org.bouncycastle.pqc.crypto.xmss.XMSSSigner Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-ext-debug-jdk15on Show documentation
Show all versions of bcprov-ext-debug-jdk15on Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8. Note: this package includes the NTRU encryption algorithms.
package org.bouncycastle.pqc.crypto.xmss;
import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.params.AsymmetricKeyParameter;
import org.bouncycastle.pqc.crypto.StateAwareMessageSigner;
import org.bouncycastle.util.Arrays;
public class XMSSSigner
implements StateAwareMessageSigner
{
private XMSSPrivateKeyParameters privateKey;
private XMSSPrivateKeyParameters nextKeyGenerator;
private XMSSPublicKeyParameters publicKey;
private XMSSParameters params;
private KeyedHashFunctions khf;
private boolean initSign;
private boolean hasGenerated;
public void init(boolean forSigning, CipherParameters param)
{
if (forSigning)
{
initSign = true;
hasGenerated = false;
privateKey = (XMSSPrivateKeyParameters)param;
nextKeyGenerator = privateKey;
params = privateKey.getParameters();
khf = params.getWOTSPlus().getKhf();
}
else
{
initSign = false;
publicKey = (XMSSPublicKeyParameters)param;
params = publicKey.getParameters();
khf = params.getWOTSPlus().getKhf();
}
}
public byte[] generateSignature(byte[] message)
{
if (message == null)
{
throw new NullPointerException("message == null");
}
if (initSign)
{
if (privateKey == null)
{
throw new IllegalStateException("signing key no longer usable");
}
}
else
{
throw new IllegalStateException("signer not initialized for signature generation");
}
if (privateKey.getBDSState().getAuthenticationPath().isEmpty())
{
throw new IllegalStateException("not initialized");
}
int index = privateKey.getIndex();
if (!XMSSUtil.isIndexValid(params.getHeight(), index))
{
throw new IllegalStateException("index out of bounds");
}
/* create (randomized keyed) messageDigest of message */
byte[] random = khf.PRF(privateKey.getSecretKeyPRF(), XMSSUtil.toBytesBigEndian(index, 32));
byte[] concatenated = Arrays.concatenate(random, privateKey.getRoot(),
XMSSUtil.toBytesBigEndian(index, params.getDigestSize()));
byte[] messageDigest = khf.HMsg(concatenated, message);
/* create signature for messageDigest */
OTSHashAddress otsHashAddress = (OTSHashAddress)new OTSHashAddress.Builder().withOTSAddress(index).build();
WOTSPlusSignature wotsPlusSignature = wotsSign(messageDigest, otsHashAddress);
XMSSSignature signature = (XMSSSignature)new XMSSSignature.Builder(params).withIndex(index).withRandom(random)
.withWOTSPlusSignature(wotsPlusSignature).withAuthPath(privateKey.getBDSState().getAuthenticationPath())
.build();
hasGenerated = true;
if (nextKeyGenerator != null)
{
privateKey = nextKeyGenerator.getNextKey();
nextKeyGenerator = privateKey;
}
else
{
privateKey = null;
}
return signature.toByteArray();
}
public long getUsagesRemaining()
{
return privateKey.getUsagesRemaining();
}
public boolean verifySignature(byte[] message, byte[] signature)
{
/* parse signature and public key */
XMSSSignature sig = new XMSSSignature.Builder(params).withSignature(signature).build();
/* generate public key */
int index = sig.getIndex();
/* reinitialize WOTS+ object */
params.getWOTSPlus().importKeys(new byte[params.getDigestSize()], publicKey.getPublicSeed());
/* create message digest */
byte[] concatenated = Arrays.concatenate(sig.getRandom(), publicKey.getRoot(),
XMSSUtil.toBytesBigEndian(index, params.getDigestSize()));
byte[] messageDigest = khf.HMsg(concatenated, message);
int xmssHeight = params.getHeight();
int indexLeaf = XMSSUtil.getLeafIndex(index, xmssHeight);
/* get root from signature */
OTSHashAddress otsHashAddress = (OTSHashAddress)new OTSHashAddress.Builder().withOTSAddress(index).build();
XMSSNode rootNodeFromSignature = XMSSVerifierUtil.getRootNodeFromSignature(params.getWOTSPlus(), xmssHeight, messageDigest, sig, otsHashAddress, indexLeaf);
return Arrays.constantTimeAreEqual(rootNodeFromSignature.getValue(), publicKey.getRoot());
}
public AsymmetricKeyParameter getUpdatedPrivateKey()
{
// if we've generated a signature return the last private key generated
// if we've only initialised leave it in place and return the next one instead.
if (hasGenerated)
{
XMSSPrivateKeyParameters privKey = privateKey;
privateKey = null;
nextKeyGenerator = null;
return privKey;
}
else
{
XMSSPrivateKeyParameters privKey = nextKeyGenerator.getNextKey();
nextKeyGenerator = null;
return privKey;
}
}
private WOTSPlusSignature wotsSign(byte[] messageDigest, OTSHashAddress otsHashAddress)
{
if (messageDigest.length != params.getDigestSize())
{
throw new IllegalArgumentException("size of messageDigest needs to be equal to size of digest");
}
if (otsHashAddress == null)
{
throw new NullPointerException("otsHashAddress == null");
}
/* (re)initialize WOTS+ instance */
params.getWOTSPlus().importKeys(params.getWOTSPlus().getWOTSPlusSecretKey(privateKey.getSecretKeySeed(), otsHashAddress), privateKey.getPublicSeed());
/* create WOTS+ signature */
return params.getWOTSPlus().sign(messageDigest, otsHashAddress);
}
}