key

      Parameters

      • ciphertext: Uint8Array<ArrayBufferLike>

        Ciphertext (15744 bytes)

      • secretKey: Uint8Array<ArrayBufferLike>

        Secret key (31296 bytes)

      Returns Uint8Array<ArrayBufferLike>

      Shared secret (24 bytes)

      If instance is destroyed

      If ciphertext or secret key size is invalid

      If decapsulation fails

      const sharedSecret = kem.decapsulate(ciphertext, secretKey);
      console.log('Recovered secret:', sharedSecret.length); // 24 bytes
    • Free WASM resources

      Returns void

      Releases all WASM memory associated with this instance. The instance cannot be used after calling destroy().

      kem.destroy();
      // kem is now unusable