algos_enc: padding
This commit is contained in:
parent
5f49e3aa39
commit
c345408cc8
|
@ -20,6 +20,10 @@
|
||||||
|
|
||||||
#include "mce_qd.h"
|
#include "mce_qd.h"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* keygen
|
||||||
|
*/
|
||||||
|
|
||||||
int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng)
|
int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng)
|
||||||
{
|
{
|
||||||
mce_qd::pubkey Pub;
|
mce_qd::pubkey Pub;
|
||||||
|
@ -46,4 +50,104 @@ int algo_mceqd256::create_keypair (sencode**pub, sencode**priv, prng&rng)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Padding. Ha-ha.
|
||||||
|
*
|
||||||
|
* This wouldn't be necessary, but the ciphertext length would then very easily
|
||||||
|
* leak information about plaintext length (= len(c) - len(McE block) ).
|
||||||
|
* Moreover we need to somehow convert bvector bits to actual bytes.
|
||||||
|
*
|
||||||
|
* First, the bvector is converted to vector of bytes so it's easy to work with
|
||||||
|
* it. Result is in the form
|
||||||
|
*
|
||||||
|
* bits [randombits] nrbits
|
||||||
|
*
|
||||||
|
* where
|
||||||
|
* bits = message bits
|
||||||
|
* randombits = randomness that pads the message bits to whole byte.
|
||||||
|
* nrbits = 1 byte with number of random bits applied
|
||||||
|
*
|
||||||
|
* Then we are padding stuff in 256-byte blocks this way:
|
||||||
|
*
|
||||||
|
* messagemessage [randomrandomrandom] 1bytesize
|
||||||
|
*
|
||||||
|
* where
|
||||||
|
* message = "tail" of the message that has overflown to the last block
|
||||||
|
* random = random bytes
|
||||||
|
* 1bytesize = how many bytes of the mesage are there in the last block
|
||||||
|
*
|
||||||
|
* Note that:
|
||||||
|
* - the last block is _always present_
|
||||||
|
* (even if there's no message bytes in it.)
|
||||||
|
* - stuff in bytes is always thought about as big-endian
|
||||||
|
*/
|
||||||
|
|
||||||
|
static void message_pad (const bvector&in, std::vector<byte>&out, prng&rng)
|
||||||
|
{
|
||||||
|
out.clear();
|
||||||
|
|
||||||
|
//make space for the bit stage
|
||||||
|
if (in.size() == 0) out.resize (1, 0);
|
||||||
|
else out.resize ( ( (in.size() - 1) >> 3) + 2, 0);
|
||||||
|
|
||||||
|
//copy message bits
|
||||||
|
int i;
|
||||||
|
for (i = 0; i < in.size(); ++i)
|
||||||
|
if (in[i]) out[i >> 3] |= 1 << (i & 0x7);
|
||||||
|
|
||||||
|
//pad with random bits to whole byte
|
||||||
|
unsigned char rtmp = rng.random (256);
|
||||||
|
for (; i & 0x7; ++i)
|
||||||
|
if (rtmp >> (i & 0x7) )
|
||||||
|
out[i >> 3] |= 1 << (i & 0x7);
|
||||||
|
|
||||||
|
//append message overflow size
|
||||||
|
out[i >> 3] = in.size() & 0x7;
|
||||||
|
|
||||||
|
//byte stage
|
||||||
|
int overflow = out.size() & 0xff;
|
||||||
|
int pad_block_start = out.size() >> 8;
|
||||||
|
|
||||||
|
//make space for the bytes
|
||||||
|
out.resize ( (pad_block_start + 1) << 8, 0);
|
||||||
|
|
||||||
|
//fill random bytes
|
||||||
|
for (i = overflow; i < 0xff; ++i)
|
||||||
|
out[i + pad_block_start] = rng.random (256);
|
||||||
|
|
||||||
|
//fill the overflow size byte
|
||||||
|
out[pad_block_start + 0xff] = overflow;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool message_unpad (const std::vector<byte>&in, bvector&out)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Fujisaki-okamoto encryption scheme
|
||||||
|
*/
|
||||||
|
|
||||||
|
int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher,
|
||||||
|
sencode* pubkey, prng&rng)
|
||||||
|
{
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int algo_mceqd256::encrypt (const bvector&plain, bvector&cipher,
|
||||||
|
sencode* pubkey, prng&rng)
|
||||||
|
{
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int algo_mceqd128::decrypt (const bvector&cipher, bvector&plain,
|
||||||
|
sencode* privkey)
|
||||||
|
{
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int algo_mceqd256::decrypt (const bvector&cipher, bvector&plain,
|
||||||
|
sencode* privkey)
|
||||||
|
{
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue