blob: c43f10ff190c03c4b050911193152b162eec9c07 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
|
using System;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.Utilities;
namespace Org.BouncyCastle.Pqc.Crypto.Crystals.Kyber
{
public class KyberKEMGenerator
: IEncapsulatedSecretGenerator
{
// the source of randomness
private SecureRandom sr;
public KyberKEMGenerator(SecureRandom random)
{
this.sr = random;
}
public ISecretWithEncapsulation GenerateEncapsulated(AsymmetricKeyParameter recipientKey)
{
KyberPublicKeyParameters key = (KyberPublicKeyParameters) recipientKey;
KyberEngine engine = key.Parameters.GetEngine();
engine.Init(sr);
byte[] CipherText = new byte[engine.CryptoCipherTextBytes];
byte[] SessionKey = new byte[engine.CryptoBytes];
engine.KemEncrypt(CipherText, SessionKey, key.publicKey);
byte[] rv = Arrays.CopyOfRange(SessionKey, 0, key.Parameters.DefaultKeySize / 8);
Arrays.Clear(SessionKey);
return new SecretWithEncapsulationImpl(rv, CipherText);
}
private class SecretWithEncapsulationImpl
: ISecretWithEncapsulation
{
private volatile bool hasBeenDestroyed = false;
private byte[] SessionKey;
private byte[] CipherText;
public SecretWithEncapsulationImpl(byte[] sessionKey, byte[] cipher_text)
{
this.SessionKey = sessionKey;
this.CipherText = cipher_text;
}
public byte[] GetSecret()
{
CheckDestroyed();
return Arrays.Clone(SessionKey);
}
public byte[] GetEncapsulation()
{
CheckDestroyed();
return Arrays.Clone(CipherText);
}
public void Dispose()
{
if (!hasBeenDestroyed)
{
hasBeenDestroyed = true;
Arrays.Clear(SessionKey);
Arrays.Clear(CipherText);
}
}
public bool IsDestroyed()
{
return hasBeenDestroyed;
}
void CheckDestroyed()
{
if (IsDestroyed())
{
throw new ArgumentException("data has been destroyed");
}
}
}
}
}
|