algos_enc: new cubehash-based algorithms

This commit is contained in:
Mirek Kratochvil 2013-09-29 20:48:59 +02:00
parent d48665750a
commit c65557724e
3 changed files with 201 additions and 30 deletions

View file

@ -33,5 +33,9 @@ void fill_algorithm_suite (algorithm_suite&s)
do_alg (algo_fmtseq128h20); do_alg (algo_fmtseq128h20);
do_alg (algo_fmtseq192h20); do_alg (algo_fmtseq192h20);
do_alg (algo_fmtseq256h20); do_alg (algo_fmtseq256h20);
do_alg (algo_mceqd128cube);
do_alg (algo_mceqd192cube);
do_alg (algo_mceqd256cube);
#undef do_alg #undef do_alg
} }

View file

@ -24,12 +24,13 @@
* keygen * keygen
*/ */
int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng) template<int m, int T, int b, int d>
static int mceqd_create_keypair (sencode**pub, sencode**priv, prng&rng)
{ {
mce_qd::pubkey Pub; mce_qd::pubkey Pub;
mce_qd::privkey Priv; mce_qd::privkey Priv;
if (mce_qd::generate (Pub, Priv, rng, 16, 7, 32, 4) ) if (mce_qd::generate (Pub, Priv, rng, m, T, b, d) )
return 1; return 1;
*pub = Pub.serialize(); *pub = Pub.serialize();
@ -37,30 +38,34 @@ int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng)
return 0; return 0;
} }
int algo_mceqd128::create_keypair (sencode**pub, sencode**priv, prng&rng)
{
return mceqd_create_keypair<16, 7, 32, 4> (pub, priv, rng);
}
int algo_mceqd192::create_keypair (sencode**pub, sencode**priv, prng&rng) int algo_mceqd192::create_keypair (sencode**pub, sencode**priv, prng&rng)
{ {
mce_qd::pubkey Pub; return mceqd_create_keypair<16, 8, 27, 4> (pub, priv, rng);
mce_qd::privkey Priv;
if (mce_qd::generate (Pub, Priv, rng, 16, 8, 27, 4) )
return 1;
*pub = Pub.serialize();
*priv = Priv.serialize();
return 0;
} }
int algo_mceqd256::create_keypair (sencode**pub, sencode**priv, prng&rng) int algo_mceqd256::create_keypair (sencode**pub, sencode**priv, prng&rng)
{ {
mce_qd::pubkey Pub; return mceqd_create_keypair<16, 8, 32, 4> (pub, priv, rng);
mce_qd::privkey Priv; }
if (mce_qd::generate (Pub, Priv, rng, 16, 8, 32, 4) ) int algo_mceqd128cube::create_keypair (sencode**pub, sencode**priv, prng&rng)
return 1; {
return mceqd_create_keypair<16, 7, 32, 4> (pub, priv, rng);
}
*pub = Pub.serialize(); int algo_mceqd192cube::create_keypair (sencode**pub, sencode**priv, prng&rng)
*priv = Priv.serialize(); {
return 0; return mceqd_create_keypair<16, 8, 27, 4> (pub, priv, rng);
}
int algo_mceqd256cube::create_keypair (sencode**pub, sencode**priv, prng&rng)
{
return mceqd_create_keypair<16, 8, 32, 4> (pub, priv, rng);
} }
/* /*
@ -104,10 +109,12 @@ int algo_mceqd256::create_keypair (sencode**pub, sencode**priv, prng&rng)
* where h1 to h4 are hash functions to [0..127] * where h1 to h4 are hash functions to [0..127]
*/ */
#include "rmd_hash.h"
#include <stdint.h> #include <stdint.h>
#include "hash.h"
static void msg_pad_length (const std::vector<byte>& msg, byte&start, byte&end) static void msg_pad_length (const std::vector<byte>& msg,
byte&start, byte&end,
hash_func&pad_hash)
{ {
uint64_t len = msg.size(); uint64_t len = msg.size();
std::vector<byte> lenbytes; std::vector<byte> lenbytes;
@ -119,16 +126,16 @@ static void msg_pad_length (const std::vector<byte>& msg, byte&start, byte&end)
std::vector<byte> tmp; std::vector<byte> tmp;
rmd128hash hf; tmp = pad_hash (lenbytes);
tmp = hf (lenbytes);
start = tmp[0] & 0x7f; start = tmp[0] & 0x7f;
end = tmp[1] & 0x7f; end = tmp[1] & 0x7f;
tmp = hf (msg); tmp = pad_hash (msg);
start += tmp[0] & 0x7f; start += tmp[0] & 0x7f;
end += tmp[1] & 0x7f; end += tmp[1] & 0x7f;
} }
static void message_pad (const bvector&in, std::vector<byte>&out, prng&rng) static void message_pad (const bvector&in, std::vector<byte>&out,
prng&rng, hash_func&pad_hash)
{ {
out.clear(); out.clear();
@ -152,7 +159,7 @@ static void message_pad (const bvector&in, std::vector<byte>&out, prng&rng)
//byte stage //byte stage
byte padsize_begin, padsize_end; byte padsize_begin, padsize_end;
msg_pad_length (out, padsize_begin, padsize_end); msg_pad_length (out, padsize_begin, padsize_end, pad_hash);
//padding at the beginning //padding at the beginning
out.insert (out.begin(), 1 + (uint) padsize_begin, 0); out.insert (out.begin(), 1 + (uint) padsize_begin, 0);
@ -168,7 +175,8 @@ static void message_pad (const bvector&in, std::vector<byte>&out, prng&rng)
out[out_end + padsize_end] = padsize_end; out[out_end + padsize_end] = padsize_end;
} }
static bool message_unpad (std::vector<byte> in, bvector&out) static bool message_unpad (std::vector<byte> in, bvector&out,
hash_func&pad_hash)
{ {
//check byte padding sizes //check byte padding sizes
if (!in.size() ) return false; if (!in.size() ) return false;
@ -191,7 +199,7 @@ static bool message_unpad (std::vector<byte> in, bvector&out)
//check if padding was really okay (TODO is it necessary?) //check if padding was really okay (TODO is it necessary?)
byte check_begin, check_end; byte check_begin, check_end;
msg_pad_length (in, check_begin, check_end); msg_pad_length (in, check_begin, check_end, pad_hash);
if (padsize_begin != check_begin || padsize_end != check_end) if (padsize_begin != check_begin || padsize_end != check_end)
return false; return false;
@ -221,7 +229,6 @@ static bool message_unpad (std::vector<byte> in, bvector&out)
#define MIN(a,b) ((a)<(b)?(a):(b)) #define MIN(a,b) ((a)<(b)?(a):(b))
#include "sha_hash.h"
#include "arcfour.h" #include "arcfour.h"
/* /*
@ -239,6 +246,7 @@ template < class pubkey_type,
int ciphersize, int ciphersize,
int errorcount, int errorcount,
class hash_type, class hash_type,
class pad_hash_type,
int ranksize > int ranksize >
static int fo_encrypt (const bvector&plain, bvector&cipher, static int fo_encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng) sencode* pubkey, prng&rng)
@ -256,7 +264,8 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
//create the unencrypted message part //create the unencrypted message part
std::vector<byte> M; std::vector<byte> M;
message_pad (plain, M, rng); pad_hash_type phf;
message_pad (plain, M, rng, phf);
//create the symmetric key //create the symmetric key
std::vector<byte> K; std::vector<byte> K;
@ -313,6 +322,7 @@ template < class privkey_type,
int ciphersize, int ciphersize,
int errorcount, int errorcount,
class hash_type, class hash_type,
class pad_hash_type,
int ranksize > int ranksize >
static int fo_decrypt (const bvector&cipher, bvector&plain, static int fo_decrypt (const bvector&cipher, bvector&plain,
sencode* privkey) sencode* privkey)
@ -386,7 +396,8 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
//if the message seems okay, unpad and return it. //if the message seems okay, unpad and return it.
if (!message_unpad (M, plain) ) return 9; pad_hash_type phf;
if (!message_unpad (M, plain, phf) ) return 9;
return 0; return 0;
} }
@ -395,6 +406,10 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
* Instances for actual encryption/descryption algorithms * Instances for actual encryption/descryption algorithms
*/ */
#include "sha_hash.h"
#include "rmd_hash.h"
#include "cube_hash.h"
int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher, int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng) sencode* pubkey, prng&rng)
{ {
@ -402,6 +417,7 @@ int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher,
< mce_qd::pubkey, < mce_qd::pubkey,
2048, 4096, 128, 2048, 4096, 128,
sha256hash, sha256hash,
rmd128hash,
816 > 816 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -413,6 +429,7 @@ int algo_mceqd192::encrypt (const bvector&plain, bvector&cipher,
< mce_qd::pubkey, < mce_qd::pubkey,
2816, 6912, 256, 2816, 6912, 256,
sha384hash, sha384hash,
rmd128hash,
1574 > 1574 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -424,6 +441,7 @@ int algo_mceqd256::encrypt (const bvector&plain, bvector&cipher,
< mce_qd::pubkey, < mce_qd::pubkey,
4096, 8192, 256, 4096, 8192, 256,
sha512hash, sha512hash,
rmd128hash,
1638 > 1638 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -435,6 +453,7 @@ int algo_mceqd128::decrypt (const bvector&cipher, bvector&plain,
< mce_qd::privkey, < mce_qd::privkey,
2048, 4096, 128, 2048, 4096, 128,
sha256hash, sha256hash,
rmd128hash,
816 > 816 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -446,6 +465,7 @@ int algo_mceqd192::decrypt (const bvector&cipher, bvector&plain,
< mce_qd::privkey, < mce_qd::privkey,
2816, 6912, 256, 2816, 6912, 256,
sha384hash, sha384hash,
rmd128hash,
1574 > 1574 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -457,6 +477,79 @@ int algo_mceqd256::decrypt (const bvector&cipher, bvector&plain,
< mce_qd::privkey, < mce_qd::privkey,
4096, 8192, 256, 4096, 8192, 256,
sha512hash, sha512hash,
rmd128hash,
1638 >
(cipher, plain, privkey);
}
int algo_mceqd128cube::encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng)
{
return fo_encrypt
< mce_qd::pubkey,
2048, 4096, 128,
cube256hash,
cube128hash,
816 >
(plain, cipher, pubkey, rng);
}
int algo_mceqd192cube::encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng)
{
return fo_encrypt
< mce_qd::pubkey,
2816, 6912, 256,
cube384hash,
cube128hash,
1574 >
(plain, cipher, pubkey, rng);
}
int algo_mceqd256cube::encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng)
{
return fo_encrypt
< mce_qd::pubkey,
4096, 8192, 256,
cube512hash,
cube128hash,
1638 >
(plain, cipher, pubkey, rng);
}
int algo_mceqd128cube::decrypt (const bvector&cipher, bvector&plain,
sencode* privkey)
{
return fo_decrypt
< mce_qd::privkey,
2048, 4096, 128,
cube256hash,
cube128hash,
816 >
(cipher, plain, privkey);
}
int algo_mceqd192cube::decrypt (const bvector&cipher, bvector&plain,
sencode* privkey)
{
return fo_decrypt
< mce_qd::privkey,
2816, 6912, 256,
cube384hash,
cube128hash,
1574 >
(cipher, plain, privkey);
}
int algo_mceqd256cube::decrypt (const bvector&cipher, bvector&plain,
sencode* privkey)
{
return fo_decrypt
< mce_qd::privkey,
4096, 8192, 256,
cube512hash,
cube128hash,
1638 > 1638 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }

View file

@ -21,6 +21,10 @@
#include "algorithm.h" #include "algorithm.h"
/*
* SHA-based variants
*/
class algo_mceqd128 : public algorithm class algo_mceqd128 : public algorithm
{ {
public: public:
@ -87,5 +91,75 @@ public:
int create_keypair (sencode**pub, sencode**priv, prng&rng); int create_keypair (sencode**pub, sencode**priv, prng&rng);
}; };
/*
* Cubehash-based variants
*/
class algo_mceqd128cube : public algorithm
{
public:
bool provides_signatures() {
return false;
}
bool provides_encryption() {
return true;
}
std::string get_alg_id() {
return "MCEQD128FO-CUBE256-ARCFOUR";
}
int encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng);
int decrypt (const bvector&cipher, bvector&plain,
sencode* privkey);
int create_keypair (sencode**pub, sencode**priv, prng&rng);
};
class algo_mceqd192cube : public algorithm
{
public:
bool provides_signatures() {
return false;
}
bool provides_encryption() {
return true;
}
std::string get_alg_id() {
return "MCEQD192FO-CUBE384-ARCFOUR";
}
int encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng);
int decrypt (const bvector&cipher, bvector&plain,
sencode* privkey);
int create_keypair (sencode**pub, sencode**priv, prng&rng);
};
class algo_mceqd256cube : public algorithm
{
public:
bool provides_signatures() {
return false;
}
bool provides_encryption() {
return true;
}
std::string get_alg_id() {
return "MCEQD256FO-CUBE512-ARCFOUR";
}
int encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng);
int decrypt (const bvector&cipher, bvector&plain,
sencode* privkey);
int create_keypair (sencode**pub, sencode**priv, prng&rng);
};
#endif #endif