選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。

158 行
6.2 KiB

  1. #include "api.h"
  2. #include "niederreiter.h"
  3. #include "randombytes.h"
  4. #include "rng.h"
  5. #include "utils.h"
  6. #include <string.h>
  7. #define pack_ct(sk_bytes, ct) PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_tobytes(sk_bytes, ct);
  8. #define unpack_ct(ct, ct_bytes) PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_frombytes(ct, ct_bytes)
  9. static void pack_pk(uint8_t *pk_bytes, publicKeyNiederreiter_t *pk) {
  10. for (size_t i = 0; i < N0 - 1; i++) {
  11. PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_tobytes(pk_bytes + i * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B,
  12. pk->Mtr + i * NUM_DIGITS_GF2X_ELEMENT);
  13. }
  14. }
  15. static void unpack_pk(publicKeyNiederreiter_t *pk, const uint8_t *pk_bytes) {
  16. for (size_t i = 0; i < N0 - 1; i++) {
  17. PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_frombytes(pk->Mtr + i * NUM_DIGITS_GF2X_ELEMENT,
  18. pk_bytes + i * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B);
  19. }
  20. }
  21. static void pack_error(uint8_t *error_bytes, DIGIT *error_digits) {
  22. size_t i;
  23. for (i = 0; i < N0; i++) {
  24. PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_tobytes(error_bytes + i * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B,
  25. error_digits + i * NUM_DIGITS_GF2X_ELEMENT);
  26. }
  27. }
  28. /* IND-CCA2 Keygen */
  29. int PQCLEAN_LEDAKEMLT12_LEAKTIME_crypto_kem_keypair(uint8_t *pk, uint8_t *sk) {
  30. publicKeyNiederreiter_t niederreiter_pk;
  31. PQCLEAN_LEDAKEMLT12_LEAKTIME_niederreiter_keygen(&niederreiter_pk, (privateKeyNiederreiter_t *) sk);
  32. pack_pk(pk, &niederreiter_pk);
  33. return 0;
  34. }
  35. /* IND-CCA2 Encapsulation */
  36. int PQCLEAN_LEDAKEMLT12_LEAKTIME_crypto_kem_enc(uint8_t *ct, uint8_t *ss, const uint8_t *pk) {
  37. publicKeyNiederreiter_t niederreiter_pk;
  38. DIGIT syndrome[NUM_DIGITS_GF2X_ELEMENT];
  39. AES_XOF_struct hashedAndTruncatedSeed_expander;
  40. POSITION_T errorPos[NUM_ERRORS_T];
  41. DIGIT error_vector[N0 * NUM_DIGITS_GF2X_ELEMENT];
  42. uint8_t error_bytes[N0 * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B];
  43. uint8_t seed[TRNG_BYTE_LENGTH];
  44. uint8_t ss_input[2 * TRNG_BYTE_LENGTH] = {0};
  45. uint8_t hashedSeed[HASH_BYTE_LENGTH];
  46. uint8_t hashedAndTruncatedSeed[TRNG_BYTE_LENGTH] = {0};
  47. uint8_t hashedErrorVector[HASH_BYTE_LENGTH];
  48. uint8_t hashedAndTruncatedErrorVector[TRNG_BYTE_LENGTH] = {0};
  49. uint8_t maskedSeed[TRNG_BYTE_LENGTH];
  50. unpack_pk(&niederreiter_pk, pk);
  51. randombytes(seed, TRNG_BYTE_LENGTH);
  52. memcpy(ss_input, seed, TRNG_BYTE_LENGTH);
  53. HASH_FUNCTION(ss, ss_input, 2 * TRNG_BYTE_LENGTH);
  54. HASH_FUNCTION(hashedSeed, seed, TRNG_BYTE_LENGTH);
  55. memcpy(hashedAndTruncatedSeed, hashedSeed, TRNG_BYTE_LENGTH);
  56. memset(&hashedAndTruncatedSeed_expander, 0x00, sizeof(AES_XOF_struct));
  57. PQCLEAN_LEDAKEMLT12_LEAKTIME_seedexpander_from_trng(&hashedAndTruncatedSeed_expander, hashedAndTruncatedSeed);
  58. PQCLEAN_LEDAKEMLT12_LEAKTIME_rand_error_pos(errorPos, &hashedAndTruncatedSeed_expander);
  59. PQCLEAN_LEDAKEMLT12_LEAKTIME_expand_error(error_vector, errorPos);
  60. pack_error(error_bytes, error_vector);
  61. HASH_FUNCTION(hashedErrorVector, error_bytes, (N0 * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B));
  62. memcpy(hashedAndTruncatedErrorVector, hashedErrorVector, TRNG_BYTE_LENGTH);
  63. for (size_t i = 0; i < TRNG_BYTE_LENGTH; ++i) {
  64. maskedSeed[i] = seed[i] ^ hashedAndTruncatedErrorVector[i];
  65. }
  66. PQCLEAN_LEDAKEMLT12_LEAKTIME_niederreiter_encrypt(syndrome,
  67. (const publicKeyNiederreiter_t *) &niederreiter_pk, error_vector);
  68. pack_ct(ct, syndrome);
  69. memcpy(ct + (NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B), maskedSeed, TRNG_BYTE_LENGTH);
  70. return 0;
  71. }
  72. /* IND-CCA2 Decapsulation */
  73. int PQCLEAN_LEDAKEMLT12_LEAKTIME_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, const uint8_t *sk) {
  74. DIGIT syndrome[NUM_DIGITS_GF2X_ELEMENT];
  75. AES_XOF_struct hashedAndTruncatedSeed_expander;
  76. POSITION_T reconstructed_errorPos[NUM_ERRORS_T];
  77. DIGIT reconstructed_error_vector[N0 * NUM_DIGITS_GF2X_ELEMENT];
  78. DIGIT decoded_error_vector[N0 * NUM_DIGITS_GF2X_ELEMENT];
  79. uint8_t decoded_error_bytes[N0 * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B];
  80. uint8_t hashedErrorVector[HASH_BYTE_LENGTH];
  81. uint8_t hashedAndTruncatedErrorVector[TRNG_BYTE_LENGTH] = {0};
  82. uint8_t decoded_seed[TRNG_BYTE_LENGTH];
  83. uint8_t hashed_decoded_seed[HASH_BYTE_LENGTH];
  84. uint8_t hashedAndTruncated_decoded_seed[TRNG_BYTE_LENGTH] = {0};
  85. uint8_t ss_input[2 * TRNG_BYTE_LENGTH], tail[TRNG_BYTE_LENGTH] = {0};
  86. int decode_ok, decrypt_ok, equal;
  87. unpack_ct(syndrome, ct);
  88. decode_ok = PQCLEAN_LEDAKEMLT12_LEAKTIME_niederreiter_decrypt(decoded_error_vector,
  89. (const privateKeyNiederreiter_t *)sk, syndrome);
  90. pack_error(decoded_error_bytes, decoded_error_vector);
  91. HASH_FUNCTION(hashedErrorVector, decoded_error_bytes, N0 * NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B);
  92. memcpy(hashedAndTruncatedErrorVector, hashedErrorVector, TRNG_BYTE_LENGTH);
  93. for (size_t i = 0; i < TRNG_BYTE_LENGTH; ++i) {
  94. decoded_seed[i] = ct[(NUM_DIGITS_GF2X_ELEMENT * DIGIT_SIZE_B) + i] ^
  95. hashedAndTruncatedErrorVector[i];
  96. }
  97. HASH_FUNCTION(hashed_decoded_seed, decoded_seed, TRNG_BYTE_LENGTH);
  98. memcpy(hashedAndTruncated_decoded_seed, hashed_decoded_seed, TRNG_BYTE_LENGTH);
  99. memset(&hashedAndTruncatedSeed_expander, 0x00, sizeof(AES_XOF_struct));
  100. PQCLEAN_LEDAKEMLT12_LEAKTIME_seedexpander_from_trng(&hashedAndTruncatedSeed_expander,
  101. hashed_decoded_seed);
  102. PQCLEAN_LEDAKEMLT12_LEAKTIME_rand_error_pos(reconstructed_errorPos, &hashedAndTruncatedSeed_expander);
  103. PQCLEAN_LEDAKEMLT12_LEAKTIME_expand_error(reconstructed_error_vector, reconstructed_errorPos);
  104. equal = PQCLEAN_LEDAKEMLT12_LEAKTIME_gf2x_verify(decoded_error_vector,
  105. reconstructed_error_vector, N0 * NUM_DIGITS_GF2X_ELEMENT);
  106. // equal == 0, if the reconstructed error vector match !!!
  107. decrypt_ok = (decode_ok == 1 && equal == 0);
  108. memcpy(ss_input, decoded_seed, TRNG_BYTE_LENGTH);
  109. memcpy(ss_input + sizeof(decoded_seed), tail, TRNG_BYTE_LENGTH);
  110. // Overwrite on failure
  111. PQCLEAN_LEDAKEMLT12_LEAKTIME_cmov(ss_input + sizeof(decoded_seed),
  112. ((const privateKeyNiederreiter_t *) sk)->decryption_failure_secret,
  113. TRNG_BYTE_LENGTH,
  114. !decrypt_ok);
  115. HASH_FUNCTION(ss, ss_input, 2 * TRNG_BYTE_LENGTH);
  116. return 0;
  117. }