sc: stream cipher abstraction applied to arcfour

A minor bug was discovered in padding of short message signatures. If is
silently fixed, causing some (very minor) incompatibility of signatures
with previous versions.
This commit is contained in:
Mirek Kratochvil 2014-03-19 09:30:59 +01:00
parent 8c1d39d0e0
commit e687629323
8 changed files with 125 additions and 54 deletions

View file

@ -1,6 +1,9 @@
Codecrypt ChangeLog Codecrypt ChangeLog
- virtualize the stream ciphers
- fix fmtseq short message padding bug (fixed by previous)
1.5 1.5
- add hashfile support with -S - add hashfile support with -S

View file

@ -246,14 +246,13 @@ static bool message_unpad (std::vector<byte> in, bvector&out,
* otherwise it probably fails. miserably. * otherwise it probably fails. miserably.
*/ */
#define arcfour_discard 4096
template < class pubkey_type, template < class pubkey_type,
int plainsize, int plainsize,
int ciphersize, int ciphersize,
int errorcount, int errorcount,
class hash_type, class hash_type,
class pad_hash_type, class pad_hash_type,
class scipher,
int ranksize > int ranksize >
static int fo_encrypt (const bvector&plain, bvector&cipher, static int fo_encrypt (const bvector&plain, bvector&cipher,
sencode* pubkey, prng&rng) sencode* pubkey, prng&rng)
@ -304,17 +303,13 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
if (Pub.encrypt (mce_plain, cipher, ev) ) return 5; if (Pub.encrypt (mce_plain, cipher, ev) ) return 5;
//encrypt the message part (xor with arcfour) //encrypt the message part (xor with arcfour)
arcfour<byte> arc; scipher sc;
arc.init (8); sc.init ();
//whole key must be tossed in, so split if when necessary //whole key must be tossed in, so split if when necessary
for (i = 0; i < (K.size() >> 8); ++i) { sc.load_key (K);
std::vector<byte> subkey (K.begin() + (i << 8),
MIN (K.end(), //encrypt
K.begin() + ( (i + 1) << 8) ) ); for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ sc.gen();
arc.load_key (subkey);
}
arc.discard (arcfour_discard);
for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ arc.gen();
//append the message part to the ciphertext //append the message part to the ciphertext
cipher.resize (ciphersize + (M.size() << 3) ); cipher.resize (ciphersize + (M.size() << 3) );
@ -330,6 +325,7 @@ template < class privkey_type,
int errorcount, int errorcount,
class hash_type, class hash_type,
class pad_hash_type, class pad_hash_type,
class scipher,
int ranksize > int ranksize >
static int fo_decrypt (const bvector&cipher, bvector&plain, static int fo_decrypt (const bvector&cipher, bvector&plain,
sencode* privkey) sencode* privkey)
@ -370,18 +366,13 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
if (cipher[ciphersize + i]) M[i >> 3] |= 1 << (i & 0x7); if (cipher[ciphersize + i]) M[i >> 3] |= 1 << (i & 0x7);
//prepare arcfour //prepare arcfour
arcfour<byte> arc; scipher sc;
arc.init (8); sc.init ();
//stuff in the whole key //stuff in the whole key
for (i = 0; i < (K.size() >> 8); ++i) { sc.load_key (K);
std::vector<byte> subkey (K.begin() + (i << 8),
MIN (K.end(),
K.begin() + ( (i + 1) << 8) ) );
arc.load_key (subkey);
}
arc.discard (arcfour_discard);
//decrypt the message part //decrypt the message part
for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ arc.gen(); for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ sc.gen();
//compute the hash of K+M //compute the hash of K+M
std::vector<byte>H, M2; std::vector<byte>H, M2;
@ -413,6 +404,8 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
* Instances for actual encryption/descryption algorithms * Instances for actual encryption/descryption algorithms
*/ */
typedef arcfour<byte, 8, 4096> arcfour_fo_cipher;
#if HAVE_CRYPTOPP==1 #if HAVE_CRYPTOPP==1
#include "sha_hash.h" #include "sha_hash.h"
@ -426,6 +419,7 @@ int algo_mceqd128::encrypt (const bvector&plain, bvector&cipher,
2048, 4096, 128, 2048, 4096, 128,
sha256hash, sha256hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
816 > 816 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -438,6 +432,7 @@ int algo_mceqd192::encrypt (const bvector&plain, bvector&cipher,
2816, 6912, 256, 2816, 6912, 256,
sha384hash, sha384hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
1574 > 1574 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -450,6 +445,7 @@ int algo_mceqd256::encrypt (const bvector&plain, bvector&cipher,
4096, 8192, 256, 4096, 8192, 256,
sha512hash, sha512hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
1638 > 1638 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -462,6 +458,7 @@ int algo_mceqd128::decrypt (const bvector&cipher, bvector&plain,
2048, 4096, 128, 2048, 4096, 128,
sha256hash, sha256hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
816 > 816 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -474,6 +471,7 @@ int algo_mceqd192::decrypt (const bvector&cipher, bvector&plain,
2816, 6912, 256, 2816, 6912, 256,
sha384hash, sha384hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
1574 > 1574 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -486,6 +484,7 @@ int algo_mceqd256::decrypt (const bvector&cipher, bvector&plain,
4096, 8192, 256, 4096, 8192, 256,
sha512hash, sha512hash,
rmd128hash, rmd128hash,
arcfour_fo_cipher,
1638 > 1638 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -502,6 +501,7 @@ int algo_mceqd128cube::encrypt (const bvector&plain, bvector&cipher,
2048, 4096, 128, 2048, 4096, 128,
cube256hash, cube256hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
816 > 816 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -514,6 +514,7 @@ int algo_mceqd192cube::encrypt (const bvector&plain, bvector&cipher,
2816, 6912, 256, 2816, 6912, 256,
cube384hash, cube384hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
1574 > 1574 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -526,6 +527,7 @@ int algo_mceqd256cube::encrypt (const bvector&plain, bvector&cipher,
4096, 8192, 256, 4096, 8192, 256,
cube512hash, cube512hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
1638 > 1638 >
(plain, cipher, pubkey, rng); (plain, cipher, pubkey, rng);
} }
@ -538,6 +540,7 @@ int algo_mceqd128cube::decrypt (const bvector&cipher, bvector&plain,
2048, 4096, 128, 2048, 4096, 128,
cube256hash, cube256hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
816 > 816 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -550,6 +553,7 @@ int algo_mceqd192cube::decrypt (const bvector&cipher, bvector&plain,
2816, 6912, 256, 2816, 6912, 256,
cube384hash, cube384hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
1574 > 1574 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }
@ -562,6 +566,7 @@ int algo_mceqd256cube::decrypt (const bvector&cipher, bvector&plain,
4096, 8192, 256, 4096, 8192, 256,
cube512hash, cube512hash,
cube128hash, cube128hash,
arcfour_fo_cipher,
1638 > 1638 >
(cipher, plain, privkey); (cipher, plain, privkey);
} }

View file

@ -55,6 +55,8 @@
#define MIN(a,b) ((a)<(b)?(a):(b)) #define MIN(a,b) ((a)<(b)?(a):(b))
typedef arcfour<byte, 8, 256> padding_generator;
static void msg_pad (const bvector&in, std::vector<byte>&out, size_t minsize) static void msg_pad (const bvector&in, std::vector<byte>&out, size_t minsize)
{ {
uint i; uint i;
@ -66,17 +68,10 @@ static void msg_pad (const bvector&in, std::vector<byte>&out, size_t minsize)
if (out.size() >= minsize) return; if (out.size() >= minsize) return;
arcfour<byte> g; padding_generator g;
g.init (8); g.init ();
//stuff in as much seed material as possible //stuff in as much seed material as possible
for (i = 0; i < (out.size() >> 8); ++i) { g.load_key (out);
std::vector<byte> sub (out.begin() + (i << 8),
MIN (out.end(),
out.begin() + ( (i + 1) << 8) ) );
g.load_key (sub);
}
g.discard (256);
i = out.size(); i = out.size();
out.resize (minsize); out.resize (minsize);

View file

@ -19,17 +19,18 @@
#ifndef _ccr_rc4_h_ #ifndef _ccr_rc4_h_
#define _ccr_rc4_h_ #define _ccr_rc4_h_
#include "sc.h"
#include <vector> #include <vector>
#include <sys/types.h> template<class inttype = byte, int bits = 8, int disc_bytes = 0>
class arcfour : public streamcipher
template<class inttype> class arcfour
{ {
std::vector<inttype> S; std::vector<inttype> S;
inttype I, J; inttype I, J;
inttype mask; inttype mask;
public: public:
bool init (unsigned bits) { bool init () {
size_t Ssize = 1 << bits; size_t Ssize = 1 << bits;
if (bits > 8 * sizeof (inttype) ) return false; if (bits > 8 * sizeof (inttype) ) return false;
I = J = 0; I = J = 0;
@ -46,16 +47,32 @@ public:
S.clear(); S.clear();
} }
void load_key (const std::vector<inttype>&K) { void load_key (const inttype*begin, const inttype*end) {
inttype j = 0, t; inttype j, t;
for (size_t i = 0; i <= mask; ++i) { size_t i;
j = (j + S[i] + K[i % K.size()]) & mask; const inttype *keypos;
//eat whole key iteratively, even if longer than permutation
for (; begin < end; begin += mask + 1) {
j = 0;
for (i = 0, keypos = begin;
i <= mask;
++i, ++keypos) {
if (keypos >= end) keypos = begin; //rotate
j = (j + S[i] + (*keypos) ) & mask;
t = S[j]; t = S[j];
S[j] = S[i]; S[j] = S[i];
S[i] = t; S[i] = t;
} }
} }
discard (disc_bytes);
}
void load_key (const std::vector<inttype>&K) {
load_key (& (K[0]), & (K[K.size()]) );
}
inttype gen() { inttype gen() {
I = (I + 1) & mask; I = (I + 1) & mask;
J = (J + S[I]) & mask; J = (J + S[I]) & mask;
@ -68,13 +85,20 @@ public:
return S[ (S[I] + S[J]) & mask]; return S[ (S[I] + S[J]) & mask];
} }
void discard (size_t n) { void gen (size_t n, inttype*out) {
if (out)
for (size_t i = 0; i < n; ++i) out[i] = gen();
else
for (size_t i = 0; i < n; ++i) gen(); for (size_t i = 0; i < n; ++i) gen();
} }
void gen (size_t n, std::vector<inttype>&out) { void gen (size_t n, std::vector<inttype>&out) {
out.resize (n); out.resize (n);
for (size_t i = 0; i < n; ++i) out[i] = gen(); gen (n, & (out[0]) );
}
size_t block_size() {
return 1;
} }
}; };

View file

@ -21,10 +21,12 @@
using namespace fmtseq; using namespace fmtseq;
void prepare_keygen (arcfour<byte>& kg, const std::vector<byte>&SK, uint idx) typedef arcfour<byte, 8, 0> privgen;
void prepare_keygen (privgen& kg, const std::vector<byte>&SK, uint idx)
{ {
kg.clear(); kg.clear();
kg.init (8); kg.init ();
kg.load_key (SK); kg.load_key (SK);
std::vector<byte>tmp; std::vector<byte>tmp;
while (idx) { while (idx) {
@ -34,6 +36,8 @@ void prepare_keygen (arcfour<byte>& kg, const std::vector<byte>&SK, uint idx)
tmp.resize (16, 0); //prevent chaining to other numbers tmp.resize (16, 0); //prevent chaining to other numbers
kg.load_key (tmp); kg.load_key (tmp);
kg.discard (4096); kg.discard (4096);
//discarding is done manually here,
//for the purpose of double key loading.
} }
static void add_zero_checksum (bvector& v) static void add_zero_checksum (bvector& v)
@ -135,7 +139,7 @@ static bool check_privkey (privkey&priv, hash_func&hf)
static void update_privkey (privkey&priv, hash_func&hf) static void update_privkey (privkey&priv, hash_func&hf)
{ {
uint i, j; uint i, j;
arcfour<byte> generator; privgen generator;
std::vector<byte> x, Y; std::vector<byte> x, Y;
uint commitments = fmtseq_commitments (priv.hs); uint commitments = fmtseq_commitments (priv.hs);
@ -289,7 +293,7 @@ int fmtseq::generate (pubkey&pub, privkey&priv,
uint commitments = fmtseq_commitments (hs); uint commitments = fmtseq_commitments (hs);
arcfour<byte> generator; privgen generator;
std::vector<byte> x, Y; std::vector<byte> x, Y;
alloc_exist (priv); alloc_exist (priv);
@ -384,7 +388,7 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf)
Sig.reserve (hf.size() * (commitments + h * l) ); Sig.reserve (hf.size() * (commitments + h * l) );
//first, compute the commitments and push them to the signature //first, compute the commitments and push them to the signature
arcfour<byte> generator; privgen generator;
prepare_keygen (generator, SK, sigs_used); prepare_keygen (generator, SK, sigs_used);
for (i = 0; i < commitments; ++i) { for (i = 0; i < commitments; ++i) {
//generate x_i //generate x_i

View file

@ -41,6 +41,5 @@ void arcfour_rng::seed (uint bits, bool quick)
f.close(); f.close();
r.load_key (s); r.load_key (s);
r.discard (4096);
} }

View file

@ -25,10 +25,10 @@
class arcfour_rng : public prng class arcfour_rng : public prng
{ {
public: public:
arcfour<byte> r; arcfour<byte, 8, 4096> r;
arcfour_rng() { arcfour_rng() {
r.init (8); r.init ();
} }
~arcfour_rng() { ~arcfour_rng() {

41
src/sc.h Normal file
View file

@ -0,0 +1,41 @@
/*
* This file is part of Codecrypt.
*
* Codecrypt is free software: you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or (at
* your option) any later version.
*
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef _ccr_sc_h_
#define _ccr_sc_h_
#include "types.h"
#include <sys/types.h>
class streamcipher
{
public:
virtual bool init() = 0;
virtual void clear() = 0;
virtual void load_key (const byte*begin, const byte*end) = 0;
virtual byte gen() = 0;
virtual void gen (size_t n, byte*out) = 0;
virtual size_t block_size() = 0;
void discard (size_t n) {
gen (n, 0);
}
};
#endif