org.bouncycastle.pqc.crypto.qtesla.QTESLASigner Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-ext-jdk15on Show documentation
Show all versions of bcprov-ext-jdk15on Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8. Note: this package includes the NTRU encryption algorithms.
The newest version!
package org.bouncycastle.pqc.crypto.qtesla;
import java.security.SecureRandom;
import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.CryptoServicesRegistrar;
import org.bouncycastle.crypto.params.ParametersWithRandom;
import org.bouncycastle.pqc.crypto.MessageSigner;
/**
* Signer for the qTESLA algorithm (https://qtesla.org/)
*/
public class QTESLASigner
implements MessageSigner
{
/**
* The Public Key of the Identity Whose Signature Will be Generated
*/
private QTESLAPublicKeyParameters publicKey;
/**
* The Private Key of the Identity Whose Signature Will be Generated
*/
private QTESLAPrivateKeyParameters privateKey;
/**
* The Source of Randomness for private key operations
*/
private SecureRandom secureRandom;
public QTESLASigner()
{
}
/**
* Initialise the signer.
*
* @param forSigning true if we are generating a signature, false
* otherwise.
* @param param ParametersWithRandom containing a private key for signature generation, public key otherwise.
*/
public void init(boolean forSigning, CipherParameters param)
{
if (forSigning)
{
if (param instanceof ParametersWithRandom)
{
this.secureRandom = ((ParametersWithRandom)param).getRandom();
privateKey = (QTESLAPrivateKeyParameters)((ParametersWithRandom)param).getParameters();
}
else
{
this.secureRandom = CryptoServicesRegistrar.getSecureRandom();
privateKey = (QTESLAPrivateKeyParameters)param;
}
publicKey = null;
QTESLASecurityCategory.validate(privateKey.getSecurityCategory());
}
else
{
privateKey = null;
publicKey = (QTESLAPublicKeyParameters)param;
QTESLASecurityCategory.validate(publicKey.getSecurityCategory());
}
}
/**
* Generate a signature directly for the passed in message.
*
* @param message the message to be signed.
* @return the signature generated.
*/
public byte[] generateSignature(byte[] message)
{
byte[] sig = new byte[QTESLASecurityCategory.getSignatureSize(privateKey.getSecurityCategory())];
switch (privateKey.getSecurityCategory())
{
case QTESLASecurityCategory.PROVABLY_SECURE_I:
QTesla1p.generateSignature(sig, message, 0, message.length, privateKey.getSecret(), secureRandom);
break;
case QTESLASecurityCategory.PROVABLY_SECURE_III:
QTesla3p.generateSignature(sig, message, 0, message.length, privateKey.getSecret(), secureRandom);
break;
default:
throw new IllegalArgumentException("unknown security category: " + privateKey.getSecurityCategory());
}
return sig;
}
/**
* Verify the signature against the passed in message.
*
* @param message the message that was supposed to have been signed.
* @param signature the signature of the message
* @return true if the signature passes, false otherwise.
*/
public boolean verifySignature(byte[] message, byte[] signature)
{
int status;
switch (publicKey.getSecurityCategory())
{
case QTESLASecurityCategory.PROVABLY_SECURE_I:
status = QTesla1p.verifying(message, signature, 0, signature.length, publicKey.getPublicData());
break;
case QTESLASecurityCategory.PROVABLY_SECURE_III:
status = QTesla3p.verifying(message, signature, 0, signature.length, publicKey.getPublicData());
break;
default:
throw new IllegalArgumentException("unknown security category: " + publicKey.getSecurityCategory());
}
return 0 == status;
}
}