Experience ML-KEM key exchange with AES encryption/decryption
Generate a key pair. In a real-world scenario, the recipient would generate a key pair and share the public key.
Encapsulate a shared secret using the recipient's public key. In a real-world scenario, this would be done by the sender.
Decapsulate the shared secret using the cipher text and recipient's secret key.
Use the shared secret to encrypt a message with AES-GCM.
Decrypt a message using the shared secret and AES-GCM.