2011-07-16 01:41:23 +00:00
|
|
|
/*
|
|
|
|
This program implements the ECIES public key encryption scheme based on the
|
|
|
|
NIST B163 elliptic curve and the XTEA block cipher. The code was written
|
|
|
|
as an accompaniment for an article published in phrack #63 and is released to
|
|
|
|
the public domain.
|
|
|
|
Original author: Phrack Staff
|
|
|
|
Ported to ARM7TDMI: Jiri Pittner <jiri@pittnerovi.com>
|
|
|
|
compiled by arm-elf-gcc (GCC) 4.0.1 and tested on LPC2106
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdint.h>
|
2011-07-16 17:12:35 +00:00
|
|
|
#include "ecc.h"
|
2011-07-23 21:47:42 +00:00
|
|
|
#include "random.h"
|
2011-07-16 17:12:35 +00:00
|
|
|
|
|
|
|
exp_t base_order;
|
|
|
|
elem_t poly; /* the reduction polynomial */
|
|
|
|
elem_t coeff_b, base_x, base_y;
|
2011-07-16 01:41:23 +00:00
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static unsigned char rnd1()
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
2011-07-24 13:58:47 +00:00
|
|
|
return getRandom() & 0xFF;
|
2011-07-16 01:41:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//compiles to a quite reasonable assembly code
|
|
|
|
//void INT2CHARS (unsigned char *ptr, uint32_t val)
|
2011-08-05 01:03:03 +00:00
|
|
|
static void INT2CHARS (char *ptr, uint32_t val)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
*ptr++ =val; val>>=8;
|
|
|
|
*ptr++ =val; val>>=8;
|
|
|
|
*ptr++ =val; val>>=8;
|
|
|
|
*ptr++ =val;
|
|
|
|
}
|
|
|
|
|
|
|
|
//uint32_t CHARS2INT(const unsigned char *ptr)
|
2011-08-05 01:03:03 +00:00
|
|
|
static uint32_t CHARS2INT(const char *ptr)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
uint32_t r;
|
|
|
|
ptr+=3;
|
|
|
|
r=*ptr--; r<<=8;
|
|
|
|
r|=*ptr--; r<<=8;
|
|
|
|
r|=*ptr--; r<<=8;
|
|
|
|
r|=*ptr--;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static int bitstr_is_clear(const bitstr_t x)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(i = 0; i < NUMWORDS && ! *x++; i++);
|
|
|
|
return i == NUMWORDS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* return the number of the highest one-bit + 1 */
|
2011-08-05 01:03:03 +00:00
|
|
|
static int bitstr_sizeinbits(const bitstr_t x)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
uint32_t mask;
|
|
|
|
for(x += NUMWORDS, i = 32 * NUMWORDS; i > 0 && ! *--x; i -= 32);
|
|
|
|
if (i)
|
|
|
|
for(mask = ((uint32_t) 1) << 31; ! (*x & mask); mask >>= 1, i--);
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* left-shift by 'count' digits */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bitstr_lshift(bitstr_t A, const bitstr_t B, int count)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i, offs = 4 * (count / 32);
|
|
|
|
memmove((void*)A + offs, B, sizeof(bitstr_t) - offs);
|
|
|
|
memset(A, 0, offs);
|
|
|
|
if (count %= 32) {
|
|
|
|
for(i = NUMWORDS - 1; i > 0; i--)
|
|
|
|
A[i] = (A[i] << count) | (A[i - 1] >> (32 - count));
|
|
|
|
A[0] <<= count;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* (raw) import from a byte array */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bitstr_import(bitstr_t x, const char *s)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(x += NUMWORDS, i = 0; i < NUMWORDS; i++, s += 4)
|
|
|
|
*--x = CHARS2INT(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* (raw) export to a byte array */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bitstr_export(char *s, const bitstr_t x)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(x += NUMWORDS, i = 0; i < NUMWORDS; i++, s += 4)
|
|
|
|
INT2CHARS(s, *--x);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* export as hex string (null-terminated!) */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bitstr_to_hex(char *s, const bitstr_t x)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(x += NUMWORDS, i = 0; i < NUMWORDS; i++, s += 8)
|
|
|
|
siprintf(s, "%08lx", *--x);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static uint8_t letter2bin (const char c)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
return c>'9' ? c+10-(c>='a'?'a':'A') : c-'0';
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static uint8_t octet2bin(const char* octet)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
return (letter2bin(octet[0])<<4) | letter2bin(octet[1]);
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bin2letter(char *c, uint8_t b)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
*c = b<10? '0'+b : 'A'+b-10;
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void bin2octet(char *octet, uint8_t bin)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
bin2letter(octet,bin>>4);
|
|
|
|
bin2letter(octet+1,bin&0x0f);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static uint32_t getword32(const char *s)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
//little endian
|
|
|
|
union {uint32_t i; uint8_t c[sizeof(uint32_t)];} r;
|
|
|
|
r.c[3]=octet2bin(s);
|
|
|
|
r.c[2]=octet2bin(s+2);
|
|
|
|
r.c[1]=octet2bin(s+4);
|
|
|
|
r.c[0]=octet2bin(s+6);
|
|
|
|
return r.i;
|
|
|
|
}
|
|
|
|
/* import from a hex string */
|
2011-08-05 01:03:03 +00:00
|
|
|
static int bitstr_parse(bitstr_t x, const char *s)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int len = strlen(s);
|
|
|
|
//if ((s[len = strspn(s, "0123456789abcdefABCDEF")]) ||
|
|
|
|
// (len > NUMWORDS * 8))
|
|
|
|
// return -1;
|
|
|
|
|
|
|
|
bitstr_clear(x);
|
|
|
|
x += len / 8;
|
|
|
|
if (len % 8) {
|
|
|
|
*x=getword32(s);
|
|
|
|
*x >>= 32 - 4 * (len % 8);
|
|
|
|
s += len % 8;
|
|
|
|
len &= ~7;
|
|
|
|
}
|
|
|
|
for(; *s; s += 8)
|
|
|
|
*--x = getword32(s);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2011-07-16 17:12:35 +00:00
|
|
|
int bitstr_parse_export(char *exp, const char *s)
|
|
|
|
{
|
|
|
|
bitstr_t x;
|
|
|
|
if( bitstr_parse(x, s) != -1 ){
|
|
|
|
bitstr_export(exp, x);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-07-16 01:41:23 +00:00
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static int field_is1(const elem_t x)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
if (*x++ != 1) return 0;
|
|
|
|
for(i = 1; i < NUMWORDS && ! *x++; i++);
|
|
|
|
return i == NUMWORDS;
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void field_add(elem_t z, const elem_t x, const elem_t y) /* field addition */
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(i = 0; i < NUMWORDS; i++)
|
|
|
|
*z++ = *x++ ^ *y++;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define field_add1(A) MACRO( A[0] ^= 1 )
|
|
|
|
|
|
|
|
/* field multiplication */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void field_mult(elem_t z, const elem_t x, const elem_t y)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
elem_t b;
|
|
|
|
int i, j;
|
|
|
|
/* assert(z != y); */
|
|
|
|
bitstr_copy(b, x);
|
|
|
|
if (bitstr_getbit(y, 0))
|
|
|
|
bitstr_copy(z, x);
|
|
|
|
else
|
|
|
|
bitstr_clear(z);
|
|
|
|
for(i = 1; i < DEGREE; i++) {
|
|
|
|
for(j = NUMWORDS - 1; j > 0; j--)
|
|
|
|
b[j] = (b[j] << 1) | (b[j - 1] >> 31);
|
|
|
|
b[0] <<= 1;
|
|
|
|
if (bitstr_getbit(b, DEGREE))
|
|
|
|
field_add(b, b, poly);
|
|
|
|
if (bitstr_getbit(y, i))
|
|
|
|
field_add(z, z, b);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void field_invert(elem_t z, const elem_t x) /* field inversion */
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
elem_t u, v, g, h;
|
|
|
|
int i;
|
|
|
|
bitstr_copy(u, x);
|
|
|
|
bitstr_copy(v, poly);
|
|
|
|
bitstr_clear(g);
|
|
|
|
field_set1(z);
|
|
|
|
while (! field_is1(u)) {
|
|
|
|
i = bitstr_sizeinbits(u) - bitstr_sizeinbits(v);
|
|
|
|
if (i < 0) {
|
|
|
|
bitstr_swap(u, v); bitstr_swap(g, z); i = -i;
|
|
|
|
}
|
|
|
|
bitstr_lshift(h, v, i);
|
|
|
|
field_add(u, u, h);
|
|
|
|
bitstr_lshift(h, g, i);
|
|
|
|
field_add(z, z, h);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
/* The following routines do the ECC arithmetic. Elliptic curve points
|
|
|
|
are represented by pairs (x,y) of elem_t. It is assumed that curve
|
|
|
|
coefficient 'a' is equal to 1 (this is the case for all NIST binary
|
|
|
|
curves). Coefficient 'b' is given in 'coeff_b'. '(base_x, base_y)'
|
|
|
|
is a point that generates a large prime order group. */
|
|
|
|
|
|
|
|
/* check if y^2 + x*y = x^3 + *x^2 + coeff_b holds */
|
2011-08-05 01:03:03 +00:00
|
|
|
static int is_point_on_curve(const elem_t x, const elem_t y)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
elem_t a, b;
|
|
|
|
if (point_is_zero(x, y))
|
|
|
|
return 1;
|
|
|
|
field_mult(a, x, x);
|
|
|
|
field_mult(b, a, x);
|
|
|
|
field_add(a, a, b);
|
|
|
|
field_add(a, a, coeff_b);
|
|
|
|
field_mult(b, y, y);
|
|
|
|
field_add(a, a, b);
|
|
|
|
field_mult(b, x, y);
|
|
|
|
return bitstr_is_equal(a, b);
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void point_double(elem_t x, elem_t y) /* double the point (x,y) */
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
if (! bitstr_is_clear(x)) {
|
|
|
|
elem_t a;
|
|
|
|
field_invert(a, x);
|
|
|
|
field_mult(a, a, y);
|
|
|
|
field_add(a, a, x);
|
|
|
|
field_mult(y, x, x);
|
|
|
|
field_mult(x, a, a);
|
|
|
|
field_add1(a);
|
|
|
|
field_add(x, x, a);
|
|
|
|
field_mult(a, a, x);
|
|
|
|
field_add(y, y, a);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
bitstr_clear(y);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* add two points together (x1, y1) := (x1, y1) + (x2, y2) */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void point_add(elem_t x1, elem_t y1, const elem_t x2, const elem_t y2)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
if (! point_is_zero(x2, y2)) {
|
|
|
|
if (point_is_zero(x1, y1))
|
|
|
|
point_copy(x1, y1, x2, y2);
|
|
|
|
else {
|
|
|
|
if (bitstr_is_equal(x1, x2)) {
|
|
|
|
if (bitstr_is_equal(y1, y2))
|
|
|
|
point_double(x1, y1);
|
|
|
|
else
|
|
|
|
point_set_zero(x1, y1);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
elem_t a, b, c, d;
|
|
|
|
field_add(a, y1, y2);
|
|
|
|
field_add(b, x1, x2);
|
|
|
|
field_invert(c, b);
|
|
|
|
field_mult(c, c, a);
|
|
|
|
field_mult(d, c, c);
|
|
|
|
field_add(d, d, c);
|
|
|
|
field_add(d, d, b);
|
|
|
|
field_add1(d);
|
|
|
|
field_add(x1, x1, d);
|
|
|
|
field_mult(a, x1, c);
|
|
|
|
field_add(a, a, d);
|
|
|
|
field_add(y1, y1, a);
|
|
|
|
bitstr_copy(x1, d);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* point multiplication via double-and-add algorithm */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void point_mult(elem_t x, elem_t y, const exp_t exp)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
elem_t X, Y;
|
|
|
|
int i;
|
|
|
|
point_set_zero(X, Y);
|
|
|
|
for(i = bitstr_sizeinbits(exp) - 1; i >= 0; i--) {
|
|
|
|
point_double(X, Y);
|
|
|
|
if (bitstr_getbit(exp, i))
|
|
|
|
point_add(X, Y, x, y);
|
|
|
|
}
|
|
|
|
point_copy(x, y, X, Y);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* draw a random value 'exp' with 1 <= exp < n */
|
|
|
|
//@@@ Make a HARDWARE randomness generator with ARM, at the moment just a simple pseudorandom replacement
|
2011-08-05 01:03:03 +00:00
|
|
|
static void get_random_exponent(exp_t exp)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
char buf[4 * NUMWORDS];
|
|
|
|
int r ;
|
|
|
|
do {
|
|
|
|
for(r=0; r<4 * NUMWORDS; ++r)
|
|
|
|
{
|
|
|
|
buf[r]= rnd1();
|
|
|
|
}
|
|
|
|
bitstr_import(exp, buf);
|
|
|
|
for(r = bitstr_sizeinbits(base_order) - 1; r < NUMWORDS * 32; r++)
|
|
|
|
bitstr_clrbit(exp, r);
|
|
|
|
} while(bitstr_is_clear(exp));
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void XTEA_init_key(uint32_t *k, const char *key)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
k[0] = CHARS2INT(key + 0); k[1] = CHARS2INT(key + 4);
|
|
|
|
k[2] = CHARS2INT(key + 8); k[3] = CHARS2INT(key + 12);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the XTEA block cipher */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void XTEA_encipher_block(char *data, const uint32_t *k)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
uint32_t sum = 0, delta = 0x9e3779b9, y, z;
|
|
|
|
int i;
|
|
|
|
y = CHARS2INT(data); z = CHARS2INT(data + 4);
|
|
|
|
for(i = 0; i < 32; i++) {
|
|
|
|
y += ((z << 4 ^ z >> 5) + z) ^ (sum + k[sum & 3]);
|
|
|
|
sum += delta;
|
|
|
|
z += ((y << 4 ^ y >> 5) + y) ^ (sum + k[(sum >> 11) & 3]);
|
|
|
|
}
|
|
|
|
INT2CHARS(data, y); INT2CHARS(data + 4, z);
|
|
|
|
}
|
|
|
|
/* encrypt in CTR mode */
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void XTEA_ctr_crypt(char *data, int size, const char *key)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
uint32_t k[4], ctr = 0;
|
|
|
|
int len, i;
|
|
|
|
char buf[8];
|
|
|
|
XTEA_init_key(k, key);
|
|
|
|
while(size) {
|
|
|
|
INT2CHARS(buf, 0); INT2CHARS(buf + 4, ctr++);
|
|
|
|
XTEA_encipher_block(buf, k);
|
|
|
|
len = MIN(8, size);
|
|
|
|
for(i = 0; i < len; i++)
|
|
|
|
*data++ ^= buf[i];
|
|
|
|
size -= len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* calculate the CBC MAC */
|
2011-08-05 01:03:03 +00:00
|
|
|
static void XTEA_cbcmac(char *mac, const char *data, int size, const char *key)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
uint32_t k[4];
|
|
|
|
int len, i;
|
|
|
|
XTEA_init_key(k, key);
|
|
|
|
|
|
|
|
INT2CHARS(mac, 0L);
|
|
|
|
INT2CHARS(mac + 4, size);
|
|
|
|
XTEA_encipher_block(mac, k);
|
|
|
|
while(size) {
|
|
|
|
len = MIN(8, size);
|
|
|
|
for(i = 0; i < len; i++)
|
|
|
|
mac[i] ^= *data++;
|
|
|
|
XTEA_encipher_block(mac, k);
|
|
|
|
size -= len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* modified(!) Davies-Meyer construction.*/
|
2011-08-05 01:03:03 +00:00
|
|
|
static void XTEA_davies_meyer(char *out, const char *in, int ilen)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
uint32_t k[4];
|
|
|
|
char buf[8];
|
|
|
|
int i;
|
|
|
|
memset(out, 0, 8);
|
|
|
|
while(ilen--) {
|
|
|
|
XTEA_init_key(k, in);
|
|
|
|
memcpy(buf, out, 8);
|
|
|
|
XTEA_encipher_block(buf, k);
|
|
|
|
for(i = 0; i < 8; i++)
|
|
|
|
out[i] ^= buf[i];
|
|
|
|
in += 16;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
#if 0
|
|
|
|
void ECIES_generate_key_pair(void) /* generate a public/private key pair */
|
|
|
|
{
|
|
|
|
char buf[8 * NUMWORDS + 1]; *bufptr = buf + NUMWORDS * 8 - (DEGREE + 3) / 4;
|
|
|
|
elem_t x, y;
|
|
|
|
exp_t k;
|
|
|
|
get_random_exponent(k);
|
|
|
|
point_copy(x, y, base_x, base_y);
|
|
|
|
point_mult(x, y, k);
|
|
|
|
/*
|
|
|
|
uart0Puts("Here is your new public/private key pair:\n");
|
|
|
|
bitstr_to_hex(buf, x); uart0Puts("Public key: "); uart0Puts(bufptr); uart0Putch(':');
|
|
|
|
bitstr_to_hex(buf, y); uart0Puts(bufptr);
|
|
|
|
bitstr_to_hex(buf, k); uart0Puts("\nPrivate key: "); uart0Puts(bufptr); uart0Putch('\n');
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* check that a given elem_t-pair is a valid point on the curve != 'o' */
|
2011-08-05 01:03:03 +00:00
|
|
|
static int ECIES_embedded_public_key_validation(const elem_t Px, const elem_t Py)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
return (bitstr_sizeinbits(Px) > DEGREE) || (bitstr_sizeinbits(Py) > DEGREE) ||
|
|
|
|
point_is_zero(Px, Py) || ! is_point_on_curve(Px, Py) ? -1 : 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* same thing, but check also that (Px,Py) generates a group of order n */
|
2011-08-05 01:03:03 +00:00
|
|
|
static int ECIES_public_key_validation(const char *Px, const char *Py)
|
2011-07-16 01:41:23 +00:00
|
|
|
{
|
|
|
|
elem_t x, y;
|
|
|
|
if ((bitstr_parse(x, Px) < 0) || (bitstr_parse(y, Py) < 0))
|
|
|
|
return -1;
|
|
|
|
if (ECIES_embedded_public_key_validation(x, y) < 0)
|
|
|
|
return -1;
|
|
|
|
point_mult(x, y, base_order);
|
|
|
|
return point_is_zero(x, y) ? 1 : -1;
|
|
|
|
}
|
|
|
|
|
2011-08-05 01:03:03 +00:00
|
|
|
static void ECIES_kdf(char *k1, char *k2, const elem_t Zx, /* a non-standard KDF */
|
2011-07-16 01:41:23 +00:00
|
|
|
const elem_t Rx, const elem_t Ry)
|
|
|
|
{
|
|
|
|
int bufsize = (3 * (4 * NUMWORDS) + 1 + 15) & ~15;
|
|
|
|
char buf[bufsize];
|
|
|
|
memset(buf, 0, bufsize);
|
|
|
|
bitstr_export(buf, Zx);
|
|
|
|
bitstr_export(buf + 4 * NUMWORDS, Rx);
|
|
|
|
bitstr_export(buf + 8 * NUMWORDS, Ry);
|
|
|
|
buf[12 * NUMWORDS] = 0; XTEA_davies_meyer(k1, buf, bufsize / 16);
|
|
|
|
buf[12 * NUMWORDS] = 1; XTEA_davies_meyer(k1 + 8, buf, bufsize / 16);
|
|
|
|
buf[12 * NUMWORDS] = 2; XTEA_davies_meyer(k2, buf, bufsize / 16);
|
|
|
|
buf[12 * NUMWORDS] = 3; XTEA_davies_meyer(k2 + 8, buf, bufsize / 16);
|
|
|
|
}
|
|
|
|
|
2011-07-16 17:12:35 +00:00
|
|
|
void ECIES_encyptkeygen(uint8_t *px, uint8_t *py,
|
2011-07-16 01:41:23 +00:00
|
|
|
uint8_t k1[16], uint8_t k2[16], uint8_t *Rx_exp, uint8_t *Ry_exp)
|
|
|
|
{
|
|
|
|
elem_t Rx, Ry, Zx, Zy;
|
|
|
|
exp_t k;
|
|
|
|
do {
|
|
|
|
get_random_exponent(k);
|
2011-07-16 17:12:35 +00:00
|
|
|
bitstr_import(Zx, (char*)px);
|
|
|
|
bitstr_import(Zy, (char*)py);
|
2011-07-16 01:41:23 +00:00
|
|
|
point_mult(Zx, Zy, k);
|
|
|
|
point_double(Zx, Zy); /* cofactor h = 2 on B163 */
|
|
|
|
} while(point_is_zero(Zx, Zy));
|
|
|
|
point_copy(Rx, Ry, base_x, base_y);
|
|
|
|
point_mult(Rx, Ry, k);
|
|
|
|
ECIES_kdf((char *)k1,(char *) k2, Zx, Rx, Ry);
|
|
|
|
bitstr_export((char*)Rx_exp, Rx);
|
|
|
|
bitstr_export((char*)Ry_exp, Ry);
|
|
|
|
}
|
|
|
|
|
2011-07-16 17:12:35 +00:00
|
|
|
int ECIES_decryptkeygen(uint8_t *rx, uint8_t *ry,
|
2011-07-16 01:41:23 +00:00
|
|
|
uint8_t k1[16], uint8_t k2[16], const char *privkey)
|
|
|
|
{
|
|
|
|
elem_t Rx, Ry, Zx, Zy;
|
|
|
|
exp_t d;
|
2011-07-16 17:12:35 +00:00
|
|
|
bitstr_import(Rx, (char*)rx);
|
|
|
|
bitstr_import(Ry, (char*)ry);
|
2011-07-16 01:41:23 +00:00
|
|
|
if (ECIES_embedded_public_key_validation(Rx, Ry) < 0)
|
|
|
|
return -1;
|
|
|
|
bitstr_parse(d, privkey);
|
|
|
|
point_copy(Zx, Zy, Rx, Ry);
|
|
|
|
point_mult(Zx, Zy, d);
|
|
|
|
point_double(Zx, Zy); /* cofactor h = 2 on B163 */
|
|
|
|
if (point_is_zero(Zx, Zy))
|
|
|
|
return -1;
|
|
|
|
ECIES_kdf((char*)k1,(char*) k2, Zx, Rx, Ry);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-07-16 17:12:35 +00:00
|
|
|
void ECIES_setup(void)
|
|
|
|
{
|
|
|
|
bitstr_parse(poly, "800000000000000000000000000000000000000c9");
|
|
|
|
bitstr_parse(coeff_b, "20a601907b8c953ca1481eb10512f78744a3205fd");
|
|
|
|
bitstr_parse(base_x, "3f0eba16286a2d57ea0991168d4994637e8343e36");
|
|
|
|
bitstr_parse(base_y, "0d51fbc6c71a0094fa2cdd545b11c5c0c797324f1");
|
|
|
|
bitstr_parse(base_order, "40000000000000000000292fe77e70c12a4234c33");
|
|
|
|
}
|
|
|
|
|
2011-07-16 01:41:23 +00:00
|
|
|
#define ECIES_OVERHEAD (8 * NUMWORDS + 8)
|
|
|
|
|
|
|
|
/* ECIES encryption; the resulting cipher text message will be
|
|
|
|
(len + ECIES_OVERHEAD) bytes long */
|
|
|
|
void ECIES_encryption(char *msg, const char *text, int len,
|
|
|
|
const char *Px, const char *Py)
|
|
|
|
{
|
|
|
|
elem_t Rx, Ry, Zx, Zy;
|
|
|
|
char k1[16], k2[16];
|
|
|
|
exp_t k;
|
|
|
|
//memset(msg,0,len+ECIES_OVERHEAD); //in the case buffer was not clean
|
|
|
|
do {
|
|
|
|
get_random_exponent(k);
|
|
|
|
bitstr_parse(Zx, Px);
|
|
|
|
bitstr_parse(Zy, Py);
|
|
|
|
point_mult(Zx, Zy, k);
|
|
|
|
point_double(Zx, Zy); /* cofactor h = 2 on B163 */
|
|
|
|
} while(point_is_zero(Zx, Zy));
|
|
|
|
point_copy(Rx, Ry, base_x, base_y);
|
|
|
|
point_mult(Rx, Ry, k);
|
|
|
|
ECIES_kdf(k1, k2, Zx, Rx, Ry);
|
|
|
|
bitstr_export(msg, Rx);
|
|
|
|
bitstr_export(msg + 4 * NUMWORDS, Ry);
|
|
|
|
memcpy(msg + 8 * NUMWORDS, text, len);
|
|
|
|
XTEA_ctr_crypt(msg + 8 * NUMWORDS, len, k1);
|
|
|
|
XTEA_cbcmac(msg + 8 * NUMWORDS + len, msg + 8 * NUMWORDS, len, k2);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* ECIES decryption */
|
|
|
|
int ECIES_decryption(char *text, const char *msg, int len,
|
|
|
|
const char *privkey)
|
|
|
|
{
|
|
|
|
elem_t Rx, Ry, Zx, Zy;
|
|
|
|
char k1[16], k2[16], mac[8];
|
|
|
|
exp_t d;
|
|
|
|
bitstr_import(Rx, msg);
|
|
|
|
bitstr_import(Ry, msg + 4 * NUMWORDS);
|
|
|
|
if (ECIES_embedded_public_key_validation(Rx, Ry) < 0)
|
|
|
|
return -1;
|
|
|
|
bitstr_parse(d, privkey);
|
|
|
|
point_copy(Zx, Zy, Rx, Ry);
|
|
|
|
point_mult(Zx, Zy, d);
|
|
|
|
point_double(Zx, Zy); /* cofactor h = 2 on B163 */
|
|
|
|
if (point_is_zero(Zx, Zy))
|
|
|
|
return -1;
|
|
|
|
ECIES_kdf(k1, k2, Zx, Rx, Ry);
|
|
|
|
|
|
|
|
XTEA_cbcmac(mac, msg + 8 * NUMWORDS, len, k2);
|
|
|
|
if (memcmp(mac, msg + 8 * NUMWORDS + len, 8))
|
|
|
|
return -1;
|
|
|
|
memcpy(text, msg + 8 * NUMWORDS, len);
|
|
|
|
XTEA_ctr_crypt(text, len, k1);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|