pqc/crypto_kem/kyber768/clean/indcpa.c

311 lines
11 KiB
C
Raw Normal View History

#include "indcpa.h"
#include "fips202.h"
#include "ntt.h"
#include "poly.h"
#include "polyvec.h"
#include "randombytes.h"
#include <string.h>
/*************************************************
* Name: pack_pk
*
* Description: Serialize the public key as concatenation of the
* compressed and serialized vector of polynomials pk
* and the public seed used to generate the matrix A.
*
* Arguments: unsigned char *r: pointer to the output serialized
*public key const poly *pk: pointer to the input public-key
*polynomial const unsigned char *seed: pointer to the input public seed
**************************************************/
static void pack_pk(unsigned char *r, const polyvec *pk, const unsigned char *seed) {
2019-01-16 10:02:32 +00:00
int i;
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_compress(r, pk);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_SYMBYTES; i++) {
r[i + KYBER_POLYVECCOMPRESSEDBYTES] = seed[i];
}
}
/*************************************************
* Name: unpack_pk
*
* Description: De-serialize and decompress public key from a byte array;
* approximate inverse of pack_pk
*
* Arguments: - polyvec *pk: pointer to output public-key
*vector of polynomials
* - unsigned char *seed: pointer to output seed to
*generate matrix A
* - const unsigned char *packedpk: pointer to input serialized
*public key
**************************************************/
static void unpack_pk(polyvec *pk, unsigned char *seed, const unsigned char *packedpk) {
2019-01-16 10:02:32 +00:00
int i;
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_decompress(pk, packedpk);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_SYMBYTES; i++) {
seed[i] = packedpk[i + KYBER_POLYVECCOMPRESSEDBYTES];
}
}
/*************************************************
* Name: pack_ciphertext
*
* Description: Serialize the ciphertext as concatenation of the
* compressed and serialized vector of polynomials b
* and the compressed and serialized polynomial v
*
* Arguments: unsigned char *r: pointer to the output serialized
*ciphertext const poly *pk: pointer to the input vector of
*polynomials b const unsigned char *seed: pointer to the input polynomial v
**************************************************/
static void pack_ciphertext(unsigned char *r, const polyvec *b, const poly *v) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_compress(r, b);
PQCLEAN_KYBER768_poly_compress(r + KYBER_POLYVECCOMPRESSEDBYTES, v);
}
/*************************************************
* Name: unpack_ciphertext
*
* Description: De-serialize and decompress ciphertext from a byte array;
* approximate inverse of pack_ciphertext
*
* Arguments: - polyvec *b: pointer to the output vector of
*polynomials b
* - poly *v: pointer to the output polynomial v
* - const unsigned char *c: pointer to the input serialized
*ciphertext
**************************************************/
static void unpack_ciphertext(polyvec *b, poly *v, const unsigned char *c) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_decompress(b, c);
PQCLEAN_KYBER768_poly_decompress(v, c + KYBER_POLYVECCOMPRESSEDBYTES);
}
/*************************************************
* Name: pack_sk
*
* Description: Serialize the secret key
*
* Arguments: - unsigned char *r: pointer to output serialized secret key
* - const polyvec *sk: pointer to input vector of polynomials
*(secret key)
**************************************************/
static void pack_sk(unsigned char *r, const polyvec *sk) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_tobytes(r, sk);
}
/*************************************************
* Name: unpack_sk
*
* Description: De-serialize the secret key;
* inverse of pack_sk
*
* Arguments: - polyvec *sk: pointer to output vector of
*polynomials (secret key)
* - const unsigned char *packedsk: pointer to input serialized
*secret key
**************************************************/
static void unpack_sk(polyvec *sk, const unsigned char *packedsk) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_frombytes(sk, packedsk);
}
#define gen_a(A, B) gen_matrix(A, B, 0)
#define gen_at(A, B) gen_matrix(A, B, 1)
/*************************************************
* Name: gen_matrix
*
* Description: Deterministically generate matrix A (or the transpose of A)
* from a seed. Entries of the matrix are polynomials that look
* uniformly random. Performs rejection sampling on output of
* SHAKE-128
*
* Arguments: - polyvec *a: pointer to ouptput matrix A
* - const unsigned char *seed: pointer to input seed
* - int transposed: boolean deciding whether A or A^T
*is generated
**************************************************/
static void gen_matrix(polyvec *a, const unsigned char *seed, int transposed) {
2019-01-16 10:02:32 +00:00
unsigned int pos = 0, ctr;
uint16_t val;
unsigned int nblocks;
const unsigned int maxnblocks = 4;
uint8_t buf[SHAKE128_RATE * /* maxnblocks = */ 4];
2019-01-16 10:02:32 +00:00
int i, j;
uint64_t state[25]; // SHAKE state
unsigned char extseed[KYBER_SYMBYTES + 2];
for (i = 0; i < KYBER_SYMBYTES; i++) {
extseed[i] = seed[i];
}
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_K; i++) {
for (j = 0; j < KYBER_K; j++) {
ctr = pos = 0;
nblocks = maxnblocks;
if (transposed) {
extseed[KYBER_SYMBYTES] = (unsigned char)i;
extseed[KYBER_SYMBYTES + 1] = (unsigned char)j;
2019-01-16 10:02:32 +00:00
} else {
extseed[KYBER_SYMBYTES] = (unsigned char)j;
extseed[KYBER_SYMBYTES + 1] = (unsigned char)i;
2019-01-16 10:02:32 +00:00
}
shake128_absorb(state, extseed, KYBER_SYMBYTES + 2);
shake128_squeezeblocks(buf, nblocks, state);
while (ctr < KYBER_N) {
val = (buf[pos] | ((uint16_t)buf[pos + 1] << 8)) & 0x1fff;
if (val < KYBER_Q) {
a[i].vec[j].coeffs[ctr++] = val;
}
pos += 2;
if (pos > SHAKE128_RATE * nblocks - 2) {
nblocks = 1;
shake128_squeezeblocks(buf, nblocks, state);
pos = 0;
}
}
}
}
}
/*************************************************
* Name: indcpa_keypair
*
* Description: Generates public and private key for the CPA-secure
* public-key encryption scheme underlying Kyber
*
* Arguments: - unsigned char *pk: pointer to output public key (of length
*KYBER_INDCPA_PUBLICKEYBYTES bytes)
* - unsigned char *sk: pointer to output private key (of length
*KYBER_INDCPA_SECRETKEYBYTES bytes)
**************************************************/
2019-01-22 16:38:22 +00:00
void PQCLEAN_KYBER768_indcpa_keypair(unsigned char *pk, unsigned char *sk) {
2019-01-16 10:02:32 +00:00
polyvec a[KYBER_K], e, pkpv, skpv;
unsigned char buf[KYBER_SYMBYTES + KYBER_SYMBYTES];
unsigned char *publicseed = buf;
unsigned char *noiseseed = buf + KYBER_SYMBYTES;
int i;
unsigned char nonce = 0;
2019-01-16 10:02:32 +00:00
randombytes(buf, KYBER_SYMBYTES);
sha3_512(buf, buf, KYBER_SYMBYTES);
2019-01-16 10:02:32 +00:00
gen_a(a, publicseed);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_getnoise(skpv.vec + i, noiseseed, nonce++);
2019-01-16 10:02:32 +00:00
}
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_ntt(&skpv);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_getnoise(e.vec + i, noiseseed, nonce++);
2019-01-16 10:02:32 +00:00
}
2019-01-16 10:02:32 +00:00
// matrix-vector multiplication
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_pointwise_acc(&pkpv.vec[i], &skpv, a + i);
2019-01-16 10:02:32 +00:00
}
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_invntt(&pkpv);
PQCLEAN_KYBER768_polyvec_add(&pkpv, &pkpv, &e);
2019-01-16 10:02:32 +00:00
pack_sk(sk, &skpv);
pack_pk(pk, &pkpv, publicseed);
}
/*************************************************
* Name: indcpa_enc
*
* Description: Encryption function of the CPA-secure
* public-key encryption scheme underlying Kyber.
*
* Arguments: - unsigned char *c: pointer to output ciphertext (of
*length KYBER_INDCPA_BYTES bytes)
* - const unsigned char *m: pointer to input message (of length
*KYBER_INDCPA_MSGBYTES bytes)
* - const unsigned char *pk: pointer to input public key (of
*length KYBER_INDCPA_PUBLICKEYBYTES bytes)
* - const unsigned char *coin: pointer to input random coins used
*as seed (of length KYBER_SYMBYTES bytes) to deterministically generate all
*randomness
**************************************************/
2019-01-22 16:38:22 +00:00
void PQCLEAN_KYBER768_indcpa_enc(unsigned char *c, const unsigned char *m,
const unsigned char *pk,
const unsigned char *coins) {
2019-01-16 10:02:32 +00:00
polyvec sp, pkpv, ep, at[KYBER_K], bp;
poly v, k, epp;
unsigned char seed[KYBER_SYMBYTES];
int i;
unsigned char nonce = 0;
2019-01-16 10:02:32 +00:00
unpack_pk(&pkpv, seed, pk);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_frommsg(&k, m);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_ntt(&pkpv);
2019-01-16 10:02:32 +00:00
gen_at(at, seed);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_getnoise(sp.vec + i, coins, nonce++);
2019-01-16 10:02:32 +00:00
}
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_ntt(&sp);
2019-01-16 10:02:32 +00:00
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_getnoise(ep.vec + i, coins, nonce++);
2019-01-16 10:02:32 +00:00
}
2019-01-16 10:02:32 +00:00
// matrix-vector multiplication
for (i = 0; i < KYBER_K; i++) {
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_pointwise_acc(&bp.vec[i], &sp, at + i);
2019-01-16 10:02:32 +00:00
}
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_invntt(&bp);
PQCLEAN_KYBER768_polyvec_add(&bp, &bp, &ep);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_pointwise_acc(&v, &pkpv, &sp);
PQCLEAN_KYBER768_poly_invntt(&v);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_getnoise(&epp, coins, nonce++);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_add(&v, &v, &epp);
PQCLEAN_KYBER768_poly_add(&v, &v, &k);
2019-01-16 10:02:32 +00:00
pack_ciphertext(c, &bp, &v);
}
/*************************************************
* Name: indcpa_dec
*
* Description: Decryption function of the CPA-secure
* public-key encryption scheme underlying Kyber.
*
* Arguments: - unsigned char *m: pointer to output decrypted message
*(of length KYBER_INDCPA_MSGBYTES)
* - const unsigned char *c: pointer to input ciphertext (of
*length KYBER_INDCPA_BYTES)
* - const unsigned char *sk: pointer to input secret key (of
*length KYBER_INDCPA_SECRETKEYBYTES)
**************************************************/
2019-01-22 16:38:22 +00:00
void PQCLEAN_KYBER768_indcpa_dec(unsigned char *m, const unsigned char *c,
const unsigned char *sk) {
2019-01-16 10:02:32 +00:00
polyvec bp, skpv;
poly v, mp;
2019-01-16 10:02:32 +00:00
unpack_ciphertext(&bp, &v, c);
unpack_sk(&skpv, sk);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_ntt(&bp);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_polyvec_pointwise_acc(&mp, &skpv, &bp);
PQCLEAN_KYBER768_poly_invntt(&mp);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_sub(&mp, &mp, &v);
2019-01-22 16:38:22 +00:00
PQCLEAN_KYBER768_poly_tomsg(m, &mp);
}