/* Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /* ECDH/ECIES/ECDSA Functions - see main program below */ #include #include #include #include #include "ecdh_FP256BN.h" /* Calculate a public/private EC GF(p) key pair. W=S.G mod EC(p), * where S is the secret key and W is the public key * and G is fixed generator. * If RNG is NULL then the private key is provided externally in S * otherwise it is generated randomly internally */ int ECP_FP256BN_KEY_PAIR_GENERATE(csprng *RNG,octet* S,octet *W) { BIG_256_56 r,gx,s; ECP_FP256BN G; int res=0; BIG_256_56_rcopy(gx,CURVE_Gx_FP256BN); #if CURVETYPE_FP256BN!=MONTGOMERY BIG_256_56 gy; BIG_256_56_rcopy(gy,CURVE_Gy_FP256BN); ECP_FP256BN_set(&G,gx,gy); #else ECP_FP256BN_set(&G,gx); #endif BIG_256_56_rcopy(r,CURVE_Order_FP256BN); if (RNG!=NULL) { BIG_256_56_randomnum(s,r,RNG); } else { BIG_256_56_fromBytes(s,S->val); BIG_256_56_mod(s,r); } #ifdef AES_S BIG_256_56_mod2m(s,2*AES_S); // BIG_toBytes(S->val,s); #endif ECP_FP256BN_mul(&G,s); #if CURVETYPE_FP256BN!=MONTGOMERY ECP_FP256BN_get(gx,gy,&G); #else ECP_FP256BN_get(gx,&G); #endif S->len=EGS_FP256BN; BIG_256_56_toBytes(S->val,s); #if CURVETYPE_FP256BN!=MONTGOMERY W->len=2*EFS_FP256BN+1; W->val[0]=4; BIG_256_56_toBytes(&(W->val[1]),gx); BIG_256_56_toBytes(&(W->val[EFS_FP256BN+1]),gy); #else W->len=EFS_FP256BN+1; W->val[0]=2; BIG_256_56_toBytes(&(W->val[1]),gx); #endif return res; } /* validate public key. Set full=true for fuller check */ int ECP_FP256BN_PUBLIC_KEY_VALIDATE(octet *W) { BIG_256_56 q,r,wx,k; ECP_FP256BN WP; int valid,nb; int res=0; BIG_256_56_rcopy(q,Modulus_FP256BN); BIG_256_56_rcopy(r,CURVE_Order_FP256BN); BIG_256_56_fromBytes(wx,&(W->val[1])); if (BIG_256_56_comp(wx,q)>=0) res=ECDH_INVALID_PUBLIC_KEY; #if CURVETYPE_FP256BN!=MONTGOMERY BIG_256_56 wy; BIG_256_56_fromBytes(wy,&(W->val[EFS_FP256BN+1])); if (BIG_256_56_comp(wy,q)>=0) res=ECDH_INVALID_PUBLIC_KEY; #endif if (res==0) { #if CURVETYPE_FP256BN!=MONTGOMERY valid=ECP_FP256BN_set(&WP,wx,wy); #else valid=ECP_FP256BN_set(&WP,wx); #endif if (!valid || ECP_FP256BN_isinf(&WP)) res=ECDH_INVALID_PUBLIC_KEY; if (res==0 ) { /* Check point is not in wrong group */ nb=BIG_256_56_nbits(q); BIG_256_56_one(k); BIG_256_56_shl(k,(nb+4)/2); BIG_256_56_add(k,q,k); BIG_256_56_sdiv(k,r); /* get co-factor */ while (BIG_256_56_parity(k)==0) { ECP_FP256BN_dbl(&WP); BIG_256_56_fshr(k,1); } if (!BIG_256_56_isunity(k)) ECP_FP256BN_mul(&WP,k); if (ECP_FP256BN_isinf(&WP)) res=ECDH_INVALID_PUBLIC_KEY; } } return res; } /* IEEE-1363 Diffie-Hellman online calculation Z=S.WD */ int ECP_FP256BN_SVDP_DH(octet *S,octet *WD,octet *Z) { BIG_256_56 r,s,wx; int valid; ECP_FP256BN W; int res=0; BIG_256_56_fromBytes(s,S->val); BIG_256_56_fromBytes(wx,&(WD->val[1])); #if CURVETYPE_FP256BN!=MONTGOMERY BIG_256_56 wy; BIG_256_56_fromBytes(wy,&(WD->val[EFS_FP256BN+1])); valid=ECP_FP256BN_set(&W,wx,wy); #else valid=ECP_FP256BN_set(&W,wx); #endif if (!valid) res=ECDH_ERROR; if (res==0) { BIG_256_56_rcopy(r,CURVE_Order_FP256BN); BIG_256_56_mod(s,r); ECP_FP256BN_mul(&W,s); if (ECP_FP256BN_isinf(&W)) res=ECDH_ERROR; else { #if CURVETYPE_FP256BN!=MONTGOMERY ECP_FP256BN_get(wx,wx,&W); #else ECP_FP256BN_get(wx,&W); #endif Z->len=MODBYTES_256_56; BIG_256_56_toBytes(Z->val,wx); } } return res; } #if CURVETYPE_FP256BN!=MONTGOMERY /* IEEE ECDSA Signature, C and D are signature on F using private key S */ int ECP_FP256BN_SP_DSA(int sha,csprng *RNG,octet *K,octet *S,octet *F,octet *C,octet *D) { char h[128]; octet H= {0,sizeof(h),h}; BIG_256_56 gx,gy,r,s,f,c,d,u,vx,w; ECP_FP256BN G,V; ehashit(sha,F,-1,NULL,&H,sha); BIG_256_56_rcopy(gx,CURVE_Gx_FP256BN); BIG_256_56_rcopy(gy,CURVE_Gy_FP256BN); BIG_256_56_rcopy(r,CURVE_Order_FP256BN); BIG_256_56_fromBytes(s,S->val); int hlen=H.len; if (H.len>MODBYTES_256_56) hlen=MODBYTES_256_56; BIG_256_56_fromBytesLen(f,H.val,hlen); ECP_FP256BN_set(&G,gx,gy); do { if (RNG!=NULL) { BIG_256_56_randomnum(u,r,RNG); BIG_256_56_randomnum(w,r,RNG); /* randomize calculation */ } else { BIG_256_56_fromBytes(u,K->val); BIG_256_56_mod(u,r); } #ifdef AES_S BIG_256_56_mod2m(u,2*AES_S); #endif ECP_FP256BN_copy(&V,&G); ECP_FP256BN_mul(&V,u); ECP_FP256BN_get(vx,vx,&V); BIG_256_56_copy(c,vx); BIG_256_56_mod(c,r); if (BIG_256_56_iszilch(c)) continue; if (RNG!=NULL) { BIG_256_56_modmul(u,u,w,r); } BIG_256_56_invmodp(u,u,r); BIG_256_56_modmul(d,s,c,r); BIG_256_56_add(d,f,d); if (RNG!=NULL) { BIG_256_56_modmul(d,d,w,r); } BIG_256_56_modmul(d,u,d,r); } while (BIG_256_56_iszilch(d)); C->len=D->len=EGS_FP256BN; BIG_256_56_toBytes(C->val,c); BIG_256_56_toBytes(D->val,d); return 0; } /* IEEE1363 ECDSA Signature Verification. Signature C and D on F is verified using public key W */ int ECP_FP256BN_VP_DSA(int sha,octet *W,octet *F, octet *C,octet *D) { char h[128]; octet H= {0,sizeof(h),h}; BIG_256_56 r,gx,gy,wx,wy,f,c,d,h2; int res=0; ECP_FP256BN G,WP; int valid; ehashit(sha,F,-1,NULL,&H,sha); BIG_256_56_rcopy(gx,CURVE_Gx_FP256BN); BIG_256_56_rcopy(gy,CURVE_Gy_FP256BN); BIG_256_56_rcopy(r,CURVE_Order_FP256BN); OCT_shl(C,C->len-MODBYTES_256_56); OCT_shl(D,D->len-MODBYTES_256_56); BIG_256_56_fromBytes(c,C->val); BIG_256_56_fromBytes(d,D->val); int hlen=H.len; if (hlen>MODBYTES_256_56) hlen=MODBYTES_256_56; BIG_256_56_fromBytesLen(f,H.val,hlen); //BIG_fromBytes(f,H.val); if (BIG_256_56_iszilch(c) || BIG_256_56_comp(c,r)>=0 || BIG_256_56_iszilch(d) || BIG_256_56_comp(d,r)>=0) res=ECDH_INVALID; if (res==0) { BIG_256_56_invmodp(d,d,r); BIG_256_56_modmul(f,f,d,r); BIG_256_56_modmul(h2,c,d,r); ECP_FP256BN_set(&G,gx,gy); BIG_256_56_fromBytes(wx,&(W->val[1])); BIG_256_56_fromBytes(wy,&(W->val[EFS_FP256BN+1])); valid=ECP_FP256BN_set(&WP,wx,wy); if (!valid) res=ECDH_ERROR; else { ECP_FP256BN_mul2(&WP,&G,h2,f); if (ECP_FP256BN_isinf(&WP)) res=ECDH_INVALID; else { ECP_FP256BN_get(d,d,&WP); BIG_256_56_mod(d,r); if (BIG_256_56_comp(d,c)!=0) res=ECDH_INVALID; } } } return res; } /* IEEE1363 ECIES encryption. Encryption of plaintext M uses public key W and produces ciphertext V,C,T */ void ECP_FP256BN_ECIES_ENCRYPT(int sha,octet *P1,octet *P2,csprng *RNG,octet *W,octet *M,int tlen,octet *V,octet *C,octet *T) { int i,len; char z[EFS_FP256BN],vz[3*EFS_FP256BN+1],k[2*EAS_FP256BN],k1[EAS_FP256BN],k2[EAS_FP256BN],l2[8],u[EFS_FP256BN]; octet Z= {0,sizeof(z),z}; octet VZ= {0,sizeof(vz),vz}; octet K= {0,sizeof(k),k}; octet K1= {0,sizeof(k1),k1}; octet K2= {0,sizeof(k2),k2}; octet L2= {0,sizeof(l2),l2}; octet U= {0,sizeof(u),u}; if (ECP_FP256BN_KEY_PAIR_GENERATE(RNG,&U,V)!=0) return; if (ECP_FP256BN_SVDP_DH(&U,W,&Z)!=0) return; OCT_copy(&VZ,V); OCT_joctet(&VZ,&Z); KDF2(sha,&VZ,P1,2*EAS_FP256BN,&K); K1.len=K2.len=EAS_FP256BN; for (i=0; ilen,8); len=C->len; OCT_joctet(C,P2); OCT_joctet(C,&L2); HMAC(sha,C,&K2,tlen,T); C->len=len; } /* IEEE1363 ECIES decryption. Decryption of ciphertext V,C,T using private key U outputs plaintext M */ int ECP_FP256BN_ECIES_DECRYPT(int sha,octet *P1,octet *P2,octet *V,octet *C,octet *T,octet *U,octet *M) { int i,len; char z[EFS_FP256BN],vz[3*EFS_FP256BN+1],k[2*EAS_FP256BN],k1[EAS_FP256BN],k2[EAS_FP256BN],l2[8],tag[32]; octet Z= {0,sizeof(z),z}; octet VZ= {0,sizeof(vz),vz}; octet K= {0,sizeof(k),k}; octet K1= {0,sizeof(k1),k1}; octet K2= {0,sizeof(k2),k2}; octet L2= {0,sizeof(l2),l2}; octet TAG= {0,sizeof(tag),tag}; if (ECP_FP256BN_SVDP_DH(U,V,&Z)!=0) return 0; OCT_copy(&VZ,V); OCT_joctet(&VZ,&Z); KDF2(sha,&VZ,P1,EFS_FP256BN,&K); K1.len=K2.len=EAS_FP256BN; for (i=0; ilen,8); len=C->len; OCT_joctet(C,P2); OCT_joctet(C,&L2); HMAC(sha,C,&K2,T->len,&TAG); C->len=len; if (!OCT_comp(T,&TAG)) return 0; return 1; } #endif