Botan 3.1.1
Crypto and TLS for C&
mceliece_key.cpp
Go to the documentation of this file.
1/*
2 * (C) Copyright Projet SECRET, INRIA, Rocquencourt
3 * (C) Bhaskar Biswas and Nicolas Sendrier
4 *
5 * (C) 2014 cryptosource GmbH
6 * (C) 2014 Falko Strenzke fstrenzke@cryptosource.de
7 * (C) 2015 Jack Lloyd
8 *
9 * Botan is released under the Simplified BSD License (see license.txt)
10 *
11 */
12
13#include <botan/mceliece.h>
14
15#include <botan/ber_dec.h>
16#include <botan/der_enc.h>
17#include <botan/rng.h>
18#include <botan/internal/bit_ops.h>
19#include <botan/internal/code_based_util.h>
20#include <botan/internal/loadstor.h>
21#include <botan/internal/mce_internal.h>
22#include <botan/internal/pk_ops_impl.h>
23#include <botan/internal/polyn_gf2m.h>
24
25namespace Botan {
26
27McEliece_PrivateKey::McEliece_PrivateKey(const McEliece_PrivateKey&) = default;
28McEliece_PrivateKey::McEliece_PrivateKey(McEliece_PrivateKey&&) noexcept = default;
29McEliece_PrivateKey& McEliece_PrivateKey::operator=(const McEliece_PrivateKey&) = default;
30McEliece_PrivateKey& McEliece_PrivateKey::operator=(McEliece_PrivateKey&&) noexcept = default;
31McEliece_PrivateKey::~McEliece_PrivateKey() = default;
32
34 const std::vector<uint32_t>& parity_check_matrix_coeffs,
35 const std::vector<polyn_gf2m>& square_root_matrix,
36 const std::vector<gf2m>& inverse_support,
37 const std::vector<uint8_t>& public_matrix) :
38 McEliece_PublicKey(public_matrix, goppa_polyn.get_degree(), inverse_support.size()),
39 m_g{goppa_polyn},
40 m_sqrtmod(square_root_matrix),
41 m_Linv(inverse_support),
42 m_coeffs(parity_check_matrix_coeffs),
43 m_codimension(static_cast<size_t>(ceil_log2(inverse_support.size())) * goppa_polyn.get_degree()),
44 m_dimension(inverse_support.size() - m_codimension) {}
45
47 uint32_t ext_deg = ceil_log2(code_length);
48 *this = generate_mceliece_key(rng, ext_deg, code_length, t);
49}
50
52 return m_g[0];
53}
54
56 size_t codimension = ceil_log2(m_code_length) * m_t;
57 return m_code_length - codimension;
58}
59
61 const size_t bits = get_message_word_bit_length();
62
63 secure_vector<uint8_t> plaintext((bits + 7) / 8);
64 rng.randomize(plaintext.data(), plaintext.size());
65
66 // unset unused bits in the last plaintext byte
67 if(uint32_t used = bits % 8) {
68 const uint8_t mask = (1 << used) - 1;
69 plaintext[plaintext.size() - 1] &= mask;
70 }
71
72 return plaintext;
73}
74
77}
78
79std::vector<uint8_t> McEliece_PublicKey::public_key_bits() const {
80 std::vector<uint8_t> output;
81 DER_Encoder(output)
84 .encode(static_cast<size_t>(get_code_length()))
85 .encode(static_cast<size_t>(get_t()))
86 .end_cons()
88 .end_cons();
89 return output;
90}
91
93 return m_code_length;
94}
95
98}
99
100McEliece_PublicKey::McEliece_PublicKey(std::span<const uint8_t> key_bits) {
101 BER_Decoder dec(key_bits);
102 size_t n;
103 size_t t;
104 dec.start_sequence()
106 .decode(n)
107 .decode(t)
108 .end_cons()
110 .end_cons();
111 m_t = t;
112 m_code_length = n;
113}
114
116 DER_Encoder enc;
117 enc.start_sequence()
119 .encode(static_cast<size_t>(get_code_length()))
120 .encode(static_cast<size_t>(get_t()))
121 .end_cons()
123 .encode(m_g[0].encode(), ASN1_Type::OctetString); // g as octet string
124 enc.start_sequence();
125 for(size_t i = 0; i < m_sqrtmod.size(); i++) {
126 enc.encode(m_sqrtmod[i].encode(), ASN1_Type::OctetString);
127 }
128 enc.end_cons();
129 secure_vector<uint8_t> enc_support;
130
131 for(uint16_t Linv : m_Linv) {
132 enc_support.push_back(get_byte<0>(Linv));
133 enc_support.push_back(get_byte<1>(Linv));
134 }
135 enc.encode(enc_support, ASN1_Type::OctetString);
137 for(uint32_t coef : m_coeffs) {
138 enc_H.push_back(get_byte<0>(coef));
139 enc_H.push_back(get_byte<1>(coef));
140 enc_H.push_back(get_byte<2>(coef));
141 enc_H.push_back(get_byte<3>(coef));
142 }
143 enc.encode(enc_H, ASN1_Type::OctetString);
144 enc.end_cons();
145 return enc.get_contents();
146}
147
148bool McEliece_PrivateKey::check_key(RandomNumberGenerator& rng, bool /*unused*/) const {
149 const secure_vector<uint8_t> plaintext = this->random_plaintext_element(rng);
150
151 secure_vector<uint8_t> ciphertext;
153 mceliece_encrypt(ciphertext, errors, plaintext, *this, rng);
154
155 secure_vector<uint8_t> plaintext_out;
156 secure_vector<uint8_t> errors_out;
157 mceliece_decrypt(plaintext_out, errors_out, ciphertext, *this);
158
159 if(errors != errors_out || plaintext != plaintext_out) {
160 return false;
161 }
162
163 return true;
164}
165
166McEliece_PrivateKey::McEliece_PrivateKey(std::span<const uint8_t> key_bits) {
167 size_t n, t;
169 BER_Decoder dec_base(key_bits);
170 BER_Decoder dec = dec_base.start_sequence()
172 .decode(n)
173 .decode(t)
174 .end_cons()
177
178 if(t == 0 || n == 0) {
179 throw Decoding_Error("invalid McEliece parameters");
180 }
181
182 uint32_t ext_deg = ceil_log2(n);
183 m_code_length = n;
184 m_t = t;
185 m_codimension = (ext_deg * t);
186 m_dimension = (n - m_codimension);
187
188 auto sp_field = std::make_shared<GF2m_Field>(ext_deg);
189 m_g = {polyn_gf2m(enc_g, sp_field)};
190 if(m_g[0].get_degree() != static_cast<int>(t)) {
191 throw Decoding_Error("degree of decoded Goppa polynomial is incorrect");
192 }
193 BER_Decoder dec2 = dec.start_sequence();
194 for(uint32_t i = 0; i < t / 2; i++) {
195 secure_vector<uint8_t> sqrt_enc;
196 dec2.decode(sqrt_enc, ASN1_Type::OctetString);
197 while(sqrt_enc.size() < (t * 2)) {
198 // ensure that the length is always t
199 sqrt_enc.push_back(0);
200 sqrt_enc.push_back(0);
201 }
202 if(sqrt_enc.size() != t * 2) {
203 throw Decoding_Error("length of square root polynomial entry is too large");
204 }
205 m_sqrtmod.push_back(polyn_gf2m(sqrt_enc, sp_field));
206 }
207 secure_vector<uint8_t> enc_support;
208 BER_Decoder dec3 = dec2.end_cons().decode(enc_support, ASN1_Type::OctetString);
209 if(enc_support.size() % 2) {
210 throw Decoding_Error("encoded support has odd length");
211 }
212 if(enc_support.size() / 2 != n) {
213 throw Decoding_Error("encoded support has length different from code length");
214 }
215 for(uint32_t i = 0; i < n * 2; i += 2) {
216 gf2m el = (enc_support[i] << 8) | enc_support[i + 1];
217 m_Linv.push_back(el);
218 }
221 if(enc_H.size() % 4) {
222 throw Decoding_Error("encoded parity check matrix has length which is not a multiple of four");
223 }
224 if(enc_H.size() / 4 != bit_size_to_32bit_size(m_codimension) * m_code_length) {
225 throw Decoding_Error("encoded parity check matrix has wrong length");
226 }
227
228 for(uint32_t i = 0; i < enc_H.size(); i += 4) {
229 uint32_t coeff = (enc_H[i] << 24) | (enc_H[i + 1] << 16) | (enc_H[i + 2] << 8) | enc_H[i + 3];
230 m_coeffs.push_back(coeff);
231 }
232}
233
235 if(*static_cast<const McEliece_PublicKey*>(this) != *static_cast<const McEliece_PublicKey*>(&other)) {
236 return false;
237 }
238 if(m_g != other.m_g) {
239 return false;
240 }
241
242 if(m_sqrtmod != other.m_sqrtmod) {
243 return false;
244 }
245 if(m_Linv != other.m_Linv) {
246 return false;
247 }
248 if(m_coeffs != other.m_coeffs) {
249 return false;
250 }
251
252 if(m_codimension != other.m_codimension || m_dimension != other.m_dimension) {
253 return false;
254 }
255
256 return true;
257}
258
259std::unique_ptr<Public_Key> McEliece_PrivateKey::public_key() const {
260 return std::make_unique<McEliece_PublicKey>(get_public_matrix(), get_t(), get_code_length());
261}
262
264 if(m_public_matrix != other.m_public_matrix) {
265 return false;
266 }
267 if(m_t != other.m_t) {
268 return false;
269 }
270 if(m_code_length != other.m_code_length) {
271 return false;
272 }
273 return true;
274}
275
276namespace {
277
278class MCE_KEM_Encryptor final : public PK_Ops::KEM_Encryption_with_KDF {
279 public:
280 MCE_KEM_Encryptor(const McEliece_PublicKey& key, std::string_view kdf) :
281 KEM_Encryption_with_KDF(kdf), m_key(key) {}
282
283 private:
284 size_t raw_kem_shared_key_length() const override {
285 const size_t err_sz = (m_key.get_code_length() + 7) / 8;
286 const size_t ptext_sz = (m_key.get_message_word_bit_length() + 7) / 8;
287 return ptext_sz + err_sz;
288 }
289
290 size_t encapsulated_key_length() const override { return (m_key.get_code_length() + 7) / 8; }
291
292 void raw_kem_encrypt(secure_vector<uint8_t>& out_encapsulated_key,
293 secure_vector<uint8_t>& raw_shared_key,
294 RandomNumberGenerator& rng) override {
295 secure_vector<uint8_t> plaintext = m_key.random_plaintext_element(rng);
296
297 secure_vector<uint8_t> ciphertext, error_mask;
298 mceliece_encrypt(ciphertext, error_mask, plaintext, m_key, rng);
299
300 raw_shared_key.clear();
301 raw_shared_key += plaintext;
302 raw_shared_key += error_mask;
303
304 out_encapsulated_key.swap(ciphertext);
305 }
306
307 const McEliece_PublicKey& m_key;
308};
309
310class MCE_KEM_Decryptor final : public PK_Ops::KEM_Decryption_with_KDF {
311 public:
312 MCE_KEM_Decryptor(const McEliece_PrivateKey& key, std::string_view kdf) :
313 KEM_Decryption_with_KDF(kdf), m_key(key) {}
314
315 private:
316 size_t raw_kem_shared_key_length() const override {
317 const size_t err_sz = (m_key.get_code_length() + 7) / 8;
318 const size_t ptext_sz = (m_key.get_message_word_bit_length() + 7) / 8;
319 return ptext_sz + err_sz;
320 }
321
322 secure_vector<uint8_t> raw_kem_decrypt(const uint8_t encap_key[], size_t len) override {
323 secure_vector<uint8_t> plaintext, error_mask;
324 mceliece_decrypt(plaintext, error_mask, encap_key, len, m_key);
325
326 secure_vector<uint8_t> output;
327 output.reserve(plaintext.size() + error_mask.size());
328 output.insert(output.end(), plaintext.begin(), plaintext.end());
329 output.insert(output.end(), error_mask.begin(), error_mask.end());
330 return output;
331 }
332
333 const McEliece_PrivateKey& m_key;
334};
335
336} // namespace
337
338std::unique_ptr<PK_Ops::KEM_Encryption> McEliece_PublicKey::create_kem_encryption_op(std::string_view params,
339 std::string_view provider) const {
340 if(provider == "base" || provider.empty()) {
341 return std::make_unique<MCE_KEM_Encryptor>(*this, params);
342 }
343 throw Provider_Not_Found(algo_name(), provider);
344}
345
346std::unique_ptr<PK_Ops::KEM_Decryption> McEliece_PrivateKey::create_kem_decryption_op(RandomNumberGenerator& /*rng*/,
347 std::string_view params,
348 std::string_view provider) const {
349 if(provider == "base" || provider.empty()) {
350 return std::make_unique<MCE_KEM_Decryptor>(*this, params);
351 }
352 throw Provider_Not_Found(algo_name(), provider);
353}
354
355} // namespace Botan
virtual OID object_identifier() const
Definition: pk_keys.cpp:22
void push_back(const BER_Object &obj)
Definition: ber_dec.cpp:272
BER_Decoder & decode(bool &out)
Definition: ber_dec.h:173
BER_Decoder & end_cons()
Definition: ber_dec.cpp:295
BER_Decoder start_sequence()
Definition: ber_dec.h:112
secure_vector< uint8_t > get_contents()
Definition: der_enc.cpp:132
DER_Encoder & start_sequence()
Definition: der_enc.h:65
DER_Encoder & end_cons()
Definition: der_enc.cpp:171
DER_Encoder & encode(bool b)
Definition: der_enc.cpp:250
secure_vector< uint8_t > private_key_bits() const override
McEliece_PrivateKey(RandomNumberGenerator &rng, size_t code_length, size_t t)
std::unique_ptr< Public_Key > public_key() const override
std::unique_ptr< PK_Ops::KEM_Decryption > create_kem_decryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
const polyn_gf2m & get_goppa_polyn() const
bool operator==(const McEliece_PrivateKey &other) const
bool check_key(RandomNumberGenerator &rng, bool strong) const override
secure_vector< uint8_t > random_plaintext_element(RandomNumberGenerator &rng) const
size_t get_message_word_bit_length() const
size_t get_t() const
Definition: mceliece.h:47
std::unique_ptr< PK_Ops::KEM_Encryption > create_kem_encryption_op(std::string_view params, std::string_view provider) const override
std::string algo_name() const override
Definition: mceliece.h:36
std::vector< uint8_t > public_key_bits() const override
std::vector< uint8_t > m_public_matrix
Definition: mceliece.h:69
const std::vector< uint8_t > & get_public_matrix() const
Definition: mceliece.h:53
size_t estimated_strength() const override
size_t get_code_length() const
Definition: mceliece.h:49
bool operator==(const McEliece_PublicKey &other) const
AlgorithmIdentifier algorithm_identifier() const override
size_t key_length() const override
void randomize(std::span< uint8_t > output)
Definition: rng.h:52
int(* final)(unsigned char *, CTX *)
Definition: alg_id.cpp:13
void mceliece_decrypt(secure_vector< uint8_t > &plaintext_out, secure_vector< uint8_t > &error_mask_out, const secure_vector< uint8_t > &ciphertext, const McEliece_PrivateKey &key)
Definition: goppa_code.cpp:116
void mceliece_encrypt(secure_vector< uint8_t > &ciphertext_out, secure_vector< uint8_t > &error_mask_out, const secure_vector< uint8_t > &plaintext, const McEliece_PublicKey &key, RandomNumberGenerator &rng)
Definition: mceliece.cpp:108
McEliece_PrivateKey generate_mceliece_key(RandomNumberGenerator &rng, size_t ext_deg, size_t code_length, size_t t)
size_t mceliece_work_factor(size_t n, size_t t)
size_t bit_size_to_32bit_size(size_t bit_size)
std::vector< T, secure_allocator< T > > secure_vector
Definition: secmem.h:61
constexpr uint8_t ceil_log2(T x)
Definition: bit_ops.h:122
uint16_t gf2m
Definition: gf2m_small_m.h:20
Definition: bigint.h:1030