Skip to main content

Encapsulation using ML‑KEM

POST 

/v1/encapsulate

Generate an ephemeral key pair and perform a key‑encapsulation using the ML‑KEM algorithm. The operation takes the public key, generates and encapsulates a shared secret, and returns the ciphertext along with the secret.

Request

Responses

Successful Operation

Get started withCloudHSM for free.
Other questions?Ask Sales.
Feedback
Need help?