Mixing KEM into Noise

This is a draft. It’s a notepad for me to jot things down for fun. It might disappear anytime.

I am not a cryptographer. Expect severe bugs.

Purpose

KEM selection

Tokens

ke sender

ke receiver

kem sender

kem receiver

Some handshake patterns

Pefer kem before s. (Obviously doesn’t apply to pre-knowledge s.)

These are the four that I’m familiar with (as part of Murshy’s design).

NX

-> e, ke
<- e, ee, kem, s, es

XX

-> e, ke
<- e, ee, kem, s, es
-> s, se

NK

<- s
...
-> e, es, ke
<- e, ee, kem

XK

<- s
...
-> e, es, ke
<- e, ee, kem
-> s, se

Formal verification?

Well, I’ll look into applied π\pi-calculus when I finish my school exams.