@@ -281,7 +281,7 @@ <h4>Block Asymmetric</h4>
281281< p >
282282The base interface is < b > AsymmetricBlockCipher</ b > and has the following
283283implementations which match the modes the cipher can be operated in.
284-
284+ </ p >
285285< p >
286286< table cellpadding =5 cellspacing =0 border =1 width =80% >
287287< tr > < th > Name</ th > < th > Constructor</ th > < th > Notes</ th > </ tr >
@@ -435,32 +435,37 @@ <h4>Key Agreement</h4>
435435
436436< h4 > Key Encapsulation Mechanisms</ h4 >
437437< p >
438- The first set have a base class < b > KeyEncapsulation</ b > with the following
439- sub-classes
438+ The first non-post-quantum set use the < b > EncapsulatedSecretGenerator</ b > and < b > EncapsulatedSecretGenerator</ b > interfaces.
440439</ p >
441440< table cellpadding =5 cellspacing =0 border =1 width =80% >
442441< thead >
443442< tr > < th > Name</ th > < th > Notes</ th > </ tr >
444443</ thead >
445444< tbody >
446- < tr > < td > < b > RSAKeyEncapsulation </ b > </ td > < td > RSA-KEM from ISO 18033-2</ td > </ tr >
447- < tr > < td > < b > PKCS5S2ParametersGenerator </ b > </ td > < td > ECIES-KEM from ISO 18033-2</ td > </ tr >
445+ < tr > < td > < b > RSA </ b > </ td > < td > RSA-KEM from ISO 18033-2, implemented in < b > RSAKEMExtractor </ b > and < b > RSAKEMGenerator </ b > </ td > </ tr >
446+ < tr > < td > < b > ECIES </ b > </ td > < td > ECIES-KEM from ISO 18033-2, implemented in < b > ECIESKEMExtractor </ b > and < b > ECIESKEMGenerator </ b > </ td > </ tr >
448447</ tbody >
449448</ table >
450449< p >
451- The second, post-quantum set use < b > EncapsulatdSecretGenerator </ b > and < b > EncapsulatedSecretGenerator</ b > .
450+ The second, post-quantum set use < b > EncapsulatedSecretGenerator </ b > and < b > EncapsulatedSecretGenerator</ b > .
452451</ p >
452+
453453< table cellpadding =5 cellspacing =0 border =1 width =80% >
454- < thead >
455- < tr > < th > Name</ th > < th > Notes</ th > </ tr >
456- </ thead >
457454< tbody >
458- < tr > < td > < b > CMCEKEMGenerator, CMCEKEMExtractor</ b > </ td > < td > Class McEliece (NIST Alternate Candidate)</ td > </ tr >
459- < tr > < td > < b > FrodoKEMGenerator, FrodoKEMExtractor</ b > </ td > < td > FrodoKEM (NIST Alternate Candidate)</ td > </ tr >
460- < tr > < td > < b > SABERKEMGenerator, SABERKEMExtractor</ b > </ td > < td > SABER (NIST Finalist)</ td > </ tr >
455+ < tr > < th > Name</ th > < th > Security Strength (in bits)</ th > < th > Implementations</ th > < th > Notes</ th > </ tr >
456+ < tr > < td > < b > BIKE</ b > </ td > < td > 128-256.</ td > < td > < b > BIKEKEMGenerator</ b > , < b > BIKEKEMExtractor</ b > < td > Round 4</ td > </ tr >
457+ < tr > < td > < b > Classic McEliece</ b > </ td > < td > 128-256.</ td > < td > < b > BIKEKEMGenerator</ b > , < b > BIKEKEMExtractor</ b > </ td > < td > Round 4</ td > </ tr >
458+ < tr > < td > < b > FrodoKEM</ b > </ td > < td > 128-256.</ td > < td > < b > FrodoKEMGenerator</ b > , < b > FrodoKEMExtractor</ b > </ td > < td > </ td > </ tr >
459+ < tr > < td > < b > HQC</ b > </ td > < td > 128-256.</ td > < td > < b > HQCKEMGenerator</ b > , < b > HQCKEMExtractor</ b > </ td > < td > Round 4</ td > </ tr >
460+ < tr > < td > < b > Kyber</ b > </ td > < td > 128-256.</ td > < td > < b > KyberKEMGenerator</ b > , < b > KyberKEMExtractor</ b > </ td > < td > Finalist</ td > </ tr >
461+ < tr > < td > < b > NTRU</ b > </ td > < td > 128-256.</ td > < td > < b > NTRUKEMGenerator</ b > , < b > NTRUKEMExtractor</ b > </ td > < td > </ td > </ tr >
462+ < tr > < td > < b > NTRU Prime</ b > </ td > < td > 128-256.</ td > < td > < b > NTRULPRimeKEMGenerator</ b > , < b > NTRULPRimeKEMExtractor</ b > < br /> < b > SNTRUPrimeKEMGenerator</ b > , < b > SNTRUPrimeKEMExtractor</ b > </ td > < td > </ td > </ tr >
463+ < tr > < td > < b > SABER</ b > </ td > < td > 128-256.</ td > < td > < b > SABERKEMGenerator</ b > , < b > SABERKEMExtractor</ b > </ td > < td > </ td > </ tr >
461464</ tbody >
462465</ table >
463466
467+ </ p >
468+
464469< h4 > Signers</ h4 >
465470< p >
466471DSA, ECDSA, ISO-9796-2, GOST-3410-94, GOST-3410-2001, GOST-3410-2012, DSTU-4145-2002, and RSA-PSS are supported by the < b > org.bouncycastle.crypto.signers</ b >
@@ -695,6 +700,7 @@ <h4>Symmetric (Stream)</h4>
695700< tr > < td > VMPC</ td > < td > 128/6144< b > (128)</ b > </ td > < td > </ td > </ tr >
696701< tr > < td > Grainv1</ b > </ td > < td > 80</ td > < td > 64 bit IV</ td > </ tr >
697702< tr > < td > Grain128</ b > </ td > < td > 128</ td > < td > 96 bit IV</ td > </ tr >
703+ < tr > < td > Grain128AEAD</ b > </ td > < td > 128</ td > < td > 96 bit IV</ td > </ tr >
698704< tr > < td > Zuc128</ b > </ td > < td > 128</ td > < td > 128 bit IV</ td > </ tr >
699705< tr > < td > Zuc256</ b > </ td > < td > 256</ td > < td > 200 bit IV</ td > </ tr >
700706</ table >
@@ -991,6 +997,9 @@ <h4>Signature Algorithms</h4>
991997< li > SHA256withSM2</ li >
992998< li > SM3withSM2</ li >
993999< li > LMS</ li >
1000+ < li > Dilithium</ li >
1001+ < li > Falcon</ li >
1002+ < li > Picnic</ li >
9941003< li > SPHINCS+</ li >
9951004< li > XMSS-SHA256</ li >
9961005< li > XMSS-SHA512</ li >
@@ -1008,11 +1017,6 @@ <h4>Signature Algorithms</h4>
10081017< li > SHA512withXMSSMT-SHA512</ li >
10091018< li > SHAKE128withXMSSMT-SHAKE128</ li >
10101019< li > SHAKE256withXMSSMT-SHAKE256</ li >
1011- < li > qTESLA-I</ li >
1012- < li > qTESLA-III-SIZE</ li >
1013- < li > qTESLA-III-SPEED</ li >
1014- < li > qTESLA-P-I</ li >
1015- < li > qTESLA-P-III</ li >
10161020</ ul >
10171021
10181022< h4 > Password Hashing and PBE</ h4 >
0 commit comments