pqc/crypto_kem/kyber768-90s/avx2/indcpa.c

371 lines
15 KiB
C
Raw Normal View History

#include "align.h"
2019-09-17 13:02:01 +01:00
#include "cbd.h"
#include "indcpa.h"
#include "ntt.h"
#include "params.h"
2019-09-17 13:02:01 +01:00
#include "poly.h"
#include "polyvec.h"
#include "randombytes.h"
#include "rejsample.h"
#include "symmetric.h"
2020-10-27 13:48:42 +00:00
#include <immintrin.h>
#include <stddef.h>
#include <stdint.h>
2019-09-17 13:02:01 +01:00
/*************************************************
* Name: pack_pk
*
* Description: Serialize the public key as concatenation of the
2020-10-27 13:48:42 +00:00
* serialized vector of polynomials pk and the
* public seed used to generate the matrix A.
* The polynomial coefficients in pk are assumed to
* lie in the invertal [0,q], i.e. pk must be reduced
* by PQCLEAN_KYBER76890S_AVX2_polyvec_reduce().
2019-09-17 13:02:01 +01:00
*
2020-10-27 13:48:42 +00:00
* Arguments: uint8_t *r: pointer to the output serialized public key
* polyvec *pk: pointer to the input public-key polyvec
2019-09-17 13:02:01 +01:00
* const uint8_t *seed: pointer to the input public seed
**************************************************/
static void pack_pk(uint8_t r[KYBER_INDCPA_PUBLICKEYBYTES],
polyvec *pk,
const uint8_t seed[KYBER_SYMBYTES]) {
size_t i;
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_tobytes(r, pk);
for (i = 0; i < KYBER_SYMBYTES; i++) {
2019-09-17 13:02:01 +01:00
r[i + KYBER_POLYVECBYTES] = seed[i];
}
}
/*************************************************
* Name: unpack_pk
*
* Description: De-serialize public key from a byte array;
2019-09-17 13:02:01 +01:00
* approximate inverse of pack_pk
*
* Arguments: - polyvec *pk: pointer to output public-key polynomial vector
* - uint8_t *seed: pointer to output seed to generate matrix A
2019-09-17 13:02:01 +01:00
* - const uint8_t *packedpk: pointer to input serialized public key
**************************************************/
static void unpack_pk(polyvec *pk,
uint8_t seed[KYBER_SYMBYTES],
const uint8_t packedpk[KYBER_INDCPA_PUBLICKEYBYTES]) {
size_t i;
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_frombytes(pk, packedpk);
for (i = 0; i < KYBER_SYMBYTES; i++) {
2019-09-17 13:02:01 +01:00
seed[i] = packedpk[i + KYBER_POLYVECBYTES];
}
}
/*************************************************
* Name: pack_sk
*
2020-10-27 13:48:42 +00:00
* Description: Serialize the secret key.
* The polynomial coefficients in sk are assumed to
* lie in the invertal [0,q], i.e. sk must be reduced
* by PQCLEAN_KYBER76890S_AVX2_polyvec_reduce().
2019-09-17 13:02:01 +01:00
*
2020-10-27 13:48:42 +00:00
* Arguments: - uint8_t *r: pointer to output serialized secret key
* - polyvec *sk: pointer to input vector of polynomials (secret key)
2019-09-17 13:02:01 +01:00
**************************************************/
static void pack_sk(uint8_t r[KYBER_INDCPA_SECRETKEYBYTES], polyvec *sk) {
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_tobytes(r, sk);
}
/*************************************************
* Name: unpack_sk
*
2020-10-27 13:48:42 +00:00
* Description: De-serialize the secret key; inverse of pack_sk
2019-09-17 13:02:01 +01:00
*
2020-10-27 13:48:42 +00:00
* Arguments: - polyvec *sk: pointer to output vector of polynomials (secret key)
2019-09-17 13:02:01 +01:00
* - const uint8_t *packedsk: pointer to input serialized secret key
**************************************************/
2020-10-27 13:48:42 +00:00
static void unpack_sk(polyvec *sk, const uint8_t packedsk[KYBER_INDCPA_SECRETKEYBYTES]) {
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_frombytes(sk, packedsk);
}
/*************************************************
* Name: pack_ciphertext
*
* Description: Serialize the ciphertext as concatenation of the
* compressed and serialized vector of polynomials b
2020-10-27 13:48:42 +00:00
* and the compressed and serialized polynomial v.
* The polynomial coefficients in b and v are assumed to
* lie in the invertal [0,q], i.e. b and v must be reduced
* by PQCLEAN_KYBER76890S_AVX2_polyvec_reduce() and PQCLEAN_KYBER76890S_AVX2_poly_reduce(), respectively.
2019-09-17 13:02:01 +01:00
*
* Arguments: uint8_t *r: pointer to the output serialized ciphertext
2020-10-27 13:48:42 +00:00
* poly *pk: pointer to the input vector of polynomials b
* poly *v: pointer to the input polynomial v
2019-09-17 13:02:01 +01:00
**************************************************/
2020-10-27 13:48:42 +00:00
static void pack_ciphertext(uint8_t r[KYBER_INDCPA_BYTES], polyvec *b, poly *v) {
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_compress(r, b);
PQCLEAN_KYBER76890S_AVX2_poly_compress(r + KYBER_POLYVECCOMPRESSEDBYTES, v);
}
/*************************************************
* Name: unpack_ciphertext
*
* Description: De-serialize and decompress ciphertext from a byte array;
* approximate inverse of pack_ciphertext
*
2020-10-27 13:48:42 +00:00
* Arguments: - polyvec *b: pointer to the output vector of polynomials b
* - poly *v: pointer to the output polynomial v
2019-09-17 13:02:01 +01:00
* - const uint8_t *c: pointer to the input serialized ciphertext
**************************************************/
2020-10-27 13:48:42 +00:00
static void unpack_ciphertext(polyvec *b, poly *v, const uint8_t c[KYBER_INDCPA_BYTES]) {
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_decompress(b, c);
PQCLEAN_KYBER76890S_AVX2_poly_decompress(v, c + KYBER_POLYVECCOMPRESSEDBYTES);
}
/*************************************************
* Name: rej_uniform
*
* Description: Run rejection sampling on uniform random bytes to generate
* uniform random integers mod q
*
2020-10-27 13:48:42 +00:00
* Arguments: - int16_t *r: pointer to output array
* - unsigned int len: requested number of 16-bit integers (uniform mod q)
* - const uint8_t *buf: pointer to input buffer (assumed to be uniformly random bytes)
* - unsigned int buflen: length of input buffer in bytes
*
* Returns number of sampled 16-bit integers (at most len)
**************************************************/
static unsigned int rej_uniform(int16_t *r,
unsigned int len,
const uint8_t *buf,
unsigned int buflen) {
unsigned int ctr, pos;
2020-10-27 13:48:42 +00:00
uint16_t val0, val1;
2019-09-17 13:02:01 +01:00
ctr = pos = 0;
2020-10-27 13:48:42 +00:00
while (ctr < len && pos + 3 <= buflen) {
val0 = ((buf[pos + 0] >> 0) | ((uint16_t)buf[pos + 1] << 8)) & 0xFFF;
val1 = ((buf[pos + 1] >> 4) | ((uint16_t)buf[pos + 2] << 4)) & 0xFFF;
pos += 3;
2019-09-17 13:02:01 +01:00
2020-10-27 13:48:42 +00:00
if (val0 < KYBER_Q) {
r[ctr++] = val0;
}
if (ctr < len && val1 < KYBER_Q) {
r[ctr++] = val1;
2019-09-17 13:02:01 +01:00
}
}
return ctr;
}
#define gen_a(A,B) PQCLEAN_KYBER76890S_AVX2_gen_matrix(A,B,0)
#define gen_at(A,B) PQCLEAN_KYBER76890S_AVX2_gen_matrix(A,B,1)
2019-09-17 13:02:01 +01:00
/*************************************************
* Name: PQCLEAN_KYBER76890S_AVX2_gen_matrix
2019-09-17 13:02:01 +01:00
*
* Description: Deterministically generate matrix A (or the transpose of A)
* from a seed. Entries of the matrix are polynomials that look
* uniformly random. Performs rejection sampling on output of
* a XOF
*
* Arguments: - polyvec *a: pointer to ouptput matrix A
2019-09-17 13:02:01 +01:00
* - const uint8_t *seed: pointer to input seed
* - int transposed: boolean deciding whether A or A^T is generated
2019-09-17 13:02:01 +01:00
**************************************************/
2020-10-27 13:48:42 +00:00
void PQCLEAN_KYBER76890S_AVX2_gen_matrix(polyvec *a, const uint8_t seed[32], int transposed) {
unsigned int ctr, i, j, k;
unsigned int buflen, off;
uint64_t nonce = 0;
ALIGNED_UINT8(REJ_UNIFORM_AVX_NBLOCKS * AES256CTR_BLOCKBYTES) buf;
2019-09-17 13:02:01 +01:00
aes256ctr_ctx state;
PQCLEAN_KYBER76890S_AVX2_aes256ctr_init(&state, seed, 0);
for (i = 0; i < KYBER_K; i++) {
for (j = 0; j < KYBER_K; j++) {
2019-09-17 13:02:01 +01:00
if (transposed) {
2020-10-27 13:48:42 +00:00
nonce = (j << 8) | i;
2019-09-17 13:02:01 +01:00
} else {
2020-10-27 13:48:42 +00:00
nonce = (i << 8) | j;
2019-09-17 13:02:01 +01:00
}
2020-10-27 13:48:42 +00:00
state.n = _mm_loadl_epi64((__m128i *)&nonce);
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(buf.coeffs, REJ_UNIFORM_AVX_NBLOCKS, &state);
buflen = REJ_UNIFORM_AVX_NBLOCKS * AES256CTR_BLOCKBYTES;
ctr = PQCLEAN_KYBER76890S_AVX2_rej_uniform_avx(a[i].vec[j].coeffs, buf.coeffs);
2019-09-17 13:02:01 +01:00
while (ctr < KYBER_N) {
2020-10-27 13:48:42 +00:00
off = buflen % 3;
for (k = 0; k < off; k++) {
buf.coeffs[k] = buf.coeffs[buflen - off + k];
}
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(buf.coeffs + off, 1, &state);
buflen = off + AES256CTR_BLOCKBYTES;
ctr += rej_uniform(a[i].vec[j].coeffs + ctr, KYBER_N - ctr, buf.coeffs, buflen);
2019-09-17 13:02:01 +01:00
}
PQCLEAN_KYBER76890S_AVX2_poly_nttunpack(&a[i].vec[j]);
}
}
}
/*************************************************
* Name: PQCLEAN_KYBER76890S_AVX2_indcpa_keypair
2019-09-17 13:02:01 +01:00
*
* Description: Generates public and private key for the CPA-secure
* public-key encryption scheme underlying Kyber
*
* Arguments: - uint8_t *pk: pointer to output public key
* (of length KYBER_INDCPA_PUBLICKEYBYTES bytes)
* - uint8_t *sk: pointer to output private key
(of length KYBER_INDCPA_SECRETKEYBYTES bytes)
2019-09-17 13:02:01 +01:00
**************************************************/
void PQCLEAN_KYBER76890S_AVX2_indcpa_keypair(uint8_t pk[KYBER_INDCPA_PUBLICKEYBYTES],
uint8_t sk[KYBER_INDCPA_SECRETKEYBYTES]) {
unsigned int i;
2020-10-27 13:48:42 +00:00
uint8_t buf[2 * KYBER_SYMBYTES];
const uint8_t *publicseed = buf;
const uint8_t *noiseseed = buf + KYBER_SYMBYTES;
polyvec a[KYBER_K], e, pkpv, skpv;
2019-09-17 13:02:01 +01:00
2020-10-27 13:48:42 +00:00
randombytes(buf, KYBER_SYMBYTES);
hash_g(buf, buf, KYBER_SYMBYTES);
2019-09-17 13:02:01 +01:00
gen_a(a, publicseed);
2020-10-27 13:48:42 +00:00
#define NOISE_NBLOCKS ((KYBER_ETA1*KYBER_N/4)/AES256CTR_BLOCKBYTES) /* Assumes divisibility */
uint64_t nonce = 0;
ALIGNED_UINT8(NOISE_NBLOCKS * AES256CTR_BLOCKBYTES + 32) coins; // +32 bytes as required by PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta1
2019-09-17 13:02:01 +01:00
aes256ctr_ctx state;
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_init(&state, noiseseed, nonce++);
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(coins.coeffs, NOISE_NBLOCKS, &state);
state.n = _mm_loadl_epi64((__m128i *)&nonce);
nonce += 1;
PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta1(&skpv.vec[i], coins.vec);
2019-09-17 13:02:01 +01:00
}
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(coins.coeffs, NOISE_NBLOCKS, &state);
state.n = _mm_loadl_epi64((__m128i *)&nonce);
nonce += 1;
PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta1(&e.vec[i], coins.vec);
2019-09-17 13:02:01 +01:00
}
PQCLEAN_KYBER76890S_AVX2_polyvec_ntt(&skpv);
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_reduce(&skpv);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_ntt(&e);
// matrix-vector multiplication
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_basemul_acc_montgomery(&pkpv.vec[i], &a[i], &skpv);
PQCLEAN_KYBER76890S_AVX2_poly_tomont(&pkpv.vec[i]);
2019-09-17 13:02:01 +01:00
}
PQCLEAN_KYBER76890S_AVX2_polyvec_add(&pkpv, &pkpv, &e);
PQCLEAN_KYBER76890S_AVX2_polyvec_reduce(&pkpv);
pack_sk(sk, &skpv);
pack_pk(pk, &pkpv, publicseed);
}
/*************************************************
* Name: PQCLEAN_KYBER76890S_AVX2_indcpa_enc
2019-09-17 13:02:01 +01:00
*
* Description: Encryption function of the CPA-secure
* public-key encryption scheme underlying Kyber.
*
2020-10-27 13:48:42 +00:00
* Arguments: - uint8_t *c: pointer to output ciphertext
* (of length KYBER_INDCPA_BYTES bytes)
* - const uint8_t *m: pointer to input message
* (of length KYBER_INDCPA_MSGBYTES bytes)
* - const uint8_t *pk: pointer to input public key
* (of length KYBER_INDCPA_PUBLICKEYBYTES)
* - const uint8_t *coins: pointer to input random coins used as seed
* (of length KYBER_SYMBYTES) to deterministically
* generate all randomness
2019-09-17 13:02:01 +01:00
**************************************************/
void PQCLEAN_KYBER76890S_AVX2_indcpa_enc(uint8_t c[KYBER_INDCPA_BYTES],
const uint8_t m[KYBER_INDCPA_MSGBYTES],
const uint8_t pk[KYBER_INDCPA_PUBLICKEYBYTES],
const uint8_t coins[KYBER_SYMBYTES]) {
unsigned int i;
2020-10-27 13:48:42 +00:00
uint8_t seed[KYBER_SYMBYTES];
polyvec sp, pkpv, ep, at[KYBER_K], b;
poly v, k, epp;
2020-10-27 13:48:42 +00:00
unpack_pk(&pkpv, seed, pk);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_poly_frommsg(&k, m);
2020-10-27 13:48:42 +00:00
gen_at(at, seed);
2019-09-17 13:02:01 +01:00
2020-10-27 13:48:42 +00:00
#define NOISE_NBLOCKS ((KYBER_ETA1*KYBER_N/4)/AES256CTR_BLOCKBYTES) /* Assumes divisibility */
#define CIPHERTEXTNOISE_NBLOCKS ((KYBER_ETA2*KYBER_N/4)/AES256CTR_BLOCKBYTES) /* Assumes divisibility */
uint64_t nonce = 0;
ALIGNED_UINT8(NOISE_NBLOCKS * AES256CTR_BLOCKBYTES + 32) buf; /* +32 bytes as required by PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta1 */
2019-09-17 13:02:01 +01:00
aes256ctr_ctx state;
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_init(&state, coins, nonce++);
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(buf.coeffs, NOISE_NBLOCKS, &state);
state.n = _mm_loadl_epi64((__m128i *)&nonce);
nonce += 1;
PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta1(&sp.vec[i], buf.vec);
2019-09-17 13:02:01 +01:00
}
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(buf.coeffs, CIPHERTEXTNOISE_NBLOCKS, &state);
state.n = _mm_loadl_epi64((__m128i *)&nonce);
nonce += 1;
PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta2(&ep.vec[i], buf.vec);
2019-09-17 13:02:01 +01:00
}
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_aes256ctr_squeezeblocks(buf.coeffs, CIPHERTEXTNOISE_NBLOCKS, &state);
state.n = _mm_loadl_epi64((__m128i *)&nonce);
nonce += 1;
PQCLEAN_KYBER76890S_AVX2_poly_cbd_eta2(&epp, buf.vec);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_polyvec_ntt(&sp);
// matrix-vector multiplication
for (i = 0; i < KYBER_K; i++) {
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_basemul_acc_montgomery(&b.vec[i], &at[i], &sp);
2019-09-17 13:02:01 +01:00
}
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_basemul_acc_montgomery(&v, &pkpv, &sp);
2019-09-17 13:02:01 +01:00
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_invntt_tomont(&b);
PQCLEAN_KYBER76890S_AVX2_poly_invntt_tomont(&v);
2019-09-17 13:02:01 +01:00
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_add(&b, &b, &ep);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_poly_add(&v, &v, &epp);
PQCLEAN_KYBER76890S_AVX2_poly_add(&v, &v, &k);
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_reduce(&b);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_poly_reduce(&v);
2020-10-27 13:48:42 +00:00
pack_ciphertext(c, &b, &v);
2019-09-17 13:02:01 +01:00
}
/*************************************************
* Name: PQCLEAN_KYBER76890S_AVX2_indcpa_dec
2019-09-17 13:02:01 +01:00
*
* Description: Decryption function of the CPA-secure
* public-key encryption scheme underlying Kyber.
*
2020-10-27 13:48:42 +00:00
* Arguments: - uint8_t *m: pointer to output decrypted message
* (of length KYBER_INDCPA_MSGBYTES)
* - const uint8_t *c: pointer to input ciphertext
* (of length KYBER_INDCPA_BYTES)
* - const uint8_t *sk: pointer to input secret key
* (of length KYBER_INDCPA_SECRETKEYBYTES)
2019-09-17 13:02:01 +01:00
**************************************************/
void PQCLEAN_KYBER76890S_AVX2_indcpa_dec(uint8_t m[KYBER_INDCPA_MSGBYTES],
const uint8_t c[KYBER_INDCPA_BYTES],
const uint8_t sk[KYBER_INDCPA_SECRETKEYBYTES]) {
2020-10-27 13:48:42 +00:00
polyvec b, skpv;
2019-09-17 13:02:01 +01:00
poly v, mp;
2020-10-27 13:48:42 +00:00
unpack_ciphertext(&b, &v, c);
2019-09-17 13:02:01 +01:00
unpack_sk(&skpv, sk);
2020-10-27 13:48:42 +00:00
PQCLEAN_KYBER76890S_AVX2_polyvec_ntt(&b);
PQCLEAN_KYBER76890S_AVX2_polyvec_basemul_acc_montgomery(&mp, &skpv, &b);
PQCLEAN_KYBER76890S_AVX2_poly_invntt_tomont(&mp);
2019-09-17 13:02:01 +01:00
PQCLEAN_KYBER76890S_AVX2_poly_sub(&mp, &v, &mp);
PQCLEAN_KYBER76890S_AVX2_poly_reduce(&mp);
PQCLEAN_KYBER76890S_AVX2_poly_tomsg(m, &mp);
}