xref: /nrf52832-nimble/packages/NimBLE-latest/ext/tinycrypt/src/ecc_dsa.c (revision 042d53a763ad75cb1465103098bb88c245d95138)
1*042d53a7SEvalZero /* ec_dsa.c - TinyCrypt implementation of EC-DSA */
2*042d53a7SEvalZero 
3*042d53a7SEvalZero /* Copyright (c) 2014, Kenneth MacKay
4*042d53a7SEvalZero  * All rights reserved.
5*042d53a7SEvalZero  *
6*042d53a7SEvalZero  * Redistribution and use in source and binary forms, with or without
7*042d53a7SEvalZero  * modification, are permitted provided that the following conditions are met:
8*042d53a7SEvalZero  *  * Redistributions of source code must retain the above copyright notice,
9*042d53a7SEvalZero  *    this list of conditions and the following disclaimer.
10*042d53a7SEvalZero  *  * Redistributions in binary form must reproduce the above copyright notice,
11*042d53a7SEvalZero  *    this list of conditions and the following disclaimer in the documentation
12*042d53a7SEvalZero  *    and/or other materials provided with the distribution.
13*042d53a7SEvalZero  *
14*042d53a7SEvalZero  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15*042d53a7SEvalZero  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16*042d53a7SEvalZero  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17*042d53a7SEvalZero  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
18*042d53a7SEvalZero  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
19*042d53a7SEvalZero  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
20*042d53a7SEvalZero  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
21*042d53a7SEvalZero  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
22*042d53a7SEvalZero  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
23*042d53a7SEvalZero  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
24*042d53a7SEvalZero  * POSSIBILITY OF SUCH DAMAGE.*/
25*042d53a7SEvalZero 
26*042d53a7SEvalZero /*
27*042d53a7SEvalZero  *  Copyright (C) 2017 by Intel Corporation, All Rights Reserved.
28*042d53a7SEvalZero  *
29*042d53a7SEvalZero  *  Redistribution and use in source and binary forms, with or without
30*042d53a7SEvalZero  *  modification, are permitted provided that the following conditions are met:
31*042d53a7SEvalZero  *
32*042d53a7SEvalZero  *    - Redistributions of source code must retain the above copyright notice,
33*042d53a7SEvalZero  *     this list of conditions and the following disclaimer.
34*042d53a7SEvalZero  *
35*042d53a7SEvalZero  *    - Redistributions in binary form must reproduce the above copyright
36*042d53a7SEvalZero  *    notice, this list of conditions and the following disclaimer in the
37*042d53a7SEvalZero  *    documentation and/or other materials provided with the distribution.
38*042d53a7SEvalZero  *
39*042d53a7SEvalZero  *    - Neither the name of Intel Corporation nor the names of its contributors
40*042d53a7SEvalZero  *    may be used to endorse or promote products derived from this software
41*042d53a7SEvalZero  *    without specific prior written permission.
42*042d53a7SEvalZero  *
43*042d53a7SEvalZero  *  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
44*042d53a7SEvalZero  *  AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45*042d53a7SEvalZero  *  IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46*042d53a7SEvalZero  *  ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
47*042d53a7SEvalZero  *  LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
48*042d53a7SEvalZero  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
49*042d53a7SEvalZero  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
50*042d53a7SEvalZero  *  INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
51*042d53a7SEvalZero  *  CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
52*042d53a7SEvalZero  *  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
53*042d53a7SEvalZero  *  POSSIBILITY OF SUCH DAMAGE.
54*042d53a7SEvalZero  */
55*042d53a7SEvalZero 
56*042d53a7SEvalZero #include <tinycrypt/constants.h>
57*042d53a7SEvalZero #include <tinycrypt/ecc.h>
58*042d53a7SEvalZero #include <tinycrypt/ecc_dsa.h>
59*042d53a7SEvalZero 
60*042d53a7SEvalZero #if default_RNG_defined
61*042d53a7SEvalZero static uECC_RNG_Function g_rng_function = &default_CSPRNG;
62*042d53a7SEvalZero #else
63*042d53a7SEvalZero static uECC_RNG_Function g_rng_function = 0;
64*042d53a7SEvalZero #endif
65*042d53a7SEvalZero 
bits2int(uECC_word_t * native,const uint8_t * bits,unsigned bits_size,uECC_Curve curve)66*042d53a7SEvalZero static void bits2int(uECC_word_t *native, const uint8_t *bits,
67*042d53a7SEvalZero 		     unsigned bits_size, uECC_Curve curve)
68*042d53a7SEvalZero {
69*042d53a7SEvalZero 	unsigned num_n_bytes = BITS_TO_BYTES(curve->num_n_bits);
70*042d53a7SEvalZero 	unsigned num_n_words = BITS_TO_WORDS(curve->num_n_bits);
71*042d53a7SEvalZero 	int shift;
72*042d53a7SEvalZero 	uECC_word_t carry;
73*042d53a7SEvalZero 	uECC_word_t *ptr;
74*042d53a7SEvalZero 
75*042d53a7SEvalZero 	if (bits_size > num_n_bytes) {
76*042d53a7SEvalZero 		bits_size = num_n_bytes;
77*042d53a7SEvalZero 	}
78*042d53a7SEvalZero 
79*042d53a7SEvalZero 	uECC_vli_clear(native, num_n_words);
80*042d53a7SEvalZero 	uECC_vli_bytesToNative(native, bits, bits_size);
81*042d53a7SEvalZero 	if (bits_size * 8 <= (unsigned)curve->num_n_bits) {
82*042d53a7SEvalZero 		return;
83*042d53a7SEvalZero 	}
84*042d53a7SEvalZero 	shift = bits_size * 8 - curve->num_n_bits;
85*042d53a7SEvalZero 	carry = 0;
86*042d53a7SEvalZero 	ptr = native + num_n_words;
87*042d53a7SEvalZero 	while (ptr-- > native) {
88*042d53a7SEvalZero 		uECC_word_t temp = *ptr;
89*042d53a7SEvalZero 		*ptr = (temp >> shift) | carry;
90*042d53a7SEvalZero 		carry = temp << (uECC_WORD_BITS - shift);
91*042d53a7SEvalZero 	}
92*042d53a7SEvalZero 
93*042d53a7SEvalZero 	/* Reduce mod curve_n */
94*042d53a7SEvalZero 	if (uECC_vli_cmp_unsafe(curve->n, native, num_n_words) != 1) {
95*042d53a7SEvalZero 		uECC_vli_sub(native, native, curve->n, num_n_words);
96*042d53a7SEvalZero 	}
97*042d53a7SEvalZero }
98*042d53a7SEvalZero 
uECC_sign_with_k(const uint8_t * private_key,const uint8_t * message_hash,unsigned hash_size,uECC_word_t * k,uint8_t * signature,uECC_Curve curve)99*042d53a7SEvalZero int uECC_sign_with_k(const uint8_t *private_key, const uint8_t *message_hash,
100*042d53a7SEvalZero 		     unsigned hash_size, uECC_word_t *k, uint8_t *signature,
101*042d53a7SEvalZero 		     uECC_Curve curve)
102*042d53a7SEvalZero {
103*042d53a7SEvalZero 
104*042d53a7SEvalZero 	uECC_word_t tmp[NUM_ECC_WORDS];
105*042d53a7SEvalZero 	uECC_word_t s[NUM_ECC_WORDS];
106*042d53a7SEvalZero 	uECC_word_t *k2[2] = {tmp, s};
107*042d53a7SEvalZero 	uECC_word_t p[NUM_ECC_WORDS * 2];
108*042d53a7SEvalZero 	uECC_word_t carry;
109*042d53a7SEvalZero 	wordcount_t num_words = curve->num_words;
110*042d53a7SEvalZero 	wordcount_t num_n_words = BITS_TO_WORDS(curve->num_n_bits);
111*042d53a7SEvalZero 	bitcount_t num_n_bits = curve->num_n_bits;
112*042d53a7SEvalZero 
113*042d53a7SEvalZero 	/* Make sure 0 < k < curve_n */
114*042d53a7SEvalZero   	if (uECC_vli_isZero(k, num_words) ||
115*042d53a7SEvalZero 	    uECC_vli_cmp(curve->n, k, num_n_words) != 1) {
116*042d53a7SEvalZero 		return 0;
117*042d53a7SEvalZero 	}
118*042d53a7SEvalZero 
119*042d53a7SEvalZero 	carry = regularize_k(k, tmp, s, curve);
120*042d53a7SEvalZero 	EccPoint_mult(p, curve->G, k2[!carry], 0, num_n_bits + 1, curve);
121*042d53a7SEvalZero 	if (uECC_vli_isZero(p, num_words)) {
122*042d53a7SEvalZero 		return 0;
123*042d53a7SEvalZero 	}
124*042d53a7SEvalZero 
125*042d53a7SEvalZero 	/* If an RNG function was specified, get a random number
126*042d53a7SEvalZero 	to prevent side channel analysis of k. */
127*042d53a7SEvalZero 	if (!g_rng_function) {
128*042d53a7SEvalZero 		uECC_vli_clear(tmp, num_n_words);
129*042d53a7SEvalZero 		tmp[0] = 1;
130*042d53a7SEvalZero 	}
131*042d53a7SEvalZero 	else if (!uECC_generate_random_int(tmp, curve->n, num_n_words)) {
132*042d53a7SEvalZero 		return 0;
133*042d53a7SEvalZero 	}
134*042d53a7SEvalZero 
135*042d53a7SEvalZero 	/* Prevent side channel analysis of uECC_vli_modInv() to determine
136*042d53a7SEvalZero 	bits of k / the private key by premultiplying by a random number */
137*042d53a7SEvalZero 	uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k' = rand * k */
138*042d53a7SEvalZero 	uECC_vli_modInv(k, k, curve->n, num_n_words);       /* k = 1 / k' */
139*042d53a7SEvalZero 	uECC_vli_modMult(k, k, tmp, curve->n, num_n_words); /* k = 1 / k */
140*042d53a7SEvalZero 
141*042d53a7SEvalZero 	uECC_vli_nativeToBytes(signature, curve->num_bytes, p); /* store r */
142*042d53a7SEvalZero 
143*042d53a7SEvalZero 	/* tmp = d: */
144*042d53a7SEvalZero 	uECC_vli_bytesToNative(tmp, private_key, BITS_TO_BYTES(curve->num_n_bits));
145*042d53a7SEvalZero 
146*042d53a7SEvalZero 	s[num_n_words - 1] = 0;
147*042d53a7SEvalZero 	uECC_vli_set(s, p, num_words);
148*042d53a7SEvalZero 	uECC_vli_modMult(s, tmp, s, curve->n, num_n_words); /* s = r*d */
149*042d53a7SEvalZero 
150*042d53a7SEvalZero 	bits2int(tmp, message_hash, hash_size, curve);
151*042d53a7SEvalZero 	uECC_vli_modAdd(s, tmp, s, curve->n, num_n_words); /* s = e + r*d */
152*042d53a7SEvalZero 	uECC_vli_modMult(s, s, k, curve->n, num_n_words);  /* s = (e + r*d) / k */
153*042d53a7SEvalZero 	if (uECC_vli_numBits(s, num_n_words) > (bitcount_t)curve->num_bytes * 8) {
154*042d53a7SEvalZero 		return 0;
155*042d53a7SEvalZero 	}
156*042d53a7SEvalZero 
157*042d53a7SEvalZero 	uECC_vli_nativeToBytes(signature + curve->num_bytes, curve->num_bytes, s);
158*042d53a7SEvalZero 	return 1;
159*042d53a7SEvalZero }
160*042d53a7SEvalZero 
uECC_sign(const uint8_t * private_key,const uint8_t * message_hash,unsigned hash_size,uint8_t * signature,uECC_Curve curve)161*042d53a7SEvalZero int uECC_sign(const uint8_t *private_key, const uint8_t *message_hash,
162*042d53a7SEvalZero 	      unsigned hash_size, uint8_t *signature, uECC_Curve curve)
163*042d53a7SEvalZero {
164*042d53a7SEvalZero 	      uECC_word_t _random[2*NUM_ECC_WORDS];
165*042d53a7SEvalZero 	      uECC_word_t k[NUM_ECC_WORDS];
166*042d53a7SEvalZero 	      uECC_word_t tries;
167*042d53a7SEvalZero 
168*042d53a7SEvalZero 	for (tries = 0; tries < uECC_RNG_MAX_TRIES; ++tries) {
169*042d53a7SEvalZero 		/* Generating _random uniformly at random: */
170*042d53a7SEvalZero 		uECC_RNG_Function rng_function = uECC_get_rng();
171*042d53a7SEvalZero 		if (!rng_function ||
172*042d53a7SEvalZero 		    !rng_function((uint8_t *)_random, 2*NUM_ECC_WORDS*uECC_WORD_SIZE)) {
173*042d53a7SEvalZero 			return 0;
174*042d53a7SEvalZero 		}
175*042d53a7SEvalZero 
176*042d53a7SEvalZero 		// computing k as modular reduction of _random (see FIPS 186.4 B.5.1):
177*042d53a7SEvalZero 		uECC_vli_mmod(k, _random, curve->n, BITS_TO_WORDS(curve->num_n_bits));
178*042d53a7SEvalZero 
179*042d53a7SEvalZero 		if (uECC_sign_with_k(private_key, message_hash, hash_size, k, signature,
180*042d53a7SEvalZero 		    curve)) {
181*042d53a7SEvalZero 			return 1;
182*042d53a7SEvalZero 		}
183*042d53a7SEvalZero 	}
184*042d53a7SEvalZero 	return 0;
185*042d53a7SEvalZero }
186*042d53a7SEvalZero 
smax(bitcount_t a,bitcount_t b)187*042d53a7SEvalZero static bitcount_t smax(bitcount_t a, bitcount_t b)
188*042d53a7SEvalZero {
189*042d53a7SEvalZero 	return (a > b ? a : b);
190*042d53a7SEvalZero }
191*042d53a7SEvalZero 
uECC_verify(const uint8_t * public_key,const uint8_t * message_hash,unsigned hash_size,const uint8_t * signature,uECC_Curve curve)192*042d53a7SEvalZero int uECC_verify(const uint8_t *public_key, const uint8_t *message_hash,
193*042d53a7SEvalZero 		unsigned hash_size, const uint8_t *signature,
194*042d53a7SEvalZero 	        uECC_Curve curve)
195*042d53a7SEvalZero {
196*042d53a7SEvalZero 
197*042d53a7SEvalZero 	uECC_word_t u1[NUM_ECC_WORDS], u2[NUM_ECC_WORDS];
198*042d53a7SEvalZero 	uECC_word_t z[NUM_ECC_WORDS];
199*042d53a7SEvalZero 	uECC_word_t sum[NUM_ECC_WORDS * 2];
200*042d53a7SEvalZero 	uECC_word_t rx[NUM_ECC_WORDS];
201*042d53a7SEvalZero 	uECC_word_t ry[NUM_ECC_WORDS];
202*042d53a7SEvalZero 	uECC_word_t tx[NUM_ECC_WORDS];
203*042d53a7SEvalZero 	uECC_word_t ty[NUM_ECC_WORDS];
204*042d53a7SEvalZero 	uECC_word_t tz[NUM_ECC_WORDS];
205*042d53a7SEvalZero 	const uECC_word_t *points[4];
206*042d53a7SEvalZero 	const uECC_word_t *point;
207*042d53a7SEvalZero 	bitcount_t num_bits;
208*042d53a7SEvalZero 	bitcount_t i;
209*042d53a7SEvalZero 
210*042d53a7SEvalZero 	uECC_word_t _public[NUM_ECC_WORDS * 2];
211*042d53a7SEvalZero 	uECC_word_t r[NUM_ECC_WORDS], s[NUM_ECC_WORDS];
212*042d53a7SEvalZero 	wordcount_t num_words = curve->num_words;
213*042d53a7SEvalZero 	wordcount_t num_n_words = BITS_TO_WORDS(curve->num_n_bits);
214*042d53a7SEvalZero 
215*042d53a7SEvalZero 	rx[num_n_words - 1] = 0;
216*042d53a7SEvalZero 	r[num_n_words - 1] = 0;
217*042d53a7SEvalZero 	s[num_n_words - 1] = 0;
218*042d53a7SEvalZero 
219*042d53a7SEvalZero 	uECC_vli_bytesToNative(_public, public_key, curve->num_bytes);
220*042d53a7SEvalZero 	uECC_vli_bytesToNative(_public + num_words, public_key + curve->num_bytes,
221*042d53a7SEvalZero 			       curve->num_bytes);
222*042d53a7SEvalZero 	uECC_vli_bytesToNative(r, signature, curve->num_bytes);
223*042d53a7SEvalZero 	uECC_vli_bytesToNative(s, signature + curve->num_bytes, curve->num_bytes);
224*042d53a7SEvalZero 
225*042d53a7SEvalZero 	/* r, s must not be 0. */
226*042d53a7SEvalZero 	if (uECC_vli_isZero(r, num_words) || uECC_vli_isZero(s, num_words)) {
227*042d53a7SEvalZero 		return 0;
228*042d53a7SEvalZero 	}
229*042d53a7SEvalZero 
230*042d53a7SEvalZero 	/* r, s must be < n. */
231*042d53a7SEvalZero 	if (uECC_vli_cmp_unsafe(curve->n, r, num_n_words) != 1 ||
232*042d53a7SEvalZero 	    uECC_vli_cmp_unsafe(curve->n, s, num_n_words) != 1) {
233*042d53a7SEvalZero 		return 0;
234*042d53a7SEvalZero 	}
235*042d53a7SEvalZero 
236*042d53a7SEvalZero 	/* Calculate u1 and u2. */
237*042d53a7SEvalZero 	uECC_vli_modInv(z, s, curve->n, num_n_words); /* z = 1/s */
238*042d53a7SEvalZero 	u1[num_n_words - 1] = 0;
239*042d53a7SEvalZero 	bits2int(u1, message_hash, hash_size, curve);
240*042d53a7SEvalZero 	uECC_vli_modMult(u1, u1, z, curve->n, num_n_words); /* u1 = e/s */
241*042d53a7SEvalZero 	uECC_vli_modMult(u2, r, z, curve->n, num_n_words); /* u2 = r/s */
242*042d53a7SEvalZero 
243*042d53a7SEvalZero 	/* Calculate sum = G + Q. */
244*042d53a7SEvalZero 	uECC_vli_set(sum, _public, num_words);
245*042d53a7SEvalZero 	uECC_vli_set(sum + num_words, _public + num_words, num_words);
246*042d53a7SEvalZero 	uECC_vli_set(tx, curve->G, num_words);
247*042d53a7SEvalZero 	uECC_vli_set(ty, curve->G + num_words, num_words);
248*042d53a7SEvalZero 	uECC_vli_modSub(z, sum, tx, curve->p, num_words); /* z = x2 - x1 */
249*042d53a7SEvalZero 	XYcZ_add(tx, ty, sum, sum + num_words, curve);
250*042d53a7SEvalZero 	uECC_vli_modInv(z, z, curve->p, num_words); /* z = 1/z */
251*042d53a7SEvalZero 	apply_z(sum, sum + num_words, z, curve);
252*042d53a7SEvalZero 
253*042d53a7SEvalZero 	/* Use Shamir's trick to calculate u1*G + u2*Q */
254*042d53a7SEvalZero 	points[0] = 0;
255*042d53a7SEvalZero 	points[1] = curve->G;
256*042d53a7SEvalZero 	points[2] = _public;
257*042d53a7SEvalZero 	points[3] = sum;
258*042d53a7SEvalZero 	num_bits = smax(uECC_vli_numBits(u1, num_n_words),
259*042d53a7SEvalZero 	uECC_vli_numBits(u2, num_n_words));
260*042d53a7SEvalZero 
261*042d53a7SEvalZero 	point = points[(!!uECC_vli_testBit(u1, num_bits - 1)) |
262*042d53a7SEvalZero                        ((!!uECC_vli_testBit(u2, num_bits - 1)) << 1)];
263*042d53a7SEvalZero 	uECC_vli_set(rx, point, num_words);
264*042d53a7SEvalZero 	uECC_vli_set(ry, point + num_words, num_words);
265*042d53a7SEvalZero 	uECC_vli_clear(z, num_words);
266*042d53a7SEvalZero 	z[0] = 1;
267*042d53a7SEvalZero 
268*042d53a7SEvalZero 	for (i = num_bits - 2; i >= 0; --i) {
269*042d53a7SEvalZero 		uECC_word_t index;
270*042d53a7SEvalZero 		curve->double_jacobian(rx, ry, z, curve);
271*042d53a7SEvalZero 
272*042d53a7SEvalZero 		index = (!!uECC_vli_testBit(u1, i)) | ((!!uECC_vli_testBit(u2, i)) << 1);
273*042d53a7SEvalZero 		point = points[index];
274*042d53a7SEvalZero 		if (point) {
275*042d53a7SEvalZero 			uECC_vli_set(tx, point, num_words);
276*042d53a7SEvalZero 			uECC_vli_set(ty, point + num_words, num_words);
277*042d53a7SEvalZero 			apply_z(tx, ty, z, curve);
278*042d53a7SEvalZero 			uECC_vli_modSub(tz, rx, tx, curve->p, num_words); /* Z = x2 - x1 */
279*042d53a7SEvalZero 			XYcZ_add(tx, ty, rx, ry, curve);
280*042d53a7SEvalZero 			uECC_vli_modMult_fast(z, z, tz, curve);
281*042d53a7SEvalZero 		}
282*042d53a7SEvalZero   	}
283*042d53a7SEvalZero 
284*042d53a7SEvalZero 	uECC_vli_modInv(z, z, curve->p, num_words); /* Z = 1/Z */
285*042d53a7SEvalZero 	apply_z(rx, ry, z, curve);
286*042d53a7SEvalZero 
287*042d53a7SEvalZero 	/* v = x1 (mod n) */
288*042d53a7SEvalZero 	if (uECC_vli_cmp_unsafe(curve->n, rx, num_n_words) != 1) {
289*042d53a7SEvalZero 		uECC_vli_sub(rx, rx, curve->n, num_n_words);
290*042d53a7SEvalZero 	}
291*042d53a7SEvalZero 
292*042d53a7SEvalZero 	/* Accept only if v == r. */
293*042d53a7SEvalZero 	return (int)(uECC_vli_equal(rx, r, num_words) == 0);
294*042d53a7SEvalZero }
295*042d53a7SEvalZero 
296