From c345408cc823a5547cc0279b7348392522ce8498 Mon Sep 17 00:00:00 2001 From: Mirek Kratochvil Date: Thu, 17 Jan 2013 12:05:01 +0100 Subject: [PATCH] algos_enc: padding --- src/algos_enc.cpp | 104 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 104 insertions(+) diff --git a/src/algos_enc.cpp b/src/algos_enc.cpp index ff62211..b821f68 100644 --- a/src/algos_enc.cpp +++ b/src/algos_enc.cpp @@ -20,6 +20,10 @@ #include "mce_qd.h" +/* + * keygen + */ + int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng) { mce_qd::pubkey Pub; @@ -46,4 +50,104 @@ int algo_mceqd256::create_keypair (sencode**pub, sencode**priv, prng&rng) return 0; } +/* + * Padding. Ha-ha. + * + * This wouldn't be necessary, but the ciphertext length would then very easily + * leak information about plaintext length (= len(c) - len(McE block) ). + * Moreover we need to somehow convert bvector bits to actual bytes. + * + * First, the bvector is converted to vector of bytes so it's easy to work with + * it. Result is in the form + * + * bits [randombits] nrbits + * + * where + * bits = message bits + * randombits = randomness that pads the message bits to whole byte. + * nrbits = 1 byte with number of random bits applied + * + * Then we are padding stuff in 256-byte blocks this way: + * + * messagemessage [randomrandomrandom] 1bytesize + * + * where + * message = "tail" of the message that has overflown to the last block + * random = random bytes + * 1bytesize = how many bytes of the mesage are there in the last block + * + * Note that: + * - the last block is _always present_ + * (even if there's no message bytes in it.) + * - stuff in bytes is always thought about as big-endian + */ +static void message_pad (const bvector&in, std::vector&out, prng&rng) +{ + out.clear(); + + //make space for the bit stage + if (in.size() == 0) out.resize (1, 0); + else out.resize ( ( (in.size() - 1) >> 3) + 2, 0); + + //copy message bits + int i; + for (i = 0; i < in.size(); ++i) + if (in[i]) out[i >> 3] |= 1 << (i & 0x7); + + //pad with random bits to whole byte + unsigned char rtmp = rng.random (256); + for (; i & 0x7; ++i) + if (rtmp >> (i & 0x7) ) + out[i >> 3] |= 1 << (i & 0x7); + + //append message overflow size + out[i >> 3] = in.size() & 0x7; + + //byte stage + int overflow = out.size() & 0xff; + int pad_block_start = out.size() >> 8; + + //make space for the bytes + out.resize ( (pad_block_start + 1) << 8, 0); + + //fill random bytes + for (i = overflow; i < 0xff; ++i) + out[i + pad_block_start] = rng.random (256); + + //fill the overflow size byte + out[pad_block_start + 0xff] = overflow; +} + +static bool message_unpad (const std::vector&in, bvector&out) +{ + +} + +/* + * Fujisaki-okamoto encryption scheme + */ + +int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher, + sencode* pubkey, prng&rng) +{ + return -1; +} + +int algo_mceqd256::encrypt (const bvector&plain, bvector&cipher, + sencode* pubkey, prng&rng) +{ + return -1; +} + +int algo_mceqd128::decrypt (const bvector&cipher, bvector&plain, + sencode* privkey) +{ + return -1; +} + +int algo_mceqd256::decrypt (const bvector&cipher, bvector&plain, + sencode* privkey) +{ + return -1; +}