Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Presentation

Kemeleon: Elligator-like Obfuscation for ML-KEM

February 26, 2025

Presenters

Shannon Veitch - ETH Zurich
Michael Rosenburg - Cloudflare

Description

In this talk, we will present Kemeleon: new encodings that map ML-KEM public keys and ciphertexts to
random bytestrings. In addition, since many post-quantum protocol migrations deploy hybrids of classical
and post-quantum algorithms, we consider the question of hybrid obfuscation. Unlike the Elligator encoding
for ECDH, our Kemeleon encodings for ML-KEM are not statistically indistinguishable from random
bytestrings: they depend on the decision module-LWE assumption. As a result, subtleties emerge in the
security properties of hybrid obfuscation, in contrast with the basic key indistinguishability goal for hybrid
key exchange where simple concatenation does yield a secure solution. We present an efficient obfuscated key
encapsulation mechanism (KEM) combiner which operates sequentially, encrypting one KEM’s ciphertext
under a key derived from the other KEM’s shared secret. We discuss some applications of hybrid obfuscated
KEMs, including how to hybridize deployed obfuscated key exchange protocols such as Tor’s obfs4 protocol
and uses in hybrid password authenticated key exchange protocols.

Presented at

NIST Workshop on Guidance for KEMs
February 25-26, 2025 (Virtual)

Downloads

Event Details

Location

    Virtual

Related Topics

Security and Privacy: key management, post-quantum cryptography

Created February 26, 2025, Updated April 28, 2025