Annotation of src/usr.bin/ssh/sntrup761.c, Revision 1.6
1.6 ! djm 1: /* $OpenBSD: sntrup761.c,v 1.5 2021/01/08 02:33:13 dtucker Exp $ */
1.1 djm 2:
3: /*
4: * Public Domain, Authors:
5: * - Daniel J. Bernstein
6: * - Chitchanok Chuengsatiansup
7: * - Tanja Lange
8: * - Christine van Vredendaal
9: */
10:
11: #include <string.h>
12: #include "crypto_api.h"
13:
1.5 dtucker 14: #define int8 crypto_int8
15: #define uint8 crypto_uint8
16: #define int16 crypto_int16
17: #define uint16 crypto_uint16
18: #define int32 crypto_int32
19: #define uint32 crypto_uint32
20: #define int64 crypto_int64
21: #define uint64 crypto_uint64
1.4 dtucker 22:
23: /* from supercop-20201130/crypto_sort/int32/portable4/int32_minmax.inc */
24: #define int32_MINMAX(a,b) \
25: do { \
26: int64_t ab = (int64_t)b ^ (int64_t)a; \
27: int64_t c = (int64_t)b - (int64_t)a; \
28: c ^= ab & (c ^ b); \
29: c >>= 31; \
30: c &= ab; \
31: a ^= c; \
32: b ^= c; \
33: } while(0)
1.1 djm 34:
35: /* from supercop-20201130/crypto_sort/int32/portable4/sort.c */
36:
37:
38: static void crypto_sort_int32(void *array,long long n)
39: {
40: long long top,p,q,r,i,j;
41: int32 *x = array;
42:
43: if (n < 2) return;
44: top = 1;
45: while (top < n - top) top += top;
46:
47: for (p = top;p >= 1;p >>= 1) {
48: i = 0;
49: while (i + 2 * p <= n) {
50: for (j = i;j < i + p;++j)
51: int32_MINMAX(x[j],x[j+p]);
52: i += 2 * p;
53: }
54: for (j = i;j < n - p;++j)
55: int32_MINMAX(x[j],x[j+p]);
56:
57: i = 0;
58: j = 0;
59: for (q = top;q > p;q >>= 1) {
60: if (j != i) for (;;) {
61: if (j == n - q) goto done;
62: int32 a = x[j + p];
63: for (r = q;r > p;r >>= 1)
64: int32_MINMAX(a,x[j + r]);
65: x[j + p] = a;
66: ++j;
67: if (j == i + p) {
68: i += 2 * p;
69: break;
70: }
71: }
72: while (i + p <= n - q) {
73: for (j = i;j < i + p;++j) {
74: int32 a = x[j + p];
75: for (r = q;r > p;r >>= 1)
76: int32_MINMAX(a,x[j+r]);
77: x[j + p] = a;
78: }
79: i += 2 * p;
80: }
81: /* now i + p > n - q */
82: j = i;
83: while (j < n - q) {
84: int32 a = x[j + p];
85: for (r = q;r > p;r >>= 1)
86: int32_MINMAX(a,x[j+r]);
87: x[j + p] = a;
88: ++j;
89: }
90:
91: done: ;
92: }
93: }
94: }
95:
96: /* from supercop-20201130/crypto_sort/uint32/useint32/sort.c */
97:
98: /* can save time by vectorizing xor loops */
99: /* can save time by integrating xor loops with int32_sort */
100:
101: static void crypto_sort_uint32(void *array,long long n)
102: {
103: crypto_uint32 *x = array;
104: long long j;
105: for (j = 0;j < n;++j) x[j] ^= 0x80000000;
106: crypto_sort_int32(array,n);
107: for (j = 0;j < n;++j) x[j] ^= 0x80000000;
108: }
109:
110: /* from supercop-20201130/crypto_kem/sntrup761/ref/uint32.c */
111:
112: /*
113: CPU division instruction typically takes time depending on x.
114: This software is designed to take time independent of x.
115: Time still varies depending on m; user must ensure that m is constant.
116: Time also varies on CPUs where multiplication is variable-time.
117: There could be more CPU issues.
1.6 ! djm 118: There could also be compiler issues.
1.1 djm 119: */
120:
121: static void uint32_divmod_uint14(uint32 *q,uint16 *r,uint32 x,uint16 m)
122: {
123: uint32 v = 0x80000000;
124: uint32 qpart;
125: uint32 mask;
126:
127: v /= m;
128:
129: /* caller guarantees m > 0 */
130: /* caller guarantees m < 16384 */
131: /* vm <= 2^31 <= vm+m-1 */
132: /* xvm <= 2^31 x <= xvm+x(m-1) */
133:
134: *q = 0;
135:
136: qpart = (x*(uint64)v)>>31;
137: /* 2^31 qpart <= xv <= 2^31 qpart + 2^31-1 */
138: /* 2^31 qpart m <= xvm <= 2^31 qpart m + (2^31-1)m */
139: /* 2^31 qpart m <= 2^31 x <= 2^31 qpart m + (2^31-1)m + x(m-1) */
140: /* 0 <= 2^31 newx <= (2^31-1)m + x(m-1) */
141: /* 0 <= newx <= (1-1/2^31)m + x(m-1)/2^31 */
142: /* 0 <= newx <= (1-1/2^31)(2^14-1) + (2^32-1)((2^14-1)-1)/2^31 */
143:
144: x -= qpart*m; *q += qpart;
145: /* x <= 49146 */
146:
147: qpart = (x*(uint64)v)>>31;
148: /* 0 <= newx <= (1-1/2^31)m + x(m-1)/2^31 */
149: /* 0 <= newx <= m + 49146(2^14-1)/2^31 */
150: /* 0 <= newx <= m + 0.4 */
151: /* 0 <= newx <= m */
152:
153: x -= qpart*m; *q += qpart;
154: /* x <= m */
155:
156: x -= m; *q += 1;
157: mask = -(x>>31);
158: x += mask&(uint32)m; *q += mask;
159: /* x < m */
160:
161: *r = x;
162: }
163:
164:
1.5 dtucker 165: static uint16 uint32_mod_uint14(uint32 x,uint16 m)
1.1 djm 166: {
167: uint32 q;
168: uint16 r;
169: uint32_divmod_uint14(&q,&r,x,m);
170: return r;
171: }
172:
173: /* from supercop-20201130/crypto_kem/sntrup761/ref/int32.c */
174:
175: static void int32_divmod_uint14(int32 *q,uint16 *r,int32 x,uint16 m)
176: {
177: uint32 uq,uq2;
178: uint16 ur,ur2;
179: uint32 mask;
180:
181: uint32_divmod_uint14(&uq,&ur,0x80000000+(uint32)x,m);
182: uint32_divmod_uint14(&uq2,&ur2,0x80000000,m);
183: ur -= ur2; uq -= uq2;
184: mask = -(uint32)(ur>>15);
185: ur += mask&m; uq += mask;
186: *r = ur; *q = uq;
187: }
188:
189:
1.5 dtucker 190: static uint16 int32_mod_uint14(int32 x,uint16 m)
1.1 djm 191: {
192: int32 q;
193: uint16 r;
194: int32_divmod_uint14(&q,&r,x,m);
195: return r;
196: }
197:
198: /* from supercop-20201130/crypto_kem/sntrup761/ref/paramsmenu.h */
199: /* pick one of these three: */
200: #define SIZE761
201: #undef SIZE653
202: #undef SIZE857
203:
204: /* pick one of these two: */
205: #define SNTRUP /* Streamlined NTRU Prime */
206: #undef LPR /* NTRU LPRime */
207:
208: /* from supercop-20201130/crypto_kem/sntrup761/ref/params.h */
209: #ifndef params_H
210: #define params_H
211:
212: /* menu of parameter choices: */
213:
214:
215: /* what the menu means: */
216:
217: #if defined(SIZE761)
218: #define p 761
219: #define q 4591
220: #define Rounded_bytes 1007
221: #ifndef LPR
222: #define Rq_bytes 1158
223: #define w 286
224: #else
225: #define w 250
226: #define tau0 2156
227: #define tau1 114
228: #define tau2 2007
229: #define tau3 287
230: #endif
231:
232: #elif defined(SIZE653)
233: #define p 653
234: #define q 4621
235: #define Rounded_bytes 865
236: #ifndef LPR
237: #define Rq_bytes 994
238: #define w 288
239: #else
240: #define w 252
241: #define tau0 2175
242: #define tau1 113
243: #define tau2 2031
244: #define tau3 290
245: #endif
246:
247: #elif defined(SIZE857)
248: #define p 857
249: #define q 5167
250: #define Rounded_bytes 1152
251: #ifndef LPR
252: #define Rq_bytes 1322
253: #define w 322
254: #else
255: #define w 281
256: #define tau0 2433
257: #define tau1 101
258: #define tau2 2265
259: #define tau3 324
260: #endif
261:
262: #else
263: #error "no parameter set defined"
264: #endif
265:
266: #ifdef LPR
267: #define I 256
268: #endif
269:
270: #endif
271:
272: /* from supercop-20201130/crypto_kem/sntrup761/ref/Decode.h */
273: #ifndef Decode_H
274: #define Decode_H
275:
276:
277: /* Decode(R,s,M,len) */
278: /* assumes 0 < M[i] < 16384 */
279: /* produces 0 <= R[i] < M[i] */
280:
281: #endif
282:
283: /* from supercop-20201130/crypto_kem/sntrup761/ref/Decode.c */
284:
285: static void Decode(uint16 *out,const unsigned char *S,const uint16 *M,long long len)
286: {
287: if (len == 1) {
288: if (M[0] == 1)
289: *out = 0;
290: else if (M[0] <= 256)
291: *out = uint32_mod_uint14(S[0],M[0]);
292: else
293: *out = uint32_mod_uint14(S[0]+(((uint16)S[1])<<8),M[0]);
294: }
295: if (len > 1) {
296: uint16 R2[(len+1)/2];
297: uint16 M2[(len+1)/2];
298: uint16 bottomr[len/2];
299: uint32 bottomt[len/2];
300: long long i;
301: for (i = 0;i < len-1;i += 2) {
302: uint32 m = M[i]*(uint32) M[i+1];
303: if (m > 256*16383) {
304: bottomt[i/2] = 256*256;
305: bottomr[i/2] = S[0]+256*S[1];
306: S += 2;
307: M2[i/2] = (((m+255)>>8)+255)>>8;
308: } else if (m >= 16384) {
309: bottomt[i/2] = 256;
310: bottomr[i/2] = S[0];
311: S += 1;
312: M2[i/2] = (m+255)>>8;
313: } else {
314: bottomt[i/2] = 1;
315: bottomr[i/2] = 0;
316: M2[i/2] = m;
317: }
318: }
319: if (i < len)
320: M2[i/2] = M[i];
321: Decode(R2,S,M2,(len+1)/2);
322: for (i = 0;i < len-1;i += 2) {
323: uint32 r = bottomr[i/2];
324: uint32 r1;
325: uint16 r0;
326: r += bottomt[i/2]*R2[i/2];
327: uint32_divmod_uint14(&r1,&r0,r,M[i]);
328: r1 = uint32_mod_uint14(r1,M[i+1]); /* only needed for invalid inputs */
329: *out++ = r0;
330: *out++ = r1;
331: }
332: if (i < len)
333: *out++ = R2[i/2];
334: }
335: }
336:
337: /* from supercop-20201130/crypto_kem/sntrup761/ref/Encode.h */
338: #ifndef Encode_H
339: #define Encode_H
340:
341:
342: /* Encode(s,R,M,len) */
343: /* assumes 0 <= R[i] < M[i] < 16384 */
344:
345: #endif
346:
347: /* from supercop-20201130/crypto_kem/sntrup761/ref/Encode.c */
348:
349: /* 0 <= R[i] < M[i] < 16384 */
350: static void Encode(unsigned char *out,const uint16 *R,const uint16 *M,long long len)
351: {
352: if (len == 1) {
353: uint16 r = R[0];
354: uint16 m = M[0];
355: while (m > 1) {
356: *out++ = r;
357: r >>= 8;
358: m = (m+255)>>8;
359: }
360: }
361: if (len > 1) {
362: uint16 R2[(len+1)/2];
363: uint16 M2[(len+1)/2];
364: long long i;
365: for (i = 0;i < len-1;i += 2) {
366: uint32 m0 = M[i];
367: uint32 r = R[i]+R[i+1]*m0;
368: uint32 m = M[i+1]*m0;
369: while (m >= 16384) {
370: *out++ = r;
371: r >>= 8;
372: m = (m+255)>>8;
373: }
374: R2[i/2] = r;
375: M2[i/2] = m;
376: }
377: if (i < len) {
378: R2[i/2] = R[i];
379: M2[i/2] = M[i];
380: }
381: Encode(out,R2,M2,(len+1)/2);
382: }
383: }
384:
385: /* from supercop-20201130/crypto_kem/sntrup761/ref/kem.c */
386:
387: #ifdef LPR
388: #endif
389:
390:
391: /* ----- masks */
392:
393: #ifndef LPR
394:
395: /* return -1 if x!=0; else return 0 */
396: static int int16_nonzero_mask(int16 x)
397: {
398: uint16 u = x; /* 0, else 1...65535 */
399: uint32 v = u; /* 0, else 1...65535 */
400: v = -v; /* 0, else 2^32-65535...2^32-1 */
401: v >>= 31; /* 0, else 1 */
402: return -v; /* 0, else -1 */
403: }
404:
405: #endif
406:
407: /* return -1 if x<0; otherwise return 0 */
408: static int int16_negative_mask(int16 x)
409: {
410: uint16 u = x;
411: u >>= 15;
412: return -(int) u;
413: /* alternative with gcc -fwrapv: */
414: /* x>>15 compiles to CPU's arithmetic right shift */
415: }
416:
417: /* ----- arithmetic mod 3 */
418:
419: typedef int8 small;
420:
421: /* F3 is always represented as -1,0,1 */
422: /* so ZZ_fromF3 is a no-op */
423:
424: /* x must not be close to top int16 */
425: static small F3_freeze(int16 x)
426: {
427: return int32_mod_uint14(x+1,3)-1;
428: }
429:
430: /* ----- arithmetic mod q */
431:
432: #define q12 ((q-1)/2)
433: typedef int16 Fq;
434: /* always represented as -q12...q12 */
435: /* so ZZ_fromFq is a no-op */
436:
437: /* x must not be close to top int32 */
438: static Fq Fq_freeze(int32 x)
439: {
440: return int32_mod_uint14(x+q12,q)-q12;
441: }
442:
443: #ifndef LPR
444:
445: static Fq Fq_recip(Fq a1)
1.6 ! djm 446: {
1.1 djm 447: int i = 1;
448: Fq ai = a1;
449:
450: while (i < q-2) {
451: ai = Fq_freeze(a1*(int32)ai);
452: i += 1;
453: }
454: return ai;
1.6 ! djm 455: }
1.1 djm 456:
457: #endif
458:
459: /* ----- Top and Right */
460:
461: #ifdef LPR
462: #define tau 16
463:
464: static int8 Top(Fq C)
465: {
466: return (tau1*(int32)(C+tau0)+16384)>>15;
467: }
468:
469: static Fq Right(int8 T)
470: {
471: return Fq_freeze(tau3*(int32)T-tau2);
472: }
473: #endif
474:
475: /* ----- small polynomials */
476:
477: #ifndef LPR
478:
479: /* 0 if Weightw_is(r), else -1 */
480: static int Weightw_mask(small *r)
481: {
482: int weight = 0;
483: int i;
484:
485: for (i = 0;i < p;++i) weight += r[i]&1;
486: return int16_nonzero_mask(weight-w);
487: }
488:
489: /* R3_fromR(R_fromRq(r)) */
490: static void R3_fromRq(small *out,const Fq *r)
491: {
492: int i;
493: for (i = 0;i < p;++i) out[i] = F3_freeze(r[i]);
494: }
495:
496: /* h = f*g in the ring R3 */
497: static void R3_mult(small *h,const small *f,const small *g)
498: {
499: small fg[p+p-1];
500: small result;
501: int i,j;
502:
503: for (i = 0;i < p;++i) {
504: result = 0;
505: for (j = 0;j <= i;++j) result = F3_freeze(result+f[j]*g[i-j]);
506: fg[i] = result;
507: }
508: for (i = p;i < p+p-1;++i) {
509: result = 0;
510: for (j = i-p+1;j < p;++j) result = F3_freeze(result+f[j]*g[i-j]);
511: fg[i] = result;
512: }
513:
514: for (i = p+p-2;i >= p;--i) {
515: fg[i-p] = F3_freeze(fg[i-p]+fg[i]);
516: fg[i-p+1] = F3_freeze(fg[i-p+1]+fg[i]);
517: }
518:
519: for (i = 0;i < p;++i) h[i] = fg[i];
520: }
521:
522: /* returns 0 if recip succeeded; else -1 */
523: static int R3_recip(small *out,const small *in)
1.6 ! djm 524: {
1.1 djm 525: small f[p+1],g[p+1],v[p+1],r[p+1];
526: int i,loop,delta;
527: int sign,swap,t;
1.6 ! djm 528:
1.1 djm 529: for (i = 0;i < p+1;++i) v[i] = 0;
530: for (i = 0;i < p+1;++i) r[i] = 0;
531: r[0] = 1;
532: for (i = 0;i < p;++i) f[i] = 0;
533: f[0] = 1; f[p-1] = f[p] = -1;
534: for (i = 0;i < p;++i) g[p-1-i] = in[i];
535: g[p] = 0;
1.6 ! djm 536:
! 537: delta = 1;
1.1 djm 538:
539: for (loop = 0;loop < 2*p-1;++loop) {
540: for (i = p;i > 0;--i) v[i] = v[i-1];
541: v[0] = 0;
1.6 ! djm 542:
1.1 djm 543: sign = -g[0]*f[0];
544: swap = int16_negative_mask(-delta) & int16_nonzero_mask(g[0]);
545: delta ^= swap&(delta^-delta);
546: delta += 1;
1.6 ! djm 547:
1.1 djm 548: for (i = 0;i < p+1;++i) {
549: t = swap&(f[i]^g[i]); f[i] ^= t; g[i] ^= t;
550: t = swap&(v[i]^r[i]); v[i] ^= t; r[i] ^= t;
551: }
1.6 ! djm 552:
1.1 djm 553: for (i = 0;i < p+1;++i) g[i] = F3_freeze(g[i]+sign*f[i]);
554: for (i = 0;i < p+1;++i) r[i] = F3_freeze(r[i]+sign*v[i]);
555:
556: for (i = 0;i < p;++i) g[i] = g[i+1];
557: g[p] = 0;
558: }
1.6 ! djm 559:
1.1 djm 560: sign = f[0];
561: for (i = 0;i < p;++i) out[i] = sign*v[p-1-i];
1.6 ! djm 562:
1.1 djm 563: return int16_nonzero_mask(delta);
1.6 ! djm 564: }
1.1 djm 565:
566: #endif
567:
568: /* ----- polynomials mod q */
569:
570: /* h = f*g in the ring Rq */
571: static void Rq_mult_small(Fq *h,const Fq *f,const small *g)
572: {
573: Fq fg[p+p-1];
574: Fq result;
575: int i,j;
576:
577: for (i = 0;i < p;++i) {
578: result = 0;
579: for (j = 0;j <= i;++j) result = Fq_freeze(result+f[j]*(int32)g[i-j]);
580: fg[i] = result;
581: }
582: for (i = p;i < p+p-1;++i) {
583: result = 0;
584: for (j = i-p+1;j < p;++j) result = Fq_freeze(result+f[j]*(int32)g[i-j]);
585: fg[i] = result;
586: }
587:
588: for (i = p+p-2;i >= p;--i) {
589: fg[i-p] = Fq_freeze(fg[i-p]+fg[i]);
590: fg[i-p+1] = Fq_freeze(fg[i-p+1]+fg[i]);
591: }
592:
593: for (i = 0;i < p;++i) h[i] = fg[i];
594: }
595:
596: #ifndef LPR
597:
598: /* h = 3f in Rq */
599: static void Rq_mult3(Fq *h,const Fq *f)
600: {
601: int i;
1.6 ! djm 602:
1.1 djm 603: for (i = 0;i < p;++i) h[i] = Fq_freeze(3*f[i]);
604: }
605:
606: /* out = 1/(3*in) in Rq */
607: /* returns 0 if recip succeeded; else -1 */
608: static int Rq_recip3(Fq *out,const small *in)
1.6 ! djm 609: {
1.1 djm 610: Fq f[p+1],g[p+1],v[p+1],r[p+1];
611: int i,loop,delta;
612: int swap,t;
613: int32 f0,g0;
614: Fq scale;
615:
616: for (i = 0;i < p+1;++i) v[i] = 0;
617: for (i = 0;i < p+1;++i) r[i] = 0;
618: r[0] = Fq_recip(3);
619: for (i = 0;i < p;++i) f[i] = 0;
620: f[0] = 1; f[p-1] = f[p] = -1;
621: for (i = 0;i < p;++i) g[p-1-i] = in[i];
622: g[p] = 0;
623:
624: delta = 1;
625:
626: for (loop = 0;loop < 2*p-1;++loop) {
627: for (i = p;i > 0;--i) v[i] = v[i-1];
628: v[0] = 0;
629:
630: swap = int16_negative_mask(-delta) & int16_nonzero_mask(g[0]);
631: delta ^= swap&(delta^-delta);
632: delta += 1;
633:
634: for (i = 0;i < p+1;++i) {
635: t = swap&(f[i]^g[i]); f[i] ^= t; g[i] ^= t;
636: t = swap&(v[i]^r[i]); v[i] ^= t; r[i] ^= t;
637: }
638:
639: f0 = f[0];
640: g0 = g[0];
641: for (i = 0;i < p+1;++i) g[i] = Fq_freeze(f0*g[i]-g0*f[i]);
642: for (i = 0;i < p+1;++i) r[i] = Fq_freeze(f0*r[i]-g0*v[i]);
643:
644: for (i = 0;i < p;++i) g[i] = g[i+1];
645: g[p] = 0;
646: }
647:
648: scale = Fq_recip(f[0]);
649: for (i = 0;i < p;++i) out[i] = Fq_freeze(scale*(int32)v[p-1-i]);
650:
651: return int16_nonzero_mask(delta);
652: }
653:
654: #endif
655:
656: /* ----- rounded polynomials mod q */
657:
658: static void Round(Fq *out,const Fq *a)
659: {
660: int i;
661: for (i = 0;i < p;++i) out[i] = a[i]-F3_freeze(a[i]);
662: }
663:
664: /* ----- sorting to generate short polynomial */
665:
666: static void Short_fromlist(small *out,const uint32 *in)
667: {
668: uint32 L[p];
669: int i;
670:
671: for (i = 0;i < w;++i) L[i] = in[i]&(uint32)-2;
672: for (i = w;i < p;++i) L[i] = (in[i]&(uint32)-3)|1;
673: crypto_sort_uint32(L,p);
674: for (i = 0;i < p;++i) out[i] = (L[i]&3)-1;
675: }
676:
677: /* ----- underlying hash function */
678:
679: #define Hash_bytes 32
680:
681: /* e.g., b = 0 means out = Hash0(in) */
682: static void Hash_prefix(unsigned char *out,int b,const unsigned char *in,int inlen)
683: {
684: unsigned char x[inlen+1];
685: unsigned char h[64];
686: int i;
687:
688: x[0] = b;
689: for (i = 0;i < inlen;++i) x[i+1] = in[i];
690: crypto_hash_sha512(h,x,inlen+1);
691: for (i = 0;i < 32;++i) out[i] = h[i];
692: }
693:
694: /* ----- higher-level randomness */
695:
696: static uint32 urandom32(void)
697: {
698: unsigned char c[4];
699: uint32 out[4];
700:
701: randombytes(c,4);
702: out[0] = (uint32)c[0];
703: out[1] = ((uint32)c[1])<<8;
704: out[2] = ((uint32)c[2])<<16;
705: out[3] = ((uint32)c[3])<<24;
706: return out[0]+out[1]+out[2]+out[3];
707: }
708:
709: static void Short_random(small *out)
710: {
711: uint32 L[p];
712: int i;
713:
714: for (i = 0;i < p;++i) L[i] = urandom32();
715: Short_fromlist(out,L);
716: }
717:
718: #ifndef LPR
719:
720: static void Small_random(small *out)
721: {
722: int i;
723:
724: for (i = 0;i < p;++i) out[i] = (((urandom32()&0x3fffffff)*3)>>30)-1;
725: }
726:
727: #endif
728:
729: /* ----- Streamlined NTRU Prime Core */
730:
731: #ifndef LPR
732:
733: /* h,(f,ginv) = KeyGen() */
734: static void KeyGen(Fq *h,small *f,small *ginv)
735: {
736: small g[p];
737: Fq finv[p];
1.6 ! djm 738:
1.1 djm 739: for (;;) {
740: Small_random(g);
741: if (R3_recip(ginv,g) == 0) break;
742: }
743: Short_random(f);
744: Rq_recip3(finv,f); /* always works */
745: Rq_mult_small(h,finv,g);
746: }
747:
748: /* c = Encrypt(r,h) */
749: static void Encrypt(Fq *c,const small *r,const Fq *h)
750: {
751: Fq hr[p];
752:
753: Rq_mult_small(hr,h,r);
754: Round(c,hr);
755: }
756:
757: /* r = Decrypt(c,(f,ginv)) */
758: static void Decrypt(small *r,const Fq *c,const small *f,const small *ginv)
759: {
760: Fq cf[p];
761: Fq cf3[p];
762: small e[p];
763: small ev[p];
764: int mask;
765: int i;
766:
767: Rq_mult_small(cf,c,f);
768: Rq_mult3(cf3,cf);
769: R3_fromRq(e,cf3);
770: R3_mult(ev,e,ginv);
771:
772: mask = Weightw_mask(ev); /* 0 if weight w, else -1 */
773: for (i = 0;i < w;++i) r[i] = ((ev[i]^1)&~mask)^1;
774: for (i = w;i < p;++i) r[i] = ev[i]&~mask;
775: }
1.6 ! djm 776:
1.1 djm 777: #endif
778:
779: /* ----- NTRU LPRime Core */
780:
781: #ifdef LPR
782:
783: /* (G,A),a = KeyGen(G); leaves G unchanged */
784: static void KeyGen(Fq *A,small *a,const Fq *G)
785: {
786: Fq aG[p];
787:
788: Short_random(a);
789: Rq_mult_small(aG,G,a);
790: Round(A,aG);
791: }
792:
793: /* B,T = Encrypt(r,(G,A),b) */
794: static void Encrypt(Fq *B,int8 *T,const int8 *r,const Fq *G,const Fq *A,const small *b)
795: {
796: Fq bG[p];
797: Fq bA[p];
798: int i;
799:
800: Rq_mult_small(bG,G,b);
801: Round(B,bG);
802: Rq_mult_small(bA,A,b);
803: for (i = 0;i < I;++i) T[i] = Top(Fq_freeze(bA[i]+r[i]*q12));
804: }
805:
806: /* r = Decrypt((B,T),a) */
807: static void Decrypt(int8 *r,const Fq *B,const int8 *T,const small *a)
808: {
809: Fq aB[p];
810: int i;
811:
812: Rq_mult_small(aB,B,a);
813: for (i = 0;i < I;++i)
814: r[i] = -int16_negative_mask(Fq_freeze(Right(T[i])-aB[i]+4*w+1));
815: }
1.6 ! djm 816:
1.1 djm 817: #endif
818:
819: /* ----- encoding I-bit inputs */
820:
821: #ifdef LPR
822:
823: #define Inputs_bytes (I/8)
824: typedef int8 Inputs[I]; /* passed by reference */
825:
826: static void Inputs_encode(unsigned char *s,const Inputs r)
827: {
828: int i;
829: for (i = 0;i < Inputs_bytes;++i) s[i] = 0;
830: for (i = 0;i < I;++i) s[i>>3] |= r[i]<<(i&7);
831: }
832:
833: #endif
834:
835: /* ----- Expand */
836:
837: #ifdef LPR
838:
839: static const unsigned char aes_nonce[16] = {0};
840:
841: static void Expand(uint32 *L,const unsigned char *k)
842: {
843: int i;
844: crypto_stream_aes256ctr((unsigned char *) L,4*p,aes_nonce,k);
845: for (i = 0;i < p;++i) {
846: uint32 L0 = ((unsigned char *) L)[4*i];
847: uint32 L1 = ((unsigned char *) L)[4*i+1];
848: uint32 L2 = ((unsigned char *) L)[4*i+2];
849: uint32 L3 = ((unsigned char *) L)[4*i+3];
850: L[i] = L0+(L1<<8)+(L2<<16)+(L3<<24);
851: }
852: }
853:
854: #endif
855:
856: /* ----- Seeds */
857:
858: #ifdef LPR
859:
860: #define Seeds_bytes 32
861:
862: static void Seeds_random(unsigned char *s)
863: {
864: randombytes(s,Seeds_bytes);
865: }
866:
867: #endif
868:
869: /* ----- Generator, HashShort */
870:
871: #ifdef LPR
872:
873: /* G = Generator(k) */
874: static void Generator(Fq *G,const unsigned char *k)
875: {
876: uint32 L[p];
877: int i;
878:
879: Expand(L,k);
880: for (i = 0;i < p;++i) G[i] = uint32_mod_uint14(L[i],q)-q12;
881: }
882:
883: /* out = HashShort(r) */
884: static void HashShort(small *out,const Inputs r)
885: {
886: unsigned char s[Inputs_bytes];
887: unsigned char h[Hash_bytes];
888: uint32 L[p];
889:
890: Inputs_encode(s,r);
891: Hash_prefix(h,5,s,sizeof s);
892: Expand(L,h);
893: Short_fromlist(out,L);
894: }
895:
896: #endif
1.6 ! djm 897:
1.1 djm 898: /* ----- NTRU LPRime Expand */
899:
900: #ifdef LPR
901:
902: /* (S,A),a = XKeyGen() */
903: static void XKeyGen(unsigned char *S,Fq *A,small *a)
904: {
905: Fq G[p];
906:
907: Seeds_random(S);
908: Generator(G,S);
909: KeyGen(A,a,G);
910: }
911:
912: /* B,T = XEncrypt(r,(S,A)) */
913: static void XEncrypt(Fq *B,int8 *T,const int8 *r,const unsigned char *S,const Fq *A)
914: {
915: Fq G[p];
916: small b[p];
917:
918: Generator(G,S);
919: HashShort(b,r);
920: Encrypt(B,T,r,G,A,b);
921: }
922:
923: #define XDecrypt Decrypt
924:
925: #endif
926:
927: /* ----- encoding small polynomials (including short polynomials) */
928:
929: #define Small_bytes ((p+3)/4)
930:
931: /* these are the only functions that rely on p mod 4 = 1 */
932:
933: static void Small_encode(unsigned char *s,const small *f)
934: {
935: small x;
936: int i;
937:
938: for (i = 0;i < p/4;++i) {
939: x = *f++ + 1;
940: x += (*f++ + 1)<<2;
941: x += (*f++ + 1)<<4;
942: x += (*f++ + 1)<<6;
943: *s++ = x;
944: }
945: x = *f++ + 1;
946: *s++ = x;
947: }
948:
949: static void Small_decode(small *f,const unsigned char *s)
950: {
951: unsigned char x;
952: int i;
953:
954: for (i = 0;i < p/4;++i) {
955: x = *s++;
956: *f++ = ((small)(x&3))-1; x >>= 2;
957: *f++ = ((small)(x&3))-1; x >>= 2;
958: *f++ = ((small)(x&3))-1; x >>= 2;
959: *f++ = ((small)(x&3))-1;
960: }
961: x = *s++;
962: *f++ = ((small)(x&3))-1;
963: }
964:
965: /* ----- encoding general polynomials */
966:
967: #ifndef LPR
968:
969: static void Rq_encode(unsigned char *s,const Fq *r)
970: {
971: uint16 R[p],M[p];
972: int i;
1.6 ! djm 973:
1.1 djm 974: for (i = 0;i < p;++i) R[i] = r[i]+q12;
975: for (i = 0;i < p;++i) M[i] = q;
976: Encode(s,R,M,p);
977: }
978:
979: static void Rq_decode(Fq *r,const unsigned char *s)
980: {
981: uint16 R[p],M[p];
982: int i;
983:
984: for (i = 0;i < p;++i) M[i] = q;
985: Decode(R,s,M,p);
986: for (i = 0;i < p;++i) r[i] = ((Fq)R[i])-q12;
987: }
1.6 ! djm 988:
1.1 djm 989: #endif
990:
991: /* ----- encoding rounded polynomials */
992:
993: static void Rounded_encode(unsigned char *s,const Fq *r)
994: {
995: uint16 R[p],M[p];
996: int i;
997:
998: for (i = 0;i < p;++i) R[i] = ((r[i]+q12)*10923)>>15;
999: for (i = 0;i < p;++i) M[i] = (q+2)/3;
1000: Encode(s,R,M,p);
1001: }
1002:
1003: static void Rounded_decode(Fq *r,const unsigned char *s)
1004: {
1005: uint16 R[p],M[p];
1006: int i;
1007:
1008: for (i = 0;i < p;++i) M[i] = (q+2)/3;
1009: Decode(R,s,M,p);
1010: for (i = 0;i < p;++i) r[i] = R[i]*3-q12;
1011: }
1012:
1013: /* ----- encoding top polynomials */
1014:
1015: #ifdef LPR
1016:
1017: #define Top_bytes (I/2)
1018:
1019: static void Top_encode(unsigned char *s,const int8 *T)
1020: {
1021: int i;
1022: for (i = 0;i < Top_bytes;++i)
1023: s[i] = T[2*i]+(T[2*i+1]<<4);
1024: }
1025:
1026: static void Top_decode(int8 *T,const unsigned char *s)
1027: {
1028: int i;
1029: for (i = 0;i < Top_bytes;++i) {
1030: T[2*i] = s[i]&15;
1031: T[2*i+1] = s[i]>>4;
1032: }
1033: }
1034:
1035: #endif
1036:
1037: /* ----- Streamlined NTRU Prime Core plus encoding */
1038:
1039: #ifndef LPR
1040:
1041: typedef small Inputs[p]; /* passed by reference */
1042: #define Inputs_random Short_random
1043: #define Inputs_encode Small_encode
1044: #define Inputs_bytes Small_bytes
1045:
1046: #define Ciphertexts_bytes Rounded_bytes
1047: #define SecretKeys_bytes (2*Small_bytes)
1048: #define PublicKeys_bytes Rq_bytes
1049:
1050: /* pk,sk = ZKeyGen() */
1051: static void ZKeyGen(unsigned char *pk,unsigned char *sk)
1052: {
1053: Fq h[p];
1054: small f[p],v[p];
1055:
1056: KeyGen(h,f,v);
1057: Rq_encode(pk,h);
1058: Small_encode(sk,f); sk += Small_bytes;
1059: Small_encode(sk,v);
1060: }
1061:
1062: /* C = ZEncrypt(r,pk) */
1063: static void ZEncrypt(unsigned char *C,const Inputs r,const unsigned char *pk)
1064: {
1065: Fq h[p];
1066: Fq c[p];
1067: Rq_decode(h,pk);
1068: Encrypt(c,r,h);
1069: Rounded_encode(C,c);
1070: }
1071:
1072: /* r = ZDecrypt(C,sk) */
1073: static void ZDecrypt(Inputs r,const unsigned char *C,const unsigned char *sk)
1074: {
1075: small f[p],v[p];
1076: Fq c[p];
1077:
1078: Small_decode(f,sk); sk += Small_bytes;
1079: Small_decode(v,sk);
1080: Rounded_decode(c,C);
1081: Decrypt(r,c,f,v);
1082: }
1083:
1084: #endif
1085:
1086: /* ----- NTRU LPRime Expand plus encoding */
1087:
1088: #ifdef LPR
1089:
1090: #define Ciphertexts_bytes (Rounded_bytes+Top_bytes)
1091: #define SecretKeys_bytes Small_bytes
1092: #define PublicKeys_bytes (Seeds_bytes+Rounded_bytes)
1093:
1094: static void Inputs_random(Inputs r)
1095: {
1096: unsigned char s[Inputs_bytes];
1097: int i;
1098:
1099: randombytes(s,sizeof s);
1100: for (i = 0;i < I;++i) r[i] = 1&(s[i>>3]>>(i&7));
1101: }
1102:
1103: /* pk,sk = ZKeyGen() */
1104: static void ZKeyGen(unsigned char *pk,unsigned char *sk)
1105: {
1106: Fq A[p];
1107: small a[p];
1108:
1109: XKeyGen(pk,A,a); pk += Seeds_bytes;
1110: Rounded_encode(pk,A);
1111: Small_encode(sk,a);
1112: }
1113:
1114: /* c = ZEncrypt(r,pk) */
1115: static void ZEncrypt(unsigned char *c,const Inputs r,const unsigned char *pk)
1116: {
1117: Fq A[p];
1118: Fq B[p];
1119: int8 T[I];
1120:
1121: Rounded_decode(A,pk+Seeds_bytes);
1122: XEncrypt(B,T,r,pk,A);
1123: Rounded_encode(c,B); c += Rounded_bytes;
1124: Top_encode(c,T);
1125: }
1126:
1127: /* r = ZDecrypt(C,sk) */
1128: static void ZDecrypt(Inputs r,const unsigned char *c,const unsigned char *sk)
1129: {
1130: small a[p];
1131: Fq B[p];
1132: int8 T[I];
1133:
1134: Small_decode(a,sk);
1135: Rounded_decode(B,c);
1136: Top_decode(T,c+Rounded_bytes);
1137: XDecrypt(r,B,T,a);
1138: }
1139:
1140: #endif
1141:
1142: /* ----- confirmation hash */
1143:
1144: #define Confirm_bytes 32
1145:
1146: /* h = HashConfirm(r,pk,cache); cache is Hash4(pk) */
1147: static void HashConfirm(unsigned char *h,const unsigned char *r,const unsigned char *pk,const unsigned char *cache)
1148: {
1149: #ifndef LPR
1150: unsigned char x[Hash_bytes*2];
1151: int i;
1152:
1153: Hash_prefix(x,3,r,Inputs_bytes);
1154: for (i = 0;i < Hash_bytes;++i) x[Hash_bytes+i] = cache[i];
1155: #else
1156: unsigned char x[Inputs_bytes+Hash_bytes];
1157: int i;
1158:
1159: for (i = 0;i < Inputs_bytes;++i) x[i] = r[i];
1160: for (i = 0;i < Hash_bytes;++i) x[Inputs_bytes+i] = cache[i];
1161: #endif
1162: Hash_prefix(h,2,x,sizeof x);
1163: }
1164:
1165: /* ----- session-key hash */
1166:
1167: /* k = HashSession(b,y,z) */
1168: static void HashSession(unsigned char *k,int b,const unsigned char *y,const unsigned char *z)
1169: {
1170: #ifndef LPR
1171: unsigned char x[Hash_bytes+Ciphertexts_bytes+Confirm_bytes];
1172: int i;
1173:
1174: Hash_prefix(x,3,y,Inputs_bytes);
1175: for (i = 0;i < Ciphertexts_bytes+Confirm_bytes;++i) x[Hash_bytes+i] = z[i];
1176: #else
1177: unsigned char x[Inputs_bytes+Ciphertexts_bytes+Confirm_bytes];
1178: int i;
1179:
1180: for (i = 0;i < Inputs_bytes;++i) x[i] = y[i];
1181: for (i = 0;i < Ciphertexts_bytes+Confirm_bytes;++i) x[Inputs_bytes+i] = z[i];
1182: #endif
1183: Hash_prefix(k,b,x,sizeof x);
1184: }
1185:
1186: /* ----- Streamlined NTRU Prime and NTRU LPRime */
1187:
1188: /* pk,sk = KEM_KeyGen() */
1189: static void KEM_KeyGen(unsigned char *pk,unsigned char *sk)
1190: {
1191: int i;
1192:
1193: ZKeyGen(pk,sk); sk += SecretKeys_bytes;
1194: for (i = 0;i < PublicKeys_bytes;++i) *sk++ = pk[i];
1195: randombytes(sk,Inputs_bytes); sk += Inputs_bytes;
1196: Hash_prefix(sk,4,pk,PublicKeys_bytes);
1197: }
1198:
1199: /* c,r_enc = Hide(r,pk,cache); cache is Hash4(pk) */
1200: static void Hide(unsigned char *c,unsigned char *r_enc,const Inputs r,const unsigned char *pk,const unsigned char *cache)
1201: {
1202: Inputs_encode(r_enc,r);
1203: ZEncrypt(c,r,pk); c += Ciphertexts_bytes;
1204: HashConfirm(c,r_enc,pk,cache);
1205: }
1206:
1207: /* c,k = Encap(pk) */
1208: static void Encap(unsigned char *c,unsigned char *k,const unsigned char *pk)
1209: {
1210: Inputs r;
1211: unsigned char r_enc[Inputs_bytes];
1212: unsigned char cache[Hash_bytes];
1213:
1214: Hash_prefix(cache,4,pk,PublicKeys_bytes);
1215: Inputs_random(r);
1216: Hide(c,r_enc,r,pk,cache);
1217: HashSession(k,1,r_enc,c);
1218: }
1219:
1220: /* 0 if matching ciphertext+confirm, else -1 */
1221: static int Ciphertexts_diff_mask(const unsigned char *c,const unsigned char *c2)
1222: {
1223: uint16 differentbits = 0;
1224: int len = Ciphertexts_bytes+Confirm_bytes;
1225:
1226: while (len-- > 0) differentbits |= (*c++)^(*c2++);
1227: return (1&((differentbits-1)>>8))-1;
1228: }
1229:
1230: /* k = Decap(c,sk) */
1231: static void Decap(unsigned char *k,const unsigned char *c,const unsigned char *sk)
1232: {
1233: const unsigned char *pk = sk + SecretKeys_bytes;
1234: const unsigned char *rho = pk + PublicKeys_bytes;
1235: const unsigned char *cache = rho + Inputs_bytes;
1236: Inputs r;
1237: unsigned char r_enc[Inputs_bytes];
1238: unsigned char cnew[Ciphertexts_bytes+Confirm_bytes];
1239: int mask;
1240: int i;
1241:
1242: ZDecrypt(r,c,sk);
1243: Hide(cnew,r_enc,r,pk,cache);
1244: mask = Ciphertexts_diff_mask(c,cnew);
1245: for (i = 0;i < Inputs_bytes;++i) r_enc[i] ^= mask&(r_enc[i]^rho[i]);
1246: HashSession(k,1+mask,r_enc,c);
1247: }
1248:
1249: /* ----- crypto_kem API */
1250:
1251:
1252: int crypto_kem_sntrup761_keypair(unsigned char *pk,unsigned char *sk)
1253: {
1254: KEM_KeyGen(pk,sk);
1255: return 0;
1256: }
1257:
1258: int crypto_kem_sntrup761_enc(unsigned char *c,unsigned char *k,const unsigned char *pk)
1259: {
1260: Encap(c,k,pk);
1261: return 0;
1262: }
1263:
1264: int crypto_kem_sntrup761_dec(unsigned char *k,const unsigned char *c,const unsigned char *sk)
1265: {
1266: Decap(k,c,sk);
1267: return 0;
1268: }
1269: