Back to ML-KEM

Interactive ML-KEM Key Exchange

Experience ML-KEM key exchange with AES encryption/decryption

1. Select Security Level

2. Key Generation (Recipient)

Generate a key pair. In a real-world scenario, the recipient would generate a key pair and share the public key.

3. Encapsulation (Sender)

Encapsulate a shared secret using the recipient's public key. In a real-world scenario, this would be done by the sender.

4. Decapsulation (Recipient)

Decapsulate the shared secret using the cipher text and recipient's secret key.

5. AES Encryption with Shared Secret

Use the shared secret to encrypt a message with AES-GCM.

Complete steps 1-3 to generate a shared secret first.

6. AES Decryption with Shared Secret

Decrypt a message using the shared secret and AES-GCM.

Complete steps 1-4 to generate and decapsulate a shared secret first.

Operation Log