Skip to main content

7.1. Key Encapsulation Mechanisms (KEMs)

7.1. Key Encapsulation Mechanisms (KEMs)

ValueKEMNsecretNencNpkNskAuthReference
0x0000ReservedN/AN/AN/AN/AyesRFC 9180
0x0010DHKEM(P-256, HKDF-SHA256)32656532yes[NISTCurves], [RFC5869]
0x0011DHKEM(P-384, HKDF-SHA384)48979748yes[NISTCurves], [RFC5869]
0x0012DHKEM(P-521, HKDF-SHA512)6413313366yes[NISTCurves], [RFC5869]
0x0020DHKEM(X25519, HKDF-SHA256)32323232yes[RFC5869], [RFC7748]
0x0021DHKEM(X448, HKDF-SHA512)64565656yes[RFC5869], [RFC7748]

Table 2: KEM IDs

The Auth column indicates if the KEM algorithm provides the AuthEncap()/AuthDecap() interface and is therefore suitable for the Auth and AuthPSK modes. The meaning of all other columns is explained in Section 11.1. All algorithms are suitable for the PSK mode.

Subsections