org.bouncycastle.pqc.crypto.falcon.FalconNIST Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-jdk18on Show documentation
Show all versions of bcprov-jdk18on Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.8 and up.
package org.bouncycastle.pqc.crypto.falcon;
import java.security.SecureRandom;
import org.bouncycastle.util.Arrays;
class FalconNIST
{
int NONCELEN;
int LOGN;
private int N;
private SecureRandom rand;
private int CRYPTO_SECRETKEYBYTES;
private int CRYPTO_PUBLICKEYBYTES;
int CRYPTO_BYTES;
private FalconCodec codec;
FalconNIST(int logn, int noncelen, SecureRandom random)
{
codec = new FalconCodec();
this.rand = random;
this.LOGN = logn;
this.NONCELEN = noncelen;
this.N = 1 << logn;
this.CRYPTO_PUBLICKEYBYTES = 1 + (14 * this.N / 8);
if (logn == 10)
{
this.CRYPTO_SECRETKEYBYTES = 2305;
this.CRYPTO_BYTES = 1330;
}
else if (logn == 9 || logn == 8)
{
this.CRYPTO_SECRETKEYBYTES = 1 + (6 * this.N * 2 / 8) + this.N;
this.CRYPTO_BYTES = 690; // TODO find what the byte length is here when not at degree 9 or 10
}
else if (logn == 7 || logn == 6)
{
this.CRYPTO_SECRETKEYBYTES = 1 + (7 * this.N * 2 / 8) + this.N;
this.CRYPTO_BYTES = 690;
}
else
{
this.CRYPTO_SECRETKEYBYTES = 1 + (this.N * 2) + this.N;
this.CRYPTO_BYTES = 690;
}
}
byte[][] crypto_sign_keypair(byte[] srcpk, int pk, byte[] srcsk, int sk)
{
// TODO: clean up required
byte[] f = new byte[N],
g = new byte[N],
F = new byte[N];
short[] h = new short[N];
byte[] seed = new byte[48];
SHAKE256 rng = new SHAKE256();
int u, v;
FalconKeyGen keygen = new FalconKeyGen();
// savcw = set_fpu_cw(2);
/*
* Generate key pair.
*/
// randombytes(seed, sizeof seed);
rand.nextBytes(seed);
// inner_shake256_init(&rng);
// inner_shake256_inject(&rng, seed, sizeof seed);
// inner_shake256_flip(&rng);
rng.inner_shake256_init();
rng.inner_shake256_inject(seed, 0, seed.length);
rng.i_shake256_flip();
// Zf(keygen)(&rng, f, g, F, NULL, h, 10, tmp.b);
keygen.keygen(rng, f, 0, g, 0, F, 0, null, 0, h, 0, LOGN);
// set_fpu_cw(savcw);
/*
* Encode private key.
*/
srcsk[sk + 0] = (byte)(0x50 + LOGN); // old python header
u = 1;
v = codec.trim_i8_encode(srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u,
f, 0, LOGN, codec.max_fg_bits[LOGN]);
if (v == 0)
{
throw new IllegalStateException("f encode failed");
}
byte[] fEnc = Arrays.copyOfRange(srcsk, sk + u, u + v);
u += v;
v = codec.trim_i8_encode(srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u,
g, 0, LOGN, codec.max_fg_bits[LOGN]);
if (v == 0)
{
throw new IllegalStateException("g encode failed");
}
byte[] gEnc = Arrays.copyOfRange(srcsk, sk + u, u + v);
u += v;
v = codec.trim_i8_encode(srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u,
F, 0, LOGN, codec.max_FG_bits[LOGN]);
if (v == 0)
{
throw new IllegalStateException("F encode failed");
}
byte[] FEnc = Arrays.copyOfRange(srcsk, sk + u, u + v);
u += v;
if (u != CRYPTO_SECRETKEYBYTES)
{
throw new IllegalStateException("secret key encoding failed");
}
/*
* Encode public key.
*/
srcpk[pk + 0] = (byte)(0x00 + LOGN);
v = codec.modq_encode(srcpk, pk + 1, CRYPTO_PUBLICKEYBYTES - 1, h, 0, LOGN);
if (v != CRYPTO_PUBLICKEYBYTES - 1)
{
throw new IllegalStateException("public key encoding failed");
}
return new byte[][] { Arrays.copyOfRange(srcpk, 1, srcpk.length), fEnc, gEnc, FEnc };
}
byte[] crypto_sign(boolean attached, byte[] srcsm,
byte[] srcm, int m, int mlen,
byte[] srcsk, int sk)
{
byte[] f = new byte[N],
g = new byte[N],
F = new byte[N],
G = new byte[N];
short[] sig = new short[N];
short[] hm = new short[N];
byte[] seed = new byte[48],
nonce = new byte[NONCELEN];
SHAKE256 sc = new SHAKE256();
int u, v, sig_len;
FalconSign sign = new FalconSign();
FalconVrfy vrfy = new FalconVrfy();
FalconCommon common = new FalconCommon();
/*
* Decode the private key.
*/
// if (srcsk[sk + 0] != (byte)(0x50 + LOGN))
// {
// throw new IllegalArgumentException("private key header incorrect");
// }
u = 0;
v = codec.trim_i8_decode(f, 0, LOGN, codec.max_fg_bits[LOGN],
srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u);
if (v == 0)
{
throw new IllegalStateException("f decode failed");
}
u += v;
v = codec.trim_i8_decode(g, 0, LOGN, codec.max_fg_bits[LOGN],
srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u);
if (v == 0)
{
throw new IllegalStateException("g decode failed");
}
u += v;
v = codec.trim_i8_decode(F, 0, LOGN, codec.max_FG_bits[LOGN],
srcsk, sk + u, CRYPTO_SECRETKEYBYTES - u);
if (v == 0)
{
throw new IllegalArgumentException("F decode failed");
}
u += v;
if (u != CRYPTO_SECRETKEYBYTES - 1)
{
throw new IllegalStateException("full key not used");
}
if (!vrfy.complete_private(G, 0, f, 0, g, 0, F, 0, LOGN, new short[2 * N], 0))
{
throw new IllegalStateException("complete_private failed");
}
/*
* Create a random nonce (40 bytes).
*/
// randombytes(nonce, sizeof nonce);
rand.nextBytes(nonce);
/*
* Hash message nonce + message into a vector.
*/
// inner_shake256_init(&sc);
// inner_shake256_inject(&sc, nonce, sizeof nonce);
// inner_shake256_inject(&sc, m, mlen);
// inner_shake256_flip(&sc);
sc.inner_shake256_init();
sc.inner_shake256_inject(nonce, 0, NONCELEN);
sc.inner_shake256_inject(srcm, m, mlen);
sc.i_shake256_flip();
// Zf(hash_to_point_vartime)(&sc, r.hm, 10);
common.hash_to_point_vartime(sc, hm, 0, LOGN); // TODO check if this needs to be ct
// System.out.println(String.format("%x %x %x %x %x %x %x %x", hm[0], hm[1], hm[2], hm[3], hm[4], hm[5], hm[6], hm[7]));
/*
* Initialize a RNG.
*/
// randombytes(seed, sizeof seed);
rand.nextBytes(seed);
// inner_shake256_init(&sc);
// inner_shake256_inject(&sc, seed, sizeof seed);
// inner_shake256_flip(&sc);
sc.inner_shake256_init();
sc.inner_shake256_inject(seed, 0, seed.length);
sc.i_shake256_flip();
// savcw = set_fpu_cw(2);
/*
* Compute the signature.
*/
// Zf(sign_dyn)(r.sig, &sc, f, g, F, G, r.hm, 10, tmp.b);
sign.sign_dyn(sig, 0, sc, f, 0, g, 0, F, 0, G, 0, hm, 0, LOGN, new FalconFPR[10 * N], 0);
// set_fpu_cw(savcw);
byte[] esig = new byte[CRYPTO_BYTES - 2 - NONCELEN];
if (attached)
{
/*
* Encode the signature. Format is:
* signature header 1 bytes
* nonce 40 bytes
* signature slen bytes
*/
esig[0] = (byte)(0x20 + LOGN);
sig_len = codec.comp_encode(esig, 1, esig.length - 1, sig, 0, LOGN);
if (sig_len == 0)
{
throw new IllegalStateException("signature failed to generate");
}
sig_len++;
}
else
{
sig_len = codec.comp_encode(esig, 0, esig.length, sig, 0, LOGN);
if (sig_len == 0)
{
throw new IllegalStateException("signature failed to generate");
}
}
// header
srcsm[0] = (byte)(0x30 + LOGN);
// nonce
System.arraycopy(nonce, 0, srcsm, 1, NONCELEN);
// signature
System.arraycopy(esig, 0, srcsm, 1 + NONCELEN, sig_len);
return Arrays.copyOfRange(srcsm, 0, 1 + NONCELEN + sig_len);
}
int crypto_sign_open(boolean attached, byte[] sig_encoded, byte[] nonce, byte[] msg,
byte[] srcpk, int pk)
{
short[] h = new short[N],
hm = new short[N];
short[] sig = new short[N];
SHAKE256 sc = new SHAKE256();
int sig_len, msg_len;
FalconVrfy vrfy = new FalconVrfy();
FalconCommon common = new FalconCommon();
/*
* Decode public key.
*/
// if (srcpk[pk + 0] != (byte)(0x00 + LOGN))
// {
// return -1;
// }
if (codec.modq_decode(h, 0, LOGN, srcpk, pk, CRYPTO_PUBLICKEYBYTES - 1)
!= CRYPTO_PUBLICKEYBYTES - 1)
{
return -1;
}
vrfy.to_ntt_monty(h, 0, LOGN);
/*
* Find nonce, signature, message length.
*/
// if (smlen < 2 + NONCELEN)
// {
// return -1;
// }
// sig_len = (Byte.toUnsignedInt(srcsm[sm + 0]) << 8) | Byte.toUnsignedInt(srcsm[sm + 1]);
sig_len = sig_encoded.length;
// if (sig_len > (smlen - 2 - NONCELEN))
// {
// return -1;
// }
msg_len = msg.length;
/*
* Decode signature.
*/
// Check only required for attached signatures - see 3.11.3 and 3.11.6 in the spec
if (attached)
{
if (sig_len < 1 || sig_encoded[0] != (byte)(0x20 + LOGN))
{
return -1;
}
if (codec.comp_decode(sig, 0, LOGN,
sig_encoded, 1, sig_len - 1) != sig_len - 1)
{
return -1;
}
}
else
{
if (sig_len < 1 || codec.comp_decode(sig, 0, LOGN,
sig_encoded, 0, sig_len) != sig_len)
{
return -1;
}
}
/*
* Hash nonce + message into a vector.
*/
sc.inner_shake256_init();
sc.inner_shake256_inject(nonce, 0, NONCELEN);
sc.inner_shake256_inject(msg, 0, msg_len);
sc.i_shake256_flip();
common.hash_to_point_vartime(sc, hm, 0, LOGN); // TODO check if this needs to become ct
/*
* Verify signature.
*/
if (vrfy.verify_raw(hm, 0, sig, 0, h, 0, LOGN, new short[N], 0) == 0)
{
return -1;
}
/*
* Return plaintext.
*/
// System.arraycopy(srcsm, sm + 2 + NONCELEN, srcm, m, msg_len);
// mlen[0] = msg_len;
return 0;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy