10#include <botan/ber_dec.h>
11#include <botan/der_enc.h>
12#include <botan/numthry.h>
13#include <botan/pss_params.h>
14#include <botan/internal/barrett.h>
15#include <botan/internal/blinding.h>
16#include <botan/internal/divide.h>
17#include <botan/internal/fmt.h>
18#include <botan/internal/keypair.h>
19#include <botan/internal/mod_inv.h>
20#include <botan/internal/monty.h>
21#include <botan/internal/monty_exp.h>
22#include <botan/internal/mp_core.h>
23#include <botan/internal/parsing.h>
24#include <botan/internal/pk_ops_impl.h>
25#include <botan/internal/sig_padding.h>
26#include <botan/internal/target_info.h>
27#include <botan/internal/workfactor.h>
29#if defined(BOTAN_HAS_THREAD_UTILS)
30 #include <botan/internal/thread_pool.h>
35class RSA_Public_Data final {
37 RSA_Public_Data(BigInt&& n, BigInt&& e) :
40 m_mod_n(Barrett_Reduction::for_public_modulus(m_n)),
41 m_monty_n(m_n, m_mod_n),
42 m_public_modulus_bits(m_n.bits()),
43 m_public_modulus_bytes(m_n.bytes()) {}
45 BigInt public_op(
const BigInt& m)
const {
46 const size_t powm_window = 1;
51 const BigInt& get_n()
const {
return m_n; }
53 const BigInt& get_e()
const {
return m_e; }
55 size_t public_modulus_bits()
const {
return m_public_modulus_bits; }
57 size_t public_modulus_bytes()
const {
return m_public_modulus_bytes; }
59 const Montgomery_Params& monty_n()
const {
return m_monty_n; }
61 const Barrett_Reduction& reducer_mod_n()
const {
return m_mod_n; }
66 Barrett_Reduction m_mod_n;
67 const Montgomery_Params m_monty_n;
68 size_t m_public_modulus_bits;
69 size_t m_public_modulus_bytes;
72class RSA_Private_Data final {
74 RSA_Private_Data(BigInt&& d, BigInt&& p, BigInt&& q, BigInt&& d1, BigInt&& d2, BigInt&& c) :
83 m_c_monty(m_monty_p, m_c),
85 m_q_bits(m_q.bits()) {}
87 const BigInt& get_d()
const {
return m_d; }
89 const BigInt& get_p()
const {
return m_p; }
91 const BigInt& get_q()
const {
return m_q; }
93 const BigInt& get_d1()
const {
return m_d1; }
95 const BigInt& get_d2()
const {
return m_d2; }
97 BigInt blinded_d1(
const BigInt& m)
const {
return m_d1 + m * (m_p - 1); }
99 BigInt blinded_d2(
const BigInt& m)
const {
return m_d2 + m * (m_q - 1); }
101 const BigInt& get_c()
const {
return m_c; }
103 const Montgomery_Int& get_c_monty()
const {
return m_c_monty; }
105 const Montgomery_Params& monty_p()
const {
return m_monty_p; }
107 const Montgomery_Params& monty_q()
const {
return m_monty_q; }
109 size_t p_bits()
const {
return m_p_bits; }
111 size_t q_bits()
const {
return m_q_bits; }
113 bool primes_imbalanced()
const {
return p_bits() != q_bits(); }
123 const Montgomery_Params m_monty_p;
124 const Montgomery_Params m_monty_q;
125 Montgomery_Int m_c_monty;
137 }
else if(field ==
"e") {
145 return std::make_unique<RSA_PrivateKey>(rng,
m_public->public_modulus_bits(), 65537);
157 if(n.signum() <= 0 || n.is_even() || n.bits() < 384 || n.bits() > 16384) {
160 if(e.is_even() || e <= 1 || e >= n || e.bits() > 256) {
163 m_public = std::make_shared<RSA_Public_Data>(std::move(n), std::move(e));
171 init(std::move(n), std::move(e));
182 init(std::move(n), std::move(e));
186 return m_public->public_modulus_bits();
198 throw Not_Implemented(
"an RSA public key does not provide a raw binary representation.");
202 std::vector<uint8_t> output;
226 .
encode(
static_cast<size_t>(0))
240 return m_private->get_p();
244 return m_private->get_q();
248 return m_private->get_d();
252 return m_private->get_c();
256 return m_private->get_d1();
260 return m_private->get_d2();
264 if(d < 2 || p < 3 || q < 3 || p == q) {
267 if(p * q !=
get_n()) {
268 throw Decoding_Error(
"Invalid RSA private key: p * q != n");
270 m_private = std::make_shared<RSA_Private_Data>(
271 std::move(d), std::move(p), std::move(q), std::move(d1), std::move(d2), std::move(c));
300 RSA_PrivateKey::init(std::move(d), std::move(p), std::move(q), std::move(d1), std::move(d2), std::move(c));
316 const BigInt p_minus_1 = p - 1;
317 const BigInt q_minus_1 = q - 1;
320 const BigInt phi_n =
lcm(p_minus_1, q_minus_1);
330 RSA_PrivateKey::init(std::move(d), std::move(p), std::move(q), std::move(d1), std::move(d2), std::move(c));
337 constexpr size_t MIN_RSA_BITS = 1024;
338 constexpr size_t MAX_RSA_BITS = 16384;
339 constexpr size_t MOD_RSA_BITS = 8;
341 if(bits < MIN_RSA_BITS) {
342 throw Invalid_Argument(
fmt(
"Cannot create an RSA key of {} bits: must be at least {} bits", bits, MIN_RSA_BITS));
343 }
else if(bits > MAX_RSA_BITS) {
345 fmt(
"Cannot create an RSA key of {} bits: must be no more than {} bits", bits, MAX_RSA_BITS));
346 }
else if(bits % MOD_RSA_BITS != 0) {
348 fmt(
"Cannot create an RSA key of {} bits: must be a multiple of {} bits", bits, MOD_RSA_BITS));
351 if(exp < 3 || exp % 2 == 0) {
355 const size_t p_bits = (bits + 1) / 2;
356 const size_t q_bits = bits - p_bits;
363 for(
size_t attempt = 0;; ++attempt) {
372 const BigInt diff = p - q;
373 if(diff.
bits() < (bits / 2) - 100) {
379 if(n.
bits() != bits) {
386 const BigInt p_minus_1 = p - 1;
387 const BigInt q_minus_1 = q - 1;
389 const BigInt phi_n =
lcm(p_minus_1, q_minus_1);
400 RSA_PrivateKey::init(std::move(d), std::move(p), std::move(q), std::move(d1), std::move(d2), std::move(c));
405 return m_private->get_p();
406 }
else if(field ==
"q") {
407 return m_private->get_q();
408 }
else if(field ==
"d") {
409 return m_private->get_d();
410 }
else if(field ==
"c") {
411 return m_private->get_c();
412 }
else if(field ==
"d1") {
413 return m_private->get_d1();
414 }
else if(field ==
"d2") {
415 return m_private->get_d2();
422 return std::make_unique<RSA_PublicKey>(
get_n(),
get_e());
455 const size_t prob = (strong) ? 128 : 12;
469#if defined(BOTAN_HAS_PSS) && defined(BOTAN_HAS_SHA_256)
470 const std::string padding =
"PSS(SHA-256)";
472 const std::string padding =
"Raw";
500 const size_t n_words = 2 * p_words;
538class RSA_Private_Operation {
540 size_t public_modulus_bits()
const {
return m_public->public_modulus_bits(); }
542 size_t public_modulus_bytes()
const {
return m_public->public_modulus_bytes(); }
544 explicit RSA_Private_Operation(
const RSA_PrivateKey& rsa, RandomNumberGenerator& rng) :
545 m_public(rsa.public_data()),
546 m_private(rsa.private_data()),
548 m_public->reducer_mod_n(),
550 [this](const BigInt& k) {
return m_public->public_op(k); },
553 m_max_d1_bits(m_private->p_bits() + m_blinding_bits),
554 m_max_d2_bits(m_private->q_bits() + m_blinding_bits) {}
556 void raw_op(std::span<uint8_t> out, std::span<const uint8_t> input) {
557 if(input.size() > public_modulus_bytes()) {
558 throw Decoding_Error(
"RSA input is too long for this key");
560 const BigInt input_bn(input.data(), input.size());
561 if(input_bn.is_zero() || input_bn >= m_public->get_n()) {
562 throw Decoding_Error(
"RSA input is not in the valid range");
567 const BigInt recovered = m_blinder.unblind(rsa_private_op(m_blinder.blind(input_bn)));
568 BOTAN_ASSERT(input_bn == m_public->public_op(recovered),
"RSA consistency check");
569 BOTAN_ASSERT(m_public->public_modulus_bytes() == out.size(),
"output size check");
570 recovered.serialize_to(out);
574 BigInt rsa_private_op(
const BigInt& m)
const {
579 if(m_private->primes_imbalanced()) {
580 return monty_exp(m_public->monty_n(), m, m_private->get_d(), m_public->get_n().bits()).
value();
583 static constexpr size_t powm_window = 4;
586 const BigInt d1_mask(m_blinder.rng(), m_blinding_bits);
588#if defined(BOTAN_HAS_THREAD_UTILS) && !defined(BOTAN_HAS_VALGRIND)
589 #define BOTAN_RSA_USE_ASYNC
592#if defined(BOTAN_RSA_USE_ASYNC)
602 const BigInt masked_d1 = m_private->blinded_d1(d1_mask);
604 auto j1 =
monty_execute(*powm_d1_p, masked_d1, m_max_d1_bits);
606#if defined(BOTAN_RSA_USE_ASYNC)
611 const BigInt d2_mask(m_blinder.rng(), m_blinding_bits);
612 const BigInt masked_d2 = m_private->blinded_d2(d2_mask);
616#if defined(BOTAN_RSA_USE_ASYNC)
617 auto j1 = future_j1.get();
623 return crt_recombine(j1, j2_p, j2, m_private->get_c_monty(), m_private->get_p(), m_private->get_q());
626 std::shared_ptr<const RSA_Public_Data> m_public;
627 std::shared_ptr<const RSA_Private_Data> m_private;
631 const size_t m_blinding_bits;
632 const size_t m_max_d1_bits;
633 const size_t m_max_d2_bits;
637 private RSA_Private_Operation {
639 void update(std::span<const uint8_t> msg)
override { m_padding->
update(msg.data(), msg.size()); }
641 std::vector<uint8_t> sign(RandomNumberGenerator& rng)
override {
642 const size_t max_input_bits = public_modulus_bits() - 1;
643 const auto msg = m_padding->raw_data();
644 const auto padded = m_padding->encoding_of(msg, max_input_bits, rng);
646 std::vector<uint8_t> out(public_modulus_bytes());
651 size_t signature_length()
const override {
return public_modulus_bytes(); }
653 AlgorithmIdentifier algorithm_identifier()
const override;
655 std::string hash_function()
const override {
return m_padding->hash_function(); }
657 RSA_Signature_Operation(
const RSA_PrivateKey& rsa, std::string_view padding, RandomNumberGenerator& rng) :
658 RSA_Private_Operation(rsa, rng), m_padding(SignaturePaddingScheme::create_or_throw(padding)) {}
661 std::unique_ptr<SignaturePaddingScheme> m_padding;
665 const std::string padding_name = m_padding->name();
668 const std::string full_name =
"RSA/" + padding_name;
669 const OID oid = OID::from_string(full_name);
670 return AlgorithmIdentifier(oid, AlgorithmIdentifier::USE_EMPTY_PARAM);
671 }
catch(Lookup_Error&) {}
673 if(padding_name.starts_with(
"PSS(")) {
674 auto parameters = PSS_Params::from_padding_name(m_padding->name()).serialize();
675 return AlgorithmIdentifier(
"RSA/PSS", parameters);
678 throw Invalid_Argument(
fmt(
"Signatures using RSA/{} are not supported", padding_name));
681class RSA_Decryption_Operation final :
public PK_Ops::Decryption_with_Padding,
682 private RSA_Private_Operation {
684 RSA_Decryption_Operation(
const RSA_PrivateKey& rsa, std::string_view padding, RandomNumberGenerator& rng) :
685 PK_Ops::Decryption_with_Padding(padding), RSA_Private_Operation(rsa, rng) {}
687 size_t plaintext_length(
size_t )
const override {
return public_modulus_bytes(); }
689 secure_vector<uint8_t> raw_decrypt(std::span<const uint8_t> input)
override {
690 secure_vector<uint8_t> out(public_modulus_bytes());
696class RSA_KEM_Decryption_Operation final :
public PK_Ops::KEM_Decryption_with_KDF,
697 private RSA_Private_Operation {
699 RSA_KEM_Decryption_Operation(
const RSA_PrivateKey& key, std::string_view kdf, RandomNumberGenerator& rng) :
700 PK_Ops::KEM_Decryption_with_KDF(kdf), RSA_Private_Operation(key, rng) {}
702 size_t raw_kem_shared_key_length()
const override {
return public_modulus_bytes(); }
704 size_t encapsulated_key_length()
const override {
return public_modulus_bytes(); }
706 void raw_kem_decrypt(std::span<uint8_t> out_shared_key, std::span<const uint8_t> encapsulated_key)
override {
707 raw_op(out_shared_key, encapsulated_key);
714class RSA_Public_Operation {
716 explicit RSA_Public_Operation(
const RSA_PublicKey& rsa) : m_public(rsa.public_data()) {}
718 size_t public_modulus_bits()
const {
return m_public->public_modulus_bits(); }
721 BigInt public_op(
const BigInt& m)
const {
722 if(m >= m_public->get_n()) {
723 throw Decoding_Error(
"RSA public op - input is too large");
726 return m_public->public_op(m);
729 size_t public_modulus_bytes()
const {
return m_public->public_modulus_bytes(); }
731 const BigInt& get_n()
const {
return m_public->get_n(); }
734 std::shared_ptr<const RSA_Public_Data> m_public;
737class RSA_Encryption_Operation final :
public PK_Ops::Encryption_with_Padding,
738 private RSA_Public_Operation {
740 RSA_Encryption_Operation(
const RSA_PublicKey& rsa, std::string_view padding) :
741 PK_Ops::Encryption_with_Padding(padding), RSA_Public_Operation(rsa) {}
743 size_t ciphertext_length(
size_t )
const override {
return public_modulus_bytes(); }
745 size_t max_ptext_input_bits()
const override {
return public_modulus_bits() - 1; }
747 std::vector<uint8_t> raw_encrypt(std::span<const uint8_t> input, RandomNumberGenerator& )
override {
748 const BigInt input_bn(input);
749 return public_op(input_bn).serialize(public_modulus_bytes());
753class RSA_Verify_Operation final :
public PK_Ops::Verification,
754 private RSA_Public_Operation {
756 void update(std::span<const uint8_t> msg)
override { m_padding->update(msg.data(), msg.size()); }
758 bool is_valid_signature(std::span<const uint8_t> sig)
override {
759 const auto msg = m_padding->raw_data();
760 const auto message_repr = recover_message_repr(sig.data(), sig.size());
761 return m_padding->verify(message_repr, msg, public_modulus_bits() - 1);
764 RSA_Verify_Operation(
const RSA_PublicKey& rsa, std::string_view padding) :
765 RSA_Public_Operation(rsa), m_padding(SignaturePaddingScheme::create_or_throw(padding)) {}
767 std::string hash_function()
const override {
return m_padding->hash_function(); }
770 std::vector<uint8_t> recover_message_repr(
const uint8_t input[],
size_t input_len) {
771 if(input_len > public_modulus_bytes()) {
772 throw Decoding_Error(
"RSA signature too large to be valid for this key");
774 const BigInt input_bn(input, input_len);
775 return public_op(input_bn).serialize();
778 std::unique_ptr<SignaturePaddingScheme> m_padding;
781class RSA_KEM_Encryption_Operation final :
public PK_Ops::KEM_Encryption_with_KDF,
782 private RSA_Public_Operation {
784 RSA_KEM_Encryption_Operation(
const RSA_PublicKey& key, std::string_view kdf) :
785 PK_Ops::KEM_Encryption_with_KDF(kdf), RSA_Public_Operation(key) {}
788 size_t raw_kem_shared_key_length()
const override {
return public_modulus_bytes(); }
790 size_t encapsulated_key_length()
const override {
return public_modulus_bytes(); }
792 void raw_kem_encrypt(std::span<uint8_t> out_encapsulated_key,
793 std::span<uint8_t> raw_shared_key,
794 RandomNumberGenerator& rng)
override {
795 const BigInt r = BigInt::random_integer(rng, BigInt::one(), get_n());
796 const BigInt c = public_op(r);
798 c.serialize_to(out_encapsulated_key);
799 r.serialize_to(raw_shared_key);
806 std::string_view params,
807 std::string_view provider)
const {
808 if(provider ==
"base" || provider.empty()) {
809 return std::make_unique<RSA_Encryption_Operation>(*
this, params);
815 std::string_view provider)
const {
816 if(provider ==
"base" || provider.empty()) {
817 return std::make_unique<RSA_KEM_Encryption_Operation>(*
this, params);
823 std::string_view provider)
const {
824 if(provider ==
"base" || provider.empty()) {
825 return std::make_unique<RSA_Verify_Operation>(*
this, params);
836 if(sig_info.empty() || sig_info.size() != 2 || sig_info[0] !=
"RSA") {
837 throw Decoding_Error(
"Unknown AlgorithmIdentifier for RSA X.509 signatures");
840 std::string padding = sig_info[1];
842 if(padding !=
"PSS") {
844 throw Decoding_Error(
"Non-PSS RSA signature algorithm OID has unexpected parameters");
848 if(padding ==
"PSS") {
851 throw Decoding_Error(
"PSS params must be provided");
854 const PSS_Params pss_params(alg_id.
parameters());
858 const std::string hash_algo = pss_params.hash_function();
859 if(hash_algo !=
"SHA-1" && hash_algo !=
"SHA-224" && hash_algo !=
"SHA-256" && hash_algo !=
"SHA-384" &&
860 hash_algo !=
"SHA-512" && hash_algo !=
"SHA-3(224)" && hash_algo !=
"SHA-3(256)" &&
861 hash_algo !=
"SHA-3(384)" && hash_algo !=
"SHA-3(512)") {
862 throw Decoding_Error(
"Unacceptable hash for PSS signatures");
865 if(pss_params.mgf_function() !=
"MGF1") {
866 throw Decoding_Error(
"Unacceptable MGF for PSS signatures");
871 if(pss_params.hash_algid() != pss_params.mgf_hash_algid()) {
872 throw Decoding_Error(
"Unacceptable MGF hash for PSS signatures");
875 if(pss_params.trailer_field() != 1) {
876 throw Decoding_Error(
"Unacceptable trailer field for PSS signatures");
879 padding +=
fmt(
"({},MGF1,{})", hash_algo, pss_params.salt_length());
888 std::string_view provider)
const {
889 if(provider ==
"base" || provider.empty()) {
890 return std::make_unique<RSA_Verify_Operation>(*
this, parse_rsa_signature_algorithm(alg_id));
897 std::string_view params,
898 std::string_view provider)
const {
899 if(provider ==
"base" || provider.empty()) {
900 return std::make_unique<RSA_Decryption_Operation>(*
this, params, rng);
907 std::string_view params,
908 std::string_view provider)
const {
909 if(provider ==
"base" || provider.empty()) {
910 return std::make_unique<RSA_KEM_Decryption_Operation>(*
this, params, rng);
917 std::string_view params,
918 std::string_view provider)
const {
919 if(provider ==
"base" || provider.empty()) {
920 return std::make_unique<RSA_Signature_Operation>(*
this, params, rng);
#define BOTAN_ASSERT_NOMSG(expr)
#define BOTAN_DEBUG_ASSERT(expr)
#define BOTAN_ASSERT(expr, assertion_made)
bool parameters_are_null_or_empty() const
const std::vector< uint8_t > & parameters() const
virtual const BigInt & get_int_field(std::string_view field) const
virtual OID object_identifier() const
BER_Decoder & decode(bool &out)
BER_Decoder & verify_end()
BER_Decoder start_sequence()
BER_Decoder & decode_and_check(const T &expected, std::string_view error_msg)
static BigInt _from_words(secure_vector< word > &words)
static BigInt from_u64(uint64_t n)
const word * _data() const
secure_vector< uint8_t > get_contents()
DER_Encoder & start_sequence()
DER_Encoder & encode(bool b)
static Montgomery_Int from_wide_int(const Montgomery_Params ¶ms, const BigInt &x)
const secure_vector< word > & repr() const
std::string to_formatted_string() const
virtual void update(std::span< const uint8_t > input)=0
const BigInt & get_q() const
const BigInt & get_int_field(std::string_view field) const override
std::shared_ptr< const RSA_Private_Data > private_data() const
std::unique_ptr< PK_Ops::Decryption > create_decryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
const BigInt & get_c() const
std::unique_ptr< PK_Ops::Signature > create_signature_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
RSA_PrivateKey(const AlgorithmIdentifier &alg_id, std::span< const uint8_t > key_bits)
const BigInt & get_p() const
const BigInt & get_d2() const
bool check_key(RandomNumberGenerator &rng, bool strong) const override
const BigInt & get_d() const
secure_vector< uint8_t > private_key_bits() const override
std::unique_ptr< PK_Ops::KEM_Decryption > create_kem_decryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
std::unique_ptr< Public_Key > public_key() const override
const BigInt & get_d1() const
std::unique_ptr< PK_Ops::Encryption > create_encryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const override
void init(BigInt &&n, BigInt &&e)
size_t key_length() const override
std::unique_ptr< PK_Ops::Verification > create_verification_op(std::string_view params, std::string_view provider) const override
std::string algo_name() const override
std::unique_ptr< PK_Ops::Verification > create_x509_verification_op(const AlgorithmIdentifier &alg_id, std::string_view provider) const override
const BigInt & get_int_field(std::string_view field) const override
bool check_key(RandomNumberGenerator &rng, bool strong) const override
const BigInt & get_n() const
size_t estimated_strength() const override
std::unique_ptr< PK_Ops::KEM_Encryption > create_kem_encryption_op(std::string_view params, std::string_view provider) const override
std::unique_ptr< Private_Key > generate_another(RandomNumberGenerator &rng) const override
std::vector< uint8_t > raw_public_key_bits() const override
AlgorithmIdentifier algorithm_identifier() const override
std::vector< uint8_t > public_key_bits() const override
std::shared_ptr< const RSA_Public_Data > m_public
std::shared_ptr< const RSA_Public_Data > public_data() const
const BigInt & get_e() const
bool supports_operation(PublicKeyOperation op) const override
auto run(F &&f, Args &&... args) -> std::future< std::invoke_result_t< F, Args... > >
static Thread_Pool & global_instance()
bool signature_consistency_check(RandomNumberGenerator &rng, const Private_Key &private_key, const Public_Key &public_key, std::string_view padding)
BigInt inverse_mod_secret_prime(const BigInt &x, const BigInt &p)
constexpr auto bigint_add2(W x[], size_t x_size, const W y[], size_t y_size) -> W
std::string fmt(std::string_view format, const T &... args)
BigInt lcm(const BigInt &a, const BigInt &b)
std::shared_ptr< const Montgomery_Exponentiation_State > monty_precompute(const Montgomery_Int &g, size_t window_bits, bool const_time)
std::vector< std::string > split_on(std::string_view str, char delim)
size_t low_zero_bits(const BigInt &n)
void bigint_mul(word z[], size_t z_size, const word x[], size_t x_size, size_t x_sw, const word y[], size_t y_size, size_t y_sw, word workspace[], size_t ws_size)
bool is_prime(const BigInt &n, RandomNumberGenerator &rng, size_t prob, bool is_random)
BigInt ct_modulo(const BigInt &x, const BigInt &y)
Montgomery_Int monty_execute_vartime(const Montgomery_Exponentiation_State &precomputed_state, const BigInt &k)
BigInt compute_rsa_secret_exponent(const BigInt &e, const BigInt &phi_n, const BigInt &p, const BigInt &q)
BigInt generate_rsa_prime(RandomNumberGenerator &keygen_rng, RandomNumberGenerator &prime_test_rng, size_t bits, const BigInt &coprime, size_t prob)
void carry(int64_t &h0, int64_t &h1)
Montgomery_Int monty_execute(const Montgomery_Exponentiation_State &precomputed_state, const BigInt &k, size_t max_k_bits)
std::vector< T, secure_allocator< T > > secure_vector
BigInt inverse_mod_rsa_public_modulus(const BigInt &x, const BigInt &n)
size_t if_work_factor(size_t bits)
std::conditional_t< HasNative64BitRegisters, std::uint64_t, uint32_t > word
Montgomery_Int monty_exp(const Montgomery_Params ¶ms_p, const BigInt &g, const BigInt &k, size_t max_k_bits)