th5/testdata
David Leon Gil a1363d2ed9 crypto/ecdsa: make Sign safe with broken entropy sources
ECDSA is unsafe to use if an entropy source produces predictable
output for the ephemeral nonces. E.g., [Nguyen]. A simple
countermeasure is to hash the secret key, the message, and
entropy together to seed a CSPRNG, from which the ephemeral key
is derived.

Fixes #9452

--

This is a minimalist (in terms of patch size) solution, though
not the most parsimonious in its use of primitives:

   - csprng_key = ChopMD-256(SHA2-512(priv.D||entropy||hash))
   - reader = AES-256-CTR(k=csprng_key)

This, however, provides at most 128-bit collision-resistance,
so that Adv will have a term related to the number of messages
signed that is significantly worse than plain ECDSA. This does
not seem to be of any practical importance.

ChopMD-256(SHA2-512(x)) is used, rather than SHA2-256(x), for
two sets of reasons:

*Practical:* SHA2-512 has a larger state and 16 more rounds; it
is likely non-generically stronger than SHA2-256. And, AFAIK,
cryptanalysis backs this up. (E.g., [Biryukov] gives a
distinguisher on 47-round SHA2-256 with cost < 2^85.) This is
well below a reasonable security-strength target.

*Theoretical:* [Coron] and [Chang] show that Chop-MD(F(x)) is
indifferentiable from a random oracle for slightly beyond the
birthday barrier. It seems likely that this makes a generic
security proof that this construction remains UF-CMA is
possible in the indifferentiability framework.

--

Many thanks to Payman Mohassel for reviewing this construction;
any mistakes are mine, however. And, as he notes, reusing the
private key in this way means that the generic-group (non-RO)
proof of ECDSA's security given in [Brown] no longer directly
applies.

--

[Brown]: http://www.cacr.math.uwaterloo.ca/techreports/2000/corr2000-54.ps
"Brown. The exact security of ECDSA. 2000"

[Coron]: https://www.cs.nyu.edu/~puniya/papers/merkle.pdf
"Coron et al. Merkle-Damgard revisited. 2005"

[Chang]: https://www.iacr.org/archive/fse2008/50860436/50860436.pdf
"Chang and Nandi. Improved indifferentiability security analysis
of chopMD hash function. 2008"

[Biryukov]: http://www.iacr.org/archive/asiacrypt2011/70730269/70730269.pdf
"Biryukov et al. Second-order differential collisions for reduced
SHA-256. 2011"

[Nguyen]: ftp://ftp.di.ens.fr/pub/users/pnguyen/PubECDSA.ps
"Nguyen and Shparlinski. The insecurity of the elliptic curve
digital signature algorithm with partially known nonces. 2003"

New tests:

  TestNonceSafety: Check that signatures are safe even with a
    broken entropy source.

  TestINDCCA: Check that signatures remain non-deterministic
    with a functional entropy source.

Updated "golden" KATs in crypto/tls/testdata that use ECDSA suites.

Change-Id: I55337a2fbec2e42a36ce719bd2184793682d678a
Reviewed-on: https://go-review.googlesource.com/3340
Reviewed-by: Adam Langley <agl@golang.org>
2015-01-28 01:39:51 +00:00
..
Client-TLSv10-ClientCert-ECDSA-ECDSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Client-TLSv10-ClientCert-ECDSA-RSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Client-TLSv10-ClientCert-RSA-ECDSA crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv10-ClientCert-RSA-RSA crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv10-ECDHE-ECDSA-AES crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Client-TLSv10-ECDHE-RSA-AES crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv10-RSA-RC4 crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv11-ECDHE-ECDSA-AES crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv11-ECDHE-RSA-AES crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv11-RSA-RC4 crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-ALPN crypto/tls: add ALPN support. 2014-08-05 11:36:20 -07:00
Client-TLSv12-ALPN-NoMatch crypto/tls: add ALPN support. 2014-08-05 11:36:20 -07:00
Client-TLSv12-ClientCert-ECDSA-ECDSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Client-TLSv12-ClientCert-ECDSA-RSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Client-TLSv12-ClientCert-RSA-ECDSA crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-ClientCert-RSA-RSA crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-ECDHE-ECDSA-AES crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-ECDHE-ECDSA-AES-GCM crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-ECDHE-RSA-AES crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Client-TLSv12-RSA-RC4 crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Server-SSLv3-RSA-3DES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-SSLv3-RSA-AES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-SSLv3-RSA-RC4 crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv10-ECDHE-ECDSA-AES crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Server-TLSv10-RSA-3DES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv10-RSA-AES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv10-RSA-RC4 crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv11-FallbackSCSV crypto/tls: support TLS_FALLBACK_SCSV as a server. 2014-10-15 17:54:04 -07:00
Server-TLSv11-RSA-RC4 crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-ALPN crypto/tls: add ALPN support. 2014-08-05 11:36:20 -07:00
Server-TLSv12-ALPN-NoMatch crypto/tls: add ALPN support. 2014-08-05 11:36:20 -07:00
Server-TLSv12-CipherSuiteCertPreferenceECDSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Server-TLSv12-CipherSuiteCertPreferenceRSA crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Server-TLSv12-ClientAuthRequestedAndECDSAGiven crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-ClientAuthRequestedAndGiven crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-ClientAuthRequestedNotGiven crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-ECDHE-ECDSA-AES crypto/ecdsa: make Sign safe with broken entropy sources 2015-01-28 01:39:51 +00:00
Server-TLSv12-IssueTicket crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-IssueTicketPreDisable crypto/tls: ensure that we don't resume when tickets are disabled. 2014-09-26 11:02:09 +10:00
Server-TLSv12-Resume crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-ResumeDisabled crypto/tls: ensure that we don't resume when tickets are disabled. 2014-09-26 11:02:09 +10:00
Server-TLSv12-RSA-3DES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-RSA-AES crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-RSA-AES-GCM crypto/tls: pick ECDHE curves based on server preference. 2014-02-24 17:57:51 -05:00
Server-TLSv12-RSA-RC4 crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00
Server-TLSv12-SNI crypto/tls: support renegotiation extension. 2014-01-09 13:38:11 -05:00