Botan 3.4.0
Crypto and TLS for C&
dsa.cpp
Go to the documentation of this file.
1/*
2* DSA
3* (C) 1999-2010,2014,2016,2023 Jack Lloyd
4* (C) 2016 René Korthaus
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/dsa.h>
10
11#include <botan/numthry.h>
12#include <botan/internal/divide.h>
13#include <botan/internal/dl_scheme.h>
14#include <botan/internal/keypair.h>
15#include <botan/internal/pk_ops_impl.h>
16
17#if defined(BOTAN_HAS_RFC6979_GENERATOR)
18 #include <botan/internal/rfc6979.h>
19#endif
20
21namespace Botan {
22
24 return m_public_key->group().q_bytes();
25}
26
28 return m_public_key->estimated_strength();
29}
30
32 return m_public_key->p_bits();
33}
34
35const BigInt& DSA_PublicKey::get_int_field(std::string_view field) const {
36 return m_public_key->get_int_field(algo_name(), field);
37}
38
42
43std::vector<uint8_t> DSA_PublicKey::public_key_bits() const {
44 return m_public_key->DER_encode();
45}
46
47bool DSA_PublicKey::check_key(RandomNumberGenerator& rng, bool strong) const {
48 return m_public_key->check_key(rng, strong);
49}
50
51std::unique_ptr<Private_Key> DSA_PublicKey::generate_another(RandomNumberGenerator& rng) const {
52 return std::make_unique<DSA_PrivateKey>(rng, m_public_key->group());
53}
54
55DSA_PublicKey::DSA_PublicKey(const AlgorithmIdentifier& alg_id, std::span<const uint8_t> key_bits) {
56 m_public_key = std::make_shared<DL_PublicKey>(alg_id, key_bits, DL_Group_Format::ANSI_X9_57);
57
58 BOTAN_ARG_CHECK(m_public_key->group().has_q(), "Q parameter must be set for DSA");
59}
60
61DSA_PublicKey::DSA_PublicKey(const DL_Group& group, const BigInt& y) {
62 m_public_key = std::make_shared<DL_PublicKey>(group, y);
63
64 BOTAN_ARG_CHECK(m_public_key->group().has_q(), "Q parameter must be set for DSA");
65}
66
68 BOTAN_ARG_CHECK(group.has_q(), "Q parameter must be set for DSA");
69
70 m_private_key = std::make_shared<DL_PrivateKey>(group, rng);
71 m_public_key = m_private_key->public_key();
72}
73
75 BOTAN_ARG_CHECK(group.has_q(), "Q parameter must be set for DSA");
76
77 m_private_key = std::make_shared<DL_PrivateKey>(group, x);
78 m_public_key = m_private_key->public_key();
79}
80
81DSA_PrivateKey::DSA_PrivateKey(const AlgorithmIdentifier& alg_id, std::span<const uint8_t> key_bits) {
82 m_private_key = std::make_shared<DL_PrivateKey>(alg_id, key_bits, DL_Group_Format::ANSI_X9_57);
83 m_public_key = m_private_key->public_key();
84
85 BOTAN_ARG_CHECK(m_private_key->group().has_q(), "Q parameter must be set for DSA");
86}
87
88bool DSA_PrivateKey::check_key(RandomNumberGenerator& rng, bool strong) const {
89 if(!m_private_key->check_key(rng, strong)) {
90 return false;
91 }
92
93 if(m_private_key->private_key() >= m_private_key->group().get_q()) {
94 return false;
95 }
96
97 return KeyPair::signature_consistency_check(rng, *this, "SHA-256");
98}
99
101 return m_private_key->DER_encode();
102}
103
105 return m_private_key->raw_private_key_bits();
106}
107
108const BigInt& DSA_PrivateKey::get_int_field(std::string_view field) const {
109 return m_private_key->get_int_field(algo_name(), field);
110}
111
112std::unique_ptr<Public_Key> DSA_PrivateKey::public_key() const {
113 // can't use make_unique here due to private constructor
114 return std::unique_ptr<DSA_PublicKey>(new DSA_PublicKey(m_public_key));
115}
116
117namespace {
118
119/**
120* Object that can create a DSA signature
121*/
122class DSA_Signature_Operation final : public PK_Ops::Signature_with_Hash {
123 public:
124 DSA_Signature_Operation(const std::shared_ptr<const DL_PrivateKey>& key,
125 std::string_view emsa,
127 PK_Ops::Signature_with_Hash(emsa), m_key(key) {
128 m_b = BigInt::random_integer(rng, 2, m_key->group().get_q());
129 m_b_inv = m_key->group().inverse_mod_q(m_b);
130 }
131
132 size_t signature_length() const override { return 2 * m_key->group().q_bytes(); }
133
134 secure_vector<uint8_t> raw_sign(const uint8_t msg[], size_t msg_len, RandomNumberGenerator& rng) override;
135
136 AlgorithmIdentifier algorithm_identifier() const override;
137
138 private:
139 std::shared_ptr<const DL_PrivateKey> m_key;
140 BigInt m_b, m_b_inv;
141};
142
143AlgorithmIdentifier DSA_Signature_Operation::algorithm_identifier() const {
144 const std::string full_name = "DSA/" + hash_function();
145 const OID oid = OID::from_string(full_name);
146 return AlgorithmIdentifier(oid, AlgorithmIdentifier::USE_EMPTY_PARAM);
147}
148
149secure_vector<uint8_t> DSA_Signature_Operation::raw_sign(const uint8_t msg[],
150 size_t msg_len,
151 RandomNumberGenerator& rng) {
152 const DL_Group& group = m_key->group();
153 const BigInt& q = group.get_q();
154
155 BigInt m = BigInt::from_bytes_with_max_bits(msg, msg_len, group.q_bits());
156
157 if(m >= q) {
158 m -= q;
159 }
160
161#if defined(BOTAN_HAS_RFC6979_GENERATOR)
162 BOTAN_UNUSED(rng);
163 const BigInt k = generate_rfc6979_nonce(m_key->private_key(), q, m, this->rfc6979_hash_function());
164#else
165 const BigInt k = BigInt::random_integer(rng, 1, q);
166#endif
167
168 const BigInt k_inv = group.inverse_mod_q(k);
169
170 /*
171 * It may not be strictly necessary for the reduction (g^k mod p) mod q to be
172 * const time, since r is published as part of the signature, and deriving
173 * anything useful about k from g^k mod p would seem to require computing a
174 * discrete logarithm.
175 *
176 * However it only increases the cost of signatures by about 7-10%, and DSA is
177 * only for legacy use anyway so we don't care about the performance so much.
178 */
179 const BigInt r = ct_modulo(group.power_g_p(k, group.q_bits()), group.get_q());
180
181 /*
182 * Blind the input message and compute x*r+m as (x*r*b + m*b)/b
183 */
184 m_b = group.square_mod_q(m_b);
185 m_b_inv = group.square_mod_q(m_b_inv);
186
187 m = group.multiply_mod_q(m_b, m);
188 const BigInt xr = group.multiply_mod_q(m_b, m_key->private_key(), r);
189
190 const BigInt s = group.multiply_mod_q(m_b_inv, k_inv, group.mod_q(xr + m));
191
192 // With overwhelming probability, a bug rather than actual zero r/s
193 if(r.is_zero() || s.is_zero()) {
194 throw Internal_Error("Computed zero r/s during DSA signature");
195 }
196
197 return BigInt::encode_fixed_length_int_pair(r, s, q.bytes());
198}
199
200/**
201* Object that can verify a DSA signature
202*/
203class DSA_Verification_Operation final : public PK_Ops::Verification_with_Hash {
204 public:
205 DSA_Verification_Operation(const std::shared_ptr<const DL_PublicKey>& key, std::string_view emsa) :
206 PK_Ops::Verification_with_Hash(emsa), m_key(key) {}
207
208 DSA_Verification_Operation(const std::shared_ptr<const DL_PublicKey>& key, const AlgorithmIdentifier& alg_id) :
209 PK_Ops::Verification_with_Hash(alg_id, "DSA"), m_key(key) {}
210
211 bool verify(const uint8_t msg[], size_t msg_len, const uint8_t sig[], size_t sig_len) override;
212
213 private:
214 std::shared_ptr<const DL_PublicKey> m_key;
215};
216
217bool DSA_Verification_Operation::verify(const uint8_t msg[], size_t msg_len, const uint8_t sig[], size_t sig_len) {
218 const auto group = m_key->group();
219
220 const BigInt& q = group.get_q();
221 const size_t q_bytes = q.bytes();
222
223 if(sig_len != 2 * q_bytes) {
224 return false;
225 }
226
227 BigInt r(sig, q_bytes);
228 BigInt s(sig + q_bytes, q_bytes);
229 BigInt i = BigInt::from_bytes_with_max_bits(msg, msg_len, group.q_bits());
230 if(i >= q) {
231 i -= q;
232 }
233
234 if(r <= 0 || r >= q || s <= 0 || s >= q) {
235 return false;
236 }
237
238 s = inverse_mod(s, q);
239
240 const BigInt sr = group.multiply_mod_q(s, r);
241 const BigInt si = group.multiply_mod_q(s, i);
242
243 s = group.multi_exponentiate(si, m_key->public_key(), sr);
244
245 // s is too big for Barrett, and verification doesn't need to be const-time
246 return (s % group.get_q() == r);
247}
248
249} // namespace
250
251std::unique_ptr<PK_Ops::Verification> DSA_PublicKey::create_verification_op(std::string_view params,
252 std::string_view provider) const {
253 if(provider == "base" || provider.empty()) {
254 return std::make_unique<DSA_Verification_Operation>(this->m_public_key, params);
255 }
256 throw Provider_Not_Found(algo_name(), provider);
257}
258
259std::unique_ptr<PK_Ops::Verification> DSA_PublicKey::create_x509_verification_op(
260 const AlgorithmIdentifier& signature_algorithm, std::string_view provider) const {
261 if(provider == "base" || provider.empty()) {
262 return std::make_unique<DSA_Verification_Operation>(this->m_public_key, signature_algorithm);
263 }
264
265 throw Provider_Not_Found(algo_name(), provider);
266}
267
268std::unique_ptr<PK_Ops::Signature> DSA_PrivateKey::create_signature_op(RandomNumberGenerator& rng,
269 std::string_view params,
270 std::string_view provider) const {
271 if(provider == "base" || provider.empty()) {
272 return std::make_unique<DSA_Signature_Operation>(this->m_private_key, params, rng);
273 }
274 throw Provider_Not_Found(algo_name(), provider);
275}
276
277} // namespace Botan
#define BOTAN_UNUSED
Definition assert.h:118
#define BOTAN_ARG_CHECK(expr, msg)
Definition assert.h:29
virtual OID object_identifier() const
Definition pk_keys.cpp:22
static BigInt random_integer(RandomNumberGenerator &rng, const BigInt &min, const BigInt &max)
Definition big_rand.cpp:43
bool has_q() const
Definition dl_group.cpp:448
secure_vector< uint8_t > private_key_bits() const override
Definition dsa.cpp:100
bool check_key(RandomNumberGenerator &rng, bool strong) const override
Definition dsa.cpp:88
std::unique_ptr< PK_Ops::Signature > create_signature_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
Definition dsa.cpp:268
secure_vector< uint8_t > raw_private_key_bits() const override
Definition dsa.cpp:104
std::unique_ptr< Public_Key > public_key() const override
Definition dsa.cpp:112
const BigInt & get_int_field(std::string_view field) const override
Definition dsa.cpp:108
size_t estimated_strength() const override
Definition dsa.cpp:27
size_t message_part_size() const override
Definition dsa.cpp:23
std::unique_ptr< PK_Ops::Verification > create_x509_verification_op(const AlgorithmIdentifier &signature_algorithm, std::string_view provider) const override
Definition dsa.cpp:259
friend class DSA_PrivateKey
Definition dsa.h:67
bool check_key(RandomNumberGenerator &rng, bool strong) const override
Definition dsa.cpp:47
std::vector< uint8_t > public_key_bits() const override
Definition dsa.cpp:43
AlgorithmIdentifier algorithm_identifier() const override
Definition dsa.cpp:39
const BigInt & get_int_field(std::string_view field) const override
Definition dsa.cpp:35
std::string algo_name() const override
Definition dsa.h:42
std::unique_ptr< Private_Key > generate_another(RandomNumberGenerator &rng) const final
Definition dsa.cpp:51
size_t key_length() const override
Definition dsa.cpp:31
std::unique_ptr< PK_Ops::Verification > create_verification_op(std::string_view params, std::string_view provider) const override
Definition dsa.cpp:251
int(* final)(unsigned char *, CTX *)
bool signature_consistency_check(RandomNumberGenerator &rng, const Private_Key &private_key, const Public_Key &public_key, std::string_view padding)
Definition keypair.cpp:49
BigInt generate_rfc6979_nonce(const BigInt &x, const BigInt &q, const BigInt &h, std::string_view hash)
Definition rfc6979.cpp:43
BigInt ct_modulo(const BigInt &x, const BigInt &y)
Definition divide.cpp:117
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:61
BigInt inverse_mod(const BigInt &n, const BigInt &mod)
Definition mod_inv.cpp:178