Add Ed25519

This commit is contained in:
Miguel Oliveira 2022-03-01 20:27:38 -03:00
parent 03c2db100f
commit 43a58ebd5e
No known key found for this signature in database
GPG key ID: 2C2BE789E1377025
2 changed files with 470 additions and 0 deletions

294
ed25519.lua Normal file
View file

@ -0,0 +1,294 @@
--- The Ed25519 signature scheme.
--
-- @module ed25519
--
local expect = require "cc.expect".expect
local fp = require "ccryptolib.fp"
local fq = require "ccryptolib.fq"
local sha512 = require "ccryptolib.sha512"
local random = require "ccryptolib.random"
local util = require "ccryptolib.util"
local unpack = unpack or table.unpack
local D = fp.mul(fp.num(-121665), fp.invert(fp.num(121666)))
local K = fp.kmul(D, 2)
local O = {fp.num(0), fp.num(1), fp.num(1), fp.num(0)}
local G = nil
local function double(P1)
local P1x, P1y, P1z = unpack(P1)
local a = fp.square(P1x)
local b = fp.square(P1y)
local c = fp.square(P1z)
local d = fp.kmul(c, 2)
local e = fp.add(a, b)
local f = fp.add(P1x, P1y)
local g = fp.square(f)
local h = fp.sub(g, e)
local i = fp.sub(b, a)
local j = fp.sub(d, i)
local P3x = fp.mul(h, j)
local P3y = fp.mul(i, e)
local P3z = fp.mul(j, i)
local P3t = fp.mul(h, e)
return {P3x, P3y, P3z, P3t}
end
local function add(P1, N1)
local P1x, P1y, P1z, P1t = unpack(P1)
local N1p, N1m, N1z, N1t = unpack(N1)
local a = fp.sub(P1y, P1x)
local b = fp.mul(a, N1m)
local c = fp.add(P1y, P1x)
local d = fp.mul(c, N1p)
local e = fp.mul(P1t, N1t)
local f = fp.mul(P1z, N1z)
local g = fp.sub(d, b)
local h = fp.sub(f, e)
local i = fp.add(f, e)
local j = fp.add(d, b)
local P3x = fp.mul(g, h)
local P3y = fp.mul(i, j)
local P3z = fp.mul(h, i)
local P3t = fp.mul(g, j)
return {P3x, P3y, P3z, P3t}
end
local function sub(P1, N1)
local P1x, P1y, P1z, P1t = unpack(P1)
local N1p, N1m, N1z, N1t = unpack(N1)
local a = fp.sub(P1y, P1x)
local b = fp.mul(a, N1p)
local c = fp.add(P1y, P1x)
local d = fp.mul(c, N1m)
local e = fp.mul(P1t, N1t)
local f = fp.mul(P1z, N1z)
local g = fp.sub(d, b)
local h = fp.add(f, e)
local i = fp.sub(f, e)
local j = fp.add(d, b)
local P3x = fp.mul(g, h)
local P3y = fp.mul(i, j)
local P3z = fp.mul(h, i)
local P3t = fp.mul(g, j)
return {P3x, P3y, P3z, P3t}
end
local function niels(P1)
local P1x, P1y, P1z, P1t = unpack(P1)
local N3p = fp.add(P1y, P1x)
local N3m = fp.sub(P1y, P1x)
local N3z = fp.add(P1z, P1z)
local N3t = fp.mul(P1t, K)
return {N3p, N3m, N3z, N3t}
end
local function scale(P1)
local P1x, P1y, P1z = unpack(P1)
local zInv = fp.invert(P1z)
local P3x = fp.mul(P1x, zInv)
local P3y = fp.mul(P1y, zInv)
local P3z = fp.num(1)
local P3t = fp.mul(P3x, P3y)
return {P3x, P3y, P3z, P3t}
end
local function encode(P1)
local P1x, P1y = unpack(P1)
local y = fp.encode(P1y)
local xBit = fp.canonicalize(P1x)[1] % 2
return y:sub(1, -2) .. string.char(y:byte(-1) + xBit * 128)
end
local function decode(str)
local P3y = fp.decode(str)
local a = fp.square(P3y)
local b = fp.sub(a, fp.num(1))
local c = fp.mul(a, D)
local d = fp.add(c, fp.num(1))
local P3x = fp.sqrtDiv(b, d)
if not P3x then return nil end
local xBit = fp.canonicalize(P3x)[1] % 2
if xBit ~= bit32.extract(str:byte(-1), 7) then
P3x = fp.neg(P3x)
P3x = fp.carry(P3x)
end
local P3z = fp.num(1)
local P3t = fp.mul(P3x, P3y)
return {P3x, P3y, P3z, P3t}
end
G = decode("Xfffffffffffffffffffffffffffffff")
local function signedRadixW(bits, w)
-- TODO Find a more elegant way of doing this.
local wPow = 2 ^ w
local wPowh = wPow / 2
local out = {}
local acc = 0
local mul = 1
for i = 1, #bits do
acc = acc + bits[i] * mul
mul = mul * 2
while i == #bits and acc > 0 or mul > wPow do
local rem = acc % wPow
if rem >= wPowh then rem = rem - wPow end
acc = (acc - rem) / wPow
mul = mul / wPow
out[#out + 1] = rem
end
end
return out
end
local function radixWTable(P, w)
local out = {}
for i = 1, 255 / w do
local row = {niels(P)}
for j = 2, 2 ^ w / 2 do
P = add(P, row[1])
row[j] = niels(P)
end
out[i] = row
P = double(P)
end
return out
end
local G_W = 5
local G_TABLE = radixWTable(G, G_W)
local function WNAF(bits, w)
-- TODO Find a more elegant way of doing this.
local wPow = 2 ^ w
local wPowh = wPow / 2
local out = {}
local acc = 0
local mul = 1
for i = 1, #bits do
acc = acc + bits[i] * mul
mul = mul * 2
while i == #bits and acc > 0 or mul > wPow do
if acc % 2 == 0 then
acc = acc / 2
mul = mul / 2
out[#out + 1] = 0
else
local rem = acc % wPow
if rem >= wPowh then rem = rem - wPow end
acc = acc - rem
out[#out + 1] = rem
end
end
end
while out[#out] == 0 do out[#out] = nil end
return out
end
local function WNAFTable(P, w)
local dP = double(P)
local out = {niels(P)}
for i = 3, 2 ^ w, 2 do
out[i] = niels(add(dP, out[i - 2]))
end
return out
end
local function mulG(bits)
local sw = signedRadixW(bits, G_W)
local R = O
for i = 1, #sw do
local b = sw[i]
if b > 0 then
R = add(R, G_TABLE[i][b])
elseif b < 0 then
R = sub(R, G_TABLE[i][-b])
end
end
return R
end
local function mul(P, bits)
local naf = WNAF(bits, 5)
local tbl = WNAFTable(P, 5)
local R = O
for i = #naf, 1, -1 do
local b = naf[i]
if b == 0 then
R = double(R)
elseif b > 0 then
R = add(R, tbl[b])
else
R = sub(R, tbl[-b])
end
end
return R
end
local function publicKey(sk)
expect(1, sk, "string")
assert(#sk == 32, "secret key length must be 32")
-- FIXME SHA512 isn't constant-time.
local h = sha512.digest(sk):sub(1, 32)
local kBits, xkInvBits = blinding.decodeBlinded(h)
local Y0 = mulG(xkInvBits)
local Y1 = mul(Y0, kBits)
return encode(scale(Y1))
end
local function sign(sk, pk, msg)
expect(1, sk, "string")
assert(#sk == 32, "secret key length must be 32")
expect(2, pk, "string")
assert(#pk == 32, "public key length must be 32")
expect(3, msg, "string")
-- Decode cwords and clamp with a mask.
local h = sha512.digest(sk):sub(1, 32)
local xm, m = fq.maskedDecode(h, random.random(32))
-- Commitment.
local k = fq.decodeWide(random.random(64))
local kBits = fq.bits(k)
local R = mulG(kBits)
-- Challenge.
local rStr = encode(scale(R))
local e = fq.decodeWide(sha512.digest(rStr .. pk .. msg))
-- Response.
local exm = fq.mul(e, xm)
local em = fq.mul(e, m)
local s = fq.add(fq.sub(k, exm), em)
local sStr = fq.encode(s)
return rStr .. sStr
end
local function verify(pk, msg, sig)
expect(1, pk, "string")
assert(#pk == 32, "public key length must be 32")
expect(2, msg, "string")
expect(3, sig, "string")
assert(#sig == 64, "public key length must be 32")
local rStr = sig:sub(1, 32)
local sStr = sig:sub(33)
local Y = decode(pk)
local ev = fq.decodeWide(sha512.digest(rStr .. pk .. msg))
local evBits = fq.bits(ev)
local sBits = util.rebaseLE({sStr:byte(1, -1)}, 256, 2)
local Rv = add(mulG(sBits), mul(Y, evBits))
return encode(scale(Rv)) == rStr
end
return {
publicKey = publicKey,
sign = sign,
verify = verify,
}

176
sha512.lua Normal file
View file

@ -0,0 +1,176 @@
--- The SHA512 cryptographic hash function.
--
-- @module sha512
--
local expect = require "cc.expect".expect
local shl = bit32.lshift
local shr = bit32.rshift
local bxor = bit32.bxor
local bnot = bit32.bnot
local band = bit32.band
local function carry64(a1, a0)
local r0 = a0 % 2 ^ 32
a1 = a1 + (a0 - r0) / 2 ^ 32
return a1 % 2 ^ 32, r0
end
local K = {
0x428a2f98, 0xd728ae22, 0x71374491, 0x23ef65cd, 0xb5c0fbcf, 0xec4d3b2f,
0xe9b5dba5, 0x8189dbbc, 0x3956c25b, 0xf348b538, 0x59f111f1, 0xb605d019,
0x923f82a4, 0xaf194f9b, 0xab1c5ed5, 0xda6d8118, 0xd807aa98, 0xa3030242,
0x12835b01, 0x45706fbe, 0x243185be, 0x4ee4b28c, 0x550c7dc3, 0xd5ffb4e2,
0x72be5d74, 0xf27b896f, 0x80deb1fe, 0x3b1696b1, 0x9bdc06a7, 0x25c71235,
0xc19bf174, 0xcf692694, 0xe49b69c1, 0x9ef14ad2, 0xefbe4786, 0x384f25e3,
0x0fc19dc6, 0x8b8cd5b5, 0x240ca1cc, 0x77ac9c65, 0x2de92c6f, 0x592b0275,
0x4a7484aa, 0x6ea6e483, 0x5cb0a9dc, 0xbd41fbd4, 0x76f988da, 0x831153b5,
0x983e5152, 0xee66dfab, 0xa831c66d, 0x2db43210, 0xb00327c8, 0x98fb213f,
0xbf597fc7, 0xbeef0ee4, 0xc6e00bf3, 0x3da88fc2, 0xd5a79147, 0x930aa725,
0x06ca6351, 0xe003826f, 0x14292967, 0x0a0e6e70, 0x27b70a85, 0x46d22ffc,
0x2e1b2138, 0x5c26c926, 0x4d2c6dfc, 0x5ac42aed, 0x53380d13, 0x9d95b3df,
0x650a7354, 0x8baf63de, 0x766a0abb, 0x3c77b2a8, 0x81c2c92e, 0x47edaee6,
0x92722c85, 0x1482353b, 0xa2bfe8a1, 0x4cf10364, 0xa81a664b, 0xbc423001,
0xc24b8b70, 0xd0f89791, 0xc76c51a3, 0x0654be30, 0xd192e819, 0xd6ef5218,
0xd6990624, 0x5565a910, 0xf40e3585, 0x5771202a, 0x106aa070, 0x32bbd1b8,
0x19a4c116, 0xb8d2d0c8, 0x1e376c08, 0x5141ab53, 0x2748774c, 0xdf8eeb99,
0x34b0bcb5, 0xe19b48a8, 0x391c0cb3, 0xc5c95a63, 0x4ed8aa4a, 0xe3418acb,
0x5b9cca4f, 0x7763e373, 0x682e6ff3, 0xd6b2b8a3, 0x748f82ee, 0x5defb2fc,
0x78a5636f, 0x43172f60, 0x84c87814, 0xa1f0ab72, 0x8cc70208, 0x1a6439ec,
0x90befffa, 0x23631e28, 0xa4506ceb, 0xde82bde9, 0xbef9a3f7, 0xb2c67915,
0xc67178f2, 0xe372532b, 0xca273ece, 0xea26619c, 0xd186b8c7, 0x21c0c207,
0xeada7dd6, 0xcde0eb1e, 0xf57d4f7f, 0xee6ed178, 0x06f067aa, 0x72176fba,
0x0a637dc5, 0xa2c898a6, 0x113f9804, 0xbef90dae, 0x1b710b35, 0x131c471b,
0x28db77f5, 0x23047d84, 0x32caab7b, 0x40c72493, 0x3c9ebe0a, 0x15c9bebc,
0x431d67c4, 0x9c100d4c, 0x4cc5d4be, 0xcb3e42b6, 0x597f299c, 0xfc657e2a,
0x5fcb6fab, 0x3ad6faec, 0x6c44198c, 0x4a475817,
}
--- Hashes data bytes using SHA512.
--
-- @tparam string data The input data.
-- @treturn string The 64-byte hash value.
--
local function digest(data)
expect(1, data, "string")
-- Pad input.
local bitlen = #data * 8
local padlen = -(#data + 17) % 128
data = data .. "\x80" .. ("\0"):rep(padlen) .. (">I16"):pack(bitlen)
local dataWords = {(">" .. ("I4"):rep(#data / 4)):unpack(data)}
dataWords[#dataWords] = nil
-- Initialize state.
local h01, h00 = 0x6a09e667, 0xf3bcc908
local h11, h10 = 0xbb67ae85, 0x84caa73b
local h21, h20 = 0x3c6ef372, 0xfe94f82b
local h31, h30 = 0xa54ff53a, 0x5f1d36f1
local h41, h40 = 0x510e527f, 0xade682d1
local h51, h50 = 0x9b05688c, 0x2b3e6c1f
local h61, h60 = 0x1f83d9ab, 0xfb41bd6b
local h71, h70 = 0x5be0cd19, 0x137e2179
-- Digest.
local w = {}
for i = 1, #dataWords, 32 do
local index = i - 1
for j = 1, 32 do
w[j] = dataWords[index + j]
end
-- Message schedule.
for j = 33, 160, 2 do
local wf1, wf0 = w[j - 30], w[j - 29]
local t1 = shr(wf1, 1) + shl(wf0, 31)
local t0 = shr(wf0, 1) + shl(wf1, 31)
local u1 = shr(wf1, 8) + shl(wf0, 24)
local u0 = shr(wf0, 8) + shl(wf1, 24)
local v1 = shr(wf1, 7)
local v0 = shr(wf0, 7) + shl(wf1, 25)
local w21, w20 = w[j - 4], w[j - 3]
local w1 = shr(w21, 19) + shl(w20, 13)
local w0 = shr(w20, 19) + shl(w21, 13)
local x0 = shr(w21, 29) + shl(w20, 3)
local x1 = shr(w20, 29) + shl(w21, 3)
local y1 = shr(w21, 6)
local y0 = shr(w20, 6) + shl(w21, 26)
local r1, r0 =
w[j - 32] + bxor(t1, u1, v1) + w[j - 14] + bxor(w1, x1, y1),
w[j - 31] + bxor(t0, u0, v0) + w[j - 13] + bxor(w0, x0, y0)
w[j], w[j + 1] = carry64(r1, r0)
end
-- Block function.
local a1, a0 = h01, h00
local b1, b0 = h11, h10
local c1, c0 = h21, h20
local d1, d0 = h31, h30
local e1, e0 = h41, h40
local f1, f0 = h51, h50
local g1, g0 = h61, h60
local h1, h0 = h71, h70
for j = 1, 160, 2 do
local t1 = shr(e1, 14) + shl(e0, 18)
local t0 = shr(e0, 14) + shl(e1, 18)
local u1 = shr(e1, 18) + shl(e0, 14)
local u0 = shr(e0, 18) + shl(e1, 14)
local v0 = shr(e1, 9) + shl(e0, 23)
local v1 = shr(e0, 9) + shl(e1, 23)
local s11 = bxor(t1, u1, v1)
local s10 = bxor(t0, u0, v0)
local ch1 = bxor(band(e1, f1), band(bnot(e1), g1))
local ch0 = bxor(band(e0, f0), band(bnot(e0), g0))
local temp11 = h1 + s11 + ch1 + K[j] + w[j]
local temp10 = h0 + s10 + ch0 + K[j + 1] + w[j + 1]
local w1 = shr(a1, 28) + shl(a0, 4)
local w0 = shr(a0, 28) + shl(a1, 4)
local x0 = shr(a1, 2) + shl(a0, 30)
local x1 = shr(a0, 2) + shl(a1, 30)
local y0 = shr(a1, 7) + shl(a0, 25)
local y1 = shr(a0, 7) + shl(a1, 25)
local s01 = bxor(w1, x1, y1)
local s00 = bxor(w0, x0, y0)
local maj1 = bxor(band(a1, b1), band(a1, c1), band(b1, c1))
local maj0 = bxor(band(a0, b0), band(a0, c0), band(b0, c0))
local temp21 = s01 + maj1
local temp20 = s00 + maj0
h1 = g1 h0 = g0
g1 = f1 g0 = f0
f1 = e1 f0 = e0
e1, e0 = carry64(d1 + temp11, d0 + temp10)
d1 = c1 d0 = c0
c1 = b1 c0 = b0
b1 = a1 b0 = a0
a1, a0 = carry64(temp11 + temp21, temp10 + temp20)
end
h01, h00 = carry64(h01 + a1, h00 + a0)
h11, h10 = carry64(h11 + b1, h10 + b0)
h21, h20 = carry64(h21 + c1, h20 + c0)
h31, h30 = carry64(h31 + d1, h30 + d0)
h41, h40 = carry64(h41 + e1, h40 + e0)
h51, h50 = carry64(h51 + f1, h50 + f0)
h61, h60 = carry64(h61 + g1, h60 + g0)
h71, h70 = carry64(h71 + h1, h70 + h0)
end
return (">I4I4I4I4I4I4I4I4I4I4I4I4I4I4I4I4"):pack(
h01, h00, h11, h10, h21, h20, h31, h30,
h41, h40, h51, h50, h61, h60, h71, h70
)
end
return {
digest = digest,
}