A message recipient uses their asymmetric private key to decrypt an "encapsulated key" (ciphertext), thereby recovering a temporary symmetric key (represented as CryptoKey) which is then used to decrypt a message.
The algorithms currently supported include:
'ML-KEM-512''ML-KEM-768''ML-KEM-1024'