algos_sig: new support for fmtseq192

It's quite rational to have such algorithm. 256-bit security is usually
an overkill, and this has two times smaller signatures (around 9.5kB) is
_so_ much faster. Use it.
This commit is contained in:
Mirek Kratochvil 2013-05-01 16:25:37 +02:00
parent 9b101c9548
commit 24bd5bd185
3 changed files with 69 additions and 8 deletions

View file

@ -24,15 +24,18 @@
void fill_algorithm_suite (algorithm_suite&s)
{
static algo_mceqd128 mce1;
mce1.register_into_suite (s);
static algo_mceqd128 mce128;
mce128.register_into_suite (s);
static algo_mceqd256 mce2;
mce2.register_into_suite (s);
static algo_mceqd256 mce256;
mce256.register_into_suite (s);
static algo_fmtseq128 fmt1;
fmt1.register_into_suite (s);
static algo_fmtseq128 fmt128;
fmt128.register_into_suite (s);
static algo_fmtseq256 fmt2;
fmt2.register_into_suite (s);
static algo_fmtseq192 fmt192;
fmt192.register_into_suite (s);
static algo_fmtseq256 fmt256;
fmt256.register_into_suite (s);
}

View file

@ -21,6 +21,7 @@
#include "fmtseq.h"
#include "sha_hash.h"
#include "rmd_hash.h"
#include "tiger_hash.h"
#include "arcfour.h"
/*
@ -184,6 +185,26 @@ int algo_fmtseq128::verify (const bvector&sig,
(sig, msg, pubkey);
}
int algo_fmtseq192::sign (const bvector&msg,
bvector&sig,
sencode**privkey,
bool&dirty,
prng&rng)
{
return fmtseq_generic_sign
<4, 4, 384, sha384hash, tiger192hash>
(msg, sig, privkey, dirty, rng);
}
int algo_fmtseq192::verify (const bvector&sig,
const bvector&msg,
sencode*pubkey)
{
return fmtseq_generic_verify
<4, 4, 384, sha384hash, tiger192hash>
(sig, msg, pubkey);
}
int algo_fmtseq256::sign (const bvector&msg,
bvector&sig,
sencode**privkey,
@ -219,6 +240,21 @@ int algo_fmtseq128::create_keypair (sencode**pub, sencode**priv, prng&rng)
return 0;
}
int algo_fmtseq192::create_keypair (sencode**pub, sencode**priv, prng&rng)
{
fmtseq::pubkey Pub;
fmtseq::privkey Priv;
tiger192hash hf;
if (fmtseq::generate (Pub, Priv, rng, hf, 384, 4, 4) )
return 1;
*pub = Pub.serialize();
*priv = Priv.serialize();
return 0;
}
int algo_fmtseq256::create_keypair (sencode**pub, sencode**priv, prng&rng)
{
fmtseq::pubkey Pub;

View file

@ -43,6 +43,28 @@ public:
int create_keypair (sencode**pub, sencode**priv, prng&rng);
};
class algo_fmtseq192 : public algorithm
{
public:
bool provides_signatures() {
return true;
}
bool provides_encryption() {
return false;
}
std::string get_alg_id() {
return "FMTSEQ192-SHA384-TIGER192";
}
virtual int sign (const bvector&msg, bvector&sig,
sencode** privkey, bool&dirty, prng&rng);
virtual int verify (const bvector&sig, const bvector&msg,
sencode* pubkey);
int create_keypair (sencode**pub, sencode**priv, prng&rng);
};
class algo_fmtseq256 : public algorithm
{
public: