mirror of
https://github.com/henrydcase/pqc.git
synced 2024-11-23 07:59:01 +00:00
207 lines
8.9 KiB
C
207 lines
8.9 KiB
C
|
/********************************************************************************************
|
||
|
* FrodoKEM: Learning with Errors Key Encapsulation
|
||
|
*
|
||
|
* Abstract: matrix arithmetic functions used by the KEM
|
||
|
*********************************************************************************************/
|
||
|
|
||
|
#include <stdint.h>
|
||
|
#include <string.h>
|
||
|
|
||
|
#include "fips202.h"
|
||
|
|
||
|
#include "api.h"
|
||
|
#include "common.h"
|
||
|
#include "params.h"
|
||
|
#define USE_SHAKE128_FOR_A
|
||
|
|
||
|
int PQCLEAN_FRODOKEM640SHAKE_OPT_mul_add_as_plus_e(uint16_t *out, const uint16_t *s, const uint16_t *e, const uint8_t *seed_A) {
|
||
|
// Generate-and-multiply: generate matrix A (N x N) row-wise, multiply by s on the right.
|
||
|
// Inputs: s, e (N x N_BAR)
|
||
|
// Output: out = A*s + e (N x N_BAR)
|
||
|
int i, j, k;
|
||
|
int16_t a_row[4 * PARAMS_N] = {0};
|
||
|
|
||
|
for (i = 0; i < (PARAMS_N * PARAMS_NBAR); i += 2) {
|
||
|
*((uint32_t *)&out[i]) = *((uint32_t *)&e[i]);
|
||
|
}
|
||
|
|
||
|
#if defined(USE_AES128_FOR_A)
|
||
|
int16_t a_row_temp[4 * PARAMS_N] = {0}; // Take four lines of A at once
|
||
|
#if !defined(USE_OPENSSL)
|
||
|
uint8_t aes_key_schedule[16 * 11];
|
||
|
AES128_load_schedule(seed_A, aes_key_schedule);
|
||
|
#else
|
||
|
EVP_CIPHER_CTX *aes_key_schedule;
|
||
|
int len;
|
||
|
if (!(aes_key_schedule = EVP_CIPHER_CTX_new())) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
if (1 != EVP_EncryptInit_ex(aes_key_schedule, EVP_aes_128_ecb(), NULL, seed_A, NULL)) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
for (j = 0; j < PARAMS_N; j += PARAMS_STRIPE_STEP) {
|
||
|
a_row_temp[j + 1 + 0 * PARAMS_N] = j; // Loading values in the little-endian order
|
||
|
a_row_temp[j + 1 + 1 * PARAMS_N] = j;
|
||
|
a_row_temp[j + 1 + 2 * PARAMS_N] = j;
|
||
|
a_row_temp[j + 1 + 3 * PARAMS_N] = j;
|
||
|
}
|
||
|
|
||
|
for (i = 0; i < PARAMS_N; i += 4) {
|
||
|
for (j = 0; j < PARAMS_N; j += PARAMS_STRIPE_STEP) { // Go through A, four rows at a time
|
||
|
a_row_temp[j + 0 * PARAMS_N] = i + 0; // Loading values in the little-endian order
|
||
|
a_row_temp[j + 1 * PARAMS_N] = i + 1;
|
||
|
a_row_temp[j + 2 * PARAMS_N] = i + 2;
|
||
|
a_row_temp[j + 3 * PARAMS_N] = i + 3;
|
||
|
}
|
||
|
|
||
|
#if !defined(USE_OPENSSL)
|
||
|
AES128_ECB_enc_sch((uint8_t *)a_row_temp, 4 * PARAMS_N * sizeof(int16_t), aes_key_schedule, (uint8_t *)a_row);
|
||
|
#else
|
||
|
if (1 != EVP_EncryptUpdate(aes_key_schedule, (uint8_t *)a_row, &len, (uint8_t *)a_row_temp, 4 * PARAMS_N * sizeof(int16_t))) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
#endif
|
||
|
#elif defined (USE_SHAKE128_FOR_A)
|
||
|
uint8_t seed_A_separated[2 + BYTES_SEED_A];
|
||
|
uint16_t *seed_A_origin = (uint16_t *)&seed_A_separated;
|
||
|
memcpy(&seed_A_separated[2], seed_A, BYTES_SEED_A);
|
||
|
for (i = 0; i < PARAMS_N; i += 4) {
|
||
|
seed_A_origin[0] = (uint16_t) (i + 0);
|
||
|
shake128((unsigned char *)(a_row + 0 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (i + 1);
|
||
|
shake128((unsigned char *)(a_row + 1 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (i + 2);
|
||
|
shake128((unsigned char *)(a_row + 2 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (i + 3);
|
||
|
shake128((unsigned char *)(a_row + 3 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
#endif
|
||
|
|
||
|
for (k = 0; k < PARAMS_NBAR; k++) {
|
||
|
uint16_t sum[4] = {0};
|
||
|
for (j = 0; j < PARAMS_N; j++) { // Matrix-vector multiplication
|
||
|
uint16_t sp = s[k * PARAMS_N + j];
|
||
|
sum[0] += a_row[0 * PARAMS_N + j] * sp; // Go through four lines with same s
|
||
|
sum[1] += a_row[1 * PARAMS_N + j] * sp;
|
||
|
sum[2] += a_row[2 * PARAMS_N + j] * sp;
|
||
|
sum[3] += a_row[3 * PARAMS_N + j] * sp;
|
||
|
}
|
||
|
out[(i + 0)*PARAMS_NBAR + k] += sum[0];
|
||
|
out[(i + 2)*PARAMS_NBAR + k] += sum[2];
|
||
|
out[(i + 1)*PARAMS_NBAR + k] += sum[1];
|
||
|
out[(i + 3)*PARAMS_NBAR + k] += sum[3];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
#if defined(USE_AES128_FOR_A)
|
||
|
AES128_free_schedule(aes_key_schedule);
|
||
|
#endif
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
|
||
|
int PQCLEAN_FRODOKEM640SHAKE_OPT_mul_add_sa_plus_e(uint16_t *out, const uint16_t *s, const uint16_t *e, const uint8_t *seed_A) {
|
||
|
// Generate-and-multiply: generate matrix A (N x N) column-wise, multiply by s' on the left.
|
||
|
// Inputs: s', e' (N_BAR x N)
|
||
|
// Output: out = s'*A + e' (N_BAR x N)
|
||
|
int i, j, k, kk;
|
||
|
|
||
|
for (i = 0; i < (PARAMS_N * PARAMS_NBAR); i += 2) {
|
||
|
*((uint32_t *)&out[i]) = *((uint32_t *)&e[i]);
|
||
|
}
|
||
|
|
||
|
#if defined(USE_AES128_FOR_A)
|
||
|
uint16_t a_cols[PARAMS_N * PARAMS_STRIPE_STEP] = {0};
|
||
|
uint16_t a_cols_t[PARAMS_N * PARAMS_STRIPE_STEP] = {0};
|
||
|
uint16_t a_cols_temp[PARAMS_N * PARAMS_STRIPE_STEP] = {0};
|
||
|
#if !defined(USE_OPENSSL)
|
||
|
uint8_t aes_key_schedule[16 * 11];
|
||
|
AES128_load_schedule(seed_A, aes_key_schedule);
|
||
|
#else
|
||
|
EVP_CIPHER_CTX *aes_key_schedule;
|
||
|
int len;
|
||
|
if (!(aes_key_schedule = EVP_CIPHER_CTX_new())) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
if (1 != EVP_EncryptInit_ex(aes_key_schedule, EVP_aes_128_ecb(), NULL, seed_A, NULL)) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
for (i = 0, j = 0; i < PARAMS_N; i++, j += PARAMS_STRIPE_STEP) {
|
||
|
a_cols_temp[j] = i; // Loading values in the little-endian order
|
||
|
}
|
||
|
|
||
|
for (kk = 0; kk < PARAMS_N; kk += PARAMS_STRIPE_STEP) { // Go through A's columns, 8 (== PARAMS_STRIPE_STEP) columns at a time.
|
||
|
for (i = 0; i < (PARAMS_N * PARAMS_STRIPE_STEP); i += PARAMS_STRIPE_STEP) {
|
||
|
a_cols_temp[i + 1] = kk; // Loading values in the little-endian order
|
||
|
}
|
||
|
|
||
|
#if !defined(USE_OPENSSL)
|
||
|
AES128_ECB_enc_sch((uint8_t *)a_cols_temp, PARAMS_N * PARAMS_STRIPE_STEP * sizeof(int16_t), aes_key_schedule, (uint8_t *)a_cols);
|
||
|
#else
|
||
|
if (1 != EVP_EncryptUpdate(aes_key_schedule, (uint8_t *)a_cols, &len, (uint8_t *)a_cols_temp, PARAMS_N * PARAMS_STRIPE_STEP * sizeof(int16_t))) {
|
||
|
handleErrors();
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
for (i = 0; i < PARAMS_N; i++) { // Transpose a_cols to have access to it in the column-major order.
|
||
|
for (k = 0; k < PARAMS_STRIPE_STEP; k++) {
|
||
|
a_cols_t[k * PARAMS_N + i] = a_cols[i * PARAMS_STRIPE_STEP + k];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
for (i = 0; i < PARAMS_NBAR; i++) {
|
||
|
for (k = 0; k < PARAMS_STRIPE_STEP; k += PARAMS_PARALLEL) {
|
||
|
uint16_t sum[PARAMS_PARALLEL] = {0};
|
||
|
for (j = 0; j < PARAMS_N; j++) { // Matrix-vector multiplication
|
||
|
uint16_t sp = s[i * PARAMS_N + j];
|
||
|
sum[0] += sp * a_cols_t[(k + 0) * PARAMS_N + j];
|
||
|
sum[1] += sp * a_cols_t[(k + 1) * PARAMS_N + j];
|
||
|
sum[2] += sp * a_cols_t[(k + 2) * PARAMS_N + j];
|
||
|
sum[3] += sp * a_cols_t[(k + 3) * PARAMS_N + j];
|
||
|
}
|
||
|
out[i * PARAMS_N + kk + k + 0] += sum[0];
|
||
|
out[i * PARAMS_N + kk + k + 2] += sum[2];
|
||
|
out[i * PARAMS_N + kk + k + 1] += sum[1];
|
||
|
out[i * PARAMS_N + kk + k + 3] += sum[3];
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
AES128_free_schedule(aes_key_schedule);
|
||
|
|
||
|
#elif defined (USE_SHAKE128_FOR_A) // SHAKE128
|
||
|
int t = 0;
|
||
|
uint16_t a_cols[4 * PARAMS_N] = {0};
|
||
|
uint8_t seed_A_separated[2 + BYTES_SEED_A];
|
||
|
uint16_t *seed_A_origin = (uint16_t *)&seed_A_separated;
|
||
|
memcpy(&seed_A_separated[2], seed_A, BYTES_SEED_A);
|
||
|
for (kk = 0; kk < PARAMS_N; kk += 4) {
|
||
|
seed_A_origin[0] = (uint16_t) (kk + 0);
|
||
|
shake128((unsigned char *)(a_cols + 0 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (kk + 1);
|
||
|
shake128((unsigned char *)(a_cols + 1 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (kk + 2);
|
||
|
shake128((unsigned char *)(a_cols + 2 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
seed_A_origin[0] = (uint16_t) (kk + 3);
|
||
|
shake128((unsigned char *)(a_cols + 3 * PARAMS_N), (unsigned long long)(2 * PARAMS_N), seed_A_separated, 2 + BYTES_SEED_A);
|
||
|
|
||
|
for (i = 0; i < PARAMS_NBAR; i++) {
|
||
|
uint16_t sum[PARAMS_N] = {0};
|
||
|
for (j = 0; j < 4; j++) {
|
||
|
uint16_t sp = s[i * PARAMS_N + kk + j];
|
||
|
for (k = 0; k < PARAMS_N; k++) { // Matrix-vector multiplication
|
||
|
sum[k] += sp * a_cols[(t + j) * PARAMS_N + k];
|
||
|
}
|
||
|
}
|
||
|
for (k = 0; k < PARAMS_N; k++) {
|
||
|
out[i * PARAMS_N + k] += sum[k];
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
return 1;
|
||
|
}
|