505 lines
13 KiB
C++
505 lines
13 KiB
C++
|
|
/*
|
|
* This file is part of Codecrypt.
|
|
*
|
|
* Codecrypt is free software: you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or (at
|
|
* your option) any later version.
|
|
*
|
|
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
* License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "fmtseq.h"
|
|
|
|
using namespace fmtseq;
|
|
|
|
void prepare_keygen (streamcipher& kg, const std::vector<byte>&SK, uint idx)
|
|
{
|
|
kg.init();
|
|
kg.load_key_vector (SK);
|
|
std::vector<byte>tmp;
|
|
tmp.reserve (16);
|
|
while (idx) {
|
|
tmp.push_back (idx & 0xff);
|
|
idx >>= 8;
|
|
}
|
|
tmp.resize (16, 0); //prevent chaining to other numbers
|
|
kg.load_key_vector (tmp);
|
|
}
|
|
|
|
static void add_zero_checksum (bvector& v)
|
|
{
|
|
uint s = v.size();
|
|
if (!s) return;
|
|
|
|
uint z = s - v.hamming_weight(); //0's instead of 1's
|
|
|
|
v.resize (fmtseq_commitments (s));
|
|
while (z) {
|
|
v[s] = z & 1;
|
|
z >>= 1;
|
|
++s;
|
|
}
|
|
}
|
|
|
|
static void alloc_exist (privkey&priv)
|
|
{
|
|
priv.exist.resize (priv.l);
|
|
uint ts = (1 << (priv.h + 1)) - 2;
|
|
for (uint i = 0; i < priv.l; ++i)
|
|
priv.exist[i].resize (ts);
|
|
}
|
|
|
|
static void store_exist (privkey&priv, const privkey::tree_stk_item&i)
|
|
{
|
|
uint level = i.level / priv.h;
|
|
if (level >= priv.l) return; //top node
|
|
uint sublevel = priv.h - (i.level % priv.h),
|
|
sublev_width = (uint) 1 << sublevel;
|
|
if (i.pos >= sublev_width) return; //too far right
|
|
|
|
priv.exist[level][i.pos + sublev_width - 2] = i.item;
|
|
}
|
|
|
|
static void alloc_desired (privkey&priv, hash_func&hf)
|
|
{
|
|
//start the desired trees
|
|
priv.desired.resize (priv.l - 1);
|
|
priv.desired_stack.resize (priv.l - 1);
|
|
priv.desired_progress.resize (priv.l - 1, 0);
|
|
for (uint i = 0; i < priv.l - 1; ++i) {
|
|
priv.desired[i].resize ( (1 << (priv.h + 1)) - 2);
|
|
for (uint j = 0; j < priv.desired[i].size(); ++j)
|
|
priv.desired[i][j].resize (hf.size(), 0);
|
|
}
|
|
}
|
|
|
|
static void store_desired (privkey&priv, uint did,
|
|
const privkey::tree_stk_item& i)
|
|
{
|
|
if ( (i.level / priv.h) != did) return; //too below or above
|
|
uint depth = priv.h - (i.level % priv.h);
|
|
if (i.pos >= ( (uint) 1 << depth)) return; //too far right, omg why?!
|
|
priv.desired[did][i.pos + (1 << depth) - 2] = i.item;
|
|
}
|
|
|
|
static bool check_privkey (privkey&priv, hash_func&hf)
|
|
{
|
|
size_t i, j;
|
|
uint ts = (1 << (priv.h + 1)) - 2;
|
|
|
|
/*
|
|
* check the content of privkey caches to prevent reading/writing
|
|
* unallocated memory.
|
|
*/
|
|
|
|
//exist tree count is always L
|
|
if (priv.exist.size() != priv.l) return false;
|
|
|
|
//exist tree sizes
|
|
for (i = 0; i < priv.exist.size(); ++i) {
|
|
if (priv.exist[i].size() != ts) return false;
|
|
|
|
//exist tree hash sizes must be OK
|
|
for (j = 0; j < ts; ++j)
|
|
if (priv.exist[i][j].size()
|
|
!= hf.size())
|
|
return false;
|
|
}
|
|
|
|
//check desired stuff
|
|
if (priv.desired_stack.size() < priv.desired.size()) return false;
|
|
if (priv.desired_progress.size() < priv.desired.size()) return false;
|
|
|
|
for (i = 0; i < priv.desired.size(); ++i) {
|
|
if (priv.desired[i].size() != ts) return false;
|
|
for (j = 0; j < ts; ++j)
|
|
if (priv.desired[i][j].size()
|
|
!= hf.size())
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
|
|
{
|
|
uint i, j;
|
|
std::vector<byte> x, Y;
|
|
uint commitments = fmtseq_commitments (priv.hs);
|
|
|
|
/*
|
|
* Perform one calculation step on all subtrees.
|
|
*
|
|
* Note the difference against original FMTseq:
|
|
*
|
|
* On every signature, we generate _one_ leaf and squash the subtree
|
|
* stack all above it. This brings (on average) the same performance,
|
|
* but some signatures are faster and some are slower. Not that much
|
|
* that it would actually matter for this purpose. Timing attacks don't
|
|
* count as we still publish the signature serial number, from which
|
|
* anyone can easily see whether it's going to take a while or not.
|
|
*
|
|
* Generating one leaf on each signature brings a complete desired tree
|
|
* exactly in time when exist tree gets exhausted (they have the same
|
|
* number of leaves).
|
|
*
|
|
* Average time for signature is around 2 units (as in fmtseq), worst
|
|
* case is around (h^2)/2 units (which isn't really that bad, for
|
|
* practical purposes it's only around 200 and only in one case).
|
|
*
|
|
* FMTseq instead calculates exactly two of those operations
|
|
* every round (e.g. 2 times stack squashing, or gen, gen, or
|
|
* gen/squash...) This brings equivalent speed for all signatures (all
|
|
* do exactly 2 operations), but storage of internal state and the
|
|
* whole algorithm is kindof complex. Omitted for simplicity.
|
|
*/
|
|
|
|
x.resize (hf.size());
|
|
|
|
uint d_leaves, d_startpos, d_h;
|
|
for (i = 0; i < priv.desired.size(); ++i) {
|
|
d_h = (i + 1) * priv.h;
|
|
d_leaves = 1 << d_h;
|
|
if (priv.desired_progress[i] >= d_leaves)
|
|
continue; //already done
|
|
|
|
//create the leaf
|
|
d_startpos = (1 + (priv.sigs_used >> d_h)) << d_h;
|
|
uint leafid = d_startpos + priv.desired_progress[i];
|
|
|
|
prepare_keygen (generator, priv.SK, leafid);
|
|
Y.clear();
|
|
for (j = 0; j < commitments; ++j) {
|
|
generator.gen (hf.size(), & (x[0]));
|
|
x = hf (x);
|
|
Y.insert (Y.end(), x.begin(), x.end());
|
|
}
|
|
|
|
|
|
std::vector<privkey::tree_stk_item>
|
|
&stk = priv.desired_stack[i];
|
|
|
|
stk.push_back (privkey::tree_stk_item
|
|
(0, priv.desired_progress[i], hf (Y)));
|
|
store_desired (priv, i, stk.back());
|
|
|
|
++priv.desired_progress[i];
|
|
|
|
//stack squashing
|
|
for (;;) {
|
|
if (stk.size() < 2) break;
|
|
if ( (stk.end() - 1)->level !=
|
|
(stk.end() - 2)->level) break;
|
|
|
|
Y.clear();
|
|
Y.insert (Y.end(),
|
|
(stk.end() - 2)->item.begin(),
|
|
(stk.end() - 2)->item.end());
|
|
Y.insert (Y.end(),
|
|
(stk.end() - 1)->item.begin(),
|
|
(stk.end() - 1)->item.end());
|
|
uint l = stk.back().level + 1;
|
|
uint p = stk.back().pos / 2;
|
|
stk.pop_back();
|
|
stk.pop_back();
|
|
stk.push_back (privkey::tree_stk_item
|
|
(l, p, hf (Y)));
|
|
store_desired (priv, i, stk.back());
|
|
}
|
|
}
|
|
|
|
//where needed, move desired to exist and reset or erase
|
|
uint next_sigs_used = priv.sigs_used + 1;
|
|
uint subtree_changes = priv.sigs_used ^ next_sigs_used;
|
|
|
|
uint one_subtree_mask = (1 << priv.h) - 1;
|
|
|
|
//go from the topmost subtree.
|
|
for (uint i = 0; i < priv.l; ++i) {
|
|
uint idx = priv.l - i - 1;
|
|
|
|
//ignore unused top levels
|
|
if (idx >= priv.desired.size()) continue;
|
|
|
|
//if nothing changed, do nothing
|
|
if (! ( (subtree_changes >> (priv.h * (1 + idx)))
|
|
& one_subtree_mask)) continue;
|
|
|
|
//move desired to exist
|
|
priv.exist[idx] = priv.desired[idx];
|
|
|
|
priv.desired_progress[idx] = 0;
|
|
priv.desired_stack[idx].clear();
|
|
|
|
//if there aren't more desired subtrees on this level,
|
|
//strip it off.
|
|
uint next_subtree_start =
|
|
(1 + (next_sigs_used >> ( (1 + idx) * priv.h)))
|
|
<< ( (1 + idx) * priv.h);
|
|
if (next_subtree_start >= ( (uint) 1 << (priv.h * priv.l))) {
|
|
priv.desired.resize (idx);
|
|
priv.desired_stack.resize (idx);
|
|
priv.desired_progress.resize (idx);
|
|
}
|
|
}
|
|
|
|
priv.sigs_used = next_sigs_used;
|
|
}
|
|
|
|
/*
|
|
* Key generator
|
|
*/
|
|
|
|
int fmtseq::generate (pubkey&pub, privkey&priv,
|
|
prng&rng, hash_func&hf, streamcipher&generator,
|
|
uint hs, uint h, uint l)
|
|
{
|
|
uint i, j;
|
|
|
|
/*
|
|
* first off, generate a secret key for commitment generator.
|
|
* exactly THIS gives the amount of all possible FMTseq privkeys.
|
|
*
|
|
* in our case it's around 2^2048, which is Enough.
|
|
*/
|
|
priv.SK.resize (1 << 8);
|
|
for (i = 0; i < (1 << 8); ++i) {
|
|
priv.SK[i] = rng.random (1 << 8);
|
|
}
|
|
|
|
priv.h = h;
|
|
priv.l = l;
|
|
priv.hs = hs;
|
|
priv.sigs_used = 0;
|
|
|
|
std::vector<privkey::tree_stk_item> stk;
|
|
stk.reserve (h * l + 1);
|
|
|
|
uint sigs = 1 << (h * l);
|
|
|
|
uint commitments = fmtseq_commitments (hs);
|
|
|
|
std::vector<byte> x, Y;
|
|
x.resize (hf.size());
|
|
|
|
alloc_exist (priv);
|
|
|
|
for (i = 0; i < sigs; ++i) {
|
|
//generate commitments and concat publics into Y
|
|
Y.clear();
|
|
Y.reserve (commitments * hf.size());
|
|
prepare_keygen (generator, priv.SK, i);
|
|
for (j = 0; j < commitments; ++j) {
|
|
generator.gen (hf.size(), & (x[0]));
|
|
x = hf (x);
|
|
Y.insert (Y.end(), x.begin(), x.end());
|
|
}
|
|
|
|
stk.push_back (privkey::tree_stk_item (0, i, hf (Y)));
|
|
store_exist (priv, stk.back());
|
|
|
|
//try squashing the stack
|
|
for (;;) {
|
|
if (stk.size() < 2) break;
|
|
if ( (stk.end() - 1)->level !=
|
|
(stk.end() - 2)->level) break;
|
|
|
|
Y.clear();
|
|
Y.insert (Y.end(),
|
|
(stk.end() - 2)->item.begin(),
|
|
(stk.end() - 2)->item.end());
|
|
Y.insert (Y.end(),
|
|
(stk.end() - 1)->item.begin(),
|
|
(stk.end() - 1)->item.end());
|
|
uint l = stk.back().level + 1;
|
|
uint p = stk.back().pos / 2;
|
|
stk.pop_back();
|
|
stk.pop_back();
|
|
stk.push_back (privkey::tree_stk_item
|
|
(l, p, hf (Y)));
|
|
store_exist (priv, stk.back());
|
|
}
|
|
}
|
|
|
|
alloc_desired (priv, hf);
|
|
|
|
//now there's the public verification key available in the stack.
|
|
pub.check = stk.back().item;
|
|
pub.H = h * l;
|
|
pub.hs = hs;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* SIGNATURE STRUCTURE
|
|
* is variable, but following stuff is concatenated exactly in this order:
|
|
*
|
|
* - private/public commitments (less than size+log2(size) in bits times hash
|
|
* size) in the "natural" left-to-right order (or from first to last bits of
|
|
* hash. Checksum goes last, with least significant bit first). Private
|
|
* commitment goes whenever there's 1 in message, public on 0.
|
|
* - h*l hashes of verification chain, from bottom to top, h*l times hash size
|
|
* - i (so that we can guess left/right concatenation before hashing) stored as
|
|
* H-bit number in little endian.
|
|
*
|
|
* summed up:
|
|
*
|
|
* Sig=(x0, y1, x2, x3, y4, ..... , xComm-1,path0,path1,...,pathH-1, i)
|
|
*
|
|
*/
|
|
|
|
#include "iohelpers.h"
|
|
|
|
int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
|
|
streamcipher&generator)
|
|
{
|
|
if (hash.size() != hash_size()) return 2;
|
|
if (!sigs_remaining()) {
|
|
err ("fmtseq notice: no signatures left");
|
|
return 2;
|
|
}
|
|
|
|
if (!check_privkey (*this, hf)) {
|
|
err ("fmtseq: mangled privkey");
|
|
return 3;
|
|
}
|
|
|
|
uint commitments = fmtseq_commitments (hs);
|
|
|
|
bvector M2 = hash;
|
|
add_zero_checksum (M2);
|
|
|
|
std::vector<byte> Sig, t;
|
|
uint i;
|
|
|
|
t.resize (hf.size());
|
|
|
|
Sig.reserve (hf.size() * (commitments + h * l));
|
|
//first, compute the commitments and push them to the signature
|
|
prepare_keygen (generator, SK, sigs_used);
|
|
for (i = 0; i < commitments; ++i) {
|
|
//generate x_i
|
|
generator.gen (hf.size(), & (t[0]));
|
|
|
|
//if it's 0, publish y_i, else publish x_i
|
|
if (!M2[i]) t = hf (t);
|
|
|
|
//append it to signature
|
|
Sig.insert (Sig.end(), t.begin(), t.end());
|
|
}
|
|
|
|
//now retrieve the authentication path
|
|
uint pos = sigs_used;
|
|
uint exlev, expos, exid;
|
|
for (i = 0; i < h * l; ++i) {
|
|
exid = i / h;
|
|
exlev = h - (i % h);
|
|
//flip the last bit of pos so it gets the neighbor
|
|
expos = (pos ^ 1) % (1 << exlev);
|
|
Sig.insert (Sig.end(),
|
|
exist[exid][expos + (1 << exlev) - 2].begin(),
|
|
exist[exid][expos + (1 << exlev) - 2].end());
|
|
pos >>= 1;
|
|
}
|
|
|
|
//prepare the signature
|
|
sig.clear();
|
|
sig.resize (signature_size (hf), 0);
|
|
|
|
//convert to bits
|
|
uint sig_no_start = (commitments + h * l) * hf.size() * 8;
|
|
for (i = 0; i < sig_no_start; ++i)
|
|
sig[i] = 1 & (Sig[i / 8] >> (i % 8));
|
|
|
|
//append signature number
|
|
pos = sigs_used;
|
|
for (i = 0; i < h * l; ++i) {
|
|
sig[i + sig_no_start] = pos & 1;
|
|
pos >>= 1;
|
|
}
|
|
|
|
//move to the next signature and update the cache
|
|
update_privkey (*this, hf, generator);
|
|
|
|
//start moaning at around 1% of remaining signatures
|
|
if (!sigs_remaining())
|
|
err ("fmtseq notice: no signatures left, "
|
|
"you should discard this key");
|
|
else if (sigs_remaining() <= (uint) (1 << (h * l)) / 100)
|
|
err ("fmtseq notice: only " << sigs_remaining()
|
|
<< " signatures left, you should certify new keys");
|
|
else
|
|
err ("fmtseq notice: " << sigs_remaining()
|
|
<< " signatures remaining");
|
|
|
|
return 0;
|
|
}
|
|
|
|
int pubkey::verify (const bvector& sig, const bvector& hash, hash_func& hf)
|
|
{
|
|
uint i, j;
|
|
if (sig.size() != signature_size (hf)) return 2;
|
|
if (hash.size() != hash_size()) return 2;
|
|
|
|
uint commitments = fmtseq_commitments (hs);
|
|
|
|
bvector M2 = hash;
|
|
add_zero_checksum (M2);
|
|
if (M2.size() != commitments) return 3; //likely internal failure
|
|
|
|
//retrieve i
|
|
uint sig_no = 0;
|
|
for (i = sig.size() - 1; i >= (commitments + H) * hf.size() * 8; --i)
|
|
sig_no = (sig_no << 1) + (sig[i] ? 1 : 0);
|
|
|
|
std::vector<byte> t, Y;
|
|
std::vector<std::vector<byte> > Sig;
|
|
|
|
//split and convert to byte form for convenient hashing
|
|
Sig.resize (commitments + H);
|
|
for (i = 0; i < (commitments + H); ++i) {
|
|
Sig[i].resize (hf.size(), 0);
|
|
for (j = 0; j < hf.size() * 8; ++j)
|
|
if (sig[j + i * hf.size() * 8])
|
|
Sig[i][j / 8] |= (1 << (j % 8));
|
|
}
|
|
|
|
Y.clear();
|
|
for (i = 0; i < commitments; ++i) {
|
|
if (M2[i]) t = hf (Sig[i]); //convert pk_i to sk_i at 1's
|
|
else t = Sig[i]; //else it should already be pk_i
|
|
Y.insert (Y.end(), t.begin(), t.end()); //append it to Y_i
|
|
}
|
|
|
|
//create the leaf
|
|
t = hf (Y);
|
|
|
|
//walk the authentication path
|
|
for (i = 0; i < H; ++i) {
|
|
Y.clear();
|
|
Y = Sig[commitments + i];
|
|
if ( (sig_no >> i) & 1) {
|
|
//append path auth from left
|
|
Y.insert (Y.end(), t.begin(), t.end());
|
|
t = hf (Y);
|
|
} else {
|
|
//append from right
|
|
t.insert (t.end(), Y.begin(), Y.end());
|
|
t = hf (t);
|
|
}
|
|
|
|
}
|
|
|
|
if (t == check) return 0; //all went okay
|
|
else return 1;
|
|
}
|