@openforge-sh/liboqs - v0.14.3
    Preparing search index...

    Class NTRUHrss701

    NTRU-HRSS-701 key encapsulation mechanism wrapper class

    NTRUHrss701

    High-level wrapper for NTRU-HRSS-701 KEM operations. Provides secure key generation, encapsulation, and decapsulation with automatic memory management.

    Memory Management:

    • All WASM memory is managed internally
    • Call destroy() when finished to free resources
    • Do not use instance after calling destroy()
    const kem = await createNTRUHrss701();

    // Generate keypair
    const { publicKey, secretKey } = kem.generateKeyPair();

    // Encapsulate
    const { ciphertext, sharedSecret: senderSecret } = kem.encapsulate(publicKey);

    // Decapsulate
    const receiverSecret = kem.decapsulate(ciphertext, secretKey);

    // Cleanup
    kem.destroy();
    Index

    Accessors

    • get info(): {
          name: "NTRU-HRSS-701";
          identifier: "NTRU-HRSS-701";
          type: "kem";
          securityLevel: 3;
          standardized: false;
          description: string;
          keySize: {
              publicKey: 1138;
              secretKey: 1450;
              ciphertext: 1138;
              sharedSecret: 32;
          };
      }

      Get algorithm information

      Returns {
          name: "NTRU-HRSS-701";
          identifier: "NTRU-HRSS-701";
          type: "kem";
          securityLevel: 3;
          standardized: false;
          description: string;
          keySize: {
              publicKey: 1138;
              secretKey: 1450;
              ciphertext: 1138;
              sharedSecret: 32;
          };
      }

      Algorithm metadata

      console.log(kem.info.name);           // 'NTRU-HRSS-701'
      console.log(kem.info.securityLevel); // 3
      console.log(kem.info.keySize); // { publicKey: 1138, secretKey: 1450, ciphertext: 1138, sharedSecret: 32 }

    Methods

    • Generate a new NTRU-HRSS-701 keypair

      Returns { publicKey: Uint8Array; secretKey: Uint8Array }

      If instance is destroyed

      If key generation fails

      const { publicKey, secretKey } = kem.generateKeyPair();
      console.log('Public key:', publicKey.length); // 1138 bytes
      console.log('Secret key:', secretKey.length); // 1450 bytes
    • Encapsulate a shared secret using the public key

      Parameters

      • publicKey: Uint8Array<ArrayBufferLike>

        Public key for encapsulation (1138 bytes)

      Returns { ciphertext: Uint8Array; sharedSecret: Uint8Array }

      If instance is destroyed

      If public key is invalid

      If encapsulation fails

      const { ciphertext, sharedSecret } = kem.encapsulate(publicKey);
      console.log('Ciphertext:', ciphertext.length); // 1138 bytes
      console.log('Shared secret:', sharedSecret.length); // 32 bytes
    • Decapsulate a shared secret using the secret key

      Parameters

      • ciphertext: Uint8Array<ArrayBufferLike>

        Ciphertext to decapsulate (1138 bytes)

      • secretKey: Uint8Array<ArrayBufferLike>

        Secret key for decapsulation (1450 bytes)

      Returns Uint8Array<ArrayBufferLike>

      Shared secret (32 bytes)

      If instance is destroyed

      If inputs are invalid

      If decapsulation fails

      const sharedSecret = kem.decapsulate(ciphertext, secretKey);
      console.log('Shared secret:', sharedSecret.length); // 32 bytes
    • Free WASM resources

      Returns void

      Releases all WASM memory associated with this instance. The instance cannot be used after calling destroy().

      kem.destroy();
      // kem is now unusable