Recipient performs Classic McEliece decapsulation, decrypts ephemeral
X25519 public key, computes shared secrets, combines them and derives KEK.
+ ====================================================
+ WARNING
+ ====================================================
+ Sender authentication uses only *NON*-PQ crypto!
+ ====================================================
+
H = SHAKE256
mceliece-ciphertext, mceliece-shared-key = KEM-Encap(mceliece-recipient-public-key)
mceliece-shared-key = KEM-Decap(mceliece-recipient-private-key, mceliece-ciphertext)
two 32-byte shared keys. Then it combines them to get the KEK decryption
key of the CEK.
+ ====================================================
+ WARNING
+ ====================================================
+ Sender authentication uses only *NON*-PQ crypto!
+ ====================================================
+
H = BLAKE2b
PRK = HKDF-Extract(H, salt="", ikm=
sntrup4591761-shared-key || es-x25519-shared-key ||