/* * Wrapper for implementing the PQClean API. */ #include #include "randombytes.h" #include "falcon.h" #include "inner.h" #include "rpo.h" #define NONCELEN 40 /* * Encoding formats (nnnn = log of degree, 9 for Falcon-512, 10 for Falcon-1024) * * private key: * header byte: 0101nnnn * private f (6 or 5 bits by element, depending on degree) * private g (6 or 5 bits by element, depending on degree) * private F (8 bits by element) * * public key: * header byte: 0000nnnn * public h (14 bits by element) * * signature: * header byte: 0011nnnn * nonce 40 bytes * value (12 bits by element) * * message + signature: * signature length (2 bytes, big-endian) * nonce 40 bytes * message * header byte: 0010nnnn * value (12 bits by element) * (signature length is 1+len(value), not counting the nonce) */ /* see falcon.h */ int PQCLEAN_FALCON512_CLEAN_crypto_sign_keypair_from_seed_rpo( uint8_t *pk, uint8_t *sk, unsigned char *seed ) { union { uint8_t b[FALCON_KEYGEN_TEMP_9]; uint64_t dummy_u64; fpr dummy_fpr; } tmp; int8_t f[512], g[512], F[512]; uint16_t h[512]; inner_shake256_context rng; size_t u, v; /* * Generate key pair. */ inner_shake256_init(&rng); inner_shake256_inject(&rng, seed, sizeof seed); inner_shake256_flip(&rng); PQCLEAN_FALCON512_CLEAN_keygen(&rng, f, g, F, NULL, h, 9, tmp.b); inner_shake256_ctx_release(&rng); /* * Encode private key. */ sk[0] = 0x50 + 9; u = 1; v = PQCLEAN_FALCON512_CLEAN_trim_i8_encode( sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u, f, 9, PQCLEAN_FALCON512_CLEAN_max_fg_bits[9]); if (v == 0) { return -1; } u += v; v = PQCLEAN_FALCON512_CLEAN_trim_i8_encode( sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u, g, 9, PQCLEAN_FALCON512_CLEAN_max_fg_bits[9]); if (v == 0) { return -1; } u += v; v = PQCLEAN_FALCON512_CLEAN_trim_i8_encode( sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u, F, 9, PQCLEAN_FALCON512_CLEAN_max_FG_bits[9]); if (v == 0) { return -1; } u += v; if (u != PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES) { return -1; } /* * Encode public key. */ pk[0] = 0x00 + 9; v = PQCLEAN_FALCON512_CLEAN_modq_encode( pk + 1, PQCLEAN_FALCON512_CLEAN_CRYPTO_PUBLICKEYBYTES - 1, h, 9); if (v != PQCLEAN_FALCON512_CLEAN_CRYPTO_PUBLICKEYBYTES - 1) { return -1; } return 0; } int PQCLEAN_FALCON512_CLEAN_crypto_sign_keypair_rpo( uint8_t *pk, uint8_t *sk ) { unsigned char seed[48]; /* * Generate a random seed. */ randombytes(seed, sizeof seed); return PQCLEAN_FALCON512_CLEAN_crypto_sign_keypair_from_seed_rpo(pk, sk, seed); } /* * Compute the signature. nonce[] receives the nonce and must have length * NONCELEN bytes. sigbuf[] receives the signature value (without nonce * or header byte), with *sigbuflen providing the maximum value length and * receiving the actual value length. * * If a signature could be computed but not encoded because it would * exceed the output buffer size, then a new signature is computed. If * the provided buffer size is too low, this could loop indefinitely, so * the caller must provide a size that can accommodate signatures with a * large enough probability. * * Return value: 0 on success, -1 on error. */ static int do_sign( uint8_t *nonce, uint8_t *sigbuf, size_t *sigbuflen, const uint8_t *m, size_t mlen, const uint8_t *sk ) { union { uint8_t b[72 * 512]; uint64_t dummy_u64; fpr dummy_fpr; } tmp; int8_t f[512], g[512], F[512], G[512]; struct { int16_t sig[512]; uint16_t hm[512]; } r; unsigned char seed[48]; inner_shake256_context sc; rpo128_context rc; size_t u, v; /* * Decode the private key. */ if (sk[0] != 0x50 + 9) { return -1; } u = 1; v = PQCLEAN_FALCON512_CLEAN_trim_i8_decode( f, 9, PQCLEAN_FALCON512_CLEAN_max_fg_bits[9], sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u); if (v == 0) { return -1; } u += v; v = PQCLEAN_FALCON512_CLEAN_trim_i8_decode( g, 9, PQCLEAN_FALCON512_CLEAN_max_fg_bits[9], sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u); if (v == 0) { return -1; } u += v; v = PQCLEAN_FALCON512_CLEAN_trim_i8_decode( F, 9, PQCLEAN_FALCON512_CLEAN_max_FG_bits[9], sk + u, PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES - u); if (v == 0) { return -1; } u += v; if (u != PQCLEAN_FALCON512_CLEAN_CRYPTO_SECRETKEYBYTES) { return -1; } if (!PQCLEAN_FALCON512_CLEAN_complete_private(G, f, g, F, 9, tmp.b)) { return -1; } /* * Create a random nonce (40 bytes). */ randombytes(nonce, NONCELEN); /* ==== Start: Deviation from the reference implementation ================================= */ // Transform the nonce into 8 chunks each of size 5 bytes. We do this in order to be sure that // the conversion to field elements succeeds uint8_t buffer[64]; memset(buffer, 0, 64); for (size_t i = 0; i < 8; i++) { buffer[8 * i] = nonce[5 * i]; buffer[8 * i + 1] = nonce[5 * i + 1]; buffer[8 * i + 2] = nonce[5 * i + 2]; buffer[8 * i + 3] = nonce[5 * i + 3]; buffer[8 * i + 4] = nonce[5 * i + 4]; } /* * Hash message nonce + message into a vector. */ rpo128_init(&rc); rpo128_absorb(&rc, buffer, NONCELEN + 24); rpo128_absorb(&rc, m, mlen); rpo128_finalize(&rc); PQCLEAN_FALCON512_CLEAN_hash_to_point_rpo(&rc, r.hm, 9); rpo128_release(&rc); /* ==== End: Deviation from the reference implementation =================================== */ /* * Initialize a RNG. */ randombytes(seed, sizeof seed); inner_shake256_init(&sc); inner_shake256_inject(&sc, seed, sizeof seed); inner_shake256_flip(&sc); /* * Compute and return the signature. This loops until a signature * value is found that fits in the provided buffer. */ for (;;) { PQCLEAN_FALCON512_CLEAN_sign_dyn(r.sig, &sc, f, g, F, G, r.hm, 9, tmp.b); v = PQCLEAN_FALCON512_CLEAN_comp_encode(sigbuf, *sigbuflen, r.sig, 9); if (v != 0) { inner_shake256_ctx_release(&sc); *sigbuflen = v; return 0; } } } /* * Verify a signature. The nonce has size NONCELEN bytes. sigbuf[] * (of size sigbuflen) contains the signature value, not including the * header byte or nonce. Return value is 0 on success, -1 on error. */ static int do_verify( const uint8_t *nonce, const uint8_t *sigbuf, size_t sigbuflen, const uint8_t *m, size_t mlen, const uint8_t *pk ) { union { uint8_t b[2 * 512]; uint64_t dummy_u64; fpr dummy_fpr; } tmp; uint16_t h[512], hm[512]; int16_t sig[512]; rpo128_context rc; /* * Decode public key. */ if (pk[0] != 0x00 + 9) { return -1; } if (PQCLEAN_FALCON512_CLEAN_modq_decode(h, 9, pk + 1, PQCLEAN_FALCON512_CLEAN_CRYPTO_PUBLICKEYBYTES - 1) != PQCLEAN_FALCON512_CLEAN_CRYPTO_PUBLICKEYBYTES - 1) { return -1; } PQCLEAN_FALCON512_CLEAN_to_ntt_monty(h, 9); /* * Decode signature. */ if (sigbuflen == 0) { return -1; } if (PQCLEAN_FALCON512_CLEAN_comp_decode(sig, 9, sigbuf, sigbuflen) != sigbuflen) { return -1; } /* ==== Start: Deviation from the reference implementation ================================= */ /* * Hash nonce + message into a vector. */ // Transform the nonce into 8 chunks each of size 5 bytes. We do this in order to be sure that // the conversion to field elements succeeds uint8_t buffer[64]; memset(buffer, 0, 64); for (size_t i = 0; i < 8; i++) { buffer[8 * i] = nonce[5 * i]; buffer[8 * i + 1] = nonce[5 * i + 1]; buffer[8 * i + 2] = nonce[5 * i + 2]; buffer[8 * i + 3] = nonce[5 * i + 3]; buffer[8 * i + 4] = nonce[5 * i + 4]; } rpo128_init(&rc); rpo128_absorb(&rc, buffer, NONCELEN + 24); rpo128_absorb(&rc, m, mlen); rpo128_finalize(&rc); PQCLEAN_FALCON512_CLEAN_hash_to_point_rpo(&rc, hm, 9); rpo128_release(&rc); /* === End: Deviation from the reference implementation ==================================== */ /* * Verify signature. */ if (!PQCLEAN_FALCON512_CLEAN_verify_raw(hm, sig, h, 9, tmp.b)) { return -1; } return 0; } /* see falcon.h */ int PQCLEAN_FALCON512_CLEAN_crypto_sign_signature_rpo( uint8_t *sig, size_t *siglen, const uint8_t *m, size_t mlen, const uint8_t *sk ) { /* * The PQCLEAN_FALCON512_CLEAN_CRYPTO_BYTES constant is used for * the signed message object (as produced by crypto_sign()) * and includes a two-byte length value, so we take care here * to only generate signatures that are two bytes shorter than * the maximum. This is done to ensure that crypto_sign() * and crypto_sign_signature() produce the exact same signature * value, if used on the same message, with the same private key, * and using the same output from randombytes() (this is for * reproducibility of tests). */ size_t vlen; vlen = PQCLEAN_FALCON512_CLEAN_CRYPTO_BYTES - NONCELEN - 3; if (do_sign(sig + 1, sig + 1 + NONCELEN, &vlen, m, mlen, sk) < 0) { return -1; } sig[0] = 0x30 + 9; *siglen = 1 + NONCELEN + vlen; return 0; } /* see falcon.h */ int PQCLEAN_FALCON512_CLEAN_crypto_sign_verify_rpo( const uint8_t *sig, size_t siglen, const uint8_t *m, size_t mlen, const uint8_t *pk ) { if (siglen < 1 + NONCELEN) { return -1; } if (sig[0] != 0x30 + 9) { return -1; } return do_verify(sig + 1, sig + 1 + NONCELEN, siglen - 1 - NONCELEN, m, mlen, pk); }