// hybrid encryption
Hybrid Encryption Playground
An interactive playground that visualises hybrid post-quantum encryption step by step. Fully client-side — all computation runs in the browser, no backend required. Choose a KEM algorithm (ML-KEM-1024, Classic McEliece, or FrodoKEM), enter a message, and click "Generate". You will see exactly what is transmitted publicly and what remains private. Then: tamper mode (change one byte — the protocol breaks immediately), attacker and quantum-computer view, KEM race (all three in parallel), or a 20× benchmark with full statistics.
KEM Algorithm
🔒 Private — never transmitted📢 Public — attacker can see this