mce_qcmdpc: implement faster decoding

This replaces the periodic recalculation of error correlations and the syndrome
by in-place modification. Bit flip is therefore a bit slower, but overall
decoding of the 256-bit secure variant fits in 200ms, and 128-bit variant
decodes under 20ms.

There still could be some (blatantly nondeterministic) method to do this using
FFT, research underway.
This commit is contained in:
Mirek Kratochvil 2015-11-15 17:11:49 +01:00
parent 4b8f65ab2d
commit 78a00ae3ce
3 changed files with 83 additions and 40 deletions

View file

@ -351,6 +351,11 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
//decrypt the symmetric key //decrypt the symmetric key
volatile bool failed = Priv.decrypt (mce_cipher, mce_plain, ev); volatile bool failed = Priv.decrypt (mce_cipher, mce_plain, ev);
if (failed) { //prevent memory errors
ev.resize (ciphersize, 0);
mce_plain.resize (plainsize, 0);
}
/* /*
* if decoding failed, ev contains something weird. We need to make it * if decoding failed, ev contains something weird. We need to make it
* to contain some dummy (but still valid) error vector that would work * to contain some dummy (but still valid) error vector that would work
@ -419,21 +424,21 @@ int algo_mceqcmdpc##name::create_keypair (sencode**pub, sencode**priv, prng&rng)
#if HAVE_CRYPTOPP==1 #if HAVE_CRYPTOPP==1
mceqcmdpc_create_keypair_func (128, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256, 32771, 2, 137, 264, 40, 4)
mceqcmdpc_create_keypair_func (128cha, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128cha, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256cha, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256cha, 32771, 2, 137, 264, 40, 4)
mceqcmdpc_create_keypair_func (128xs, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128xs, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256xs, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256xs, 32771, 2, 137, 264, 40, 4)
#endif //HAVE_CRYPTOPP==1 #endif //HAVE_CRYPTOPP==1
mceqcmdpc_create_keypair_func (128cube, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128cube, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256cube, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256cube, 32771, 2, 137, 264, 40, 4)
mceqcmdpc_create_keypair_func (128cubecha, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128cubecha, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256cubecha, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256cubecha, 32771, 2, 137, 264, 40, 4)
mceqcmdpc_create_keypair_func (128cubexs, 9857, 2, 71, 134, 60, 5) mceqcmdpc_create_keypair_func (128cubexs, 9857, 2, 71, 134, 25, 4)
mceqcmdpc_create_keypair_func (256cubexs, 32771, 2, 137, 264, 60, 8) mceqcmdpc_create_keypair_func (256cubexs, 32771, 2, 137, 264, 40, 4)
#define mceqcmdpc_create_encdec_func(name,bs,bc,errcount,hash_type,pad_hash_type,scipher,ranksize) \ #define mceqcmdpc_create_encdec_func(name,bs,bc,errcount,hash_type,pad_hash_type,scipher,ranksize) \
int algo_mceqcmdpc##name::encrypt (const bvector&plain, bvector&cipher, \ int algo_mceqcmdpc##name::encrypt (const bvector&plain, bvector&cipher, \

View file

@ -165,6 +165,10 @@ public:
_data[blockof (i)] &= ~ ( ( (uint64_t) 1) << blockpos (i)); _data[blockof (i)] &= ~ ( ( (uint64_t) 1) << blockpos (i));
} }
inline void flip (size_t i) {
_data[blockof (i)] = _data[blockof (i)] ^ ( ( (uint64_t) 1) << blockpos (i));
}
inline const_reference operator[] (size_t pos) const { inline const_reference operator[] (size_t pos) const {
return const_reference (*this, pos); return const_reference (*this, pos);
} }

View file

@ -189,6 +189,7 @@ int privkey::decrypt (const bvector & in, bvector & out)
} }
#include <vector> #include <vector>
#include <list>
int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors) int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
{ {
@ -222,49 +223,82 @@ int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
bvector (syndrome); bvector (syndrome);
fft (synd_diag, syndrome); fft (synd_diag, syndrome);
vector<unsigned> unsat; //precompute sparse matrix indexes
unsat.resize (cs, 0); vector<list<uint> > Hsp;
Hsp.resize (blocks);
for (i = 0; i < rounds; ++i) { for (i = 0; i < blocks; ++i)
for (j = 0; j < bs; ++j)
if (H[i][j])
Hsp[i].push_back (j);
/* /*
* count the correlations, abuse the sparsity of matrices. * count the correlations, abuse the sparsity of matrices.
* *
* TODO this is the slowest part of the whole thing. It's all * TODO updating the counts and so is the slowest part of the whole
* probabilistic, maybe there could be some potential to speed * thing. It's all probabilistic, maybe there could be some potential
* it up by discarding some (already missing) precision. * to speed it up by discarding some (already missing) precision.
* *
* FFT would be a cool candidate. * FFT would be a cool candidate.
*/ */
for (j = 0; j < cs; ++j) unsat[j] = 0; vector<unsigned> unsat;
for (uint Hi = 0; Hi < cs; ++Hi) unsat.resize (cs, 0);
if (H[Hi / bs][Hi % bs]) {
uint blk = Hi / bs; for (uint blk = 0; blk < blocks; ++blk)
for (uint i : Hsp[blk]) {
for (j = 0; j < bs; ++j) for (j = 0; j < bs; ++j)
if (syndrome[j]) if (syndrome[j])
++unsat[blk * bs + ++unsat[blk * bs + (j + bs - i) % bs];
(j + cs - Hi) % bs];
} }
uint round;
for (round = 0; round < rounds; ++round) {
uint max_unsat = 0; uint max_unsat = 0;
for (j = 0; j < cs; ++j) for (i = 0; i < cs; ++i)
if (unsat[j] > max_unsat) max_unsat = unsat[j]; if (unsat[i] > max_unsat) max_unsat = unsat[i];
if (!max_unsat) break; if (!max_unsat) break;
if(max_unsat>bs) out("EROR?!!!");
//TODO do something about possible timing attacks //TODO do something about possible timing attacks
uint threshold = 0; uint threshold = 0;
if (max_unsat > delta) threshold = max_unsat - delta; if (max_unsat > delta) threshold = max_unsat - delta;
//TODO also timing (but it gets pretty statistically hard here I guess) for (uint bit = 0; bit < cs; ++bit) {
for (uint bit = 0; bit < cs; ++bit) if (unsat[bit] <= threshold) continue;
if (unsat[bit] > threshold) {
in[bit] = !in[bit]; /*
syndrome.rot_add (H[bit / bs], bit % bs); * heavy trickery starts here, we carefully
* modify the state to avoid necessity of
* recomputation as a whole.
*/
uint blk = bit / bs, blkpos = bit % bs;
//adjust the error counts that were
//caused by this column of H
for (uint hpos : Hsp[blk]) {
hpos += blkpos;
//decide whether there's 1 or 0
bool increase = !syndrome[hpos % bs];
for (uint b2 = 0; b2 < blocks; ++b2)
for (uint h2 : Hsp[b2]) {
unsigned&ref = unsat[b2 * bs +
(hpos + bs - h2) % bs];
if (increase) ++ref;
else --ref;
}
//and flip it
syndrome.flip (hpos % bs);
}
//fix the bit
in.flip (bit);
} }
} }
if (i == rounds) return 2; //we simply failed if (round == rounds) return 3; //we simply failed, haha.
errors = in_orig; errors = in_orig;
errors.add (in); //get the difference errors.add (in); //get the difference