diff options
author | David Hook <dgh@cryptoworkshop.com> | 2022-08-18 20:00:25 +1000 |
---|---|---|
committer | David Hook <dgh@cryptoworkshop.com> | 2022-08-18 20:00:25 +1000 |
commit | 703d184af94e9f548deeb306fdd8a77dce2babb5 (patch) | |
tree | 0c08aba010a2841892f094db0aad47c9f23a9b38 /crypto/src | |
parent | AES intrinsics work (diff) | |
download | BouncyCastle.NET-ed25519-703d184af94e9f548deeb306fdd8a77dce2babb5.tar.xz |
added SPHINCS+ Haraka
Diffstat (limited to 'crypto/src')
8 files changed, 1304 insertions, 45 deletions
diff --git a/crypto/src/pqc/crypto/sphincsplus/HarakaS256Digest.cs b/crypto/src/pqc/crypto/sphincsplus/HarakaS256Digest.cs new file mode 100644 index 000000000..1e2ef67cf --- /dev/null +++ b/crypto/src/pqc/crypto/sphincsplus/HarakaS256Digest.cs @@ -0,0 +1,55 @@ +using System; +namespace Org.BouncyCastle.pqc.crypto.sphincsplus +{ + class HarakaS256Digest : HarakaSBase + { + public HarakaS256Digest(HarakaSXof harakaSXof) + { + haraka256_rc = harakaSXof.haraka256_rc; + } + + public String GetAlgorithmName() + { + return "HarakaS-256"; + } + + public int GetDigestSize() + { + return 32; + } + + public void BlockUpdate(byte input) + { + if (off + 1 > 32) + { + throw new ArgumentException("total input cannot be more than 32 bytes"); + } + + buffer[off++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (off + len > 32) + { + throw new ArgumentException("total input cannot be more than 32 bytes"); + } + + Array.Copy(input, inOff, buffer, off, len); + off += len; + } + + public int DoFinal(byte[] output, int outOff) + { + byte[] s = new byte[64]; + Haraka256Perm(s); + Array.Copy(s, 0, output, outOff, output.Length - outOff); + + Reset(); + + return output.Length; + } + + } + +} \ No newline at end of file diff --git a/crypto/src/pqc/crypto/sphincsplus/HarakaS512Digest.cs b/crypto/src/pqc/crypto/sphincsplus/HarakaS512Digest.cs new file mode 100644 index 000000000..883d731be --- /dev/null +++ b/crypto/src/pqc/crypto/sphincsplus/HarakaS512Digest.cs @@ -0,0 +1,65 @@ +using System; +namespace Org.BouncyCastle.pqc.crypto.sphincsplus +{ + /** + * Haraka-512 v2, https://eprint.iacr.org/2016/098.pdf + * <p> + * Haraka512-256 with reference to Python Reference Impl from: https://github.com/sphincs/sphincsplus + * </p> + */ + class HarakaS512Digest : HarakaSBase + { + public HarakaS512Digest(HarakaSBase harakaSBase) + { + haraka512_rc = harakaSBase.haraka512_rc; + } + + public String GetAlgorithmName() + { + return "HarakaS-512"; + } + + public int GetDigestSize() + { + return 64; + } + + public void BlockUpdate(byte input) + { + if (off + 1 > 64) + { + throw new ArgumentException("total input cannot be more than 64 bytes"); + } + buffer[off++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (off + len > 64) + { + throw new ArgumentException("total input cannot be more than 64 bytes"); + } + Array.Copy(input, inOff, buffer, off, len); + off += len; + } + + + public int DoFinal(byte[] output, int outOff) + { + byte[] s = new byte[64]; + Haraka512Perm(s); + for (int i = 0; i < 64; ++i) + { + s[i] ^= buffer[i]; + } + Array.Copy(s, 8, output, outOff, 8); + Array.Copy(s, 24, output, outOff + 8, 8); + Array.Copy(s, 32, output, outOff + 16, 8); + Array.Copy(s, 48, output, outOff + 24, 8); + + Reset(); + + return s.Length; + } + } +} \ No newline at end of file diff --git a/crypto/src/pqc/crypto/sphincsplus/HarakaSBase.cs b/crypto/src/pqc/crypto/sphincsplus/HarakaSBase.cs new file mode 100644 index 000000000..c10e2e195 --- /dev/null +++ b/crypto/src/pqc/crypto/sphincsplus/HarakaSBase.cs @@ -0,0 +1,794 @@ +using System; +using Org.BouncyCastle.Utilities; + +namespace Org.BouncyCastle.pqc.crypto.sphincsplus +{ + /** + * Haraka-512 v2, https://eprint.iacr.org/2016/098.pdf + * <p> + * Haraka512-256 with reference to Python Reference Impl from: https://github.com/sphincs/sphincsplus + * </p> + */ + public class HarakaSBase + { + internal ulong[][] haraka512_rc = new ulong[][]{ + new ulong[]{0x24cf0ab9086f628bL, 0xbdd6eeecc83b8382L, 0xd96fb0306cdad0a7L, 0xaace082ac8f95f89L, 0x449d8e8870d7041fL, 0x49bb2f80b2b3e2f8L, 0x0569ae98d93bb258L, 0x23dc9691e7d6a4b1L}, + new ulong[]{0xd8ba10ede0fe5b6eL, 0x7ecf7dbe424c7b8eL, 0x6ea9949c6df62a31L, 0xbf3f3c97ec9c313eL, 0x241d03a196a1861eL, 0xead3a51116e5a2eaL, 0x77d479fcad9574e3L, 0x18657a1af894b7a0L}, + new ulong[]{0x10671e1a7f595522L, 0xd9a00ff675d28c7bL, 0x2f1edf0d2b9ba661L, 0xb8ff58b8e3de45f9L, 0xee29261da9865c02L, 0xd1532aa4b50bdf43L, 0x8bf858159b231bb1L, 0xdf17439d22d4f599L}, + new ulong[]{0xdd4b2f0870b918c0L, 0x757a81f3b39b1bb6L, 0x7a5c556898952e3fL, 0x7dd70a16d915d87aL, 0x3ae61971982b8301L, 0xc3ab319e030412beL, 0x17c0033ac094a8cbL, 0x5a0630fc1a8dc4efL}, + new ulong[]{0x17708988c1632f73L, 0xf92ddae090b44f4fL, 0x11ac0285c43aa314L, 0x509059941936b8baL, 0xd03e152fa2ce9b69L, 0x3fbcbcb63a32998bL, 0x6204696d692254f7L, 0x915542ed93ec59b4L}, + new ulong[]{0xf4ed94aa8879236eL, 0xff6cb41cd38e03c0L, 0x069b38602368aeabL, 0x669495b820f0ddbaL, 0xf42013b1b8bf9e3dL, 0xcf935efe6439734dL, 0xbc1dcf42ca29e3f8L, 0x7e6d3ed29f78ad67L}, + new ulong[]{0xf3b0f6837ffcddaaL, 0x3a76faef934ddf41L, 0xcec7ae583a9c8e35L, 0xe4dd18c68f0260afL, 0x2c0e5df1ad398eaaL, 0x478df5236ae22e8cL, 0xfb944c46fe865f39L, 0xaa48f82f028132baL}, + new ulong[]{0x231b9ae2b76aca77L, 0x292a76a712db0b40L, 0x5850625dc8134491L, 0x73137dd469810fb5L, 0x8a12a6a202a474fdL, 0xd36fd9daa78bdb80L, 0xb34c5e733505706fL, 0xbaf1cdca818d9d96L}, + new ulong[]{0x2e99781335e8c641L, 0xbddfe5cce47d560eL, 0xf74e9bf32e5e040cL, 0x1d7a709d65996be9L, 0x670df36a9cf66cddL, 0xd05ef84a176a2875L, 0x0f888e828cb1c44eL, 0x1a79e9c9727b052cL}, + new ulong[]{0x83497348628d84deL, 0x2e9387d51f22a754L, 0xb000068da2f852d6L, 0x378c9e1190fd6fe5L, 0x870027c316de7293L, 0xe51a9d4462e047bbL, 0x90ecf7f8c6251195L, 0x655953bfbed90a9cL}, + }; + + internal uint[][] haraka256_rc = new uint[10][]; + + protected readonly byte[] buffer; + protected int off; + + protected HarakaSBase() + { + this.buffer = new byte[64]; + off = 0; + } + + protected void Reset() + { + off = 0; + Arrays.Clear(buffer); + } + + private void BrRangeDec32Le(byte[] input, uint[] output, int inputPos) + { + int tmp; + for (int i = 0; i < output.Length; ++i) + { + tmp = inputPos + (i << 2); + output[i] = (uint)(input[tmp] & 0xFF) | (uint)((input[tmp + 1] << 8) & 0xFF00) | (uint)((input[tmp + 2] << 16) & 0xFF0000) | (uint)(input[tmp + 3] << 24); + } + } + + protected void InterleaveConstant(ulong[] output, byte[] input, int startPos) + { + uint[] tmp_32_constant = new uint[16]; + BrRangeDec32Le(input, tmp_32_constant, startPos); + for (int i = 0; i < 4; ++i) + { + BrAesCt64InterleaveIn(output, i, tmp_32_constant, i << 2); + } + BrAesCt64Ortho(output); + } + + protected void InterleaveConstant32(uint[] output, byte[] input, int startPos) + { + for (int i = 0; i < 4; ++i) + { + output[i << 1] = BrDec32Le(input, startPos + (i << 2)); + output[(i << 1) + 1] = BrDec32Le(input, startPos + (i << 2) + 16); + } + BrAesCtOrtho(output); + } + + private uint BrDec32Le(byte[] input, int startPos) + { + return (uint)(input[startPos] & 0xFF) | (uint)((input[startPos + 1] << 8) & 0xFF00) + | (((uint)input[startPos + 2] << 16) & 0xFF0000) | ((uint)input[startPos + 3] << 24); + } + + protected void Haraka512Perm(byte[] output) + { + uint[] w = new uint[16]; + ulong[] q = new ulong[8]; + ulong tmp_q; + int i, j; + BrRangeDec32Le(buffer, w, 0); + for (i = 0; i < 4; ++i) + { + BrAesCt64InterleaveIn(q, i, w, i << 2); + } + BrAesCt64Ortho(q); + for (i = 0; i < 5; ++i) + { + for (j = 0; j < 2; ++j) + { + BrAesCt64BitsliceSbox(q); + ShiftRows(q); + MixColumns(q); + AddRoundKey(q, haraka512_rc[(i << 1) + j]); + } + for (j = 0; j < 8; j++) + { + tmp_q = q[j]; + q[j] = (tmp_q & 0x0001000100010001L) << 5 | + (tmp_q & 0x0002000200020002L) << 12 | + (tmp_q & 0x0004000400040004L) >> 1 | + (tmp_q & 0x0008000800080008L) << 6 | + (tmp_q & 0x0020002000200020L) << 9 | + (tmp_q & 0x0040004000400040L) >> 4 | + (tmp_q & 0x0080008000800080L) << 3 | + (tmp_q & 0x2100210021002100L) >> 5 | + (tmp_q & 0x0210021002100210L) << 2 | + (tmp_q & 0x0800080008000800L) << 4 | + (tmp_q & 0x1000100010001000L) >> 12 | + (tmp_q & 0x4000400040004000L) >> 10 | + (tmp_q & 0x8400840084008400L) >> 3; + } + } + BrAesCt64Ortho(q); + for (i = 0; i < 4; i++) + { + BrAesCt64InterleaveOut(w, q, i); + } + for (i = 0; i < 16; ++i) + { + for (j = 0; j < 4; ++j) + { + output[(i << 2) + j] = (byte)((w[i] >> (j << 3)) & 0xFF); + } + } + } + + protected void Haraka256Perm(byte[] output) + { + uint[] q = new uint[8]; + int i, j; + uint tmp_q; + InterleaveConstant32(q, buffer, 0); + for (i = 0; i < 5; ++i) + { + for (j = 0; j < 2; ++j) + { + BrAesCtBitsliceSbox(q); + ShiftRows32(q); + MixColumns32(q); + AddRoundKey32(q, haraka256_rc[(i << 1) + j]); + } + for (j = 0; j < 8; j++) + { + tmp_q = q[j]; + q[j] = (tmp_q & 0x81818181) | + (tmp_q & 0x02020202) << 1 | + (tmp_q & 0x04040404) << 2 | + (tmp_q & 0x08080808) << 3 | + (tmp_q & 0x10101010) >> 3 | + (tmp_q & 0x20202020) >> 2 | + (tmp_q & 0x40404040) >> 1; + } + } + BrAesCtOrtho(q); + for (i = 0; i < 4; i++) + { + BrEnc32Le(output, q[i << 1], i << 2); + BrEnc32Le(output, q[(i << 1) + 1], (i << 2) + 16); + } + + for (i = 0; i < 32; i++) + { + output[i] ^= buffer[i]; + } + } + + private void BrEnc32Le(byte[] dst, uint x, int startPos) + { + for (int i = 0; i < 4; ++i) + { + dst[startPos + i] = (byte)(x >> (i << 3)); + } + } + + private void BrAesCt64InterleaveIn(ulong[] q, int qPos, uint[] w, int startPos) + { + ulong x0, x1, x2, x3; + x0 = (ulong)w[startPos] & 0x00000000FFFFFFFFL; + x1 = (ulong)w[startPos + 1] & 0x00000000FFFFFFFFL; + x2 = (ulong)w[startPos + 2] & 0x00000000FFFFFFFFL; + x3 = (ulong)w[startPos + 3] & 0x00000000FFFFFFFFL; + x0 |= x0 << 16; + x1 |= x1 << 16; + x2 |= x2 << 16; + x3 |= x3 << 16; + x0 &= 0x0000FFFF0000FFFFL; + x1 &= 0x0000FFFF0000FFFFL; + x2 &= 0x0000FFFF0000FFFFL; + x3 &= 0x0000FFFF0000FFFFL; + x0 |= x0 << 8; + x1 |= x1 << 8; + x2 |= x2 << 8; + x3 |= x3 << 8; + x0 &= 0x00FF00FF00FF00FFL; + x1 &= 0x00FF00FF00FF00FFL; + x2 &= 0x00FF00FF00FF00FFL; + x3 &= 0x00FF00FF00FF00FFL; + q[qPos] = x0 | (x2 << 8); + q[qPos + 4] = x1 | (x3 << 8); + } + + private static void BrAesCtBitsliceSbox(uint[] q) + { + /* + * This S-box implementation is a straightforward translation of + * the circuit described by Boyar and Peralta in "A new + * combinational logic minimization technique with applications + * to cryptology" (https://eprint.iacr.org/2009/191.pdf). + * + * Note that variables x* (input) and s* (output) are numbered + * in "reverse" order (x0 is the high bit, x7 is the low bit). + */ + + uint x0, x1, x2, x3, x4, x5, x6, x7; + uint y1, y2, y3, y4, y5, y6, y7, y8, y9; + uint y10, y11, y12, y13, y14, y15, y16, y17, y18, y19; + uint y20, y21; + uint z0, z1, z2, z3, z4, z5, z6, z7, z8, z9; + uint z10, z11, z12, z13, z14, z15, z16, z17; + uint t0, t1, t2, t3, t4, t5, t6, t7, t8, t9; + uint t10, t11, t12, t13, t14, t15, t16, t17, t18, t19; + uint t20, t21, t22, t23, t24, t25, t26, t27, t28, t29; + uint t30, t31, t32, t33, t34, t35, t36, t37, t38, t39; + uint t40, t41, t42, t43, t44, t45, t46, t47, t48, t49; + uint t50, t51, t52, t53, t54, t55, t56, t57, t58, t59; + uint t60, t61, t62, t63, t64, t65, t66, t67; + uint s0, s1, s2, s3, s4, s5, s6, s7; + + x0 = q[7]; + x1 = q[6]; + x2 = q[5]; + x3 = q[4]; + x4 = q[3]; + x5 = q[2]; + x6 = q[1]; + x7 = q[0]; + + /* + * Top linear transformation. + */ + y14 = x3 ^ x5; + y13 = x0 ^ x6; + y9 = x0 ^ x3; + y8 = x0 ^ x5; + t0 = x1 ^ x2; + y1 = t0 ^ x7; + y4 = y1 ^ x3; + y12 = y13 ^ y14; + y2 = y1 ^ x0; + y5 = y1 ^ x6; + y3 = y5 ^ y8; + t1 = x4 ^ y12; + y15 = t1 ^ x5; + y20 = t1 ^ x1; + y6 = y15 ^ x7; + y10 = y15 ^ t0; + y11 = y20 ^ y9; + y7 = x7 ^ y11; + y17 = y10 ^ y11; + y19 = y10 ^ y8; + y16 = t0 ^ y11; + y21 = y13 ^ y16; + y18 = x0 ^ y16; + + /* + * Non-linear section. + */ + t2 = y12 & y15; + t3 = y3 & y6; + t4 = t3 ^ t2; + t5 = y4 & x7; + t6 = t5 ^ t2; + t7 = y13 & y16; + t8 = y5 & y1; + t9 = t8 ^ t7; + t10 = y2 & y7; + t11 = t10 ^ t7; + t12 = y9 & y11; + t13 = y14 & y17; + t14 = t13 ^ t12; + t15 = y8 & y10; + t16 = t15 ^ t12; + t17 = t4 ^ t14; + t18 = t6 ^ t16; + t19 = t9 ^ t14; + t20 = t11 ^ t16; + t21 = t17 ^ y20; + t22 = t18 ^ y19; + t23 = t19 ^ y21; + t24 = t20 ^ y18; + + t25 = t21 ^ t22; + t26 = t21 & t23; + t27 = t24 ^ t26; + t28 = t25 & t27; + t29 = t28 ^ t22; + t30 = t23 ^ t24; + t31 = t22 ^ t26; + t32 = t31 & t30; + t33 = t32 ^ t24; + t34 = t23 ^ t33; + t35 = t27 ^ t33; + t36 = t24 & t35; + t37 = t36 ^ t34; + t38 = t27 ^ t36; + t39 = t29 & t38; + t40 = t25 ^ t39; + + t41 = t40 ^ t37; + t42 = t29 ^ t33; + t43 = t29 ^ t40; + t44 = t33 ^ t37; + t45 = t42 ^ t41; + z0 = t44 & y15; + z1 = t37 & y6; + z2 = t33 & x7; + z3 = t43 & y16; + z4 = t40 & y1; + z5 = t29 & y7; + z6 = t42 & y11; + z7 = t45 & y17; + z8 = t41 & y10; + z9 = t44 & y12; + z10 = t37 & y3; + z11 = t33 & y4; + z12 = t43 & y13; + z13 = t40 & y5; + z14 = t29 & y2; + z15 = t42 & y9; + z16 = t45 & y14; + z17 = t41 & y8; + + /* + * Bottom linear transformation. + */ + t46 = z15 ^ z16; + t47 = z10 ^ z11; + t48 = z5 ^ z13; + t49 = z9 ^ z10; + t50 = z2 ^ z12; + t51 = z2 ^ z5; + t52 = z7 ^ z8; + t53 = z0 ^ z3; + t54 = z6 ^ z7; + t55 = z16 ^ z17; + t56 = z12 ^ t48; + t57 = t50 ^ t53; + t58 = z4 ^ t46; + t59 = z3 ^ t54; + t60 = t46 ^ t57; + t61 = z14 ^ t57; + t62 = t52 ^ t58; + t63 = t49 ^ t58; + t64 = z4 ^ t59; + t65 = t61 ^ t62; + t66 = z1 ^ t63; + s0 = t59 ^ t63; + s6 = t56 ^ ~t62; + s7 = t48 ^ ~t60; + t67 = t64 ^ t65; + s3 = t53 ^ t66; + s4 = t51 ^ t66; + s5 = t47 ^ t65; + s1 = t64 ^ ~s3; + s2 = t55 ^ ~t67; + + q[7] = s0; + q[6] = s1; + q[5] = s2; + q[4] = s3; + q[3] = s4; + q[2] = s5; + q[1] = s6; + q[0] = s7; + } + + private void ShiftRows32(uint[] q) + { + uint x; + for (int i = 0; i < 8; i++) + { + x = q[i]; + q[i] = (x & 0x000000FF) + | ((x & 0x0000FC00) >> 2) | ((x & 0x00000300) << 6) + | ((x & 0x00F00000) >> 4) | ((x & 0x000F0000) << 4) + | ((x & 0xC0000000) >> 6) | ((x & 0x3F000000) << 2); + } + } + + private void MixColumns32(uint[] q) + { + uint q0, q1, q2, q3, q4, q5, q6, q7; + uint r0, r1, r2, r3, r4, r5, r6, r7; + + q0 = q[0]; + q1 = q[1]; + q2 = q[2]; + q3 = q[3]; + q4 = q[4]; + q5 = q[5]; + q6 = q[6]; + q7 = q[7]; + r0 = (q0 >> 8) | (q0 << 24); + r1 = (q1 >> 8) | (q1 << 24); + r2 = (q2 >> 8) | (q2 << 24); + r3 = (q3 >> 8) | (q3 << 24); + r4 = (q4 >> 8) | (q4 << 24); + r5 = (q5 >> 8) | (q5 << 24); + r6 = (q6 >> 8) | (q6 << 24); + r7 = (q7 >> 8) | (q7 << 24); + + q[0] = q7 ^ r7 ^ r0 ^ Rotr16(q0 ^ r0); + q[1] = q0 ^ r0 ^ q7 ^ r7 ^ r1 ^ Rotr16(q1 ^ r1); + q[2] = q1 ^ r1 ^ r2 ^ Rotr16(q2 ^ r2); + q[3] = q2 ^ r2 ^ q7 ^ r7 ^ r3 ^ Rotr16(q3 ^ r3); + q[4] = q3 ^ r3 ^ q7 ^ r7 ^ r4 ^ Rotr16(q4 ^ r4); + q[5] = q4 ^ r4 ^ r5 ^ Rotr16(q5 ^ r5); + q[6] = q5 ^ r5 ^ r6 ^ Rotr16(q6 ^ r6); + q[7] = q6 ^ r6 ^ r7 ^ Rotr16(q7 ^ r7); + } + + private void AddRoundKey32(uint[] q, uint[] sk) + { + q[0] ^= sk[0]; + q[1] ^= sk[1]; + q[2] ^= sk[2]; + q[3] ^= sk[3]; + q[4] ^= sk[4]; + q[5] ^= sk[5]; + q[6] ^= sk[6]; + q[7] ^= sk[7]; + } + + private uint Rotr16(uint x) + { + return (x << 16) | (x >> 16); + } + + private void BrAesCt64Ortho(ulong[] q) + { + Swapn(q, 1, 0, 1); + Swapn(q, 1, 2, 3); + Swapn(q, 1, 4, 5); + Swapn(q, 1, 6, 7); + + Swapn(q, 2, 0, 2); + Swapn(q, 2, 1, 3); + Swapn(q, 2, 4, 6); + Swapn(q, 2, 5, 7); + + Swapn(q, 4, 0, 4); + Swapn(q, 4, 1, 5); + Swapn(q, 4, 2, 6); + Swapn(q, 4, 3, 7); + } + + private void BrAesCtOrtho(uint[] q) + { + Swapn32(q, 1, 0, 1); + Swapn32(q, 1, 2, 3); + Swapn32(q, 1, 4, 5); + Swapn32(q, 1, 6, 7); + + Swapn32(q, 2, 0, 2); + Swapn32(q, 2, 1, 3); + Swapn32(q, 2, 4, 6); + Swapn32(q, 2, 5, 7); + + Swapn32(q, 4, 0, 4); + Swapn32(q, 4, 1, 5); + Swapn32(q, 4, 2, 6); + Swapn32(q, 4, 3, 7); + } + + private void Swapn32(uint[] q, int s, int pos1, int pos2) + { + uint cl = 0, ch = 0; + switch (s) + { + case 1: + cl = 0x55555555; + ch = 0xAAAAAAAA; + break; + case 2: + cl = 0x33333333; + ch = 0xCCCCCCCC; + break; + case 4: + cl = 0x0F0F0F0F; + ch = 0xF0F0F0F0; + break; + } + uint a = q[pos1], b = q[pos2]; + q[pos1] = (a & cl) | ((b & cl) << s); + q[pos2] = ((a & ch) >> s) | (b & ch); + } + + private void Swapn(ulong[] q, int s, int pos1, int pos2) + { + ulong cl = 0, ch = 0; + switch (s) + { + case 1: + cl = 0x5555555555555555L; + ch = 0xAAAAAAAAAAAAAAAAL; + break; + case 2: + cl = 0x3333333333333333L; + ch = 0xCCCCCCCCCCCCCCCCL; + break; + case 4: + cl = 0x0F0F0F0F0F0F0F0FL; + ch = 0xF0F0F0F0F0F0F0F0L; + break; + default: + return; + } + ulong a = q[pos1], b = q[pos2]; + q[pos1] = (a & cl) | ((b & cl) << s); + q[pos2] = ((a & ch) >> s) | (b & ch); + } + + private void BrAesCt64BitsliceSbox(ulong[] q) + { + /* + * This S-box implementation is a straightforward translation of + * the circuit described by Boyar and Peralta in "A new + * combinational logic minimization technique with applications + * to cryptology" (https://eprint.iacr.org/2009/191.pdf). + * + * Note that variables x* (input) and s* (output) are numbered + * in "reverse" order (x0 is the high bit, x7 is the low bit). + */ + + ulong x0, x1, x2, x3, x4, x5, x6, x7; + ulong y1, y2, y3, y4, y5, y6, y7, y8, y9; + ulong y10, y11, y12, y13, y14, y15, y16, y17, y18, y19; + ulong y20, y21; + ulong z0, z1, z2, z3, z4, z5, z6, z7, z8, z9; + ulong z10, z11, z12, z13, z14, z15, z16, z17; + ulong t0, t1, t2, t3, t4, t5, t6, t7, t8, t9; + ulong t10, t11, t12, t13, t14, t15, t16, t17, t18, t19; + ulong t20, t21, t22, t23, t24, t25, t26, t27, t28, t29; + ulong t30, t31, t32, t33, t34, t35, t36, t37, t38, t39; + ulong t40, t41, t42, t43, t44, t45, t46, t47, t48, t49; + ulong t50, t51, t52, t53, t54, t55, t56, t57, t58, t59; + ulong t60, t61, t62, t63, t64, t65, t66, t67; + ulong s0, s1, s2, s3, s4, s5, s6, s7; + + x0 = q[7]; + x1 = q[6]; + x2 = q[5]; + x3 = q[4]; + x4 = q[3]; + x5 = q[2]; + x6 = q[1]; + x7 = q[0]; + + /* + * Top linear transformation. + */ + y14 = x3 ^ x5; + y13 = x0 ^ x6; + y9 = x0 ^ x3; + y8 = x0 ^ x5; + t0 = x1 ^ x2; + y1 = t0 ^ x7; + y4 = y1 ^ x3; + y12 = y13 ^ y14; + y2 = y1 ^ x0; + y5 = y1 ^ x6; + y3 = y5 ^ y8; + t1 = x4 ^ y12; + y15 = t1 ^ x5; + y20 = t1 ^ x1; + y6 = y15 ^ x7; + y10 = y15 ^ t0; + y11 = y20 ^ y9; + y7 = x7 ^ y11; + y17 = y10 ^ y11; + y19 = y10 ^ y8; + y16 = t0 ^ y11; + y21 = y13 ^ y16; + y18 = x0 ^ y16; + + /* + * Non-linear section. + */ + t2 = y12 & y15; + t3 = y3 & y6; + t4 = t3 ^ t2; + t5 = y4 & x7; + t6 = t5 ^ t2; + t7 = y13 & y16; + t8 = y5 & y1; + t9 = t8 ^ t7; + t10 = y2 & y7; + t11 = t10 ^ t7; + t12 = y9 & y11; + t13 = y14 & y17; + t14 = t13 ^ t12; + t15 = y8 & y10; + t16 = t15 ^ t12; + t17 = t4 ^ t14; + t18 = t6 ^ t16; + t19 = t9 ^ t14; + t20 = t11 ^ t16; + t21 = t17 ^ y20; + t22 = t18 ^ y19; + t23 = t19 ^ y21; + t24 = t20 ^ y18; + + t25 = t21 ^ t22; + t26 = t21 & t23; + t27 = t24 ^ t26; + t28 = t25 & t27; + t29 = t28 ^ t22; + t30 = t23 ^ t24; + t31 = t22 ^ t26; + t32 = t31 & t30; + t33 = t32 ^ t24; + t34 = t23 ^ t33; + t35 = t27 ^ t33; + t36 = t24 & t35; + t37 = t36 ^ t34; + t38 = t27 ^ t36; + t39 = t29 & t38; + t40 = t25 ^ t39; + + t41 = t40 ^ t37; + t42 = t29 ^ t33; + t43 = t29 ^ t40; + t44 = t33 ^ t37; + t45 = t42 ^ t41; + z0 = t44 & y15; + z1 = t37 & y6; + z2 = t33 & x7; + z3 = t43 & y16; + z4 = t40 & y1; + z5 = t29 & y7; + z6 = t42 & y11; + z7 = t45 & y17; + z8 = t41 & y10; + z9 = t44 & y12; + z10 = t37 & y3; + z11 = t33 & y4; + z12 = t43 & y13; + z13 = t40 & y5; + z14 = t29 & y2; + z15 = t42 & y9; + z16 = t45 & y14; + z17 = t41 & y8; + + /* + * Bottom linear transformation. + */ + t46 = z15 ^ z16; + t47 = z10 ^ z11; + t48 = z5 ^ z13; + t49 = z9 ^ z10; + t50 = z2 ^ z12; + t51 = z2 ^ z5; + t52 = z7 ^ z8; + t53 = z0 ^ z3; + t54 = z6 ^ z7; + t55 = z16 ^ z17; + t56 = z12 ^ t48; + t57 = t50 ^ t53; + t58 = z4 ^ t46; + t59 = z3 ^ t54; + t60 = t46 ^ t57; + t61 = z14 ^ t57; + t62 = t52 ^ t58; + t63 = t49 ^ t58; + t64 = z4 ^ t59; + t65 = t61 ^ t62; + t66 = z1 ^ t63; + s0 = t59 ^ t63; + s6 = t56 ^ ~t62; + s7 = t48 ^ ~t60; + t67 = t64 ^ t65; + s3 = t53 ^ t66; + s4 = t51 ^ t66; + s5 = t47 ^ t65; + s1 = t64 ^ ~s3; + s2 = t55 ^ ~t67; + + q[7] = s0; + q[6] = s1; + q[5] = s2; + q[4] = s3; + q[3] = s4; + q[2] = s5; + q[1] = s6; + q[0] = s7; + } + + private void ShiftRows(ulong[] q) + { + ulong x; + for (int i = 0; i < q.Length; i++) + { + x = q[i]; + q[i] = (x & 0x000000000000FFFFL) + | ((x & 0x00000000FFF00000L) >> 4) + | ((x & 0x00000000000F0000L) << 12) + | ((x & 0x0000FF0000000000L) >> 8) + | ((x & 0x000000FF00000000L) << 8) + | ((x & 0xF000000000000000L) >> 12) + | ((x & 0x0FFF000000000000L) << 4); + } + } + + private void MixColumns(ulong[] q) + { + ulong q0, q1, q2, q3, q4, q5, q6, q7; + ulong r0, r1, r2, r3, r4, r5, r6, r7; + + q0 = q[0]; + q1 = q[1]; + q2 = q[2]; + q3 = q[3]; + q4 = q[4]; + q5 = q[5]; + q6 = q[6]; + q7 = q[7]; + r0 = (q0 >> 16) | (q0 << 48); + r1 = (q1 >> 16) | (q1 << 48); + r2 = (q2 >> 16) | (q2 << 48); + r3 = (q3 >> 16) | (q3 << 48); + r4 = (q4 >> 16) | (q4 << 48); + r5 = (q5 >> 16) | (q5 << 48); + r6 = (q6 >> 16) | (q6 << 48); + r7 = (q7 >> 16) | (q7 << 48); + + q[0] = q7 ^ r7 ^ r0 ^ Rotr32(q0 ^ r0); + q[1] = q0 ^ r0 ^ q7 ^ r7 ^ r1 ^ Rotr32(q1 ^ r1); + q[2] = q1 ^ r1 ^ r2 ^ Rotr32(q2 ^ r2); + q[3] = q2 ^ r2 ^ q7 ^ r7 ^ r3 ^ Rotr32(q3 ^ r3); + q[4] = q3 ^ r3 ^ q7 ^ r7 ^ r4 ^ Rotr32(q4 ^ r4); + q[5] = q4 ^ r4 ^ r5 ^ Rotr32(q5 ^ r5); + q[6] = q5 ^ r5 ^ r6 ^ Rotr32(q6 ^ r6); + q[7] = q6 ^ r6 ^ r7 ^ Rotr32(q7 ^ r7); + } + + private ulong Rotr32(ulong x) + { + return (x << 32) | (x >> 32); + } + + private void AddRoundKey(ulong[] q, ulong[] sk) + { + q[0] ^= sk[0]; + q[1] ^= sk[1]; + q[2] ^= sk[2]; + q[3] ^= sk[3]; + q[4] ^= sk[4]; + q[5] ^= sk[5]; + q[6] ^= sk[6]; + q[7] ^= sk[7]; + } + + private void BrAesCt64InterleaveOut(uint[] w, ulong[] q, int pos) + { + ulong x0, x1, x2, x3; + + x0 = q[pos] & 0x00FF00FF00FF00FFL; + x1 = q[pos + 4] & 0x00FF00FF00FF00FFL; + x2 = (q[pos] >> 8) & 0x00FF00FF00FF00FFL; + x3 = (q[pos + 4] >> 8) & 0x00FF00FF00FF00FFL; + x0 |= (x0 >> 8); + x1 |= (x1 >> 8); + x2 |= (x2 >> 8); + x3 |= (x3 >> 8); + x0 &= 0x0000FFFF0000FFFFL; + x1 &= 0x0000FFFF0000FFFFL; + x2 &= 0x0000FFFF0000FFFFL; + x3 &= 0x0000FFFF0000FFFFL; + pos <<= 2; + w[pos] = (uint)(x0 | (x0 >> 16)); + w[pos + 1] = (uint)(x1 | (x1 >> 16)); + w[pos + 2] = (uint)(x2 | (x2 >> 16)); + w[pos + 3] = (uint)(x3 | (x3 >> 16)); + } + } +} + diff --git a/crypto/src/pqc/crypto/sphincsplus/HarakaSXof.cs b/crypto/src/pqc/crypto/sphincsplus/HarakaSXof.cs new file mode 100644 index 000000000..bcd62aa87 --- /dev/null +++ b/crypto/src/pqc/crypto/sphincsplus/HarakaSXof.cs @@ -0,0 +1,87 @@ +using System; +namespace Org.BouncyCastle.pqc.crypto.sphincsplus +{ + class HarakaSXof : HarakaSBase + { + public String GetAlgorithmName() + { + return "Haraka-S"; + } + + public HarakaSXof(byte[] pkSeed) + { + byte[] buf = new byte[640]; + BlockUpdate(pkSeed, 0, pkSeed.Length); + DoFinal(buf, 0, buf.Length); + haraka512_rc = new ulong[10][]; + haraka256_rc = new uint[10][]; + for (int i = 0; i < 10; ++i) + { + haraka512_rc[i] = new ulong[8]; + haraka256_rc[i] = new uint[8]; + InterleaveConstant32(haraka256_rc[i], buf, i << 5); + InterleaveConstant(haraka512_rc[i], buf, i << 6); + } + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + int i = inOff, j, loop = (len + off) >> 5; + for (j = 0; j < loop; ++j) + { + while (off < 32) + { + buffer[off++] ^= input[i++]; + } + Haraka512Perm(buffer); + off = 0; + } + while (i < inOff + len) + { + buffer[off++] ^= input[i++]; + } + } + + public void BlockUpdate(byte input) + { + buffer[off++] ^= input; + if (off == 32) + { + Haraka512Perm(buffer); + off = 0; + } + } + + public int DoFinal(byte[] output, int outOff, int len) + { + int outLen = len; + //Finalize + buffer[off] ^= 0x1F; + buffer[31] ^= 128; + off = 0; + //Squeeze + while (len > 0) + { + Haraka512Perm(buffer); + int i = 0; + while (i < 32 && i + outOff < output.Length) + { + output[i + outOff] = buffer[i]; + i++; + } + outOff += i; + len -= i; + } + if (len != 0) + { + byte[] d = new byte[64]; + Haraka512Perm(d); + Array.Copy(d, 0, output, outOff, -len); + } + Reset(); + return outLen; + } + } + +} + diff --git a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusEngine.cs b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusEngine.cs index f477608a6..f93d43183 100644 --- a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusEngine.cs +++ b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusEngine.cs @@ -6,6 +6,7 @@ using Org.BouncyCastle.Crypto.Generators; using Org.BouncyCastle.Crypto.Macs; using Org.BouncyCastle.Crypto.Parameters; using Org.BouncyCastle.Crypto.Utilities; +using Org.BouncyCastle.pqc.crypto.sphincsplus; using Org.BouncyCastle.Utilities; namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus @@ -30,17 +31,6 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus internal uint T; // T = 1 << A - protected static byte[] xor(byte[] m, byte[] mask) - { - byte[] r = Arrays.Clone(m); - for (int t = 0; t < m.Length; t++) - { - r[t] ^= mask[t]; - } - - return r; - } - public SPHINCSPlusEngine(bool robust, int n, uint w, uint d, int a, int k, uint h) { this.N = n; @@ -101,6 +91,8 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus this.T = 1U << a; } + public abstract void init(byte[] pkSeed); + public abstract byte[] F(byte[] pkSeed, Adrs adrs, byte[] m1); public abstract byte[] H(byte[] pkSeed, Adrs adrs, byte[] m1, byte[] m2); @@ -126,6 +118,9 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus private IDigest sha256; private byte[] sha256Buf; + private IMemoable msgMemo; + private IMemoable sha256Memo; + public Sha2Engine(bool robust, int n, uint w, uint d, int a, int k, uint h) : base(robust, n, w, d, a, k, h) { @@ -151,6 +146,21 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus this.msgDigestBuf = new byte[msgDigest.GetDigestSize()]; } + public override void init(byte[] pkSeed) + { + byte[] padding = new byte[bl]; + + msgDigest.BlockUpdate(pkSeed, 0, pkSeed.Length); + msgDigest.BlockUpdate(padding, 0, bl - N); + msgMemo = ((IMemoable)msgDigest).Copy(); + msgDigest.Reset(); + + sha256.BlockUpdate(pkSeed, 0, pkSeed.Length); + sha256.BlockUpdate(padding, 0, 64 - N); + sha256Memo = ((IMemoable)sha256).Copy(); + sha256.Reset(); + } + public override byte[] F(byte[] pkSeed, Adrs adrs, byte[] m1) { byte[] compressedAdrs = CompressedAdrs(adrs); @@ -160,8 +170,8 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus m1 = Bitmask256(Arrays.Concatenate(pkSeed, compressedAdrs), m1); } - sha256.BlockUpdate(pkSeed, 0, pkSeed.Length); - sha256.BlockUpdate(padding, 0, 64 - pkSeed.Length); // toByte(0, 64 - n) + ((IMemoable)sha256).Reset(sha256Memo); + sha256.BlockUpdate(compressedAdrs, 0, compressedAdrs.Length); sha256.BlockUpdate(m1, 0, m1.Length); sha256.DoFinal(sha256Buf, 0); @@ -172,10 +182,9 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus public override byte[] H(byte[] pkSeed, Adrs adrs, byte[] m1, byte[] m2) { byte[] compressedAdrs = CompressedAdrs(adrs); - - msgDigest.BlockUpdate(pkSeed, 0, pkSeed.Length); - msgDigest.BlockUpdate(padding, 0, bl - N); // toByte(0, 64 - n) + ((IMemoable)msgDigest).Reset(msgMemo); + msgDigest.BlockUpdate(compressedAdrs, 0, compressedAdrs.Length); if (robust) { @@ -188,8 +197,6 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus msgDigest.BlockUpdate(m2, 0, m2.Length); } - - msgDigest.DoFinal(msgDigestBuf, 0); return Arrays.CopyOfRange(msgDigestBuf, 0, N); @@ -202,7 +209,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus uint treeBits = FH - leafBits; uint leafBytes = (leafBits + 7) / 8; uint treeBytes = (treeBits + 7) / 8; - uint m = (uint) forsMsgBytes + leafBytes + treeBytes; + uint m = (uint)forsMsgBytes + leafBytes + treeBytes; byte[] output = new byte[m]; byte[] dig = new byte[msgDigest.GetDigestSize()]; @@ -213,22 +220,22 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus msgDigest.DoFinal(dig, 0); - output = Bitmask( Arrays.ConcatenateAll(prf, pkSeed, dig), output); + output = Bitmask(Arrays.ConcatenateAll(prf, pkSeed, dig), output); // tree index // currently, only indexes up to 64 bits are supported byte[] treeIndexBuf = new byte[8]; Array.Copy(output, forsMsgBytes, treeIndexBuf, 8 - treeBytes, treeBytes); ulong treeIndex = Pack.BE_To_UInt64(treeIndexBuf, 0); - if(64-treeBits != 0) + if (64 - treeBits != 0) treeIndex &= (ulong)((0x7fffffffffffffffL) >> (int)(64 - treeBits - 1)); byte[] leafIndexBuf = new byte[4]; Array.Copy(output, forsMsgBytes + treeBytes, leafIndexBuf, 4 - leafBytes, leafBytes); uint leafIndex = Pack.BE_To_UInt32(leafIndexBuf, 0); - if(32-leafBits != 0) - leafIndex &= (uint) ((0x7fffffff) >> (int) (32 - leafBits-1));//todo??? + if (32 - leafBits != 0) + leafIndex &= (uint)((0x7fffffff) >> (int)(32 - leafBits - 1));//todo??? return new IndexedDigest(treeIndex, leafIndex, Arrays.CopyOfRange(output, 0, forsMsgBytes)); } @@ -242,8 +249,8 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus } - msgDigest.BlockUpdate(pkSeed, 0, pkSeed.Length); - msgDigest.BlockUpdate(padding, 0, bl - N); // toByte(0, 64 - n) + ((IMemoable)msgDigest).Reset(msgMemo); + msgDigest.BlockUpdate(compressedAdrs, 0, compressedAdrs.Length); msgDigest.BlockUpdate(m, 0, m.Length); msgDigest.DoFinal(msgDigestBuf, 0); @@ -254,10 +261,9 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus public override byte[] PRF(byte[] pkSeed, byte[] skSeed, Adrs adrs) { int n = skSeed.Length; - - sha256.BlockUpdate(pkSeed, 0, pkSeed.Length); - sha256.BlockUpdate(padding, 0, 64 - pkSeed.Length); // toByte(0, 64 - n) - + + ((IMemoable)sha256).Reset(sha256Memo); + byte[] compressedAdrs = CompressedAdrs(adrs); sha256.BlockUpdate(compressedAdrs, 0, compressedAdrs.Length); @@ -287,7 +293,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus return rv; } - + protected byte[] Bitmask(byte[] key, byte[] m) { byte[] mask = new byte[m.Length]; @@ -360,6 +366,11 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus this.maskDigest = new ShakeDigest(256); } + public override void init(byte[] pkSeed) + { + // TODO: add use of memo + } + public override byte[] F(byte[] pkSeed, Adrs adrs, byte[] m1) { byte[] mTheta = m1; @@ -395,7 +406,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus treeDigest.BlockUpdate(m1, 0, m1.Length); treeDigest.BlockUpdate(m2, 0, m2.Length); } - + treeDigest.DoFinal(rv, 0, rv.Length); return rv; @@ -424,15 +435,15 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus byte[] treeIndexBuf = new byte[8]; Array.Copy(output, forsMsgBytes, treeIndexBuf, 8 - treeBytes, treeBytes); ulong treeIndex = Pack.BE_To_UInt64(treeIndexBuf, 0); - if(64 - treeBits != 0) - treeIndex &= (ulong) ((0x7fffffffffffffffL) >> (64 - (int)treeBits-1)); + if (64 - treeBits != 0) + treeIndex &= (ulong)((0x7fffffffffffffffL) >> (64 - (int)treeBits - 1)); byte[] leafIndexBuf = new byte[4]; Array.Copy(output, forsMsgBytes + treeBytes, leafIndexBuf, 4 - leafBytes, leafBytes); uint leafIndex = Pack.BE_To_UInt32(leafIndexBuf, 0); if (32 - leafBits != 0) - leafIndex &= (uint)((0x7fffffff) >> (32 - (int)leafBits-1)); + leafIndex &= (uint)((0x7fffffff) >> (32 - (int)leafBits - 1)); return new IndexedDigest(treeIndex, leafIndex, Arrays.CopyOfRange(output, 0, forsMsgBytes)); } @@ -460,7 +471,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus treeDigest.BlockUpdate(pkSeed, 0, pkSeed.Length); treeDigest.BlockUpdate(adrs.value, 0, adrs.value.Length); treeDigest.BlockUpdate(skSeed, 0, skSeed.Length); - + byte[] prf = new byte[N]; treeDigest.DoFinal(prf, 0, N); return prf; @@ -514,5 +525,138 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus } } + + internal class HarakaSEngine : SPHINCSPlusEngine + { + public HarakaSXof harakaSXof; + public HarakaS256Digest harakaS256Digest; + public HarakaS512Digest harakaS512Digest; + + public HarakaSEngine(bool robust, int n, uint w, uint d, int a, int k, uint h) : base(robust, n, w, d, a, k, h) + { + + } + + public override void init(byte[] pkSeed) + { + harakaSXof = new HarakaSXof(pkSeed); + harakaS256Digest = new HarakaS256Digest(harakaSXof); + harakaS512Digest = new HarakaS512Digest(harakaSXof); + } + + public override byte[] F(byte[] pkSeed, Adrs adrs, byte[] m1) + { + byte[] rv = new byte[64]; + harakaS512Digest.BlockUpdate(adrs.value, 0, adrs.value.Length); + if (robust) + { + byte[] mask = new byte[m1.Length]; + harakaS256Digest.BlockUpdate(adrs.value, 0, adrs.value.Length); + harakaS256Digest.DoFinal(mask, 0); + for (int i = 0; i < m1.Length; ++i) + { + mask[i] ^= m1[i]; + } + harakaS512Digest.BlockUpdate(mask, 0, mask.Length); + } + else + { + harakaS512Digest.BlockUpdate(m1, 0, m1.Length); + } + harakaS512Digest.DoFinal(rv, 0); + return Arrays.CopyOfRange(rv, 0, N); + } + + public override byte[] H(byte[] pkSeed, Adrs adrs, byte[] m1, byte[] m2) + { + byte[] rv = new byte[N]; + byte[] m = new byte[m1.Length + m2.Length]; + Array.Copy(m1, 0, m, 0, m1.Length); + Array.Copy(m2, 0, m, m1.Length, m2.Length); + m = Bitmask(adrs, m); + harakaSXof.BlockUpdate(adrs.value, 0, adrs.value.Length); + harakaSXof.BlockUpdate(m, 0, m.Length); + harakaSXof.DoFinal(rv, 0, rv.Length); + return rv; + } + + public override IndexedDigest H_msg(byte[] prf, byte[] pkSeed, byte[] pkRoot, byte[] message) + { + int forsMsgBytes = ((A * K) + 7) >> 3; + uint leafBits = FH / D; + uint treeBits = FH - leafBits; + uint leafBytes = (leafBits + 7) >>3; + uint treeBytes = (treeBits + 7) >>3; + uint m = (uint)(forsMsgBytes + leafBytes + treeBytes); + byte[] output = new byte[forsMsgBytes + leafBytes + treeBytes]; + harakaSXof.BlockUpdate(prf, 0, prf.Length); + harakaSXof.BlockUpdate(pkRoot, 0, pkRoot.Length); + harakaSXof.BlockUpdate(message, 0, message.Length); + harakaSXof.DoFinal(output, 0, output.Length); + // tree index + // currently, only indexes up to 64 bits are supported + byte[] treeIndexBuf = new byte[8]; + Array.Copy(output, forsMsgBytes, treeIndexBuf, 8 - treeBytes, treeBytes); + ulong treeIndex = Pack.BE_To_UInt64(treeIndexBuf, 0); + if (64 - treeBits != 0) + treeIndex &= (ulong)((0x7fffffffffffffffL) >> (64 - (int)treeBits - 1)); + + byte[] leafIndexBuf = new byte[4]; + Array.Copy(output, forsMsgBytes + treeBytes, leafIndexBuf, 4 - leafBytes, leafBytes); + + uint leafIndex = Pack.BE_To_UInt32(leafIndexBuf, 0); + if (32 - leafBits != 0) + leafIndex &= (uint)((0x7fffffff) >> (32 - (int)leafBits - 1)); + + return new IndexedDigest(treeIndex, leafIndex, Arrays.CopyOfRange(output, 0, forsMsgBytes)); + } + + + + public override byte[] T_l(byte[] pkSeed, Adrs adrs, byte[] m) + { + byte[] rv = new byte[N]; + m = Bitmask(adrs, m); + harakaSXof.BlockUpdate(adrs.value, 0, adrs.value.Length); + harakaSXof.BlockUpdate(m, 0, m.Length); + harakaSXof.DoFinal(rv, 0, rv.Length); + return rv; + } + + public override byte[] PRF(byte[] pkSeed, byte[] skSeed, Adrs adrs) + { + byte[] rv = new byte[64]; + harakaS512Digest.BlockUpdate(adrs.value, 0, adrs.value.Length); + harakaS512Digest.BlockUpdate(skSeed, 0, skSeed.Length); + harakaS512Digest.DoFinal(rv, 0); + return Arrays.CopyOfRange(rv, 0, N); + } + + public override byte[] PRF_msg(byte[] prf, byte[] randomiser, byte[] message) + { + byte[] rv = new byte[N]; + harakaSXof.BlockUpdate(prf, 0, prf.Length); + harakaSXof.BlockUpdate(randomiser, 0, randomiser.Length); + harakaSXof.BlockUpdate(message, 0, message.Length); + harakaSXof.DoFinal(rv, 0, rv.Length); + return rv; + } + + protected byte[] Bitmask(Adrs adrs, byte[] m) + { + if (robust) + { + byte[] mask = new byte[m.Length]; + harakaSXof.BlockUpdate(adrs.value, 0, adrs.value.Length); + harakaSXof.DoFinal(mask, 0, mask.Length); + for (int i = 0; i < m.Length; ++i) + { + m[i] ^= mask[i]; + } + return m; + } + return m; + } + } } } \ No newline at end of file diff --git a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusKeyPairGenerator.cs b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusKeyPairGenerator.cs index 9e5724027..dbb93a812 100644 --- a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusKeyPairGenerator.cs +++ b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusKeyPairGenerator.cs @@ -1,6 +1,8 @@ +using System; using Org.BouncyCastle.Crypto; using Org.BouncyCastle.Security; +using static Org.BouncyCastle.Pqc.Crypto.SphincsPlus.SPHINCSPlusEngine; namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus { @@ -13,15 +15,33 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus public void Init(KeyGenerationParameters param) { random = param.Random; - parameters = ((SPHINCSPlusKeyGenerationParameters) param).Parameters; + parameters = ((SPHINCSPlusKeyGenerationParameters)param).Parameters; } public AsymmetricCipherKeyPair GenerateKeyPair() { SPHINCSPlusEngine engine = parameters.GetEngine(); - - SK sk = new SK(SecRand(engine.N), SecRand(engine.N)); - byte[] pkSeed = SecRand(engine.N); + byte[] pkSeed; + SK sk; + + if (engine is SPHINCSPlusEngine.HarakaSEngine) + { + // required to pass kat tests + byte[] tmparray = SecRand(engine.N * 3); + byte[] skseed = new byte[engine.N]; + byte[] skprf = new byte[engine.N]; + pkSeed = new byte[engine.N]; + Array.Copy(tmparray, 0, skseed, 0, engine.N); + Array.Copy(tmparray, engine.N, skprf, 0, engine.N); + Array.Copy(tmparray, engine.N << 1, pkSeed, 0, engine.N); + sk = new SK(skseed, skprf); + } + else + { + sk = new SK(SecRand(engine.N), SecRand(engine.N)); + pkSeed = SecRand(engine.N); + } + engine.init(pkSeed); // TODO PK pk = new PK(pkSeed, new HT(engine, sk.seed, pkSeed).HTPubKey); diff --git a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusParameters.cs b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusParameters.cs index 3faaca896..2a5f6d581 100644 --- a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusParameters.cs +++ b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusParameters.cs @@ -90,6 +90,27 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus public static SPHINCSPlusParameters shake_256s_simple = new SPHINCSPlusParameters("shake-256s-simple", new Shake256EngineProvider(false, 32, 16, 8, 14, 22, 64)); + // Haraka. + + public static SPHINCSPlusParameters haraka_128f = new SPHINCSPlusParameters("haraka-128f-robust", new Haraka256EngineProvider(true, 16, 16, 22, 6, 33, 66)); + public static SPHINCSPlusParameters haraka_128s = new SPHINCSPlusParameters("haraka-128s-robust", new Haraka256EngineProvider(true, 16, 16, 7, 12, 14, 63)); + + public static SPHINCSPlusParameters haraka_256f = new SPHINCSPlusParameters("haraka-256f-robust", new Haraka256EngineProvider(true, 32, 16, 17, 9, 35, 68)); + public static SPHINCSPlusParameters haraka_256s = new SPHINCSPlusParameters("haraka-256s-robust", new Haraka256EngineProvider(true, 32, 16, 8, 14, 22, 64)); + + public static SPHINCSPlusParameters haraka_192f = new SPHINCSPlusParameters("haraka-192f-robust", new Haraka256EngineProvider(true, 24, 16, 22, 8, 33, 66)); + public static SPHINCSPlusParameters haraka_192s = new SPHINCSPlusParameters("haraka-192s-robust", new Haraka256EngineProvider(true, 24, 16, 7, 14, 17, 63)); + + public static SPHINCSPlusParameters haraka_128f_simple = new SPHINCSPlusParameters("haraka-128f-simple", new Haraka256EngineProvider(false, 16, 16, 22, 6, 33, 66)); + public static SPHINCSPlusParameters haraka_128s_simple = new SPHINCSPlusParameters("haraka-128s-simple", new Haraka256EngineProvider(false, 16, 16, 7, 12, 14, 63)); + + public static SPHINCSPlusParameters haraka_192f_simple = new SPHINCSPlusParameters("haraka-192f-simple", new Haraka256EngineProvider(false, 24, 16, 22, 8, 33, 66)); + public static SPHINCSPlusParameters haraka_192s_simple = new SPHINCSPlusParameters("haraka-192s-simple", new Haraka256EngineProvider(false, 24, 16, 7, 14, 17, 63)); + + public static SPHINCSPlusParameters haraka_256f_simple = new SPHINCSPlusParameters("haraka-256f-simple", new Haraka256EngineProvider(false, 32, 16, 17, 9, 35, 68)); + public static SPHINCSPlusParameters haraka_256s_simple = new SPHINCSPlusParameters("haraka-256s-simple", new Haraka256EngineProvider(false, 32, 16, 8, 14, 22, 64)); + + private static uint sphincsPlus_sha2_128f_robust = 0x010101; private static uint sphincsPlus_sha2_128s_robust = 0x010102; private static uint sphincsPlus_sha2_192f_robust = 0x010103; @@ -118,6 +139,21 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus private static uint sphincsPlus_shake_256f_simple = 0x020205; private static uint sphincsPlus_shake_256s_simple = 0x020206; + private static uint sphincsPlus_haraka_128f_robust = 0x030101; + private static uint sphincsPlus_haraka_128s_robust = 0x030102; + private static uint sphincsPlus_haraka_192f_robust = 0x030103; + private static uint sphincsPlus_haraka_192s_robust = 0x030104; + private static uint sphincsPlus_haraka_256f_robust = 0x030105; + private static uint sphincsPlus_haraka_256s_robust = 0x030106; + + private static uint sphincsPlus_haraka_128f_simple = 0x030201; + private static uint sphincsPlus_haraka_128s_simple = 0x030202; + private static uint sphincsPlus_haraka_192f_simple = 0x030203; + private static uint sphincsPlus_haraka_192s_simple = 0x030204; + private static uint sphincsPlus_haraka_256f_simple = 0x030205; + private static uint sphincsPlus_haraka_256s_simple = 0x030206; + + private static Dictionary<uint, SPHINCSPlusParameters> oidToParams = new Dictionary<uint, SPHINCSPlusParameters>(); private static Dictionary<SPHINCSPlusParameters, uint> paramsToOid = new Dictionary<SPHINCSPlusParameters, uint>(); @@ -151,6 +187,21 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus oidToParams[sphincsPlus_shake_256f_simple] = SPHINCSPlusParameters.shake_256f_simple; oidToParams[sphincsPlus_shake_256s_simple] = SPHINCSPlusParameters.shake_256s_simple; + oidToParams[sphincsPlus_haraka_128f_simple] = SPHINCSPlusParameters.haraka_128f_simple; + oidToParams[sphincsPlus_haraka_128f_robust] = SPHINCSPlusParameters.haraka_128f; + oidToParams[sphincsPlus_haraka_192f_simple] = SPHINCSPlusParameters.haraka_192f_simple; + oidToParams[sphincsPlus_haraka_192f_robust] = SPHINCSPlusParameters.haraka_192f; + oidToParams[sphincsPlus_haraka_256f_simple] = SPHINCSPlusParameters.haraka_256f_simple; + oidToParams[sphincsPlus_haraka_256f_robust] = SPHINCSPlusParameters.haraka_256f; + + oidToParams[sphincsPlus_haraka_128s_simple] = SPHINCSPlusParameters.haraka_128s_simple; + oidToParams[sphincsPlus_haraka_128s_robust] = SPHINCSPlusParameters.haraka_128s; + oidToParams[sphincsPlus_haraka_192s_simple] = SPHINCSPlusParameters.haraka_192s_simple; + oidToParams[sphincsPlus_haraka_192s_robust] = SPHINCSPlusParameters.haraka_192s; + oidToParams[sphincsPlus_haraka_256s_simple] = SPHINCSPlusParameters.haraka_256s_simple; + oidToParams[sphincsPlus_haraka_256s_robust] = SPHINCSPlusParameters.haraka_256s; + + paramsToOid[SPHINCSPlusParameters.sha2_128f] = sphincsPlus_sha2_128f_robust; paramsToOid[SPHINCSPlusParameters.sha2_128s] = sphincsPlus_sha2_128s_robust; paramsToOid[SPHINCSPlusParameters.sha2_192f] = sphincsPlus_sha2_192f_robust; @@ -178,6 +229,19 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus paramsToOid[SPHINCSPlusParameters.shake_192s_simple] = sphincsPlus_shake_192s_simple; paramsToOid[SPHINCSPlusParameters.shake_256f_simple] = sphincsPlus_shake_256f_simple; paramsToOid[SPHINCSPlusParameters.shake_256s_simple] = sphincsPlus_shake_256s_simple; + + paramsToOid[SPHINCSPlusParameters.haraka_128f_simple] = sphincsPlus_haraka_128f_simple; + paramsToOid[SPHINCSPlusParameters.haraka_192f_simple] = sphincsPlus_haraka_192f_simple; + paramsToOid[SPHINCSPlusParameters.haraka_256f_simple] = sphincsPlus_haraka_256f_simple; + paramsToOid[SPHINCSPlusParameters.haraka_128s_simple] = sphincsPlus_haraka_128s_simple; + paramsToOid[SPHINCSPlusParameters.haraka_192s_simple] = sphincsPlus_haraka_192s_simple; + paramsToOid[SPHINCSPlusParameters.haraka_256s_simple] = sphincsPlus_haraka_256s_simple; + paramsToOid[SPHINCSPlusParameters.haraka_128f] = sphincsPlus_haraka_128f_robust; + paramsToOid[SPHINCSPlusParameters.haraka_192f] = sphincsPlus_haraka_192f_robust; + paramsToOid[SPHINCSPlusParameters.haraka_256f] = sphincsPlus_haraka_256f_robust; + paramsToOid[SPHINCSPlusParameters.haraka_128s] = sphincsPlus_haraka_128s_robust; + paramsToOid[SPHINCSPlusParameters.haraka_192s] = sphincsPlus_haraka_192s_robust; + paramsToOid[SPHINCSPlusParameters.haraka_256s] = sphincsPlus_haraka_256s_robust; } private String name; @@ -235,7 +299,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus private readonly int a; private readonly int k; private readonly uint h; - + internal Sha2EngineProvider(bool robust, int n, uint w, uint d, int a, int k, uint h) { this.robust = robust; @@ -283,4 +347,33 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus return new SPHINCSPlusEngine.Shake256Engine(robust, n, w, d, a, k, h); } } + + class Haraka256EngineProvider : ISPHINCSPlusEngineProvider + { + private readonly bool robust; + private readonly int n; + private readonly uint w; + private readonly uint d; + private readonly int a; + private readonly int k; + private readonly uint h; + + public Haraka256EngineProvider(bool robust, int n, uint w, uint d, int a, int k, uint h) + { + this.robust = robust; + this.n = n; + this.w = w; + this.d = d; + this.a = a; + this.k = k; + this.h = h; + } + + public int N => this.n; + + public SPHINCSPlusEngine Get() + { + return new SPHINCSPlusEngine.HarakaSEngine(robust, n, w, d, a, k, h); + } + } } \ No newline at end of file diff --git a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusSigner.cs b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusSigner.cs index ec0b9691e..1a1c90766 100644 --- a/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusSigner.cs +++ b/crypto/src/pqc/crypto/sphincsplus/SPHINCSPlusSigner.cs @@ -39,17 +39,17 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus { if (param is ParametersWithRandom) { - privKey = ((SPHINCSPlusPrivateKeyParameters) ((ParametersWithRandom) param).Parameters); - this.random = ((ParametersWithRandom) param).Random; + privKey = ((SPHINCSPlusPrivateKeyParameters)((ParametersWithRandom)param).Parameters); + this.random = ((ParametersWithRandom)param).Random; } else { - privKey = (SPHINCSPlusPrivateKeyParameters) param; + privKey = (SPHINCSPlusPrivateKeyParameters)param; } } else { - pubKey = (SPHINCSPlusPublicKeyParameters) param; + pubKey = (SPHINCSPlusPublicKeyParameters)param; } } @@ -60,7 +60,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus // init SPHINCSPlusEngine engine = privKey.GetParameters().GetEngine(); - + engine.init(privKey.GetPublicSeed()); // generate randomizer byte[] optRand = new byte[engine.N]; if (random != null) @@ -119,6 +119,7 @@ namespace Org.BouncyCastle.Pqc.Crypto.SphincsPlus // init SPHINCSPlusEngine engine = pubKey.GetParameters().GetEngine(); + engine.init(pubKey.GetSeed()); Adrs adrs = new Adrs(); SIG sig = new SIG(engine.N, engine.K, engine.A, engine.D, engine.H_PRIME, engine.WOTS_LEN, signature); |