mce_qcmdpc: QC-MDPC McEliece
This commit is contained in:
parent
878d326859
commit
17f77e16a4
|
@ -35,6 +35,14 @@ void fill_algorithm_suite (algorithm_suite&s)
|
||||||
do_alg (algo_mceqd128xs);
|
do_alg (algo_mceqd128xs);
|
||||||
do_alg (algo_mceqd192xs);
|
do_alg (algo_mceqd192xs);
|
||||||
do_alg (algo_mceqd256xs);
|
do_alg (algo_mceqd256xs);
|
||||||
|
|
||||||
|
do_alg (algo_mceqcmdpc128);
|
||||||
|
do_alg (algo_mceqcmdpc256);
|
||||||
|
do_alg (algo_mceqcmdpc128cha);
|
||||||
|
do_alg (algo_mceqcmdpc256cha);
|
||||||
|
do_alg (algo_mceqcmdpc128xs);
|
||||||
|
do_alg (algo_mceqcmdpc256xs);
|
||||||
|
|
||||||
do_alg (algo_fmtseq128);
|
do_alg (algo_fmtseq128);
|
||||||
do_alg (algo_fmtseq192);
|
do_alg (algo_fmtseq192);
|
||||||
do_alg (algo_fmtseq256);
|
do_alg (algo_fmtseq256);
|
||||||
|
@ -52,6 +60,14 @@ void fill_algorithm_suite (algorithm_suite&s)
|
||||||
do_alg (algo_mceqd128cubexs);
|
do_alg (algo_mceqd128cubexs);
|
||||||
do_alg (algo_mceqd192cubexs);
|
do_alg (algo_mceqd192cubexs);
|
||||||
do_alg (algo_mceqd256cubexs);
|
do_alg (algo_mceqd256cubexs);
|
||||||
|
|
||||||
|
do_alg (algo_mceqcmdpc128cube);
|
||||||
|
do_alg (algo_mceqcmdpc256cube);
|
||||||
|
do_alg (algo_mceqcmdpc128cubecha);
|
||||||
|
do_alg (algo_mceqcmdpc256cubecha);
|
||||||
|
do_alg (algo_mceqcmdpc128cubexs);
|
||||||
|
do_alg (algo_mceqcmdpc256cubexs);
|
||||||
|
|
||||||
do_alg (algo_fmtseq128cube);
|
do_alg (algo_fmtseq128cube);
|
||||||
do_alg (algo_fmtseq192cube);
|
do_alg (algo_fmtseq192cube);
|
||||||
do_alg (algo_fmtseq256cube);
|
do_alg (algo_fmtseq256cube);
|
||||||
|
|
|
@ -19,6 +19,18 @@
|
||||||
#include "algos_enc.h"
|
#include "algos_enc.h"
|
||||||
|
|
||||||
#include "mce_qd.h"
|
#include "mce_qd.h"
|
||||||
|
#include "mce_qcmdpc.h"
|
||||||
|
#include "arcfour.h"
|
||||||
|
#include "chacha.h"
|
||||||
|
#include "xsynd.h"
|
||||||
|
|
||||||
|
#if HAVE_CRYPTOPP==1
|
||||||
|
#include "sha_hash.h"
|
||||||
|
#include "rmd_hash.h"
|
||||||
|
#endif
|
||||||
|
#include "cube_hash.h"
|
||||||
|
|
||||||
|
typedef arcfour<byte, 8, 4096> arcfour_fo_cipher;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* keygen
|
* keygen
|
||||||
|
@ -38,6 +50,20 @@ static int mceqd_create_keypair (sencode**pub, sencode**priv, prng&rng)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
template<int bs, int bc, int wi, int t, int rounds, int delta>
|
||||||
|
static int mceqcmdpc_create_keypair (sencode**pub, sencode**priv, prng&rng)
|
||||||
|
{
|
||||||
|
mce_qcmdpc::pubkey Pub;
|
||||||
|
mce_qcmdpc::privkey Priv;
|
||||||
|
|
||||||
|
if (mce_qcmdpc::generate (Pub, Priv, rng, bs, bc, wi, t, rounds, delta))
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
*pub = Pub.serialize();
|
||||||
|
*priv = Priv.serialize();
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Padding. Ha-ha.
|
* Padding. Ha-ha.
|
||||||
*
|
*
|
||||||
|
@ -393,7 +419,80 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Instances for actual keygen/encryption/descryption algorithms
|
* Instances for MCE-QCMDPC algorithms
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define mceqcmdpc_create_keypair_func(name,bs,bc,wi,t,rnd,delta) \
|
||||||
|
int algo_mceqcmdpc##name::create_keypair (sencode**pub, sencode**priv, prng&rng) \
|
||||||
|
{ \
|
||||||
|
return mceqcmdpc_create_keypair<bs,bc,wi,t,rnd,delta> (pub, priv, rng); \
|
||||||
|
}
|
||||||
|
|
||||||
|
#if HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
|
mceqcmdpc_create_keypair_func (128, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256, 32771, 2, 137, 264, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (128cha, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256cha, 32771, 2, 137, 264, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (128xs, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256xs, 32771, 2, 137, 264, 60, 7)
|
||||||
|
|
||||||
|
#endif //HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
|
mceqcmdpc_create_keypair_func (128cube, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256cube, 32771, 2, 137, 264, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (128cubecha, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256cubecha, 32771, 2, 137, 264, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (128cubexs, 9857, 2, 71, 134, 60, 7)
|
||||||
|
mceqcmdpc_create_keypair_func (256cubexs, 32771, 2, 137, 264, 60, 7)
|
||||||
|
|
||||||
|
#define mceqcmdpc_create_encdec_func(name,bs,bc,errcount,hash_type,pad_hash_type,scipher,ranksize) \
|
||||||
|
int algo_mceqcmdpc##name::encrypt (const bvector&plain, bvector&cipher, \
|
||||||
|
sencode* pubkey, prng&rng) \
|
||||||
|
{ \
|
||||||
|
return fo_encrypt \
|
||||||
|
< mce_qcmdpc::pubkey, \
|
||||||
|
bs*(bc-1), bs*bc, errcount, \
|
||||||
|
hash_type, \
|
||||||
|
pad_hash_type, \
|
||||||
|
scipher, \
|
||||||
|
ranksize > \
|
||||||
|
(plain, cipher, pubkey, rng); \
|
||||||
|
} \
|
||||||
|
int algo_mceqcmdpc##name::decrypt (const bvector&cipher, bvector&plain, \
|
||||||
|
sencode* privkey) \
|
||||||
|
{ \
|
||||||
|
return fo_decrypt \
|
||||||
|
< mce_qcmdpc::privkey, \
|
||||||
|
bs*(bc-1), bs*bc, errcount, \
|
||||||
|
hash_type, \
|
||||||
|
pad_hash_type, \
|
||||||
|
scipher, \
|
||||||
|
ranksize > \
|
||||||
|
(cipher, plain, privkey); \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#if HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
|
mceqcmdpc_create_encdec_func (128, 9857, 2, 134, sha256hash, rmd128hash, arcfour_fo_cipher, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256, 32771, 2, 264, sha512hash, sha256hash, arcfour_fo_cipher, 2475)
|
||||||
|
mceqcmdpc_create_encdec_func (128cha, 9857, 2, 134, sha256hash, rmd128hash, chacha20, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256cha, 32771, 2, 264, sha512hash, sha256hash, chacha20, 2475)
|
||||||
|
mceqcmdpc_create_encdec_func (128xs, 9857, 2, 134, sha256hash, rmd128hash, xsynd, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256xs, 32771, 2, 264, sha512hash, sha256hash, xsynd, 2475)
|
||||||
|
|
||||||
|
#endif //HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
|
mceqcmdpc_create_encdec_func (128cube, 9857, 2, 134, cube256hash, cube128hash, arcfour_fo_cipher, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256cube, 32771, 2, 264, cube512hash, cube256hash, arcfour_fo_cipher, 2475)
|
||||||
|
mceqcmdpc_create_encdec_func (128cubecha, 9857, 2, 134, cube256hash, cube128hash, chacha20, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256cubecha, 32771, 2, 264, cube512hash, cube256hash, chacha20, 2475)
|
||||||
|
mceqcmdpc_create_encdec_func (128cubexs, 9857, 2, 134, cube256hash, cube128hash, xsynd, 1152)
|
||||||
|
mceqcmdpc_create_encdec_func (256cubexs, 32771, 2, 264, cube512hash, cube256hash, xsynd, 2475)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Instances for MCE-QD algorithms
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#define mceqd_create_keypair_func(name,m,T,b,d) \
|
#define mceqd_create_keypair_func(name,m,T,b,d) \
|
||||||
|
@ -426,12 +525,6 @@ mceqd_create_keypair_func (128cubexs, 16, 7, 32, 4)
|
||||||
mceqd_create_keypair_func (192cubexs, 16, 8, 27, 4)
|
mceqd_create_keypair_func (192cubexs, 16, 8, 27, 4)
|
||||||
mceqd_create_keypair_func (256cubexs, 16, 8, 32, 4)
|
mceqd_create_keypair_func (256cubexs, 16, 8, 32, 4)
|
||||||
|
|
||||||
#include "arcfour.h"
|
|
||||||
#include "chacha.h"
|
|
||||||
#include "xsynd.h"
|
|
||||||
|
|
||||||
typedef arcfour<byte, 8, 4096> arcfour_fo_cipher;
|
|
||||||
|
|
||||||
#define mceqd_create_encdec_func(name,plainsize,ciphersize,errcount, hash_type,pad_hash_type,scipher,ranksize) \
|
#define mceqd_create_encdec_func(name,plainsize,ciphersize,errcount, hash_type,pad_hash_type,scipher,ranksize) \
|
||||||
int algo_mceqd##name::encrypt (const bvector&plain, bvector&cipher, \
|
int algo_mceqd##name::encrypt (const bvector&plain, bvector&cipher, \
|
||||||
sencode* pubkey, prng&rng) \
|
sencode* pubkey, prng&rng) \
|
||||||
|
@ -461,9 +554,6 @@ int algo_mceqd##name::decrypt (const bvector&cipher, bvector&plain, \
|
||||||
|
|
||||||
#if HAVE_CRYPTOPP==1
|
#if HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
#include "sha_hash.h"
|
|
||||||
#include "rmd_hash.h"
|
|
||||||
|
|
||||||
mceqd_create_encdec_func (128, 2048, 4096, 128, sha256hash, rmd128hash, arcfour_fo_cipher, 816)
|
mceqd_create_encdec_func (128, 2048, 4096, 128, sha256hash, rmd128hash, arcfour_fo_cipher, 816)
|
||||||
mceqd_create_encdec_func (192, 2816, 6912, 256, sha384hash, rmd128hash, arcfour_fo_cipher, 1574)
|
mceqd_create_encdec_func (192, 2816, 6912, 256, sha384hash, rmd128hash, arcfour_fo_cipher, 1574)
|
||||||
mceqd_create_encdec_func (256, 4096, 8192, 256, sha512hash, rmd128hash, arcfour_fo_cipher, 1638)
|
mceqd_create_encdec_func (256, 4096, 8192, 256, sha512hash, rmd128hash, arcfour_fo_cipher, 1638)
|
||||||
|
@ -476,8 +566,6 @@ mceqd_create_encdec_func (256xs, 4096, 8192, 256, sha512hash, rmd128hash, xsynd,
|
||||||
|
|
||||||
#endif //HAVE_CRYPTOPP==1
|
#endif //HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
#include "cube_hash.h"
|
|
||||||
|
|
||||||
mceqd_create_encdec_func (128cube, 2048, 4096, 128, cube256hash, cube128hash, arcfour_fo_cipher, 816)
|
mceqd_create_encdec_func (128cube, 2048, 4096, 128, cube256hash, cube128hash, arcfour_fo_cipher, 816)
|
||||||
mceqd_create_encdec_func (192cube, 2816, 6912, 256, cube384hash, cube128hash, arcfour_fo_cipher, 1574)
|
mceqd_create_encdec_func (192cube, 2816, 6912, 256, cube384hash, cube128hash, arcfour_fo_cipher, 1574)
|
||||||
mceqd_create_encdec_func (256cube, 4096, 8192, 256, cube512hash, cube128hash, arcfour_fo_cipher, 1638)
|
mceqd_create_encdec_func (256cube, 4096, 8192, 256, cube512hash, cube128hash, arcfour_fo_cipher, 1638)
|
||||||
|
|
|
@ -21,8 +21,8 @@
|
||||||
|
|
||||||
#include "algorithm.h"
|
#include "algorithm.h"
|
||||||
|
|
||||||
#define mceqd_alg_class(name,alg_id) \
|
#define mce_alg_class(name,alg_id) \
|
||||||
class algo_mceqd##name : public algorithm \
|
class algo_mce##name : public algorithm \
|
||||||
{ \
|
{ \
|
||||||
public: \
|
public: \
|
||||||
bool provides_signatures() { \
|
bool provides_signatures() { \
|
||||||
|
@ -47,15 +47,22 @@ public: \
|
||||||
* SHA-based variants
|
* SHA-based variants
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mceqd_alg_class (128, "MCEQD128FO-SHA256-ARCFOUR");
|
mce_alg_class (qd128, "MCEQD128FO-SHA256-ARCFOUR");
|
||||||
mceqd_alg_class (192, "MCEQD192FO-SHA384-ARCFOUR");
|
mce_alg_class (qd192, "MCEQD192FO-SHA384-ARCFOUR");
|
||||||
mceqd_alg_class (256, "MCEQD256FO-SHA512-ARCFOUR");
|
mce_alg_class (qd256, "MCEQD256FO-SHA512-ARCFOUR");
|
||||||
mceqd_alg_class (128cha, "MCEQD128FO-SHA256-CHACHA20");
|
mce_alg_class (qd128cha, "MCEQD128FO-SHA256-CHACHA20");
|
||||||
mceqd_alg_class (192cha, "MCEQD192FO-SHA384-CHACHA20");
|
mce_alg_class (qd192cha, "MCEQD192FO-SHA384-CHACHA20");
|
||||||
mceqd_alg_class (256cha, "MCEQD256FO-SHA512-CHACHA20");
|
mce_alg_class (qd256cha, "MCEQD256FO-SHA512-CHACHA20");
|
||||||
mceqd_alg_class (128xs, "MCEQD128FO-SHA256-XSYND");
|
mce_alg_class (qd128xs, "MCEQD128FO-SHA256-XSYND");
|
||||||
mceqd_alg_class (192xs, "MCEQD192FO-SHA384-XSYND");
|
mce_alg_class (qd192xs, "MCEQD192FO-SHA384-XSYND");
|
||||||
mceqd_alg_class (256xs, "MCEQD256FO-SHA512-XSYND");
|
mce_alg_class (qd256xs, "MCEQD256FO-SHA512-XSYND");
|
||||||
|
|
||||||
|
mce_alg_class (qcmdpc128, "MCEQCMDPC128FO-SHA256-ARCFOUR");
|
||||||
|
mce_alg_class (qcmdpc256, "MCEQCMDPC256FO-SHA512-ARCFOUR");
|
||||||
|
mce_alg_class (qcmdpc128cha, "MCEQCMDPC128FO-SHA256-CHACHA20");
|
||||||
|
mce_alg_class (qcmdpc256cha, "MCEQCMDPC256FO-SHA512-CHACHA20");
|
||||||
|
mce_alg_class (qcmdpc128xs, "MCEQCMDPC128FO-SHA256-XSYND");
|
||||||
|
mce_alg_class (qcmdpc256xs, "MCEQCMDPC256FO-SHA512-XSYND");
|
||||||
|
|
||||||
#endif //HAVE_CRYPTOPP==1
|
#endif //HAVE_CRYPTOPP==1
|
||||||
|
|
||||||
|
@ -63,15 +70,21 @@ mceqd_alg_class (256xs, "MCEQD256FO-SHA512-XSYND");
|
||||||
* Cubehash-based variants
|
* Cubehash-based variants
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mceqd_alg_class (128cube, "MCEQD128FO-CUBE256-ARCFOUR");
|
mce_alg_class (qd128cube, "MCEQD128FO-CUBE256-ARCFOUR");
|
||||||
mceqd_alg_class (192cube, "MCEQD192FO-CUBE384-ARCFOUR");
|
mce_alg_class (qd192cube, "MCEQD192FO-CUBE384-ARCFOUR");
|
||||||
mceqd_alg_class (256cube, "MCEQD256FO-CUBE512-ARCFOUR");
|
mce_alg_class (qd256cube, "MCEQD256FO-CUBE512-ARCFOUR");
|
||||||
mceqd_alg_class (128cubecha, "MCEQD128FO-CUBE256-CHACHA20");
|
mce_alg_class (qd128cubecha, "MCEQD128FO-CUBE256-CHACHA20");
|
||||||
mceqd_alg_class (192cubecha, "MCEQD192FO-CUBE384-CHACHA20");
|
mce_alg_class (qd192cubecha, "MCEQD192FO-CUBE384-CHACHA20");
|
||||||
mceqd_alg_class (256cubecha, "MCEQD256FO-CUBE512-CHACHA20");
|
mce_alg_class (qd256cubecha, "MCEQD256FO-CUBE512-CHACHA20");
|
||||||
mceqd_alg_class (128cubexs, "MCEQD128FO-CUBE256-XSYND");
|
mce_alg_class (qd128cubexs, "MCEQD128FO-CUBE256-XSYND");
|
||||||
mceqd_alg_class (192cubexs, "MCEQD192FO-CUBE384-XSYND");
|
mce_alg_class (qd192cubexs, "MCEQD192FO-CUBE384-XSYND");
|
||||||
mceqd_alg_class (256cubexs, "MCEQD256FO-CUBE512-XSYND");
|
mce_alg_class (qd256cubexs, "MCEQD256FO-CUBE512-XSYND");
|
||||||
|
|
||||||
|
mce_alg_class (qcmdpc128cube, "MCEQCMDPC128FO-CUBE256-ARCFOUR");
|
||||||
|
mce_alg_class (qcmdpc256cube, "MCEQCMDPC256FO-CUBE512-ARCFOUR");
|
||||||
|
mce_alg_class (qcmdpc128cubecha, "MCEQCMDPC128FO-CUBE256-CHACHA20");
|
||||||
|
mce_alg_class (qcmdpc256cubecha, "MCEQCMDPC256FO-CUBE512-CHACHA20");
|
||||||
|
mce_alg_class (qcmdpc128cubexs, "MCEQCMDPC128FO-CUBE256-XSYND");
|
||||||
|
mce_alg_class (qcmdpc256cubexs, "MCEQCMDPC256FO-CUBE512-XSYND");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
222
src/mce_qcmdpc.cpp
Normal file
222
src/mce_qcmdpc.cpp
Normal file
|
@ -0,0 +1,222 @@
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This file is part of Codecrypt.
|
||||||
|
*
|
||||||
|
* Codecrypt is free software: you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU Lesser General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or (at
|
||||||
|
* your option) any later version.
|
||||||
|
*
|
||||||
|
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
||||||
|
* License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public License
|
||||||
|
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "mce_qcmdpc.h"
|
||||||
|
|
||||||
|
#include "gf2m.h"
|
||||||
|
#include "polynomial.h"
|
||||||
|
|
||||||
|
using namespace mce_qcmdpc;
|
||||||
|
|
||||||
|
int mce_qcmdpc::generate (pubkey&pub, privkey&priv, prng&rng,
|
||||||
|
uint block_size, uint block_count, uint wi,
|
||||||
|
uint t, uint rounds, uint delta)
|
||||||
|
{
|
||||||
|
uint i, j;
|
||||||
|
priv.H.resize (block_count);
|
||||||
|
|
||||||
|
if (wi > block_size / 2) return 1; //safety
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Trick. Cyclomatic matrix of size n is invertible if a
|
||||||
|
* polynomial that's made up from its first row is coprime to
|
||||||
|
* (x^n-1), the polynomial inversion and matrix inversion are
|
||||||
|
* then isomorphic.
|
||||||
|
*/
|
||||||
|
gf2m gf;
|
||||||
|
gf.create (1); //binary
|
||||||
|
polynomial xmm1; //x^m-1
|
||||||
|
xmm1.resize (block_size + 1, 0);
|
||||||
|
xmm1[0] = 1;
|
||||||
|
xmm1[block_size] = 1;
|
||||||
|
polynomial last_inv_H;
|
||||||
|
for (;;) {
|
||||||
|
//retry generating the rightmost block until it is invertible
|
||||||
|
polynomial g;
|
||||||
|
g.resize (block_size, 0);
|
||||||
|
for (i = 0; i < wi; ++i)
|
||||||
|
for (uint pos = rng.random (block_size);
|
||||||
|
g[pos] ? 1 : (g[pos] = 1, 0);
|
||||||
|
pos = rng.random (block_size));
|
||||||
|
|
||||||
|
//try if it is coprime to (x^n-1)
|
||||||
|
polynomial gcd = g.gcd (xmm1, gf);
|
||||||
|
if (!gcd.one()) continue; //it isn't.
|
||||||
|
|
||||||
|
//if it is, save it to matrix (in "reverse" order for columns)
|
||||||
|
priv.H[block_count - 1].resize (block_size, 0);
|
||||||
|
for (i = 0; i < block_size && i < g.size(); ++i)
|
||||||
|
priv.H[block_count - 1][i] = g[ (-i) % block_size];
|
||||||
|
|
||||||
|
//invert it, save for later and succeed.
|
||||||
|
g.inv (xmm1, gf);
|
||||||
|
last_inv_H = g;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
//generate the rests of matrix blocks, fill the G right away.
|
||||||
|
pub.G.resize (block_count - 1);
|
||||||
|
for (i = 0; i < block_count - 1; ++i) {
|
||||||
|
polynomial hi;
|
||||||
|
hi.resize (block_size, 0);
|
||||||
|
|
||||||
|
//generate the polynomial corresponding to the first row
|
||||||
|
for (j = 0; j < wi; ++j)
|
||||||
|
for (uint pos = rng.random (block_size);
|
||||||
|
hi[pos] ? 1 : (hi[pos] = 1, 0);
|
||||||
|
pos = rng.random (block_size));
|
||||||
|
//save it to H
|
||||||
|
priv.H[i].resize (block_size);
|
||||||
|
for (j = 0; j < block_size; ++j) priv.H[i][j] = hi[ (-j) % block_size];
|
||||||
|
|
||||||
|
//compute inv(H[last])*H[i]
|
||||||
|
hi.mult (last_inv_H, gf);
|
||||||
|
hi.mod (xmm1, gf);
|
||||||
|
//save it to G
|
||||||
|
pub.G[i].resize (block_size);
|
||||||
|
for (j = 0; j < block_size; ++j) pub.G[i][j] = hi[j % block_size];
|
||||||
|
}
|
||||||
|
|
||||||
|
//save the target params
|
||||||
|
pub.t = priv.t = t;
|
||||||
|
priv.rounds = rounds;
|
||||||
|
priv.delta = delta;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
int privkey::prepare()
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
int pubkey::encrypt (const bvector& in, bvector&out, prng&rng)
|
||||||
|
{
|
||||||
|
uint s = cipher_size();
|
||||||
|
|
||||||
|
if (t > s) return 1;
|
||||||
|
|
||||||
|
//create the error vector
|
||||||
|
bvector e;
|
||||||
|
e.resize (s);
|
||||||
|
for (uint i = 0; i < t; ++i)
|
||||||
|
for (uint pos = rng.random (s);
|
||||||
|
e[pos] ? 1 : (e[pos] = 1, 0);
|
||||||
|
pos = rng.random (s));
|
||||||
|
|
||||||
|
return encrypt (in, out, e);
|
||||||
|
}
|
||||||
|
|
||||||
|
int pubkey::encrypt (const bvector&in, bvector&out, const bvector&errors)
|
||||||
|
{
|
||||||
|
|
||||||
|
uint ps = plain_size();
|
||||||
|
if (in.size() != ps) return 1;
|
||||||
|
uint bs = G[0].size();
|
||||||
|
for (uint i = 1; i < G.size(); ++i) if (G[i].size() != bs) return 1; //prevent mangled keys
|
||||||
|
|
||||||
|
//first, the checksum part
|
||||||
|
bvector bcheck;
|
||||||
|
|
||||||
|
//G stores first row(s) of the circulant matrix blocks, proceed row-by-row and construct the checkum
|
||||||
|
for (uint i = 0; i < ps; ++i)
|
||||||
|
if (in[i]) bcheck.rot_add (G[ (i % ps) / bs], i % bs);
|
||||||
|
|
||||||
|
//compute the ciphertext
|
||||||
|
out = in;
|
||||||
|
out.append (bcheck);
|
||||||
|
out.add (errors);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
int privkey::decrypt (const bvector & in, bvector & out)
|
||||||
|
{
|
||||||
|
bvector tmp_errors;
|
||||||
|
return decrypt (in, out, tmp_errors);
|
||||||
|
}
|
||||||
|
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
|
#include "iohelpers.h"
|
||||||
|
#include "ios.h"
|
||||||
|
|
||||||
|
int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
|
||||||
|
{
|
||||||
|
uint i;
|
||||||
|
uint cs = cipher_size();
|
||||||
|
|
||||||
|
if (in_orig.size() != cs) return 1;
|
||||||
|
uint bs;
|
||||||
|
bs = H[0].size();
|
||||||
|
|
||||||
|
/*
|
||||||
|
* probabilistic decoding!
|
||||||
|
*/
|
||||||
|
|
||||||
|
//compute the syndrome first
|
||||||
|
bvector syndrome;
|
||||||
|
syndrome.resize (bs, 0);
|
||||||
|
bvector in = in_orig; //we will modify it
|
||||||
|
|
||||||
|
for (i = 0; i < cs; ++i) if (in[i])
|
||||||
|
syndrome.rot_add (H[i / bs], (cs - i) % bs);
|
||||||
|
|
||||||
|
//minimize counts of unsatisfied equations by flipping
|
||||||
|
std::vector<uint> unsatisfied;
|
||||||
|
unsatisfied.resize (cs, 0);
|
||||||
|
|
||||||
|
for (i = 0; i < rounds; ++i) {
|
||||||
|
uint bit, max_unsat;
|
||||||
|
bvector tmp;
|
||||||
|
max_unsat = 0;
|
||||||
|
for (bit = 0; bit < cs; ++bit) {
|
||||||
|
tmp.fill_zeros();
|
||||||
|
tmp.rot_add (H[bit / bs], (cs - bit) % bs);
|
||||||
|
unsatisfied[bit] = tmp.and_hamming_weight (syndrome);
|
||||||
|
if (unsatisfied[bit] > max_unsat) max_unsat = unsatisfied[bit];
|
||||||
|
}
|
||||||
|
|
||||||
|
//TODO what about timing attacks?
|
||||||
|
if (!max_unsat) break;
|
||||||
|
|
||||||
|
uint threshold = 0;
|
||||||
|
if (max_unsat > delta) threshold = max_unsat - delta;
|
||||||
|
|
||||||
|
//TODO also timing (but it gets pretty statistically hard here I guess)
|
||||||
|
uint flipped = 0;
|
||||||
|
for (bit = 0; bit < cs; ++bit)
|
||||||
|
if (unsatisfied[bit] > threshold) {
|
||||||
|
in[bit] = !in[bit];
|
||||||
|
syndrome.rot_add (H[bit / bs], (cs - bit) % bs);
|
||||||
|
++flipped;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (i == rounds) return 2; //we simply failed
|
||||||
|
|
||||||
|
errors = in_orig;
|
||||||
|
errors.add (in); //get the difference
|
||||||
|
out (errors);
|
||||||
|
out = in;
|
||||||
|
out.resize (plain_size());
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
90
src/mce_qcmdpc.h
Normal file
90
src/mce_qcmdpc.h
Normal file
|
@ -0,0 +1,90 @@
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This file is part of Codecrypt.
|
||||||
|
*
|
||||||
|
* Codecrypt is free software: you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU Lesser General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or (at
|
||||||
|
* your option) any later version.
|
||||||
|
*
|
||||||
|
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
||||||
|
* License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public License
|
||||||
|
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef _ccr_mce_qcmdpc_h_
|
||||||
|
#define _ccr_mce_qcmdpc_h_
|
||||||
|
|
||||||
|
#include <vector>
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
#include "bvector.h"
|
||||||
|
#include "matrix.h"
|
||||||
|
#include "prng.h"
|
||||||
|
#include "sencode.h"
|
||||||
|
#include "types.h"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* quasi-cyclic MDPC McEliece
|
||||||
|
* Implemented accordingly to the paper by Misoczki, Tillich, Sendrier and Barreto.
|
||||||
|
*/
|
||||||
|
namespace mce_qcmdpc
|
||||||
|
{
|
||||||
|
class privkey
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
matrix H; //elems = _cols_ of H blocks (at least 2)
|
||||||
|
uint t;
|
||||||
|
uint rounds;
|
||||||
|
uint delta;
|
||||||
|
|
||||||
|
int decrypt (const bvector&, bvector&);
|
||||||
|
int decrypt (const bvector&, bvector&, bvector&);
|
||||||
|
int prepare();
|
||||||
|
|
||||||
|
uint cipher_size() {
|
||||||
|
return H[0].size() * H.size();
|
||||||
|
}
|
||||||
|
uint plain_size() {
|
||||||
|
return H[0].size() * (H.size() - 1);
|
||||||
|
}
|
||||||
|
uint error_count() {
|
||||||
|
return t;
|
||||||
|
}
|
||||||
|
|
||||||
|
sencode* serialize();
|
||||||
|
bool unserialize (sencode*);
|
||||||
|
};
|
||||||
|
|
||||||
|
class pubkey
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
matrix G; //elems = top lines of right-side G blocks
|
||||||
|
uint t; //error count
|
||||||
|
|
||||||
|
int encrypt (const bvector&, bvector&, prng&);
|
||||||
|
int encrypt (const bvector&, bvector&, const bvector&);
|
||||||
|
|
||||||
|
uint cipher_size() {
|
||||||
|
return G[0].size() * (G.size() + 1);
|
||||||
|
}
|
||||||
|
uint plain_size() {
|
||||||
|
return G[0].size() * G.size();
|
||||||
|
}
|
||||||
|
uint error_count() {
|
||||||
|
return t;
|
||||||
|
}
|
||||||
|
|
||||||
|
sencode* serialize();
|
||||||
|
bool unserialize (sencode*);
|
||||||
|
};
|
||||||
|
|
||||||
|
int generate (pubkey&, privkey&, prng&, uint blocksize, uint blocks, uint wi,
|
||||||
|
uint t, uint rounds, uint delta);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
|
@ -23,9 +23,8 @@
|
||||||
#include "gf2m.h"
|
#include "gf2m.h"
|
||||||
#include "polynomial.h"
|
#include "polynomial.h"
|
||||||
#include "permutation.h"
|
#include "permutation.h"
|
||||||
#include "mce.h"
|
|
||||||
#include "nd.h"
|
|
||||||
#include "mce_qd.h"
|
#include "mce_qd.h"
|
||||||
|
#include "mce_qcmdpc.h"
|
||||||
#include "fmtseq.h"
|
#include "fmtseq.h"
|
||||||
#include "message.h"
|
#include "message.h"
|
||||||
#include "hashfile.h"
|
#include "hashfile.h"
|
||||||
|
@ -66,8 +65,12 @@ sencode* bvector::serialize()
|
||||||
uint ss = (size() + 7) / 8;
|
uint ss = (size() + 7) / 8;
|
||||||
std::string bytes;
|
std::string bytes;
|
||||||
bytes.resize (ss, '\0');
|
bytes.resize (ss, '\0');
|
||||||
for (uint i = 0; i < size(); ++i)
|
//the padding of each vector is zero, we can stuff the bytes right in. Just make it sure here:
|
||||||
if (item (i)) bytes[i / 8] |= 1 << (i % 8);
|
fix_padding();
|
||||||
|
|
||||||
|
for (size_t i = 0; i < size(); i += 8)
|
||||||
|
bytes[i >> 3] = (_data[i >> 6] >> ( ( (i >> 3) & 7) << 3)) & 0xff;
|
||||||
|
|
||||||
sencode_list*l = new sencode_list;
|
sencode_list*l = new sencode_list;
|
||||||
l->items.push_back (new sencode_int (size()));
|
l->items.push_back (new sencode_int (size()));
|
||||||
l->items.push_back (new sencode_bytes (bytes));
|
l->items.push_back (new sencode_bytes (bytes));
|
||||||
|
@ -84,15 +87,14 @@ bool bvector::unserialize (sencode* s)
|
||||||
if (bytes->b.size() != ( (size->i + 7) / 8)) return false;
|
if (bytes->b.size() != ( (size->i + 7) / 8)) return false;
|
||||||
clear();
|
clear();
|
||||||
resize (size->i, 0);
|
resize (size->i, 0);
|
||||||
for (i = 0; i < size->i; ++i)
|
for (i = 0; i < _size; i += 8)
|
||||||
if ( (bytes->b[i / 8] >> (i % 8)) & 1)
|
_data[i >> 6] |= ( (uint64_t) (unsigned char) bytes->b[i >> 3]) << ( ( (i >> 3) & 7) << 3);
|
||||||
item (i) = 1;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* the important part. verify that padding is always zero, because
|
* the important part. verify that padding is always zero, because
|
||||||
* sencode serialization must be bijective
|
* sencode serialization must be bijective
|
||||||
*/
|
*/
|
||||||
for (; i < 8 * bytes->b.size(); ++i)
|
for (i = _size; i < 8 * bytes->b.size(); ++i)
|
||||||
if ( (bytes->b[i / 8] >> (i % 8)) & 1)
|
if ( (bytes->b[i / 8] >> (i % 8)) & 1)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
|
@ -368,6 +370,67 @@ bool fmtseq::privkey::tree_stk_item::unserialize (sencode*s)
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sencode* mce_qcmdpc::pubkey::serialize()
|
||||||
|
{
|
||||||
|
sencode_list*l = new sencode_list;
|
||||||
|
l->items.resize (3);
|
||||||
|
l->items[0] = new sencode_bytes (PUBKEY_IDENT "QCMDPC-MCE");
|
||||||
|
l->items[1] = new sencode_int (t);
|
||||||
|
l->items[2] = G.serialize();
|
||||||
|
return l;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool mce_qcmdpc::pubkey::unserialize (sencode* s)
|
||||||
|
{
|
||||||
|
sencode_list*CAST_LIST (s, l);
|
||||||
|
if (l->items.size() != 3) return false;
|
||||||
|
|
||||||
|
sencode_bytes*CAST_BYTES (l->items[0], ident);
|
||||||
|
if (ident->b.compare (PUBKEY_IDENT "QCMDPC-MCE")) return false;
|
||||||
|
|
||||||
|
sencode_int*CAST_INT (l->items[1], p);
|
||||||
|
t = p->i;
|
||||||
|
|
||||||
|
if (!G.unserialize (l->items[2])) return false;
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
sencode* mce_qcmdpc::privkey::serialize()
|
||||||
|
{
|
||||||
|
sencode_list*l = new sencode_list;
|
||||||
|
l->items.resize (5);
|
||||||
|
l->items[0] = new sencode_bytes (PRIVKEY_IDENT "QCMDPC-MCE");
|
||||||
|
l->items[1] = new sencode_int (t);
|
||||||
|
l->items[2] = new sencode_int (rounds);
|
||||||
|
l->items[3] = new sencode_int (delta);
|
||||||
|
l->items[4] = H.serialize();
|
||||||
|
return l;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool mce_qcmdpc::privkey::unserialize (sencode*s)
|
||||||
|
{
|
||||||
|
sencode_list*CAST_LIST (s, l);
|
||||||
|
if (l->items.size() != 5) return false;
|
||||||
|
|
||||||
|
sencode_bytes*CAST_BYTES (l->items[0], ident);
|
||||||
|
if (ident->b.compare (PRIVKEY_IDENT "QCMDPC-MCE")) return false;
|
||||||
|
|
||||||
|
sencode_int*CAST_INT (l->items[1], p);
|
||||||
|
t = p->i;
|
||||||
|
|
||||||
|
CAST_INT (l->items[2], p);
|
||||||
|
rounds = p->i;
|
||||||
|
|
||||||
|
CAST_INT (l->items[3], p);
|
||||||
|
delta = p->i;
|
||||||
|
|
||||||
|
if (!H.unserialize (l->items[4])) return false;
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
sencode* fmtseq::privkey::serialize()
|
sencode* fmtseq::privkey::serialize()
|
||||||
{
|
{
|
||||||
/*
|
/*
|
||||||
|
|
Loading…
Reference in a new issue