This library contains Golang implementations of leading quantum-resistant cryptographic primitives, popular and time-tested classical primitives, hybrid primitives that combine the strength of both, and ways to combine them all according to your needs. It also includes BACAP (blinding-and-capability) scheme, an orginal cryptographic protocol with a wide range of applications, including constructing anonymous messaging systems.
hpqc is used by the Katzenpost mixnet and published under the AGPLv3.0 licence
This library is divided into four parts:
- NIKE (non-interactive key exchange) encryption
- KEM (key encapsulation mechanism) encryption
- signature schemes
- BACAP
NIKE is what we usually think about when we say "Diffie-Hellman" public key exchange. It means you can find someone's public key, encrypt a message to them, and they will decrypt it with a separate private key. By contrast, KEM is a way to use symmetric-key cryptography primitives in a way that is functionally similar to public-key cryptography, by encoding the secret keys with a public key cryptography scheme that may not we suitable for universal use, but is suitable for encrypting keys.
The key to understanding and using this cryptography library is to review the Scheme
interfaces, for NIKE, KEM and signature schemes, as well as the BACAP API:
- NIKE Scheme: https://pkg.go.dev/github.com/katzenpost/[email protected]/nike#Scheme
- KEM Scheme: https://pkg.go.dev/github.com/katzenpost/[email protected]/kem#Scheme
- signature schemes' Scheme: https://pkg.go.dev/github.com/katzenpost/[email protected]/sign#Scheme
- BACAP API documentation: https://pkg.go.dev/github.com/katzenpost/[email protected]/bacap
Using our generic NIKE, KEM and Signature scheme interfaces helps you achieve cryptographic code agility which makes it easy to switch between cryptographic primitives.
NIKE schemes API docs: https://pkg.go.dev/github.com/katzenpost/hpqc/nike/schemes
NIKE interfaces docs; each NIKE implements three interfaces, Scheme, PublicKey and PrivateKey interfaces which are documented here: https://pkg.go.dev/github.com/katzenpost/hpqc/nike
If you want to get started with one of our many existing NIKE schemes, you can reference NIKE schemes by name like so:
import (
"github.com/katzenpost/hpqc/nike/schemes"
"github.com/katzenpost/hpqc/nike"
)
func doCryptoStuff() {
scheme := schemes.ByName("X25519")
if scheme == nil {
panic("NIKE scheme not found")
}
alicePubKey, alicePrivKey, err := scheme.GenerateKeyPair()
if err != nil {
panic(err)
}
bobPubKey, bobPrivKey, err := scheme.GenerateKeyPair()
if err != nil {
panic(err)
}
aliceSharedSecret := scheme.DeriveSecret(alicePrivKey, bobPubKey)
bobSharedSecret := scheme.DeriveSecret(bobPrivKey, alicePubKey)
// do stuff with shared secrets.
// aliceSharedSecret is equal to bobSharedSecret
}
Generic cryptographic interfaces means that if your double ratchet is already using the NIKE interfaces, then it's trivial to upgrade it to use a hybrid NIKE which appeases the exact same interfaces:
import (
"github.com/katzenpost/hpqc/nike"
"github.com/katzenpost/hpqc/nike/ctidh/ctidh1024"
"github.com/katzenpost/hpqc/nike/x25519"
"github.com/katzenpost/hpqc/rand"
)
var CTIDH1024X25519 nike.Scheme = &hybrid.Scheme{
name: "CTIDH1024-X25519",
second: ctidh1024.Scheme(),
first: x25519.Scheme(rand.Reader),
}
A list of implemented NIKEs can be found towards the end of this document.
KEM schemes API docs: https://pkg.go.dev/github.com/katzenpost/hpqc/kem/schemes
KEM interfaces docs; each KEM implements three interfaces, Scheme, PublicKey and PrivateKey interfaces which are documented here: https://pkg.go.dev/github.com/katzenpost/hpqc/kem
If you want to get started with one of our many existing KEM schemes, you can reference KEM schemes by name like so:
import (
"github.com/katzenpost/hpqc/kem/schemes"
"github.com/katzenpost/hpqc/kem"
)
func doCryptoStuff() {
scheme := schemes.ByName("Xwing")
if scheme == nil {
panic("KEM scheme not found")
}
myPubKey, myPrivKey, err := scheme.GenerateKeyPair()
if err != nil {
panic(err)
}
kemCiphertext, sharedSecret, err := scheme.Encapsulate(myPubKey)
if err != nil {
panic(err)
}
sharedSecret2, err := scheme.Decapsulate(myPrivKey, kemCiphertext)
if err != nil {
panic(err)
}
// do stuff with sharedSecret2 which is equal to sharedSecret
}
import "github.com/katzenpost/hpqc/kem"
func encryptMessage(publicKey kem.PublicKey, scheme kem.Scheme, message []byte) {
ct, ss, err := scheme.Encapsulate(publicKey)
if err != nil {
panic(err)
}
// ...
}
A list of implemented KEMs can be found towards the end of this document.
Signature schemes API docs: https://pkg.go.dev/github.com/katzenpost/hpqc/sign/schemes
Singature interfaces docs; each signature scheme implements three interfaces, Scheme, PublicKey and PrivateKey interfaces which are documented here: https://pkg.go.dev/github.com/katzenpost/hpqc/sign
If you want to get started with one of our existing signature schemes, you can reference signature schemes by name like so:
import (
"github.com/katzenpost/hpqc/sign/schemes"
"github.com/katzenpost/hpqc/sign"
)
func doCryptoStuff(message []byte) {
scheme := schemes.ByName("ed25519")
if scheme == nil {
panic("Signature scheme not found")
}
alicePubKey, alicePrivKey := scheme.GenerateKey()
signature := scheme.Sign(alicePrivKey, message, nil)
ok := scheme.Verify(alicePubKey, message, signature, nil)
if !ok {
panic("signature verification failed!")
}
// ...
}
Generic hybrid signature scheme, combines any two signature schemes into one
import (
"github.com/katzenpost/hpqc/sign/hybrid"
"github.com/katzenpost/hpqc/sign/ed25519"
"github.com/katzenpost/hpqc/sign/sphincsplus"
)
var Ed25519Sphincs = hybrid.New("Ed25519 Sphincs+", ed25519.Scheme(), sphincsplus.Scheme())
A list of implemented signature schemes can be found towards the end of this document.
Any NIKE primitive can be turned into a KEM to be used in combination with KEM primitives. Our "NIKE to KEM adapter" uses an ad hoc hashed ElGamal construction. The construction in pseudo code:
func ENCAPSULATE(their_pubkey publickey) ([]byte, []byte) {
my_privkey, my_pubkey = GEN_KEYPAIR(RNG)
ss = DH(my_privkey, their_pubkey)
ss2 = PRF(ss || their_pubkey || my_pubkey)
return my_pubkey, ss2
}
func DECAPSULATE(my_privkey, their_pubkey) []byte {
s = DH(my_privkey, their_pubkey)
shared_key = PRF(ss || my_pubkey || their_pubkey)
return shared_key
}
The following code demonstrates the use of both the adapter and the combiner into a hybrid KEM:
import (
"github.com/katzenpost/hpqc/kem"
"github.com/katzenpost/hpqc/kem/adapter"
"github.com/katzenpost/hpqc/kem/combiner"
"github.com/katzenpost/hpqc/kem/hybrid"
"github.com/katzenpost/hpqc/kem/mlkem768"
"github.com/katzenpost/circl/kem/frodo/frodo640shake"
"github.com/katzenpost/hpqc/nike/x448"
"github.com/katzenpost/hpqc/nike/ctidh/ctidh1024"
)
var kemScheme kem.Scheme = combiner.New(
"MLKEM768-Frodo640Shake-CTIDH1024-X448",
[]kem.Scheme{
mlkem768.Scheme(),
frodo640shake.Scheme(),
adapter.FromNIKE(ctidh1024.Scheme()),
adapter.FromNIKE(x448.Scheme(rand.Reader)),
},
)
The KEM Combiners paper makes the observation that if a KEM combiner is not security preserving then the resulting hybrid KEM will not have IND-CCA2 security if one of the composing KEMs does not have IND-CCA2 security. Likewise the paper points out that when using a security preserving KEM combiner, if only one of the composing KEMs has IND-CCA2 security then the resulting hybrid KEM will have IND-CCA2 security.
Our KEM combiner uses the split PRF design for an arbitrary number of kems, here shown with only three, in pseudo code:
func SplitPRF(ss1, ss2, ss3, cct1, cct2, cct3 []byte) []byte {
cct := cct1 || cct2 || cct3
return PRF(ss1 || cct) XOR PRF(ss2 || cct) XOR PRF(ss3 || cct)
}
The MKEM package is an efficient multiparty encryption scheme. You can pass it any NIKE scheme.
BACAP is a cryptographic protocol that we are very proud of and you can read more about it in section 4 of our paper: https://arxiv.org/abs/2501.02933. The main author of BACAP is @threebithacker. It can be used for a wide range of capability management applications.
One example, that we are implementing in our group chat protocol, is for multi-client messaging. It allows us to deterministically derive a sequence of key pairs using blinding. It is built upon the Ed25519 signature scheme, and relies on its properties throughout the design. It enables participants to derive a sequence of public-key values and corresponding encryption keys for independent, single-use capabilities using shared symmetric keys.
In the context of a messaging system, the protocol is used by Alice to send an infinite sequence of messages to Bob, one per box (public key in the sequence), with Bob using a separate, second instance of the protocol to send messages to Alice. Alice will use a root private key to derive a root public key for Bob. The root key and a CSPRNG instantiated from recursive KDF applications are then used to obtain a sequence of context-specific values for exercising and verifying a capability. A context value ctx, which is a hash of a universally public value, will be used as additional input. It can, for simplicity, be a hash of the name of the storage network, or can be bound to a specific period of time, e.g., the long epoch SRV published by the Katzenpost directories at regular intervals, similar to how Tor uses its SRV in onion services. The context value makes it safe to unlinkably relocate messages to a different network. The BACAP API is described in the library’s documentation: https://pkg.go.dev/github.com/katzenpost/hpqc/bacap
This library includes the post quantum NIKE (non-interactive key exchange) known as CTIDH via CGO bindings. However these CGO bindings are now being maintained by the highctidh fork: https://codeberg.org/vula/highctidh.git If you are going to use CTIDH you'll want to read the highctidh README; below we reproduce some of the notes about the golang cgo bindings.
The Golang bindings are compatable with musl libc for field sizes 511 and 512 without any configuration. For field sizes of 1024 and 2048, Golang users building with musl libc will need to set an environment variable to increase the default stack size at build time. The stack size should be a multiple of the page size.
For GNU/Linux:
CGO_LDFLAGS: -Wl,-z,stack-size=0x1F40000
For MacOS:
CGO_LDFLAGS: -Wl,-stack_size,0x1F40000
NIKE: Non-Interactive Key Exchange |
---|
Primitive | HPQC name | security |
---|---|---|
Classical Diffie-Hellman | "DH4096_RFC3526" | classic |
X25519 | "X25519" | classic |
X448 | "X448" | classic |
Implementations of CTIDH | "ctidh511", "ctidh512", "ctidh1024", "ctidh2048" | post-quantum |
hybrid of CSIDH and X25519 | "NOBS_CSIDH-X25519 " | hybrid |
hybrids of CTIDH with X25519 | "CTIDH511-X25519", "CTIDH512-X25519", "CTIDH1024-X25519" | hybrid |
hybrids of CTIDH with X448 | "CTIDH512-X448", "CTIDH1024-X448", "CTIDH2048-X448" | hybrid |
KEM: Key Encapsulation Mechanism |
---|
Primitive | HPQC name | security |
---|---|---|
ML-KEM-768 | "MLKEM768" | post-quantum |
XWING is a hybrid primitive that pre-combines ML-KEM-768 and X25519. Due to security properties of our combiner, we also implement our own combination of the two below. | "XWING" | hybrid |
The sntrup4591761 version of the NTRU cryptosystem. | "NTRUPrime" | post-quantum |
FrodoKEM-640-SHAKE | "FrodoKEM-640-SHAKE" | post-quantum |
Various forms of the McEliece cryptosystem | "mceliece348864", "mceliece348864f", "mceliece460896", "mceliece460896f", "mceliece6688128", "mceliece6688128f", "mceliece6960119", "mceliece6960119f", "mceliece8192128", "mceliece8192128f" | post-quantum |
A hybrid of ML-KEM-768 and X25519. The KEM Combiners paper is the reason we implemented our own combination in addition to including XWING. | "MLKEM768-X25519" | hybrid |
A hybrid of ML-KEM-768 and X448 | "MLKEM768-X448" | hybrid |
A hybrid of FrodoKEM-640-SHAKE and X448 | "FrodoKEM-640-SHAKE-X448" | hybrid |
A hybrid of NTRU and X448 | "sntrup4591761-X448" | hybrid |
Hybrids of the McEliece primitives and X25519 | "mceliece348864-X25519", "mceliece348864f-X25519", "mceliece460896-X25519", "mceliece460896f-X25519", "mceliece6688128-X25519", "mceliece6688128f-X25519", "mceliece6960119-X25519", "mceliece6960119f-X25519", "mceliece8192128-X25519", "mceliece8192128f-X25519" | hybrid |
As well as all of the NIKE schemes through the KEM adapter, and any combinations of the above through the combiner.
SIGN: Cryptographic Signature Schemes |
---|
Primitive | HPQC name | security |
---|---|---|
Ed25519 | "ed25519" | classic |
Ed448 | "ed448" | classic |
Sphincs+shake-256f | "Sphincs+" | post-quantum |
hybrids of Sphincs+ and ECC | "Ed25519 Sphincs+", "Ed448-Sphincs+" | hybrid |
hybrids of Dilithium 2 and 3 with Ed25519 | "eddilithium2", "eddilithium3" | hybrid |
This cryptography library has not had any external security review. It should be considered experimental.
This library was inspired by Cloudflare's circl
cryptography library. HPQC uses the same set of interfaces as circl for signature schemes and for KEM schemes.
HPQC (aka hpqc) is free libre open source software (FLOSS) under the AGPL-3.0 software license.
- LICENSE file.
- About free software philosophy
- There are precisely three files which were borrowed from cloudflare's
circl
cryptography library:
- https://github.com/katzenpost/hpqc/blob/main/kem/hybrid/hybrid.go
- https://github.com/katzenpost/hpqc/blob/main/kem/interfaces.go
- https://github.com/katzenpost/hpqc/blob/main/sign/interfaces.go
- Classical Diffiehellman implementation from Elixxir/XX Network and modified in place to conform to our NIKE scheme interfaces, BSD 2-clause LICENSE file included
https://github.com/katzenpost/hpqc/blob/main/nike/diffiehellman/dh.go