org.spongycastle.crypto.params.NTRUEncryptionKeyGenerationParameters Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of scprov-jdk15on Show documentation
Show all versions of scprov-jdk15on Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms.
This jar contains JCE provider for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.
package org.spongycastle.crypto.params; import java.io.DataInputStream; import java.io.DataOutputStream; import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.security.SecureRandom; import java.util.Arrays; import org.spongycastle.crypto.Digest; import org.spongycastle.crypto.KeyGenerationParameters; import org.spongycastle.crypto.digests.SHA256Digest; import org.spongycastle.crypto.digests.SHA512Digest; /** * A set of parameters for NtruEncrypt. Several predefined parameter sets are available and new ones can be created as well. */ public class NTRUEncryptionKeyGenerationParameters extends KeyGenerationParameters implements Cloneable { /** * A conservative (in terms of security) parameter set that gives 256 bits of security and is optimized for key size. */ public static final NTRUEncryptionKeyGenerationParameters EES1087EP2 = new NTRUEncryptionKeyGenerationParameters(1087, 2048, 120, 120, 256, 13, 25, 14, true, new byte[]{0, 6, 3}, true, false, new SHA512Digest()); /** * A conservative (in terms of security) parameter set that gives 256 bits of security and is a tradeoff between key size and encryption/decryption speed. */ public static final NTRUEncryptionKeyGenerationParameters EES1171EP1 = new NTRUEncryptionKeyGenerationParameters(1171, 2048, 106, 106, 256, 13, 20, 15, true, new byte[]{0, 6, 4}, true, false, new SHA512Digest()); /** * A conservative (in terms of security) parameter set that gives 256 bits of security and is optimized for encryption/decryption speed. */ public static final NTRUEncryptionKeyGenerationParameters EES1499EP1 = new NTRUEncryptionKeyGenerationParameters(1499, 2048, 79, 79, 256, 13, 17, 19, true, new byte[]{0, 6, 5}, true, false, new SHA512Digest()); /** * A parameter set that gives 128 bits of security and uses simple ternary polynomials. */ public static final NTRUEncryptionKeyGenerationParameters APR2011_439 = new NTRUEncryptionKeyGenerationParameters(439, 2048, 146, 130, 128, 9, 32, 9, true, new byte[]{0, 7, 101}, true, false, new SHA256Digest()); /** * Like
polyType=SIMPLE). * * @param N number of polynomial coefficients * @param q modulus * @param df number of ones in the private polynomialAPR2011_439
, this parameter set gives 128 bits of security but uses product-form polynomials andf=1+pF
. */ public static final NTRUEncryptionKeyGenerationParameters APR2011_439_FAST = new NTRUEncryptionKeyGenerationParameters(439, 2048, 9, 8, 5, 130, 128, 9, 32, 9, true, new byte[]{0, 7, 101}, true, true, new SHA256Digest()); /** * A parameter set that gives 256 bits of security and uses simple ternary polynomials. */ public static final NTRUEncryptionKeyGenerationParameters APR2011_743 = new NTRUEncryptionKeyGenerationParameters(743, 2048, 248, 220, 256, 10, 27, 14, true, new byte[]{0, 7, 105}, false, false, new SHA512Digest()); /** * LikeAPR2011_743
, this parameter set gives 256 bits of security but uses product-form polynomials andf=1+pF
. */ public static final NTRUEncryptionKeyGenerationParameters APR2011_743_FAST = new NTRUEncryptionKeyGenerationParameters(743, 2048, 11, 11, 15, 220, 256, 10, 27, 14, true, new byte[]{0, 7, 105}, false, true, new SHA512Digest()); public int N, q, df, df1, df2, df3; public int dr; public int dr1; public int dr2; public int dr3; public int dg; int llen; public int maxMsgLenBytes; public int db; public int bufferLenBits; int bufferLenTrits; public int dm0; public int pkLen; public int c; public int minCallsR; public int minCallsMask; public boolean hashSeed; public byte[] oid; public boolean sparse; public boolean fastFp; public int polyType; public Digest hashAlg; /** * Constructs a parameter set that uses ternary private keys (i.e.f
* @param dm0 minimum acceptable number of -1's, 0's, and 1's in the polynomialm'
in the last encryption step * @param db number of random bits to prepend to the message * @param c a parameter for the Index Generation Function ({@link org.spongycastle.crypto.engines.IndexGenerator}) * @param minCallsR minimum number of hash calls for the IGF to make * @param minCallsMask minimum number of calls to generate the masking polynomial * @param hashSeed whether to hash the seed in the MGF first (true) or use the seed directly (false) * @param oid three bytes that uniquely identify the parameter set * @param sparse whether to treat ternary polynomials as sparsely populated ({@link org.spongycastle.math.ntru.polynomial.SparseTernaryPolynomial} vs {@link org.spongycastle.math.ntru.polynomial.DenseTernaryPolynomial}) * @param fastFp whetherf=1+p*F
for a ternaryF
(true) orf
is ternary (false) * @param hashAlg a valid identifier for ajava.security.MessageDigest
instance such asSHA-256
. TheMessageDigest
must support thegetDigestLength()
method. */ public NTRUEncryptionKeyGenerationParameters(int N, int q, int df, int dm0, int db, int c, int minCallsR, int minCallsMask, boolean hashSeed, byte[] oid, boolean sparse, boolean fastFp, Digest hashAlg) { super(new SecureRandom(), db); this.N = N; this.q = q; this.df = df; this.db = db; this.dm0 = dm0; this.c = c; this.minCallsR = minCallsR; this.minCallsMask = minCallsMask; this.hashSeed = hashSeed; this.oid = oid; this.sparse = sparse; this.fastFp = fastFp; this.polyType = NTRUParameters.TERNARY_POLYNOMIAL_TYPE_SIMPLE; this.hashAlg = hashAlg; init(); } /** * Constructs a parameter set that uses product-form private keys (i.e. polyType=PRODUCT). * * @param N number of polynomial coefficients * @param q modulus * @param df1 number of ones in the private polynomialf1
* @param df2 number of ones in the private polynomialf2
* @param df3 number of ones in the private polynomialf3
* @param dm0 minimum acceptable number of -1's, 0's, and 1's in the polynomialm'
in the last encryption step * @param db number of random bits to prepend to the message * @param c a parameter for the Index Generation Function ({@link org.spongycastle.crypto.engines.IndexGenerator}) * @param minCallsR minimum number of hash calls for the IGF to make * @param minCallsMask minimum number of calls to generate the masking polynomial * @param hashSeed whether to hash the seed in the MGF first (true) or use the seed directly (false) * @param oid three bytes that uniquely identify the parameter set * @param sparse whether to treat ternary polynomials as sparsely populated ({@link org.spongycastle.math.ntru.polynomial.SparseTernaryPolynomial} vs {@link org.spongycastle.math.ntru.polynomial.DenseTernaryPolynomial}) * @param fastFp whetherf=1+p*F
for a ternaryF
(true) orf
is ternary (false) * @param hashAlg a valid identifier for ajava.security.MessageDigest
instance such asSHA-256
*/ public NTRUEncryptionKeyGenerationParameters(int N, int q, int df1, int df2, int df3, int dm0, int db, int c, int minCallsR, int minCallsMask, boolean hashSeed, byte[] oid, boolean sparse, boolean fastFp, Digest hashAlg) { super(new SecureRandom(), db); this.N = N; this.q = q; this.df1 = df1; this.df2 = df2; this.df3 = df3; this.db = db; this.dm0 = dm0; this.c = c; this.minCallsR = minCallsR; this.minCallsMask = minCallsMask; this.hashSeed = hashSeed; this.oid = oid; this.sparse = sparse; this.fastFp = fastFp; this.polyType = NTRUParameters.TERNARY_POLYNOMIAL_TYPE_PRODUCT; this.hashAlg = hashAlg; init(); } private void init() { dr = df; dr1 = df1; dr2 = df2; dr3 = df3; dg = N / 3; llen = 1; // ceil(log2(maxMsgLenBytes)) maxMsgLenBytes = N * 3 / 2 / 8 - llen - db / 8 - 1; bufferLenBits = (N * 3 / 2 + 7) / 8 * 8 + 1; bufferLenTrits = N - 1; pkLen = db; } /** * Reads a parameter set from an input stream. * * @param is an input stream * @throws java.io.IOException */ public NTRUEncryptionKeyGenerationParameters(InputStream is) throws IOException { super(new SecureRandom(), -1); DataInputStream dis = new DataInputStream(is); N = dis.readInt(); q = dis.readInt(); df = dis.readInt(); df1 = dis.readInt(); df2 = dis.readInt(); df3 = dis.readInt(); db = dis.readInt(); dm0 = dis.readInt(); c = dis.readInt(); minCallsR = dis.readInt(); minCallsMask = dis.readInt(); hashSeed = dis.readBoolean(); oid = new byte[3]; dis.read(oid); sparse = dis.readBoolean(); fastFp = dis.readBoolean(); polyType = dis.read(); String alg = dis.readUTF(); if ("SHA-512".equals(alg)) { hashAlg = new SHA512Digest(); } else if ("SHA-256".equals(alg)) { hashAlg = new SHA256Digest(); } init(); } public NTRUEncryptionParameters getEncryptionParameters() { if (polyType == NTRUParameters.TERNARY_POLYNOMIAL_TYPE_SIMPLE) { return new NTRUEncryptionParameters(N, q, df, dm0, db, c, minCallsR, minCallsMask, hashSeed, oid, sparse, fastFp, hashAlg); } else { return new NTRUEncryptionParameters(N, q, df1, df2, df3, dm0, db, c, minCallsR, minCallsMask, hashSeed, oid, sparse, fastFp, hashAlg); } } public NTRUEncryptionKeyGenerationParameters clone() { if (polyType == NTRUParameters.TERNARY_POLYNOMIAL_TYPE_SIMPLE) { return new NTRUEncryptionKeyGenerationParameters(N, q, df, dm0, db, c, minCallsR, minCallsMask, hashSeed, oid, sparse, fastFp, hashAlg); } else { return new NTRUEncryptionKeyGenerationParameters(N, q, df1, df2, df3, dm0, db, c, minCallsR, minCallsMask, hashSeed, oid, sparse, fastFp, hashAlg); } } /** * Returns the maximum length a plaintext message can be with this parameter set. * * @return the maximum length in bytes */ public int getMaxMessageLength() { return maxMsgLenBytes; } /** * Writes the parameter set to an output stream * * @param os an output stream * @throws java.io.IOException */ public void writeTo(OutputStream os) throws IOException { DataOutputStream dos = new DataOutputStream(os); dos.writeInt(N); dos.writeInt(q); dos.writeInt(df); dos.writeInt(df1); dos.writeInt(df2); dos.writeInt(df3); dos.writeInt(db); dos.writeInt(dm0); dos.writeInt(c); dos.writeInt(minCallsR); dos.writeInt(minCallsMask); dos.writeBoolean(hashSeed); dos.write(oid); dos.writeBoolean(sparse); dos.writeBoolean(fastFp); dos.write(polyType); dos.writeUTF(hashAlg.getAlgorithmName()); } public int hashCode() { final int prime = 31; int result = 1; result = prime * result + N; result = prime * result + bufferLenBits; result = prime * result + bufferLenTrits; result = prime * result + c; result = prime * result + db; result = prime * result + df; result = prime * result + df1; result = prime * result + df2; result = prime * result + df3; result = prime * result + dg; result = prime * result + dm0; result = prime * result + dr; result = prime * result + dr1; result = prime * result + dr2; result = prime * result + dr3; result = prime * result + (fastFp ? 1231 : 1237); result = prime * result + ((hashAlg == null) ? 0 : hashAlg.getAlgorithmName().hashCode()); result = prime * result + (hashSeed ? 1231 : 1237); result = prime * result + llen; result = prime * result + maxMsgLenBytes; result = prime * result + minCallsMask; result = prime * result + minCallsR; result = prime * result + Arrays.hashCode(oid); result = prime * result + pkLen; result = prime * result + polyType; result = prime * result + q; result = prime * result + (sparse ? 1231 : 1237); return result; } public boolean equals(Object obj) { if (this == obj) { return true; } if (obj == null) { return false; } if (getClass() != obj.getClass()) { return false; } NTRUEncryptionKeyGenerationParameters other = (NTRUEncryptionKeyGenerationParameters)obj; if (N != other.N) { return false; } if (bufferLenBits != other.bufferLenBits) { return false; } if (bufferLenTrits != other.bufferLenTrits) { return false; } if (c != other.c) { return false; } if (db != other.db) { return false; } if (df != other.df) { return false; } if (df1 != other.df1) { return false; } if (df2 != other.df2) { return false; } if (df3 != other.df3) { return false; } if (dg != other.dg) { return false; } if (dm0 != other.dm0) { return false; } if (dr != other.dr) { return false; } if (dr1 != other.dr1) { return false; } if (dr2 != other.dr2) { return false; } if (dr3 != other.dr3) { return false; } if (fastFp != other.fastFp) { return false; } if (hashAlg == null) { if (other.hashAlg != null) { return false; } } else if (!hashAlg.getAlgorithmName().equals(other.hashAlg.getAlgorithmName())) { return false; } if (hashSeed != other.hashSeed) { return false; } if (llen != other.llen) { return false; } if (maxMsgLenBytes != other.maxMsgLenBytes) { return false; } if (minCallsMask != other.minCallsMask) { return false; } if (minCallsR != other.minCallsR) { return false; } if (!Arrays.equals(oid, other.oid)) { return false; } if (pkLen != other.pkLen) { return false; } if (polyType != other.polyType) { return false; } if (q != other.q) { return false; } if (sparse != other.sparse) { return false; } return true; } public String toString() { StringBuilder output = new StringBuilder("EncryptionParameters(N=" + N + " q=" + q); if (polyType == NTRUParameters.TERNARY_POLYNOMIAL_TYPE_SIMPLE) { output.append(" polyType=SIMPLE df=" + df); } else { output.append(" polyType=PRODUCT df1=" + df1 + " df2=" + df2 + " df3=" + df3); } output.append(" dm0=" + dm0 + " db=" + db + " c=" + c + " minCallsR=" + minCallsR + " minCallsMask=" + minCallsMask + " hashSeed=" + hashSeed + " hashAlg=" + hashAlg + " oid=" + Arrays.toString(oid) + " sparse=" + sparse + ")"); return output.toString(); } }