diff --git a/dap-sdk/crypto/CMakeLists.txt b/dap-sdk/crypto/CMakeLists.txt index 65336fcc698f9175998128d3ba457a80f19ff998..5790d473aa5d84385a6654c403803da35d824b70 100755 --- a/dap-sdk/crypto/CMakeLists.txt +++ b/dap-sdk/crypto/CMakeLists.txt @@ -16,6 +16,7 @@ file( GLOB CRYPTO_SRCS src/sha3/*.c src/msrln/*.c src/defeo_scheme/*.c + src/newhope/*.c src/sig_bliss/*.c src/sig_tesla/*.c src/sig_picnic/*.c @@ -35,6 +36,7 @@ file( GLOB CRYPTO_HEADERS src/sha3/*.h src/msrln/*.h src/defeo_scheme/*.h + src/newhope/*.h src/sig_bliss/*.h src/sig_tesla/*.h src/sig_picnic/*.h diff --git a/dap-sdk/crypto/include/dap_enc_SEED.h b/dap-sdk/crypto/include/dap_enc_SEED.h index 8ff83d6c8f14d75cd6647cb0d4eb86b0dd0a6221..8b9a31acea0357400b4f4cfaf7cb0b45deac9533 100644 --- a/dap-sdk/crypto/include/dap_enc_SEED.h +++ b/dap-sdk/crypto/include/dap_enc_SEED.h @@ -3,7 +3,7 @@ #include <stddef.h> #include "dap_enc_key.h" -#include "seed.h" +#include "seed/seed.h" #ifdef __cplusplus extern "C" { diff --git a/dap-sdk/crypto/include/dap_enc_newhope.h b/dap-sdk/crypto/include/dap_enc_newhope.h new file mode 100644 index 0000000000000000000000000000000000000000..e54e22bb65509b16028eba7d8160484efc535861 --- /dev/null +++ b/dap-sdk/crypto/include/dap_enc_newhope.h @@ -0,0 +1,64 @@ +#ifndef _DAP_ENC_NEWHOPE_H_ +#define _DAP_ENC_NEWHOPE_H_ + +#include "newhope/cpakem.h" +#include "dap_enc_key.h" + + +///======================================================================== +typedef enum{ + NEWHOPE_TOY = 0, NEWHOPE_1024 +}DAP_NEWHOPE_SIGN_SECURITY; + +typedef struct { + DAP_NEWHOPE_SIGN_SECURITY kind; /* the kind of ringct20 */ + unsigned char *data; +}newhope_public_key_t; + + +typedef struct { + DAP_NEWHOPE_SIGN_SECURITY kind; // the kind of Dilithium (i.e. *this* choice of parameters) +} newhope_param_t; + +///========================================================================================== +typedef struct { + DAP_NEWHOPE_SIGN_SECURITY kind; /* the kind of ringct20 */ + unsigned char *data; +} newhope_private_key_t; + +typedef struct { + DAP_NEWHOPE_SIGN_SECURITY kind; /* the kind of ringct20 */ + unsigned char *sig_data; + unsigned long long sig_len; +} newhope_signature_t; + + +void dap_enc_newhope_pke_set_type(DAP_NEWHOPE_SIGN_SECURITY type); + +void dap_enc_newhope_kem_key_new(struct dap_enc_key *key); + +void dap_enc_newhope_kem_key_new_generate(struct dap_enc_key * key, const void *kex_buf, + size_t kex_size, const void * seed, size_t seed_size, + size_t key_size); + +size_t dap_enc_newhope_pbk_enc(struct dap_enc_key * a_key, const void * a_pub, + size_t a_pub_size, void ** b_pub); +size_t dap_enc_newhope_prk_dec(struct dap_enc_key * a_key, const void *a_priv, + size_t b_pub_size, unsigned char *b_pub); +void dap_enc_newhope_kem_key_delete(struct dap_enc_key * key); + +//size_t dap_enc_newhope_calc_signature_unserialized_size(void); + +//static inline size_t dap_enc_newhope_calc_signagture_size(newhope_signature_t* a_sign) +//{ +// return sizeof(size_t) + sizeof(newhope_kind_t) + a_sign->sig_len + sizeof(unsigned long long); +//} + +//uint8_t* dap_enc_newhope_write_signature(newhope_signature_t* a_sign, size_t *a_sign_out); +//newhope_signature_t* dap_enc_newhope_read_signature(uint8_t *a_buf, size_t a_buflen); +//uint8_t* dap_enc_newhope_write_private_key(const newhope_private_key_t* a_private_key, size_t *a_buflen_out); +//uint8_t* dap_enc_newhope_write_public_key(const newhope_public_key_t* a_public_key, size_t *a_buflen_out); +//newhope_private_key_t* dap_enc_newhope_read_private_key(const uint8_t *a_buf, size_t a_buflen); +//newhope_public_key_t* dap_enc_newhope_read_public_key(const uint8_t *a_buf, size_t a_buflen); + +#endif diff --git a/dap-sdk/crypto/libdap-crypto.pri b/dap-sdk/crypto/libdap-crypto.pri index 95ff87f345cd43d8dbbe51d008e73e99607f2116..309dff1f71f569ad38449bba1dd986ea1b48287c 100755 --- a/dap-sdk/crypto/libdap-crypto.pri +++ b/dap-sdk/crypto/libdap-crypto.pri @@ -13,6 +13,7 @@ include (src/sig_tesla/sig_tesla.pri) include (src/sig_dilithium/sig_dilithium.pri) include (src/ringct20/ringct20.pri) include (src/seed/seed.pri) +include (src/newhope/newhope.pri) DEFINES += KeccakP1600timesN_excluded @@ -33,6 +34,7 @@ HEADERS += $$PWD/include/dap_enc.h \ $$PWD/include/dap_enc_ringct20.h \ $$PWD/include/dap_enc_salsa2012.h \ $$PWD/include/dap_enc_SEED.h \ + $$PWD/include/dap_enc_newhope.h \ $$PWD/include/dap_crypto_common.h \ $$PWD/include/dap_cert.h \ $$PWD/include/dap_cert_file.h \ @@ -70,6 +72,7 @@ SOURCES += $$PWD/src/dap_enc.c \ $$PWD/src/dap_hash_fusion.c \ $$PWD/src/dap_hash_keccak.c \ $$PWD/src/dap_enc_SEED.c \ + $$PWD/src/dap_enc_newhope.c \ $$PWD/src/XKCP/lib/high/Keccak/FIPS202/SimpleFIPS202.c \ $$PWD/src/XKCP/lib/high/Keccak/SP800-185/SP800-185.c \ $$PWD/src/XKCP/lib/high/Keccak/SP800-185/SP800-185.inc diff --git a/dap-sdk/crypto/src/dap_enc_key.c b/dap-sdk/crypto/src/dap_enc_key.c index d646d399ac6178852e3f499705c5f338ca3fa931..a361c1513a31281c2aa8d64e4461a1cf8912a8e7 100755 --- a/dap-sdk/crypto/src/dap_enc_key.c +++ b/dap-sdk/crypto/src/dap_enc_key.c @@ -36,7 +36,7 @@ #include "dap_enc_bliss.h" #include "dap_enc_tesla.h" #include "dap_enc_dilithium.h" -//#include "dap_enc_newhope.h" +#include "dap_enc_newhope.h" #include "dap_enc_ringct20.h" @@ -236,24 +236,24 @@ struct dap_enc_key_callbacks{ .sign_get = NULL, .sign_verify = NULL }, -// [DAP_ENC_KEY_TYPE_RLWE_NEWHOPE_CPA_KEM]={ -// .name = "NEWHOPE_CPA_KEM", -// .enc = NULL, -// .dec = NULL, -// .enc_na = NULL, -// .dec_na = NULL, -// .gen_key_public = NULL, -// .gen_key_public_size = NULL, -// .gen_bob_shared_key = dap_enc_newhope_pbk_enc, -// .gen_alice_shared_key = dap_enc_newhope_prk_dec, -// .new_callback = dap_enc_newhope_kem_key_new, -// .delete_callback = dap_enc_newhope_kem_key_delete, -// .new_generate_callback = dap_enc_newhope_kem_key_new_generate, -// .enc_out_size = NULL, -// .dec_out_size = NULL, -// .sign_get = NULL, -// .sign_verify = NULL -// }, + [DAP_ENC_KEY_TYPE_RLWE_NEWHOPE_CPA_KEM]={ + .name = "NEWHOPE_CPA_KEM", + .enc = NULL, + .dec = NULL, + .enc_na = NULL, + .dec_na = NULL, + .gen_key_public = NULL, + .gen_key_public_size = NULL, + .gen_bob_shared_key = dap_enc_newhope_pbk_enc, + .gen_alice_shared_key = dap_enc_newhope_prk_dec, + .new_callback = dap_enc_newhope_kem_key_new, + .delete_callback = dap_enc_newhope_kem_key_delete, + .new_generate_callback = dap_enc_newhope_kem_key_new_generate, + .enc_out_size = NULL, + .dec_out_size = NULL, + .sign_get = NULL, + .sign_verify = NULL + }, //------Signatures--------------------------- [DAP_ENC_KEY_TYPE_SIG_PICNIC]={ .name = "PICNIC", diff --git a/dap-sdk/crypto/src/dap_enc_newhope.c b/dap-sdk/crypto/src/dap_enc_newhope.c new file mode 100644 index 0000000000000000000000000000000000000000..03630c263f3d0dac4aa163ab5250df7edf113cb0 --- /dev/null +++ b/dap-sdk/crypto/src/dap_enc_newhope.c @@ -0,0 +1,117 @@ +#include <assert.h> +#include <inttypes.h> +#include <string.h> + +#include "dap_enc_newhope.h" +#include "dap_common.h" +#include "rand/dap_rand.h" +#include "newhope/cpapke.h" +#include "newhope/params.h" + + +#define LOG_TAG "dap_enc_newhope_pke" + +DAP_NEWHOPE_SIGN_SECURITY _newhope_type = NEWHOPE_1024; // by default + + +void dap_enc_newhope_pke_set_type(DAP_NEWHOPE_SIGN_SECURITY type) +{ + _newhope_type = type; +} + +void dap_enc_newhope_kem_key_new(struct dap_enc_key *key) { + + key->type = DAP_ENC_KEY_TYPE_RLWE_NEWHOPE_CPA_KEM; + key->enc = NULL; + key->enc_na = NULL; + key->dec_na = NULL; + key->gen_bob_shared_key= dap_enc_newhope_pbk_enc; + key->gen_alice_shared_key = dap_enc_newhope_prk_dec; + key->priv_key_data = NULL; + key->pub_key_data = NULL; + +} + +void dap_enc_newhope_kem_key_new_generate(struct dap_enc_key * a_key, const void *kex_buf, + size_t kex_size, const void * seed, size_t seed_size, + size_t key_size) +{ + + DAP_NEWHOPE_SIGN_SECURITY newhope_type = NEWHOPE_1024; + dap_enc_newhope_pke_set_type(newhope_type); + + + a_key->priv_key_data_size = sizeof(newhope_private_key_t); + a_key->pub_key_data_size = sizeof(newhope_public_key_t); + a_key->priv_key_data = DAP_NEW_SIZE(uint8_t, a_key->priv_key_data_size); + a_key->pub_key_data = DAP_NEW_SIZE(uint8_t, a_key->pub_key_data_size); + newhope_private_key_t *sk = (newhope_private_key_t *)a_key->priv_key_data; + newhope_public_key_t *pk = (newhope_public_key_t *)a_key->pub_key_data; + sk->kind = newhope_type; + sk->data = DAP_NEW_SIZE(uint8_t, NEWHOPE_CPAPKE_SECRETKEYBYTES); + pk->kind = newhope_type; + pk->data = DAP_NEW_SIZE(uint8_t, NEWHOPE_CPAPKE_PUBLICKEYBYTES); + cpapke_keypair(pk->data, sk->data); + return; +} + +size_t dap_enc_newhope_pbk_enc(struct dap_enc_key * a_key, const void * a_pub, + size_t a_pub_size, void ** a_sendb) +{ + if(a_pub_size != sizeof (newhope_public_key_t)) + { + log_it(L_ERROR, "newhope wrong a_pub_size"); + return 0; + } + newhope_public_key_t *pk = (newhope_public_key_t*)a_pub; + + *a_sendb = DAP_NEW_SIZE(uint8_t, NEWHOPE_CPAKEM_CIPHERTEXTBYTES); + //Bob derives a secret key and creates a response + uint8_t key_b[NEWHOPE_SYMBYTES]; + crypto_kem_enc(*a_sendb, key_b, pk->data); + //Save Bob shared key + a_key->priv_key_data_size = NEWHOPE_SYMBYTES; + a_key->priv_key_data = DAP_NEW_SIZE(uint8_t, a_key->priv_key_data_size); + a_key->pub_key_data_size = sizeof(newhope_public_key_t); + a_key->pub_key_data = DAP_NEW_SIZE(uint8_t, a_key->pub_key_data_size); + newhope_public_key_t *cur_pk = (newhope_public_key_t*)a_key->pub_key_data; + cur_pk->data = NULL; + cur_pk->kind = pk->kind; + + memcpy(a_key->priv_key_data, key_b, a_key->priv_key_data_size); + return NEWHOPE_CPAKEM_CIPHERTEXTBYTES; +} + +size_t dap_enc_newhope_prk_dec(struct dap_enc_key * a_key, const void *a_priv, + size_t a_sendb_size, unsigned char *a_sendb) +{ + if(a_sendb_size != NEWHOPE_CPAKEM_CIPHERTEXTBYTES) + { + log_it(L_ERROR, "newhope wrong size of ciphertext (Bob send"); + return 0; + } + newhope_private_key_t *sk = a_key->priv_key_data; + + uint8_t key_a[NEWHOPE_SYMBYTES]; + uint8_t sendb[NEWHOPE_CPAKEM_CIPHERTEXTBYTES]; + memcpy(sendb, a_sendb, NEWHOPE_CPAKEM_CIPHERTEXTBYTES); + crypto_kem_dec(key_a, sendb, sk->data); + DAP_DEL_Z(sk->data); + a_key->priv_key_data_size = NEWHOPE_SYMBYTES; + a_key->priv_key_data = DAP_NEW_SIZE(uint8_t,a_key->priv_key_data_size); + memcpy(a_key->priv_key_data, key_a, a_key->priv_key_data_size); + + return NEWHOPE_SYMBYTES;//return (newhope_crypto_sign_open( (unsigned char *) msg, msg_size, (newhope_signature_t *) signature, a_key->pub_key_data)); +} + +void dap_enc_newhope_kem_key_delete(struct dap_enc_key * a_key) +{ + + newhope_private_key_t *sk = (newhope_private_key_t *)a_key->priv_key_data; + newhope_public_key_t *pk = (newhope_public_key_t *)a_key->pub_key_data; + if(sk != NULL && a_key->priv_key_data_size != NEWHOPE_SYMBYTES) + DAP_DEL_Z(sk->data); + if(pk != NULL) + DAP_DEL_Z(pk->data); +} + diff --git a/dap-sdk/crypto/src/defeo_scheme/defeo_config.h b/dap-sdk/crypto/src/defeo_scheme/defeo_config.h index 58dd16d4854dfebbcb87dd36da8c36703d0bf61e..39f9d5c0dde3963fbc8bdbff6d8c0441bd7ad7fb 100755 --- a/dap-sdk/crypto/src/defeo_scheme/defeo_config.h +++ b/dap-sdk/crypto/src/defeo_scheme/defeo_config.h @@ -32,10 +32,12 @@ #define NBYTES_TO_NWORDS(nbytes) (((nbytes)+sizeof(digit_t)-1)/sizeof(digit_t)) // Conversion macro from number of bytes to number of computer words // Macro to avoid compiler warnings when detecting unreferenced parameters +#ifndef UNREFERENCED_PARAMETER #define UNREFERENCED_PARAMETER(PAR) ((void)(PAR)) +#endif -#define PASSED 0 -#define FAILED 1 +#define PASSED_DEFEO 0 +#define FAILED_DEFEO 1 /********************** Constant-time unsigned comparisons ***********************/ diff --git a/dap-sdk/crypto/src/msrln/msrln_priv.h b/dap-sdk/crypto/src/msrln/msrln_priv.h index cb4fee832355b9476c242c2f66fc555f24f91ceb..fdaae50ad30677ee0f51f9c3044c5e63f27ce430 100755 --- a/dap-sdk/crypto/src/msrln/msrln_priv.h +++ b/dap-sdk/crypto/src/msrln/msrln_priv.h @@ -28,7 +28,9 @@ extern "C" { #define NBYTES_TO_NWORDS(nbytes) (((nbytes)+sizeof(digit_t)-1)/sizeof(digit_t)) // Conversion macro from number of bytes to number of computer words // Macro to avoid compiler warnings when detecting unreferenced parameters +#ifndef UNREFERENCED_PARAMETER #define UNREFERENCED_PARAMETER(PAR) ((void)PAR) +#endif /******************** Function prototypes *******************/ diff --git a/dap-sdk/crypto/src/newhope/api.h b/dap-sdk/crypto/src/newhope/api.h new file mode 100644 index 0000000000000000000000000000000000000000..bcc9e32db3a2cf98158b51e1d7c58bf4758ee779 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/api.h @@ -0,0 +1,4 @@ +#ifndef CHOICE_API_H +#define CHOICE_API_H +#include"cpakem.h" +#endif // CHOICE_API_H diff --git a/dap-sdk/crypto/src/newhope/cpakem.c b/dap-sdk/crypto/src/newhope/cpakem.c new file mode 100644 index 0000000000000000000000000000000000000000..dd490654c3021cd19bb9bedd3861bbb2d80f432d --- /dev/null +++ b/dap-sdk/crypto/src/newhope/cpakem.c @@ -0,0 +1,74 @@ +#include <string.h> +#include "api.h" +#include "cpapke.h" +#include "params.h" +#include "rand/dap_rand.h" +#include "sha3/fips202.h" + +/************************************************* +* Name: crypto_kem_keypair +* +* Description: Generates public and private key +* for CCA secure NewHope key encapsulation +* mechanism +* +* Arguments: - unsigned char *pk: pointer to output public key (an already allocated array of CRYPTO_PUBLICKEYBYTES bytes) +* - unsigned char *sk: pointer to output private key (an already allocated array of CRYPTO_SECRETKEYBYTES bytes) +* +* Returns 0 (success) +**************************************************/ +int crypto_kem_keypair(unsigned char *pk, unsigned char *sk) +{ + cpapke_keypair(pk, sk); /* First put the actual secret key into sk */ + + return 0; +} + +/************************************************* +* Name: crypto_kem_enc +* +* Description: Generates cipher text and shared +* secret for given public key +* +* Arguments: - unsigned char *ct: pointer to output cipher text (an already allocated array of CRYPTO_CIPHERTEXTBYTES bytes) +* - unsigned char *ss: pointer to output shared secret (an already allocated array of CRYPTO_BYTES bytes) +* - const unsigned char *pk: pointer to input public key (an already allocated array of CRYPTO_PUBLICKEYBYTES bytes) +* +* Returns 0 (success) +**************************************************/ +int crypto_kem_enc(unsigned char *ct, unsigned char *ss, const unsigned char *pk) +{ + unsigned char buf[2*NEWHOPE_SYMBYTES]; + + buf[0] = 0x02; + randombytes(buf+1,NEWHOPE_SYMBYTES); + + shake256(buf,2*NEWHOPE_SYMBYTES,buf,NEWHOPE_SYMBYTES + 1); /* Don't release system RNG output */ + + cpapke_enc(ct, buf, pk, buf+NEWHOPE_SYMBYTES); /* coins are in buf+NEWHOPE_SYMBYTES */ + + shake256(ss, NEWHOPE_SYMBYTES, buf, NEWHOPE_SYMBYTES); /* hash pre-k to ss */ + return 0; +} + + +/************************************************* +* Name: crypto_kem_dec +* +* Description: Generates shared secret for given +* cipher text and private key +* +* Arguments: - unsigned char *ss: pointer to output shared secret (an already allocated array of CRYPTO_BYTES bytes) +* - const unsigned char *ct: pointer to input cipher text (an already allocated array of CRYPTO_CIPHERTEXTBYTES bytes) +* - const unsigned char *sk: pointer to input private key (an already allocated array of CRYPTO_SECRETKEYBYTES bytes) +* +* Returns 0 (success) +**************************************************/ +int crypto_kem_dec(unsigned char *ss, const unsigned char *ct, const unsigned char *sk) +{ + cpapke_dec(ss, ct, sk); + + shake256(ss, NEWHOPE_SYMBYTES, ss, NEWHOPE_SYMBYTES); /* hash pre-k to ss */ + + return 0; +} diff --git a/dap-sdk/crypto/src/newhope/cpakem.h b/dap-sdk/crypto/src/newhope/cpakem.h new file mode 100644 index 0000000000000000000000000000000000000000..b5bfd2b510016f52c499edd4b2876846e16eb827 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/cpakem.h @@ -0,0 +1,25 @@ +#ifndef API_H +#define API_H + +#include "params.h" + +#define CRYPTO_SECRETKEYBYTES NEWHOPE_CPAKEM_SECRETKEYBYTES +#define CRYPTO_PUBLICKEYBYTES NEWHOPE_CPAKEM_PUBLICKEYBYTES +#define CRYPTO_CIPHERTEXTBYTES NEWHOPE_CPAKEM_CIPHERTEXTBYTES +#define CRYPTO_BYTES NEWHOPE_SYMBYTES + +#if (NEWHOPE_N == 512) +#define CRYPTO_ALGNAME "NewHope512-CPAKEM" +#elif (NEWHOPE_N == 1024) +#define CRYPTO_ALGNAME "NewHope1024-CPAKEM" +#else +#error "NEWHOPE_N must be either 512 or 1024" +#endif + +int crypto_kem_keypair(unsigned char *pk, unsigned char *sk); + +int crypto_kem_enc(unsigned char *ct, unsigned char *ss, const unsigned char *pk); + +int crypto_kem_dec(unsigned char *ss, const unsigned char *ct, const unsigned char *sk); + +#endif diff --git a/dap-sdk/crypto/src/newhope/cpapke.c b/dap-sdk/crypto/src/newhope/cpapke.c new file mode 100644 index 0000000000000000000000000000000000000000..7d804243e424646eaa94f7378f27ab397984300e --- /dev/null +++ b/dap-sdk/crypto/src/newhope/cpapke.c @@ -0,0 +1,198 @@ +#include <stdio.h> +#include "api.h" +#include "poly.h" +#include "rand/dap_rand.h" +#include "sha3/fips202.h" + +/************************************************* +* Name: encode_pk +* +* Description: Serialize the public key as concatenation of the +* serialization of the polynomial pk and the public seed +* used to generete the polynomial a. +* +* Arguments: unsigned char *r: pointer to the output serialized public key +* const poly_newhope *pk: pointer to the input public-key polynomial +* const unsigned char *seed: pointer to the input public seed +**************************************************/ +static void encode_pk(unsigned char *r, const poly_newhope *pk, const unsigned char *seed) +{ + int i; + poly_newhope_tobytes(r, pk); + for(i=0;i<NEWHOPE_SYMBYTES;i++) + r[NEWHOPE_POLYBYTES+i] = seed[i]; +} + +/************************************************* +* Name: decode_pk +* +* Description: De-serialize the public key; inverse of encode_pk +* +* Arguments: poly_newhope *pk: pointer to output public-key polynomial +* unsigned char *seed: pointer to output public seed +* const unsigned char *r: pointer to input byte array +**************************************************/ +static void decode_pk(poly_newhope *pk, unsigned char *seed, const unsigned char *r) +{ + int i; + poly_newhope_frombytes(pk, r); + for(i=0;i<NEWHOPE_SYMBYTES;i++) + seed[i] = r[NEWHOPE_POLYBYTES+i]; +} + +/************************************************* +* Name: encode_c +* +* Description: Serialize the ciphertext as concatenation of the +* serialization of the polynomial b and serialization +* of the compressed polynomial v +* +* Arguments: - unsigned char *r: pointer to the output serialized ciphertext +* - const poly_newhope *b: pointer to the input polynomial b +* - const poly_newhope *v: pointer to the input polynomial v +**************************************************/ +static void encode_c(unsigned char *r, const poly_newhope *b, const poly_newhope *v) +{ + poly_newhope_tobytes(r,b); + poly_newhope_compress(r+NEWHOPE_POLYBYTES,v); +} + +/************************************************* +* Name: decode_c +* +* Description: de-serialize the ciphertext; inverse of encode_c +* +* Arguments: - poly_newhope *b: pointer to output polynomial b +* - poly_newhope *v: pointer to output polynomial v +* - const unsigned char *r: pointer to input byte array +**************************************************/ +static void decode_c(poly_newhope *b, poly_newhope *v, const unsigned char *r) +{ + poly_newhope_frombytes(b, r); + poly_newhope_decompress(v, r+NEWHOPE_POLYBYTES); +} + +/************************************************* +* Name: gen_a +* +* Description: Deterministically generate public polynomial a from seed +* +* Arguments: - poly_newhope *a: pointer to output polynomial a +* - const unsigned char *seed: pointer to input seed +**************************************************/ +static void gen_a(poly_newhope *a, const unsigned char *seed) +{ + poly_newhope_uniform(a,seed); +} + + +/************************************************* +* Name: cpapke_keypair +* +* Description: Generates public and private key +* for the CPA public-key encryption scheme underlying +* the NewHope KEMs +* +* Arguments: - unsigned char *pk: pointer to output public key +* - unsigned char *sk: pointer to output private key +**************************************************/ +void cpapke_keypair(unsigned char *pk, + unsigned char *sk) +{ + poly_newhope ahat, ehat, ahat_shat, bhat, shat; + unsigned char z[2*NEWHOPE_SYMBYTES]; + unsigned char *publicseed = z; + unsigned char *noiseseed = z+NEWHOPE_SYMBYTES; + + z[0] = 0x01; + randombytes(z+1, NEWHOPE_SYMBYTES); + shake256(z, 2*NEWHOPE_SYMBYTES, z, NEWHOPE_SYMBYTES + 1); + + gen_a(&ahat, publicseed); + + poly_newhope_sample(&shat, noiseseed, 0); + poly_newhope_ntt_newhope(&shat); + + poly_newhope_sample(&ehat, noiseseed, 1); + poly_newhope_ntt_newhope(&ehat); + + poly_newhope_mul_pointwise(&ahat_shat, &shat, &ahat); + poly_newhope_add(&bhat, &ehat, &ahat_shat); + + poly_newhope_tobytes(sk, &shat); + encode_pk(pk, &bhat, publicseed); +} + +/************************************************* +* Name: cpapke_enc +* +* Description: Encryption function of +* the CPA public-key encryption scheme underlying +* the NewHope KEMs +* +* Arguments: - unsigned char *c: pointer to output ciphertext +* - const unsigned char *m: pointer to input message (of length NEWHOPE_SYMBYTES bytes) +* - const unsigned char *pk: pointer to input public key +* - const unsigned char *coin: pointer to input random coins used as seed +* to deterministically generate all randomness +**************************************************/ +void cpapke_enc(unsigned char *c, + const unsigned char *m, + const unsigned char *pk, + const unsigned char *coin) +{ + poly_newhope sprime, eprime, vprime, ahat, bhat, eprimeprime, uhat, v; + unsigned char publicseed[NEWHOPE_SYMBYTES]; + + poly_newhope_frommsg(&v, m); + + decode_pk(&bhat, publicseed, pk); + gen_a(&ahat, publicseed); + + poly_newhope_sample(&sprime, coin, 0); + poly_newhope_sample(&eprime, coin, 1); + poly_newhope_sample(&eprimeprime, coin, 2); + + poly_newhope_ntt_newhope(&sprime); + poly_newhope_ntt_newhope(&eprime); + + poly_newhope_mul_pointwise(&uhat, &ahat, &sprime); + poly_newhope_add(&uhat, &uhat, &eprime); + + poly_newhope_mul_pointwise(&vprime, &bhat, &sprime); + poly_newhope_invntt_newhope(&vprime); + + poly_newhope_add(&vprime, &vprime, &eprimeprime); + poly_newhope_add(&vprime, &vprime, &v); // add message + + encode_c(c, &uhat, &vprime); +} + + +/************************************************* +* Name: cpapke_dec +* +* Description: Decryption function of +* the CPA public-key encryption scheme underlying +* the NewHope KEMs +* +* Arguments: - unsigned char *m: pointer to output decrypted message +* - const unsigned char *c: pointer to input ciphertext +* - const unsigned char *sk: pointer to input secret key +**************************************************/ +void cpapke_dec(unsigned char *m, + const unsigned char *c, + const unsigned char *sk) +{ + poly_newhope vprime, uhat, tmp, shat; + + poly_newhope_frombytes(&shat, sk); + + decode_c(&uhat, &vprime, c); + poly_newhope_mul_pointwise(&tmp, &shat, &uhat); + poly_newhope_invntt_newhope(&tmp); + + poly_newhope_sub(&tmp, &tmp, &vprime); + + poly_newhope_tomsg(m, &tmp); +} diff --git a/dap-sdk/crypto/src/newhope/cpapke.h b/dap-sdk/crypto/src/newhope/cpapke.h new file mode 100644 index 0000000000000000000000000000000000000000..23a0fe271e224ffc64fdd2ba1e37040b1cb65f4c --- /dev/null +++ b/dap-sdk/crypto/src/newhope/cpapke.h @@ -0,0 +1,16 @@ +#ifndef INDCPA_H +#define INDCPA_H + +void cpapke_keypair(unsigned char *pk, + unsigned char *sk); + +void cpapke_enc(unsigned char *c, + const unsigned char *m, + const unsigned char *pk, + const unsigned char *coins); + +void cpapke_dec(unsigned char *m, + const unsigned char *c, + const unsigned char *sk); + +#endif diff --git a/dap-sdk/crypto/src/newhope/ntt.c b/dap-sdk/crypto/src/newhope/ntt.c new file mode 100644 index 0000000000000000000000000000000000000000..8094553a47cee65009ad94f58889e6034aac8890 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/ntt.c @@ -0,0 +1,224 @@ +#include "inttypes.h" +#include "ntt.h" +#include "params.h" +#include "reduce.h" + +#if (NEWHOPE_N == 512) +/************************************************************ +* Name: bitrev_table +* +* Description: Contains bit-reversed 9-bit indices to be used to re-order +* polynomials before number theoratic transform +************************************************************/ +static uint16_t bitrev_table [512] = { + 0,256,128,384,64,320,192,448,32,288,160,416,96,352,224,480,16,272,144,400,80,336,208,464,48,304,176,432,112,368,240,496,8, + 264,136,392,72,328,200,456,40,296,168,424,104,360,232,488,24,280,152,408,88,344,216,472,56,312,184,440,120,376,248,504,4, + 260,132,388,68,324,196,452,36,292,164,420,100,356,228,484,20,276,148,404,84,340,212,468,52,308,180,436,116,372,244,500,12, + 268,140,396,76,332,204,460,44,300,172,428,108,364,236,492,28,284,156,412,92,348,220,476,60,316,188,444,124,380,252,508,2, + 258,130,386,66,322,194,450,34,290,162,418,98,354,226,482,18,274,146,402,82,338,210,466,50,306,178,434,114,370,242,498,10, + 266,138,394,74,330,202,458,42,298,170,426,106,362,234,490,26,282,154,410,90,346,218,474,58,314,186,442,122,378,250,506,6, + 262,134,390,70,326,198,454,38,294,166,422,102,358,230,486,22,278,150,406,86,342,214,470,54,310,182,438,118,374,246,502,14, + 270,142,398,78,334,206,462,46,302,174,430,110,366,238,494,30,286,158,414,94,350,222,478,62,318,190,446,126,382,254,510,1, + 257,129,385,65,321,193,449,33,289,161,417,97,353,225,481,17,273,145,401,81,337,209,465,49,305,177,433,113,369,241,497,9, + 265,137,393,73,329,201,457,41,297,169,425,105,361,233,489,25,281,153,409,89,345,217,473,57,313,185,441,121,377,249,505,5, + 261,133,389,69,325,197,453,37,293,165,421,101,357,229,485,21,277,149,405,85,341,213,469,53,309,181,437,117,373,245,501,13, + 269,141,397,77,333,205,461,45,301,173,429,109,365,237,493,29,285,157,413,93,349,221,477,61,317,189,445,125,381,253,509,3, + 259,131,387,67,323,195,451,35,291,163,419,99,355,227,483,19,275,147,403,83,339,211,467,51,307,179,435,115,371,243,499,11, + 267,139,395,75,331,203,459,43,299,171,427,107,363,235,491,27,283,155,411,91,347,219,475,59,315,187,443,123,379,251,507,7, + 263,135,391,71,327,199,455,39,295,167,423,103,359,231,487,23,279,151,407,87,343,215,471,55,311,183,439,119,375,247,503,15, + 271,143,399,79,335,207,463,47,303,175,431,111,367,239,495,31,287,159,415,95,351,223,479,63,319,191,447,127,383,255,511 +}; + +#elif (NEWHOPE_N == 1024) +/************************************************************ +* Name: bitrev_table +* +* Description: Contains bit-reversed 10-bit indices to be used to re-order +* polynomials before number theoratic transform +************************************************************/ +static uint16_t bitrev_table[NEWHOPE_N] = { + 0,512,256,768,128,640,384,896,64,576,320,832,192,704,448,960,32,544,288,800,160,672,416,928,96,608,352,864,224,736,480,992, + 16,528,272,784,144,656,400,912,80,592,336,848,208,720,464,976,48,560,304,816,176,688,432,944,112,624,368,880,240,752,496,1008, + 8,520,264,776,136,648,392,904,72,584,328,840,200,712,456,968,40,552,296,808,168,680,424,936,104,616,360,872,232,744,488,1000, + 24,536,280,792,152,664,408,920,88,600,344,856,216,728,472,984,56,568,312,824,184,696,440,952,120,632,376,888,248,760,504,1016, + 4,516,260,772,132,644,388,900,68,580,324,836,196,708,452,964,36,548,292,804,164,676,420,932,100,612,356,868,228,740,484,996, + 20,532,276,788,148,660,404,916,84,596,340,852,212,724,468,980,52,564,308,820,180,692,436,948,116,628,372,884,244,756,500,1012, + 12,524,268,780,140,652,396,908,76,588,332,844,204,716,460,972,44,556,300,812,172,684,428,940,108,620,364,876,236,748,492,1004, + 28,540,284,796,156,668,412,924,92,604,348,860,220,732,476,988,60,572,316,828,188,700,444,956,124,636,380,892,252,764,508,1020, + 2,514,258,770,130,642,386,898,66,578,322,834,194,706,450,962,34,546,290,802,162,674,418,930,98,610,354,866,226,738,482,994, + 18,530,274,786,146,658,402,914,82,594,338,850,210,722,466,978,50,562,306,818,178,690,434,946,114,626,370,882,242,754,498,1010, + 10,522,266,778,138,650,394,906,74,586,330,842,202,714,458,970,42,554,298,810,170,682,426,938,106,618,362,874,234,746,490,1002, + 26,538,282,794,154,666,410,922,90,602,346,858,218,730,474,986,58,570,314,826,186,698,442,954,122,634,378,890,250,762,506,1018, + 6,518,262,774,134,646,390,902,70,582,326,838,198,710,454,966,38,550,294,806,166,678,422,934,102,614,358,870,230,742,486,998, + 22,534,278,790,150,662,406,918,86,598,342,854,214,726,470,982,54,566,310,822,182,694,438,950,118,630,374,886,246,758,502,1014, + 14,526,270,782,142,654,398,910,78,590,334,846,206,718,462,974,46,558,302,814,174,686,430,942,110,622,366,878,238,750,494,1006, + 30,542,286,798,158,670,414,926,94,606,350,862,222,734,478,990,62,574,318,830,190,702,446,958,126,638,382,894,254,766,510,1022, + 1,513,257,769,129,641,385,897,65,577,321,833,193,705,449,961,33,545,289,801,161,673,417,929,97,609,353,865,225,737,481,993, + 17,529,273,785,145,657,401,913,81,593,337,849,209,721,465,977,49,561,305,817,177,689,433,945,113,625,369,881,241,753,497,1009, + 9,521,265,777,137,649,393,905,73,585,329,841,201,713,457,969,41,553,297,809,169,681,425,937,105,617,361,873,233,745,489,1001, + 25,537,281,793,153,665,409,921,89,601,345,857,217,729,473,985,57,569,313,825,185,697,441,953,121,633,377,889,249,761,505,1017, + 5,517,261,773,133,645,389,901,69,581,325,837,197,709,453,965,37,549,293,805,165,677,421,933,101,613,357,869,229,741,485,997, + 21,533,277,789,149,661,405,917,85,597,341,853,213,725,469,981,53,565,309,821,181,693,437,949,117,629,373,885,245,757,501,1013, + 13,525,269,781,141,653,397,909,77,589,333,845,205,717,461,973,45,557,301,813,173,685,429,941,109,621,365,877,237,749,493,1005, + 29,541,285,797,157,669,413,925,93,605,349,861,221,733,477,989,61,573,317,829,189,701,445,957,125,637,381,893,253,765,509,1021, + 3,515,259,771,131,643,387,899,67,579,323,835,195,707,451,963,35,547,291,803,163,675,419,931,99,611,355,867,227,739,483,995, + 19,531,275,787,147,659,403,915,83,595,339,851,211,723,467,979,51,563,307,819,179,691,435,947,115,627,371,883,243,755,499,1011, + 11,523,267,779,139,651,395,907,75,587,331,843,203,715,459,971,43,555,299,811,171,683,427,939,107,619,363,875,235,747,491,1003, + 27,539,283,795,155,667,411,923,91,603,347,859,219,731,475,987,59,571,315,827,187,699,443,955,123,635,379,891,251,763,507,1019, + 7,519,263,775,135,647,391,903,71,583,327,839,199,711,455,967,39,551,295,807,167,679,423,935,103,615,359,871,231,743,487,999, + 23,535,279,791,151,663,407,919,87,599,343,855,215,727,471,983,55,567,311,823,183,695,439,951,119,631,375,887,247,759,503,1015, + 15,527,271,783,143,655,399,911,79,591,335,847,207,719,463,975,47,559,303,815,175,687,431,943,111,623,367,879,239,751,495,1007, + 31,543,287,799,159,671,415,927,95,607,351,863,223,735,479,991,63,575,319,831,191,703,447,959,127,639,383,895,255,767,511,1023 +}; + +#else +#error "NEWHOPE_N must be either 512 or 1024" +#endif + +/************************************************* +* Name: bitrev_vector_newhope +* +* Description: Permutes coefficients of a polynomial into bitreversed order +* +* Arguments: - uint16_t* poly_newhope: pointer to in/output polynomial +**************************************************/ +void bitrev_vector_newhope(uint16_t* poly_newhope) +{ + unsigned int i,r; + uint16_t tmp; + + for(i = 0; i < NEWHOPE_N; i++) + { + r = bitrev_table[i]; + if (i < r) + { + tmp = poly_newhope[i]; + poly_newhope[i] = poly_newhope[r]; + poly_newhope[r] = tmp; + } + } +} + +/************************************************* +* Name: mul_coefficients_newhope +* +* Description: Performs pointwise (coefficient-wise) multiplication +* of two polynomials +* Arguments: - uint16_t* poly_newhope: pointer to in/output polynomial +* - const uint16_t* factors: pointer to input polynomial, coefficients +* are assumed to be in Montgomery representation +**************************************************/ +void mul_coefficients_newhope(uint16_t* poly_newhope, const uint16_t* factors) +{ + unsigned int i; + + for(i = 0; i < NEWHOPE_N; i++) + poly_newhope[i] = montgomery_reduce_newhope((poly_newhope[i] * factors[i])); +} + +#if (NEWHOPE_N == 512) + +/************************************************* +* Name: ntt +* +* Description: Computes number-theoretic transform (NTT) of +* a polynomial in place; inputs assumed to be in +* bitreversed order, output in normal order +* +* Arguments: - uint16_t * a: pointer to in/output polynomial +* - const uint16_t* omega: pointer to input powers of root of unity omega; +* assumed to be in Montgomery domain +**************************************************/ +void ntt(uint16_t * a, const uint16_t* omega) +{ + int i, start, j, jTwiddle, distance; + uint16_t temp, W; + + + for(i=0;i<9;i+=2) + { + // Even level + distance = (1<<i); + for(start = 0; start < distance;start++) + { + jTwiddle = 0; + for(j=start;j<NEWHOPE_N-1;j+=2*distance) + { + W = omega[jTwiddle++]; + temp = a[j]; + a[j] = (temp + a[j + distance]); // Omit reduction (be lazy) + a[j + distance] = montgomery_reduce_newhope((W * ((uint32_t)temp + 3*NEWHOPE_Q - a[j + distance]))); + } + } + if(i+1<9){ + // Odd level + distance <<= 1; + for(start = 0; start < distance;start++) + { + jTwiddle = 0; + for(j=start;j<NEWHOPE_N-1;j+=2*distance) + { + W = omega[jTwiddle++]; + temp = a[j]; + a[j] = (temp + a[j + distance]) % NEWHOPE_Q; + a[j + distance] = montgomery_reduce_newhope((W * ((uint32_t)temp + 3*NEWHOPE_Q - a[j + distance]))); + } + } + } + } +} + +#elif (NEWHOPE_N == 1024) + +void /************************************************* +* Name: ntt +* +* Description: Computes number-theoretic transform (NTT) of +* a polynomial in place; inputs assumed to be in +* bitreversed order, output in normal order +* +* Arguments: - uint16_t * a: pointer to in/output polynomial +* - const uint16_t* omega: pointer to input powers of root of unity omega; +* assumed to be in Montgomery domain +**************************************************/ +ntt_newhope(uint16_t * a, const uint16_t* omega) +{ + int i, start, j, jTwiddle, distance; + uint16_t temp, W; + + + for(i=0;i<10;i+=2) + { + // Even level + distance = (1<<i); + for(start = 0; start < distance;start++) + { + jTwiddle = 0; + for(j=start;j<NEWHOPE_N-1;j+=2*distance) + { + W = omega[jTwiddle++]; + temp = a[j]; + a[j] = (temp + a[j + distance]); // Omit reduction (be lazy) + a[j + distance] = montgomery_reduce_newhope((W * ((uint32_t)temp + 3*NEWHOPE_Q - a[j + distance]))); + } + } + + // Odd level + distance <<= 1; + for(start = 0; start < distance;start++) + { + jTwiddle = 0; + for(j=start;j<NEWHOPE_N-1;j+=2*distance) + { + W = omega[jTwiddle++]; + temp = a[j]; + a[j] = (temp + a[j + distance]) % NEWHOPE_Q; + a[j + distance] = montgomery_reduce_newhope((W * ((uint32_t)temp + 3*NEWHOPE_Q - a[j + distance]))); + } + } + } +} + +#else +#error "NEWHOPE_N must be either 512 or 1024" +#endif diff --git a/dap-sdk/crypto/src/newhope/ntt.h b/dap-sdk/crypto/src/newhope/ntt.h new file mode 100644 index 0000000000000000000000000000000000000000..f301dfcb5dcd8f802b2efa286f6a89be7c8c60cf --- /dev/null +++ b/dap-sdk/crypto/src/newhope/ntt.h @@ -0,0 +1,14 @@ +#ifndef ntt_newhope_H +#define ntt_newhope_H + +#include "inttypes.h" + +extern uint16_t omegas_inv_bitrev_montgomery_newhope[]; +extern uint16_t gammas_bitrev_montgomery[]; +extern uint16_t gammas_inv_montgomery[]; + +void bitrev_vector_newhope(uint16_t* poly_newhope); +void mul_coefficients_newhope(uint16_t* poly_newhope, const uint16_t* factors); +void ntt_newhope(uint16_t* poly_newhope, const uint16_t* omegas); + +#endif diff --git a/dap-sdk/crypto/src/newhope/params.h b/dap-sdk/crypto/src/newhope/params.h new file mode 100644 index 0000000000000000000000000000000000000000..b148d6fba1cdbede998337c9f5aab638a04f1488 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/params.h @@ -0,0 +1,28 @@ +#ifndef PARAMS_H +#define PARAMS_H + +#ifndef NEWHOPE_N +#define NEWHOPE_N 1024 +#endif + +#define NEWHOPE_Q 12289 +#define NEWHOPE_K 8 /* used in noise sampling */ + +#define NEWHOPE_SYMBYTES 32 /* size of shared key, seeds/coins, and hashes */ + +#define NEWHOPE_POLYBYTES ((14*NEWHOPE_N)/8) +#define NEWHOPE_POLYCOMPRESSEDBYTES (( 3*NEWHOPE_N)/8) + +#define NEWHOPE_CPAPKE_PUBLICKEYBYTES (NEWHOPE_POLYBYTES + NEWHOPE_SYMBYTES) +#define NEWHOPE_CPAPKE_SECRETKEYBYTES (NEWHOPE_POLYBYTES) +#define NEWHOPE_CPAPKE_CIPHERTEXTBYTES (NEWHOPE_POLYBYTES + NEWHOPE_POLYCOMPRESSEDBYTES) + +#define NEWHOPE_CPAKEM_PUBLICKEYBYTES NEWHOPE_CPAPKE_PUBLICKEYBYTES +#define NEWHOPE_CPAKEM_SECRETKEYBYTES NEWHOPE_CPAPKE_SECRETKEYBYTES +#define NEWHOPE_CPAKEM_CIPHERTEXTBYTES NEWHOPE_CPAPKE_CIPHERTEXTBYTES + +#define NEWHOPE_CCAKEM_PUBLICKEYBYTES NEWHOPE_CPAPKE_PUBLICKEYBYTES +#define NEWHOPE_CCAKEM_SECRETKEYBYTES (NEWHOPE_CPAPKE_SECRETKEYBYTES + NEWHOPE_CPAPKE_PUBLICKEYBYTES + 2*NEWHOPE_SYMBYTES) +#define NEWHOPE_CCAKEM_CIPHERTEXTBYTES (NEWHOPE_CPAPKE_CIPHERTEXTBYTES + NEWHOPE_SYMBYTES) /* Second part is for Targhi-Unruh */ + +#endif diff --git a/dap-sdk/crypto/src/newhope/poly.c b/dap-sdk/crypto/src/newhope/poly.c new file mode 100644 index 0000000000000000000000000000000000000000..9736201889cd8410543087b2705c19a3fcbc7206 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/poly.c @@ -0,0 +1,405 @@ +#include "poly.h" +#include "ntt.h" +#include "reduce.h" +#include "sha3/fips202.h" + +/************************************************* +* Name: coeff_freeze +* +* Description: Fully reduces an integer modulo q in constant time +* +* Arguments: uint16_t x: input integer to be reduced +* +* Returns integer in {0,...,q-1} congruent to x modulo q +**************************************************/ +static uint16_t coeff_freeze(uint16_t x) +{ + uint16_t m,r; + int16_t c; + r = x % NEWHOPE_Q; + + m = r - NEWHOPE_Q; + c = m; + c >>= 15; + r = m ^ ((r^m)&c); + + return r; +} + +/************************************************* +* Name: flipabs +* +* Description: Computes |(x mod q) - Q/2| +* +* Arguments: uint16_t x: input coefficient +* +* Returns |(x mod q) - Q/2| +**************************************************/ +static uint16_t flipabs(uint16_t x) +{ + int16_t r,m; + r = coeff_freeze(x); + + r = r - NEWHOPE_Q/2; + m = r >> 15; + return (r + m) ^ m; +} + +/************************************************* +* Name: poly_newhope_frombytes +* +* Description: De-serialization of a polynomial +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const unsigned char *a: pointer to input byte array +**************************************************/ +void poly_newhope_frombytes(poly_newhope *r, const unsigned char *a) +{ + int i; + for(i=0;i<NEWHOPE_N/4;i++) + { + r->coeffs[4*i+0] = a[7*i+0] | (((uint16_t)a[7*i+1] & 0x3f) << 8); + r->coeffs[4*i+1] = (a[7*i+1] >> 6) | (((uint16_t)a[7*i+2]) << 2) | (((uint16_t)a[7*i+3] & 0x0f) << 10); + r->coeffs[4*i+2] = (a[7*i+3] >> 4) | (((uint16_t)a[7*i+4]) << 4) | (((uint16_t)a[7*i+5] & 0x03) << 12); + r->coeffs[4*i+3] = (a[7*i+5] >> 2) | (((uint16_t)a[7*i+6]) << 6); + } +} + +/************************************************* +* Name: poly_newhope_tobytes +* +* Description: Serialization of a polynomial +* +* Arguments: - unsigned char *r: pointer to output byte array +* - const poly_newhope *p: pointer to input polynomial +**************************************************/ +void poly_newhope_tobytes(unsigned char *r, const poly_newhope *p) +{ + int i; + uint16_t t0,t1,t2,t3; + for(i=0;i<NEWHOPE_N/4;i++) + { + t0 = coeff_freeze(p->coeffs[4*i+0]); + t1 = coeff_freeze(p->coeffs[4*i+1]); + t2 = coeff_freeze(p->coeffs[4*i+2]); + t3 = coeff_freeze(p->coeffs[4*i+3]); + + r[7*i+0] = t0 & 0xff; + r[7*i+1] = (t0 >> 8) | (t1 << 6); + r[7*i+2] = (t1 >> 2); + r[7*i+3] = (t1 >> 10) | (t2 << 4); + r[7*i+4] = (t2 >> 4); + r[7*i+5] = (t2 >> 12) | (t3 << 2); + r[7*i+6] = (t3 >> 6); + } +} + +/************************************************* +* Name: poly_newhope_compress +* +* Description: Compression and subsequent serialization of a polynomial +* +* Arguments: - unsigned char *r: pointer to output byte array +* - const poly_newhope *p: pointer to input polynomial +**************************************************/ +void poly_newhope_compress(unsigned char *r, const poly_newhope *p) +{ + unsigned int i,j,k=0; + + uint32_t t[8]; + + for(i=0;i<NEWHOPE_N;i+=8) + { + for(j=0;j<8;j++) + { + t[j] = coeff_freeze(p->coeffs[i+j]); + t[j] = (((t[j] << 3) + NEWHOPE_Q/2)/NEWHOPE_Q) & 0x7; + } + + r[k] = t[0] | (t[1] << 3) | (t[2] << 6); + r[k+1] = (t[2] >> 2) | (t[3] << 1) | (t[4] << 4) | (t[5] << 7); + r[k+2] = (t[5] >> 1) | (t[6] << 2) | (t[7] << 5); + k += 3; + } +} + +/************************************************* +* Name: poly_newhope_decompress +* +* Description: De-serialization and subsequent decompression of a polynomial; +* approximate inverse of poly_newhope_compress +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const unsigned char *a: pointer to input byte array +**************************************************/ +void poly_newhope_decompress(poly_newhope *r, const unsigned char *a) +{ + unsigned int i,j; + for(i=0;i<NEWHOPE_N;i+=8) + { + r->coeffs[i+0] = a[0] & 7; + r->coeffs[i+1] = (a[0] >> 3) & 7; + r->coeffs[i+2] = (a[0] >> 6) | ((a[1] << 2) & 4); + r->coeffs[i+3] = (a[1] >> 1) & 7; + r->coeffs[i+4] = (a[1] >> 4) & 7; + r->coeffs[i+5] = (a[1] >> 7) | ((a[2] << 1) & 6); + r->coeffs[i+6] = (a[2] >> 2) & 7; + r->coeffs[i+7] = (a[2] >> 5); + a += 3; + for(j=0;j<8;j++) + r->coeffs[i+j] = ((uint32_t)r->coeffs[i+j] * NEWHOPE_Q + 4) >> 3; + } +} + +/************************************************* +* Name: poly_newhope_frommsg +* +* Description: Convert 32-byte message to polynomial +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const unsigned char *msg: pointer to input message +**************************************************/ +void poly_newhope_frommsg(poly_newhope *r, const unsigned char *msg) +{ + unsigned int i,j,mask; + for(i=0;i<32;i++) // XXX: MACRO for 32 + { + for(j=0;j<8;j++) + { + mask = -((msg[i] >> j)&1); + r->coeffs[8*i+j+ 0] = mask & (NEWHOPE_Q/2); + r->coeffs[8*i+j+256] = mask & (NEWHOPE_Q/2); +#if (NEWHOPE_N == 1024) + r->coeffs[8*i+j+512] = mask & (NEWHOPE_Q/2); + r->coeffs[8*i+j+768] = mask & (NEWHOPE_Q/2); +#endif + } + } +} + +/************************************************* +* Name: poly_newhope_tomsg +* +* Description: Convert polynomial to 32-byte message +* +* Arguments: - unsigned char *msg: pointer to output message +* - const poly_newhope *x: pointer to input polynomial +**************************************************/ +void poly_newhope_tomsg(unsigned char *msg, const poly_newhope *x) +{ + unsigned int i; + uint16_t t; + + for(i=0;i<32;i++) + msg[i] = 0; + + for(i=0;i<256;i++) + { + t = flipabs(x->coeffs[i+ 0]); + t += flipabs(x->coeffs[i+256]); +#if (NEWHOPE_N == 1024) + t += flipabs(x->coeffs[i+512]); + t += flipabs(x->coeffs[i+768]); + t = ((t - NEWHOPE_Q)); +#else + t = ((t - NEWHOPE_Q/2)); +#endif + + t >>= 15; + msg[i>>3] |= t<<(i&7); + } +} + +/************************************************* +* Name: poly_newhope_uniform +* +* Description: Sample a polynomial deterministically from a seed, +* with output polynomial looking uniformly random +* +* Arguments: - poly_newhope *a: pointer to output polynomial +* - const unsigned char *seed: pointer to input seed +**************************************************/ +void poly_newhope_uniform(poly_newhope *a, const unsigned char *seed) +{ + unsigned int ctr=0; + uint16_t val; + uint64_t state[25]; + uint8_t buf[SHAKE128_RATE]; + uint8_t extseed[NEWHOPE_SYMBYTES+1]; + int i,j; + + for(i=0;i<NEWHOPE_SYMBYTES;i++) + extseed[i] = seed[i]; + + for(i=0;i<NEWHOPE_N/64;i++) /* generate a in blocks of 64 coefficients */ + { + ctr = 0; + extseed[NEWHOPE_SYMBYTES] = i; /* domain-separate the 16 independent calls */ + for(int ii = 0; ii < 25; ++ii) + state[ii] = 0; + shake128_absorb(state, extseed, NEWHOPE_SYMBYTES+1); + while(ctr < 64) /* Very unlikely to run more than once */ + { + shake128_squeezeblocks(buf,1,state); + for(j=0;j<SHAKE128_RATE && ctr < 64;j+=2) + { + val = (buf[j] | ((uint16_t) buf[j+1] << 8)); + if(val < 5*NEWHOPE_Q) + { + a->coeffs[i*64+ctr] = val; + ctr++; + } + } + } + } +} + +/************************************************* +* Name: hw +* +* Description: Compute the Hamming weight of a byte +* +* Arguments: - unsigned char a: input byte +**************************************************/ +static unsigned char hw(unsigned char a) +{ + unsigned char i, r = 0; + for(i=0;i<8;i++) + r += (a >> i) & 1; + return r; +} + +/************************************************* +* Name: poly_newhope_sample +* +* Description: Sample a polynomial deterministically from a seed and a nonce, +* with output polynomial close to centered binomial distribution +* with parameter k=8 +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const unsigned char *seed: pointer to input seed +* - unsigned char nonce: one-byte input nonce +**************************************************/ +void poly_newhope_sample(poly_newhope *r, const unsigned char *seed, unsigned char nonce) +{ +#if NEWHOPE_K != 8 +#error "poly_newhope_sample in poly_newhope.c only supports k=8" +#endif + unsigned char buf[128], a, b; +// uint32_t t, d, a, b, c; + int i,j; + + unsigned char extseed[NEWHOPE_SYMBYTES+2]; + + for(i=0;i<NEWHOPE_SYMBYTES;i++) + extseed[i] = seed[i]; + extseed[NEWHOPE_SYMBYTES] = nonce; + + for(i=0;i<NEWHOPE_N/64;i++) /* Generate noise in blocks of 64 coefficients */ + { + extseed[NEWHOPE_SYMBYTES+1] = i; + shake256(buf,128,extseed,NEWHOPE_SYMBYTES+2); + for(j=0;j<64;j++) + { + a = buf[2*j]; + b = buf[2*j+1]; + r->coeffs[64*i+j] = hw(a) + NEWHOPE_Q - hw(b); + /* + t = buf[j] | ((uint32_t)buf[j+1] << 8) | ((uint32_t)buf[j+2] << 16) | ((uint32_t)buf[j+3] << 24); + d = 0; + for(k=0;k<8;k++) + d += (t >> k) & 0x01010101; + a = d & 0xff; + b = ((d >> 8) & 0xff); + c = ((d >> 16) & 0xff); + d >>= 24; + r->coeffs[64*i+j/2] = a + NEWHOPE_Q - b; + r->coeffs[64*i+j/2+1] = c + NEWHOPE_Q - d; + */ + } + } +} + +/************************************************* +* Name: poly_newhope_pointwise +* +* Description: Multiply two polynomials pointwise (i.e., coefficient-wise). +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const poly_newhope *a: pointer to first input polynomial +* - const poly_newhope *b: pointer to second input polynomial +**************************************************/ +void poly_newhope_mul_pointwise(poly_newhope *r, const poly_newhope *a, const poly_newhope *b) +{ + int i; + uint16_t t; + for(i=0;i<NEWHOPE_N;i++) + { + t = montgomery_reduce_newhope(3186*b->coeffs[i]); /* t is now in Montgomery domain */ + r->coeffs[i] = montgomery_reduce_newhope(a->coeffs[i] * t); /* r->coeffs[i] is back in normal domain */ + } +} + +/************************************************* +* Name: poly_newhope_add +* +* Description: Add two polynomials +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const poly_newhope *a: pointer to first input polynomial +* - const poly_newhope *b: pointer to second input polynomial +**************************************************/ +void poly_newhope_add(poly_newhope *r, const poly_newhope *a, const poly_newhope *b) +{ + int i; + for(i=0;i<NEWHOPE_N;i++) + r->coeffs[i] = (a->coeffs[i] + b->coeffs[i]) % NEWHOPE_Q; +} + +/************************************************* +* Name: poly_newhope_sub +* +* Description: Subtract two polynomials +* +* Arguments: - poly_newhope *r: pointer to output polynomial +* - const poly_newhope *a: pointer to first input polynomial +* - const poly_newhope *b: pointer to second input polynomial +**************************************************/ +void poly_newhope_sub(poly_newhope *r, const poly_newhope *a, const poly_newhope *b) +{ + int i; + for(i=0;i<NEWHOPE_N;i++) + r->coeffs[i] = (a->coeffs[i] + 3*NEWHOPE_Q - b->coeffs[i]) % NEWHOPE_Q; +} + +/************************************************* +* Name: poly_newhope_ntt_newhope +* +* Description: Forward ntt_newhope transform of a polynomial in place +* Input is assumed to have coefficients in bitreversed order +* Output has coefficients in normal order +* +* Arguments: - poly_newhope *r: pointer to in/output polynomial +**************************************************/ +void poly_newhope_ntt_newhope(poly_newhope *r) +{ + mul_coefficients_newhope(r->coeffs, gammas_bitrev_montgomery); + ntt_newhope((uint16_t *)r->coeffs, gammas_bitrev_montgomery); +} + +/************************************************* +* Name: poly_newhope_invntt_newhope +* +* Description: Inverse ntt_newhope transform of a polynomial in place +* Input is assumed to have coefficients in normal order +* Output has coefficients in normal order +* +* Arguments: - poly_newhope *r: pointer to in/output polynomial +**************************************************/ +void poly_newhope_invntt_newhope(poly_newhope *r) +{ + bitrev_vector_newhope(r->coeffs); + ntt_newhope((uint16_t *)r->coeffs, omegas_inv_bitrev_montgomery_newhope); + mul_coefficients_newhope(r->coeffs, gammas_inv_montgomery); +} + diff --git a/dap-sdk/crypto/src/newhope/poly.h b/dap-sdk/crypto/src/newhope/poly.h new file mode 100644 index 0000000000000000000000000000000000000000..17f62e99a213f55fff8cce3ce740ff23ee1bf29a --- /dev/null +++ b/dap-sdk/crypto/src/newhope/poly.h @@ -0,0 +1,32 @@ +#ifndef poly_newhope_H +#define poly_newhope_H + +#include <stdint.h> +#include "params.h" + +/* + * Elements of R_q = Z_q[X]/(X^n + 1). Represents polynomial + * coeffs[0] + X*coeffs[1] + X^2*xoeffs[2] + ... + X^{n-1}*coeffs[n-1] + */ +typedef struct { + uint16_t coeffs[NEWHOPE_N]; +} poly_newhope __attribute__ ((aligned (32))); + +void poly_newhope_uniform(poly_newhope *a, const unsigned char *seed); +void poly_newhope_sample(poly_newhope *r, const unsigned char *seed, unsigned char nonce); +void poly_newhope_add(poly_newhope *r, const poly_newhope *a, const poly_newhope *b); + +void poly_newhope_ntt_newhope(poly_newhope *r); +void poly_newhope_invntt_newhope(poly_newhope *r); +void poly_newhope_mul_pointwise(poly_newhope *r, const poly_newhope *a, const poly_newhope *b); + +void poly_newhope_frombytes(poly_newhope *r, const unsigned char *a); +void poly_newhope_tobytes(unsigned char *r, const poly_newhope *p); +void poly_newhope_compress(unsigned char *r, const poly_newhope *p); +void poly_newhope_decompress(poly_newhope *r, const unsigned char *a); + +void poly_newhope_frommsg(poly_newhope *r, const unsigned char *msg); +void poly_newhope_tomsg(unsigned char *msg, const poly_newhope *x); +void poly_newhope_sub(poly_newhope *r, const poly_newhope *a, const poly_newhope *b); + +#endif diff --git a/dap-sdk/crypto/src/newhope/precomp.c b/dap-sdk/crypto/src/newhope/precomp.c new file mode 100644 index 0000000000000000000000000000000000000000..22fd7a056825bb6cf449e8725a6291b35af9d32f --- /dev/null +++ b/dap-sdk/crypto/src/newhope/precomp.c @@ -0,0 +1,371 @@ +#include "inttypes.h" +#include "ntt.h" +#include "params.h" + +/* Precomputed ntt_newhope contants generated by Pari/GP script as follows: + * + * For n = 512: + * + * brv = [0,256,128,384,64,320,192,448,32,288,160,416,96,352,224,480,16,272,144,400,80,336,208,464,48,304,176,432,112,368,240,496,8, + * 264,136,392,72,328,200,456,40,296,168,424,104,360,232,488,24,280,152,408,88,344,216,472,56,312,184,440,120,376,248,504,4, + * 260,132,388,68,324,196,452,36,292,164,420,100,356,228,484,20,276,148,404,84,340,212,468,52,308,180,436,116,372,244,500,12, + * 268,140,396,76,332,204,460,44,300,172,428,108,364,236,492,28,284,156,412,92,348,220,476,60,316,188,444,124,380,252,508,2, + * 258,130,386,66,322,194,450,34,290,162,418,98,354,226,482,18,274,146,402,82,338,210,466,50,306,178,434,114,370,242,498,10, + * 266,138,394,74,330,202,458,42,298,170,426,106,362,234,490,26,282,154,410,90,346,218,474,58,314,186,442,122,378,250,506,6, + * 262,134,390,70,326,198,454,38,294,166,422,102,358,230,486,22,278,150,406,86,342,214,470,54,310,182,438,118,374,246,502,14, + * 270,142,398,78,334,206,462,46,302,174,430,110,366,238,494,30,286,158,414,94,350,222,478,62,318,190,446,126,382,254,510,1, + * 257,129,385,65,321,193,449,33,289,161,417,97,353,225,481,17,273,145,401,81,337,209,465,49,305,177,433,113,369,241,497,9, + * 265,137,393,73,329,201,457,41,297,169,425,105,361,233,489,25,281,153,409,89,345,217,473,57,313,185,441,121,377,249,505,5, + * 261,133,389,69,325,197,453,37,293,165,421,101,357,229,485,21,277,149,405,85,341,213,469,53,309,181,437,117,373,245,501,13, + * 269,141,397,77,333,205,461,45,301,173,429,109,365,237,493,29,285,157,413,93,349,221,477,61,317,189,445,125,381,253,509,3, + * 259,131,387,67,323,195,451,35,291,163,419,99,355,227,483,19,275,147,403,83,339,211,467,51,307,179,435,115,371,243,499,11, + * 267,139,395,75,331,203,459,43,299,171,427,107,363,235,491,27,283,155,411,91,347,219,475,59,315,187,443,123,379,251,507,7, + * 263,135,391,71,327,199,455,39,295,167,423,103,359,231,487,23,279,151,407,87,343,215,471,55,311,183,439,119,375,247,503,15, + * 271,143,399,79,335,207,463,47,303,175,431,111,367,239,495,31,287,159,415,95,351,223,479,63,319,191,447,127,383,255,511] + * n = 512; q = 12289; mont=2^18 + * g = Mod(10968, q); + * omegas_inv_bitrev_montgomery_newhope = lift(vector(n/2, i, (g^2)^(-brv[2*(i-1)+1])*mont)) + * gammas_bitrev_montgomery = lift(vector(n, i, g^(brv[i])*mont)) + * gammas_inv_montgomery = lift(vector(n, i, g^(-(i-1))/n*mont)) + * + * + * For n = 1024: + * + * brv = [0,512,256,768,128,640,384,896,64,576,320,832,192,704,448,960,32,544,288,800,160,672,416,928,96,608,352,864,224,736,480,992, \ + * 16,528,272,784,144,656,400,912,80,592,336,848,208,720,464,976,48,560,304,816,176,688,432,944,112,624,368,880,240,752,496,1008, \ + * 8,520,264,776,136,648,392,904,72,584,328,840,200,712,456,968,40,552,296,808,168,680,424,936,104,616,360,872,232,744,488,1000, \ + * 24,536,280,792,152,664,408,920,88,600,344,856,216,728,472,984,56,568,312,824,184,696,440,952,120,632,376,888,248,760,504,1016, \ + * 4,516,260,772,132,644,388,900,68,580,324,836,196,708,452,964,36,548,292,804,164,676,420,932,100,612,356,868,228,740,484,996, \ + * 20,532,276,788,148,660,404,916,84,596,340,852,212,724,468,980,52,564,308,820,180,692,436,948,116,628,372,884,244,756,500,1012, \ + * 12,524,268,780,140,652,396,908,76,588,332,844,204,716,460,972,44,556,300,812,172,684,428,940,108,620,364,876,236,748,492,1004, \ + * 28,540,284,796,156,668,412,924,92,604,348,860,220,732,476,988,60,572,316,828,188,700,444,956,124,636,380,892,252,764,508,1020, \ + * 2,514,258,770,130,642,386,898,66,578,322,834,194,706,450,962,34,546,290,802,162,674,418,930,98,610,354,866,226,738,482,994, \ + * 18,530,274,786,146,658,402,914,82,594,338,850,210,722,466,978,50,562,306,818,178,690,434,946,114,626,370,882,242,754,498,1010, \ + * 10,522,266,778,138,650,394,906,74,586,330,842,202,714,458,970,42,554,298,810,170,682,426,938,106,618,362,874,234,746,490,1002, \ + * 26,538,282,794,154,666,410,922,90,602,346,858,218,730,474,986,58,570,314,826,186,698,442,954,122,634,378,890,250,762,506,1018, \ + * 6,518,262,774,134,646,390,902,70,582,326,838,198,710,454,966,38,550,294,806,166,678,422,934,102,614,358,870,230,742,486,998, \ + * 22,534,278,790,150,662,406,918,86,598,342,854,214,726,470,982,54,566,310,822,182,694,438,950,118,630,374,886,246,758,502,1014, \ + * 14,526,270,782,142,654,398,910,78,590,334,846,206,718,462,974,46,558,302,814,174,686,430,942,110,622,366,878,238,750,494,1006, \ + * 30,542,286,798,158,670,414,926,94,606,350,862,222,734,478,990,62,574,318,830,190,702,446,958,126,638,382,894,254,766,510,1022, \ + * 1,513,257,769,129,641,385,897,65,577,321,833,193,705,449,961,33,545,289,801,161,673,417,929,97,609,353,865,225,737,481,993, \ + * 17,529,273,785,145,657,401,913,81,593,337,849,209,721,465,977,49,561,305,817,177,689,433,945,113,625,369,881,241,753,497,1009, \ + * 9,521,265,777,137,649,393,905,73,585,329,841,201,713,457,969,41,553,297,809,169,681,425,937,105,617,361,873,233,745,489,1001, \ + * 25,537,281,793,153,665,409,921,89,601,345,857,217,729,473,985,57,569,313,825,185,697,441,953,121,633,377,889,249,761,505,1017, \ + * 5,517,261,773,133,645,389,901,69,581,325,837,197,709,453,965,37,549,293,805,165,677,421,933,101,613,357,869,229,741,485,997, \ + * 21,533,277,789,149,661,405,917,85,597,341,853,213,725,469,981,53,565,309,821,181,693,437,949,117,629,373,885,245,757,501,1013, \ + * 13,525,269,781,141,653,397,909,77,589,333,845,205,717,461,973,45,557,301,813,173,685,429,941,109,621,365,877,237,749,493,1005, \ + * 29,541,285,797,157,669,413,925,93,605,349,861,221,733,477,989,61,573,317,829,189,701,445,957,125,637,381,893,253,765,509,1021, \ + * 3,515,259,771,131,643,387,899,67,579,323,835,195,707,451,963,35,547,291,803,163,675,419,931,99,611,355,867,227,739,483,995, \ + * 19,531,275,787,147,659,403,915,83,595,339,851,211,723,467,979,51,563,307,819,179,691,435,947,115,627,371,883,243,755,499,1011, \ + * 11,523,267,779,139,651,395,907,75,587,331,843,203,715,459,971,43,555,299,811,171,683,427,939,107,619,363,875,235,747,491,1003, \ + * 27,539,283,795,155,667,411,923,91,603,347,859,219,731,475,987,59,571,315,827,187,699,443,955,123,635,379,891,251,763,507,1019, \ + * 7,519,263,775,135,647,391,903,71,583,327,839,199,711,455,967,39,551,295,807,167,679,423,935,103,615,359,871,231,743,487,999, \ + * 23,535,279,791,151,663,407,919,87,599,343,855,215,727,471,983,55,567,311,823,183,695,439,951,119,631,375,887,247,759,503,1015, \ + * 15,527,271,783,143,655,399,911,79,591,335,847,207,719,463,975,47,559,303,815,175,687,431,943,111,623,367,879,239,751,495,1007, \ + * 31,543,287,799,159,671,415,927,95,607,351,863,223,735,479,991,63,575,319,831,191,703,447,959,127,639,383,895,255,767,511,1023] + * + * n = 1024; q = 12289; mont=2^18 + * g = Mod(7, q); + * omegas_inv_bitrev_montgomery_newhope = lift(vector(n/2, i, (g^2)^(-brv[2*(i-1)+1])*mont)) + * gammas_bitrev_montgomery = lift(vector(n, i, g^(brv[i])*mont)) + * gammas_inv_montgomery = lift(vector(n, i, g^(-(i-1))/n*mont)) +*/ + + +#if (NEWHOPE_N == 512) + +/************************************************************ +* Name: omegas_inv_bitrev_montgomery_newhope +* +* Description: Contains inverses of powers of nth root of unity +* in Montgomery domain with R=2^18 in bit-reversed order +************************************************************/ +uint16_t omegas_inv_bitrev_montgomery_newhope[NEWHOPE_N/2] = { + 4075,6974,4916,4324,7210,3262,2169,11767,3514,1041,5925,11271,6715,10316,11011,9945, + 1190,9606,3818,6118,1050,7753,8429,6844,4449,6833,147,3789,7540,6752,4467,4789, + 10367,3879,2033,3998,11316,1254,6854,1359,3988,468,11907,11973,8579,6196,5446,6950, + 1987,10587,654,3565,3199,12233,7083,6760,6427,6153,3643,6874,4948,6152,11889,1728, + 7280,10333,6008,11404,3532,11286,241,12231,11314,4212,8851,9445,3477,6608,12147,1105, + 5594,9260,5886,7507,4213,11785,2302,11684,8687,6221,8209,421,7665,6212,8689,3263, + 10710,431,9784,5906,9450,8332,2127,151,3174,52,1323,9523,6415,11612,3336,6234, + 7048,9369,4169,3127,11279,6821,787,3482,3445,4780,7232,7591,7377,2049,1321,192, + 9551,6421,5735,9634,10596,9280,723,12115,9364,347,1975,3757,10431,7535,11863,3315, + 4493,3202,5369,10232,350,10777,6906,10474,1483,6374,49,1263,10706,6347,1489,9789, + 7552,1293,4774,5429,3772,418,6381,453,9522,156,3969,3991,6956,10258,10008,6413, + 8855,3529,218,9381,9259,8174,2361,10446,10335,2051,9407,10484,9842,6147,3963,576, + 6523,11637,6099,11994,9370,3762,8273,4077,11964,1404,11143,11341,1159,6299,4049,8561, + 5961,7183,1962,10695,9597,12121,8960,7991,6992,6170,10929,8333,2555,6167,11089,5184, + 3570,4240,11454,6065,3150,10970,709,8243,1058,8210,441,11367,10331,7967,1112,2078, + 10542,3123,5486,9235,7856,6370,8455,5257,9341,9786,6507,10723,2459,683,8633,64, +}; + +/************************************************************ +* Name: gammas_bitrev_montgomery +* +* Description: Contains powers of nth root of -1 in Montgomery +* domain with R=2^18 in bit-reversed order +************************************************************/ +uint16_t gammas_bitrev_montgomery[NEWHOPE_N] = { + 4075,5315,7965,7373,522,10120,9027,5079,2344,1278,1973,5574,1018,6364,11248,8775, + 7500,7822,5537,4749,8500,12142,5456,7840,5445,3860,4536,11239,6171,8471,2683,11099, + 10561,400,6137,7341,5415,8646,6136,5862,5529,5206,56,9090,8724,11635,1702,10302, + 5339,6843,6093,3710,316,382,11821,8301,10930,5435,11035,973,8291,10256,8410,1922, + 12097,10968,10240,4912,4698,5057,7509,8844,8807,11502,5468,1010,9162,8120,2920,5241, + 6055,8953,677,5874,2766,10966,12237,9115,12138,10162,3957,2839,6383,2505,11858,1579, + 9026,3600,6077,4624,11868,4080,6068,3602,605,9987,504,8076,4782,6403,3029,6695, + 11184,142,5681,8812,2844,3438,8077,975,58,12048,1003,8757,885,6281,1956,5009, + 12225,3656,11606,9830,1566,5782,2503,2948,7032,3834,5919,4433,3054,6803,9166,1747, + 10211,11177,4322,1958,922,11848,4079,11231,4046,11580,1319,9139,6224,835,8049,8719, + 7105,1200,6122,9734,3956,1360,6119,5297,4298,3329,168,2692,1594,10327,5106,6328, + 3728,8240,5990,11130,948,1146,10885,325,8212,4016,8527,2919,295,6190,652,5766, + 11713,8326,6142,2447,1805,2882,10238,1954,1843,9928,4115,3030,2908,12071,8760,3434, + 5876,2281,2031,5333,8298,8320,12133,2767,11836,5908,11871,8517,6860,7515,10996,4737, + 2500,10800,5942,1583,11026,12240,5915,10806,1815,5383,1512,11939,2057,6920,9087,7796, + 8974,426,4754,1858,8532,10314,11942,2925,174,11566,3009,1693,2655,6554,5868,2738, + 11796,8193,9908,5444,10911,1912,7952,435,404,7644,11224,10146,7012,11121,11082,9041, + 9723,2187,9867,6250,3646,9852,6267,2987,8509,875,4976,10682,8005,5088,7278,11287, + 9223,27,3763,10849,11272,7404,5084,10657,8146,4714,12047,10752,2678,3704,545,7270, + 1067,5101,442,2401,390,11516,3778,8456,1045,9430,9808,5012,9377,6591,11935,4861, + 7852,3,3149,12129,12176,4919,10123,3915,3636,7351,2704,5291,1663,1777,1426,7635, + 1484,7394,2780,7094,8236,2645,7247,2305,2847,7875,7917,10115,10600,8925,4057,3271, + 9273,243,9289,11618,3136,5191,8889,9890,11869,5559,10111,10745,11813,8758,4905,3985, + 9603,9042,3978,9320,3510,5332,9424,2370,9405,11136,2249,8241,10659,10163,9103,6882, + 10810,1,5146,4043,8155,5736,11567,1305,1212,10643,9094,5860,8747,8785,8668,2545, + 4591,6561,5023,6461,10938,4978,6512,8961,949,2625,2639,7468,11726,2975,9545,9283, + 3091,81,11289,7969,9238,9923,2963,7393,12149,1853,11563,7678,8034,11112,1635,9521, + 3201,3014,1326,7203,1170,9970,11334,790,3135,3712,4846,2747,3553,7484,11227,2294, + 11267,9,9447,11809,11950,2468,5791,11745,10908,9764,8112,3584,4989,5331,4278,10616, + 4452,9893,8340,8993,130,7935,9452,6915,8541,11336,11462,5767,7222,2197,12171,9813, + 3241,729,3289,10276,9408,3284,2089,5092,11029,4388,5755,7657,10861,1696,2426,11955, + 4231,2548,11934,3382,10530,3707,3694,7110,3637,8830,6747,145,7399,5911,2731,8357, +}; + +/************************************************************ +* Name: gammas_inv_montgomery +* +* Description: Contains inverses of powers of nth root of -1 +* divided by n in Montgomery domain with R=2^18 +************************************************************/ +uint16_t gammas_inv_montgomery[NEWHOPE_N] = { + 512,3944,4267,5411,9615,5900,3205,6063,9261,2021,3087,4770,1029,1590,343,530, + 8307,4273,2769,9617,923,7302,4404,2434,1468,9004,8682,11194,2894,11924,5061,8071, + 1687,10883,8755,7724,11111,6671,7800,6320,2600,6203,4963,6164,9847,6151,11475,10243, + 3825,11607,1275,3869,425,5386,4238,9988,5509,11522,10029,7937,3343,6742,9307,10440, + 11295,3480,3765,1160,1255,4483,8611,9687,11063,3229,7784,9269,6691,7186,10423,10588, + 11667,11722,3889,12100,9489,12226,3163,12268,9247,12282,11275,4094,11951,5461,8080,10013, + 10886,7434,7725,2478,2575,826,9051,8468,3017,6919,5102,10499,5797,7596,10125,2532, + 3375,844,1125,8474,375,6921,125,2307,4138,769,9572,8449,7287,11009,2429,7766, + 4906,6685,9828,10421,3276,7570,1092,10716,364,3572,8314,5287,10964,9955,7751,11511, + 6680,3837,6323,1279,6204,8619,2068,2873,8882,5054,7057,5781,10545,1927,3515,8835, + 5268,2945,1756,5078,8778,5789,2926,6026,9168,6105,3056,2035,5115,8871,1705,2957, + 8761,5082,11113,1694,11897,4661,8062,5650,10880,10076,7723,7455,10767,2485,3589,9021, + 9389,3007,7226,9195,6505,3065,10361,5118,7550,1706,6613,4665,10397,1555,7562,8711, + 6617,7000,6302,10526,6197,7605,6162,2535,2054,845,4781,4378,5690,9652,5993,11410, + 6094,11996,10224,8095,3408,10891,1136,11823,4475,3941,5588,5410,5959,9996,10179,3332, + 3393,5207,1131,5832,377,1944,4222,648,9600,216,3200,72,5163,24,1721,8, + 4670,4099,5653,9559,10077,11379,3359,3793,5216,9457,5835,11345,1945,7878,8841,2626, + 2947,9068,9175,7119,11251,2373,11943,791,3981,4360,1327,9646,8635,11408,11071,7899, + 11883,2633,3961,4974,9513,1658,3171,4649,1057,5646,8545,1882,11041,8820,11873,2940, + 8054,980,6781,4423,10453,9667,11677,11415,12085,3805,12221,9461,8170,7250,10916,6513, + 7735,2171,10771,4820,11783,5703,8024,1901,6771,4730,2257,5673,8945,1891,7078,8823, + 10552,2941,11710,9173,12096,7154,4032,6481,1344,10353,448,3451,8342,9343,6877,11307, + 10485,3769,3495,9449,1165,7246,8581,10608,11053,3536,11877,5275,3959,9951,5416,3317, + 9998,5202,7429,1734,10669,578,11749,4289,12109,5526,12229,1842,12269,614,8186,4301, + 6825,5530,2275,10036,8951,11538,7080,3846,2360,1282,4883,8620,5724,11066,1908,7785, + 636,2595,212,865,4167,8481,1389,2827,463,9135,8347,3045,10975,1015,11851,8531, + 12143,6940,8144,10506,6811,3502,10463,9360,7584,3120,2528,1040,4939,4443,9839,1481, + 7376,4590,6555,1530,2185,510,8921,170,7070,4153,6453,9577,2151,11385,717,3795, + 239,1265,4176,4518,1392,1506,464,502,4251,8360,1417,6883,8665,10487,11081,7592, + 7790,6627,6693,2209,2231,8929,4840,11169,9806,3723,7365,1241,2455,4510,9011,9696, + 7100,3232,6463,9270,10347,3090,3449,1030,5246,8536,5845,11038,10141,11872,11573,12150, + 7954,4050,10844,1350,7711,450,10763,150,7684,50,10754,4113,7681,1371,10753,457, +}; + +#elif (NEWHOPE_N == 1024) +/************************************************************ +* Name: omegas_inv_bitrev_montgomery_newhope +* +* Description: Contains inverses of powers of nth root of unity +* in Montgomery domain with R=2^18 in bit-reversed order +************************************************************/ +uint16_t omegas_inv_bitrev_montgomery_newhope[NEWHOPE_N/2] = { + 4075,5315,4324,4916,10120,11767,7210,9027,10316,6715,1278,9945,3514,11248,11271,5925, + 147,8500,7840,6833,5537,4749,4467,7500,11099,9606,6171,8471,8429,5445,11239,7753, + 9090,12233,5529,5206,10587,1987,11635,3565,5415,8646,6153,6427,7341,6152,10561,400, + 8410,1922,2033,8291,1359,6854,11035,973,8579,6093,6950,5446,11821,8301,11907,316, + 52,3174,10966,9523,6055,8953,11612,6415,2505,5906,10710,11858,8332,9450,10162,151, + 3482,787,5468,1010,4169,9162,5241,9369,7509,8844,7232,4698,192,1321,10240,4912, + 885,6281,10333,7280,8757,11286,58,12048,12147,11184,8812,6608,2844,3438,4212,11314, + 8687,6068,421,8209,3600,3263,7665,6077,7507,5886,3029,6695,4213,504,11684,2302, + 1962,1594,6328,7183,168,2692,8960,4298,5184,11089,6122,9734,10929,3956,5297,6170, + 3762,9370,4016,4077,6523,652,11994,6099,1146,11341,11964,10885,6299,1159,8240,8561, + 11177,2078,10331,4322,11367,441,4079,11231,3150,1319,8243,709,8049,8719,11454,6224, + 3054,6803,3123,10542,4433,6370,7032,3834,8633,12225,9830,683,1566,5782,9786,9341, + 12115,723,3009,1693,5735,2655,2738,6421,11942,2925,1975,8532,3315,11863,4754,1858, + 1583,6347,2500,10800,6374,1483,12240,1263,1815,5383,10777,350,6920,10232,4493,9087, + 8855,8760,9381,218,9928,10446,9259,4115,6147,9842,8326,576,10335,10238,10484,9407, + 6381,11836,8517,418,6860,7515,1293,7552,2767,156,8298,8320,10008,5876,5333,10258, + 10115,4372,2847,7875,8232,9018,8925,1689,8236,2645,5042,9984,7094,9509,1484,7394, + 3,4437,160,3149,113,7370,10123,3915,6998,2704,8653,4938,1426,7635,10512,1663, + 6957,3510,2370,2865,3978,9320,3247,9603,6882,3186,10659,10163,1153,9405,8241,10040, + 2178,1544,5559,420,8304,4905,476,3531,5191,9153,2399,8889,3000,671,243,3016, + 3763,10849,12262,9223,10657,7205,11272,7404,7575,8146,10752,242,2678,3704,11744,5019, + 3833,3778,11899,773,5101,11222,9888,442,2912,5698,11935,4861,7277,9808,11244,2859, + 3780,11414,4976,10682,7201,8005,11287,5011,6267,2987,2437,3646,2566,10102,9867,6250, + 5444,2381,11796,8193,4337,11854,1912,1378,404,7644,1065,2143,11121,5277,3248,11082, + 2548,8058,8907,11934,1759,8582,3694,7110,12144,6747,8652,3459,2731,8357,6378,7399, + 10861,1696,9863,334,7657,6534,11029,4388,11560,3241,10276,9000,9408,3284,10200,7197, + 6498,544,2468,339,11267,9,2842,480,5331,7300,1673,4278,4177,8705,9764,1381, + 7837,2396,8340,8993,4354,130,6915,2837,11462,5767,953,8541,9813,118,7222,2197, + 3006,9545,563,9314,2625,11340,4821,2639,7266,5828,6561,7698,3328,6512,1351,7311, + 6553,8155,1305,722,5146,4043,12288,10810,2545,3621,8747,8785,1646,1212,5860,3195, + 7203,10963,3201,3014,955,11499,9970,11119,3135,3712,7443,9542,7484,8736,9995,11227, + 1635,9521,1177,8034,140,10436,11563,7678,4320,11289,9198,12208,2963,7393,2366,9238}; + +/************************************************************ +* Name: gammas_bitrev_montgomery +* +* Description: Contains powers of nth root of -1 in Montgomery +* domain with R=2^18 in bit-reversed order +************************************************************/ +uint16_t gammas_bitrev_montgomery[NEWHOPE_N] = { + 4075,6974,7373,7965,3262,5079,522,2169,6364,1018,1041,8775,2344,11011,5574,1973, + 4536,1050,6844,3860,3818,6118,2683,1190,4789,7822,7540,6752,5456,4449,3789,12142, + 11973,382,3988,468,6843,5339,6196,3710,11316,1254,5435,10930,3998,10256,10367,3879, + 11889,1728,6137,4948,5862,6136,3643,6874,8724,654,10302,1702,7083,6760,56,3199, + 9987,605,11785,8076,5594,9260,6403,4782,6212,4624,9026,8689,4080,11868,6221,3602, + 975,8077,8851,9445,5681,3477,1105,142,241,12231,1003,3532,5009,1956,6008,11404, + 7377,2049,10968,12097,7591,5057,3445,4780,2920,7048,3127,8120,11279,6821,11502,8807, + 12138,2127,2839,3957,431,1579,6383,9784,5874,677,3336,6234,2766,1323,9115,12237, + 2031,6956,6413,2281,3969,3991,12133,9522,4737,10996,4774,5429,11871,3772,453,5908, + 2882,1805,2051,1954,11713,3963,2447,6142,8174,3030,1843,2361,12071,2908,3529,3434, + 3202,7796,2057,5369,11939,1512,6906,10474,11026,49,10806,5915,1489,9789,5942,10706, + 10431,7535,426,8974,3757,10314,9364,347,5868,9551,9634,6554,10596,9280,11566,174, + 2948,2503,6507,10723,11606,2459,64,3656,8455,5257,5919,7856,1747,9166,5486,9235, + 6065,835,3570,4240,11580,4046,10970,9139,1058,8210,11848,922,7967,1958,10211,1112, + 3728,4049,11130,5990,1404,325,948,11143,6190,295,11637,5766,8212,8273,2919,8527, + 6119,6992,8333,1360,2555,6167,1200,7105,7991,3329,9597,12121,5106,5961,10695,10327, + 3051,9923,4896,9326,81,3091,1000,7969,4611,726,1853,12149,4255,11112,2768,10654, + 1062,2294,3553,4805,2747,4846,8577,9154,1170,2319,790,11334,9275,9088,1326,5086, + 9094,6429,11077,10643,3504,3542,8668,9744,1479,1,8246,7143,11567,10984,4134,5736, + 4978,10938,5777,8961,4591,5728,6461,5023,9650,7468,949,9664,2975,11726,2744,9283, + 10092,5067,12171,2476,3748,11336,6522,827,9452,5374,12159,7935,3296,3949,9893,4452, + 10908,2525,3584,8112,8011,10616,4989,6958,11809,9447,12280,1022,11950,9821,11745,5791, + 5092,2089,9005,2881,3289,2013,9048,729,7901,1260,5755,4632,11955,2426,10593,1428, + 4890,5911,3932,9558,8830,3637,5542,145,5179,8595,3707,10530,355,3382,4231,9741, + 1207,9041,7012,1168,10146,11224,4645,11885,10911,10377,435,7952,4096,493,9908,6845, + 6039,2422,2187,9723,8643,9852,9302,6022,7278,1002,4284,5088,1607,7313,875,8509, + 9430,1045,2481,5012,7428,354,6591,9377,11847,2401,1067,7188,11516,390,8511,8456, + 7270,545,8585,9611,12047,1537,4143,4714,4885,1017,5084,1632,3066,27,1440,8526, + 9273,12046,11618,9289,3400,9890,3136,7098,8758,11813,7384,3985,11869,6730,10745,10111, + 2249,4048,2884,11136,2126,1630,9103,5407,2686,9042,2969,8311,9424,9919,8779,5332, + 10626,1777,4654,10863,7351,3636,9585,5291,8374,2166,4919,12176,9140,12129,7852,12286, + 4895,10805,2780,5195,2305,7247,9644,4053,10600,3364,3271,4057,4414,9442,7917,2174, + 3947,11951,2455,6599,10545,10975,3654,2894,7681,7126,7287,12269,4119,3343,2151,1522, + 7174,7350,11041,2442,2148,5959,6492,8330,8945,5598,3624,10397,1325,6565,1945,11260, + 10077,2674,3338,3276,11034,506,6505,1392,5478,8778,1178,2776,3408,10347,11124,2575, + 9489,12096,6092,10058,4167,6085,923,11251,11912,4578,10669,11914,425,10453,392,10104, + 8464,4235,8761,7376,2291,3375,7954,8896,6617,7790,1737,11667,3982,9342,6680,636, + 6825,7383,512,4670,2900,12050,7735,994,1687,11883,7021,146,10485,1403,5189,6094, + 2483,2054,3042,10945,3981,10821,11826,8882,8151,180,9600,7684,5219,10880,6780,204, + 11232,2600,7584,3121,3017,11053,7814,7043,4251,4739,11063,6771,7073,9261,2360,11925, + 1928,11825,8024,3678,3205,3359,11197,5209,8581,3238,8840,1136,9363,1826,3171,4489, + 7885,346,2068,1389,8257,3163,4840,6127,8062,8921,612,4238,10763,8067,125,11749, + 10125,5416,2110,716,9839,10584,11475,11873,3448,343,1908,4538,10423,7078,4727,1208, + 11572,3589,2982,1373,1721,10753,4103,2429,4209,5412,5993,9011,438,3515,7228,1218, + 8347,5232,8682,1327,7508,4924,448,1014,10029,12221,4566,5836,12229,2717,1535,3200, + 5588,5845,412,5102,7326,3744,3056,2528,7406,8314,9202,6454,6613,1417,10032,7784, + 1518,3765,4176,5063,9828,2275,6636,4267,6463,2065,7725,3495,8328,8755,8144,10533, + 5966,12077,9175,9520,5596,6302,8400,579,6781,11014,5734,11113,11164,4860,1131,10844, + 9068,8016,9694,3837,567,9348,7000,6627,7699,5082,682,11309,5207,4050,7087,844, + 7434,3769,293,9057,6940,9344,10883,2633,8190,3944,5530,5604,3480,2171,9282,11024, + 2213,8136,3805,767,12239,216,11520,6763,10353,7,8566,845,7235,3154,4360,3285, + 10268,2832,3572,1282,7559,3229,8360,10583,6105,3120,6643,6203,8536,8348,6919,3536, + 9199,10891,11463,5043,1658,5618,8787,5789,4719,751,11379,6389,10783,3065,7806,6586, + 2622,5386,510,7628,6921,578,10345,11839,8929,4684,12226,7154,9916,7302,8481,3670, + 11066,2334,1590,7878,10734,1802,1891,5103,6151,8820,3418,7846,9951,4693,417,9996, + 9652,4510,2946,5461,365,881,1927,1015,11675,11009,1371,12265,2485,11385,5039,6742, + 8449,1842,12217,8176,9577,4834,7937,9461,2643,11194,3045,6508,4094,3451,7911,11048, + 5406,4665,3020,6616,11345,7519,3669,5287,1790,7014,5410,11038,11249,2035,6125,10407, + 4565,7315,5078,10506,2840,2478,9270,4194,9195,4518,7469,1160,6878,2730,10421,10036, + 1734,3815,10939,5832,10595,10759,4423,8420,9617,7119,11010,11424,9173,189,10080,10526, + 3466,10588,7592,3578,11511,7785,9663,530,12150,8957,2532,3317,9349,10243,1481,9332, + 3454,3758,7899,4218,2593,11410,2276,982,6513,1849,8494,9021,4523,7988,8,457, + 648,150,8000,2307,2301,874,5650,170,9462,2873,9855,11498,2535,11169,5808,12268, + 9687,1901,7171,11787,3846,1573,6063,3793,466,11259,10608,3821,6320,4649,6263,2929}; + +/************************************************************ +* Name: gammas_inv_montgomery +* +* Description: Contains inverses of powers of nth root of -1 +* divided by n in Montgomery domain with R=2^18 +************************************************************/ +uint16_t gammas_inv_montgomery[NEWHOPE_N] = { + 256,10570,1510,7238,1034,7170,6291,7921,11665,3422,4000,2327,2088,5565,795,10647, + 1521,5484,2539,7385,1055,7173,8047,11683,1669,1994,3796,5809,4341,9398,11876,12230, + 10525,12037,12253,3506,4012,9351,4847,2448,7372,9831,3160,2207,5582,2553,7387,6322, + 9681,1383,10731,1533,219,5298,4268,7632,6357,9686,8406,4712,9451,10128,4958,5975, + 11387,8649,11769,6948,11526,12180,1740,10782,6807,2728,7412,4570,4164,4106,11120,12122, + 8754,11784,3439,5758,11356,6889,9762,11928,1704,1999,10819,12079,12259,7018,11536,1648, + 1991,2040,2047,2048,10826,12080,8748,8272,8204,1172,1923,7297,2798,7422,6327,4415, + 7653,6360,11442,12168,7005,8023,9924,8440,8228,2931,7441,1063,3663,5790,9605,10150, + 1450,8985,11817,10466,10273,12001,3470,7518,1074,1909,7295,9820,4914,702,5367,7789, + 8135,9940,1420,3714,11064,12114,12264,1752,5517,9566,11900,1700,3754,5803,829,1874, + 7290,2797,10933,5073,7747,8129,6428,6185,11417,1631,233,5300,9535,10140,11982,8734, + 8270,2937,10953,8587,8249,2934,9197,4825,5956,4362,9401,1343,3703,529,10609,12049, + 6988,6265,895,3639,4031,4087,4095,585,10617,8539,4731,4187,9376,3095,9220,10095, + 10220,1460,10742,12068,1724,5513,11321,6884,2739,5658,6075,4379,11159,10372,8504,4726, + 9453,3106,7466,11600,10435,8513,9994,8450,9985,3182,10988,8592,2983,9204,4826,2445, + 5616,6069,867,3635,5786,11360,5134,2489,10889,12089,1727,7269,2794,9177,1311,5454, + 9557,6632,2703,9164,10087,1441,3717,531,3587,2268,324,5313,759,1864,5533,2546, + 7386,9833,8427,4715,11207,1601,7251,4547,11183,12131,1733,10781,10318,1474,10744,5046, + 4232,11138,10369,6748,964,7160,4534,7670,8118,8182,4680,11202,6867,981,8918,1274, + 182,26,7026,8026,11680,12202,10521,1503,7237,4545,5916,9623,8397,11733,10454,3249, + 9242,6587,941,1890,270,10572,6777,9746,6659,6218,6155,6146,878,1881,7291,11575, + 12187,1741,7271,8061,11685,6936,4502,9421,4857,4205,7623,1089,10689,1527,8996,10063, + 11971,10488,6765,2722,3900,9335,11867,6962,11528,5158,4248,4118,5855,2592,5637,6072, + 2623,7397,8079,9932,4930,5971,853,3633,519,8852,11798,3441,11025,1575,225,8810, + 11792,12218,3501,9278,3081,9218,4828,7712,8124,11694,12204,3499,4011,573,3593,5780, + 7848,9899,10192,1456,208,7052,2763,7417,11593,10434,12024,8740,11782,10461,3250,5731, + 7841,9898,1414,202,3540,7528,2831,2160,10842,5060,4234,4116,588,84,12,7024, + 2759,9172,6577,11473,1639,9012,3043,7457,6332,11438,1634,1989,9062,11828,8712,11778, + 12216,10523,6770,9745,10170,4964,9487,6622,946,8913,6540,6201,4397,9406,8366,9973, + 8447,8229,11709,8695,10020,3187,5722,2573,10901,6824,4486,4152,9371,8361,2950,2177, + 311,1800,9035,8313,11721,3430,490,70,10,1757,251,3547,7529,11609,3414,7510, + 4584,4166,9373,1339,5458,7802,11648,1664,7260,9815,10180,6721,9738,10169,8475,8233, + 9954,1422,8981,1283,5450,11312,1616,3742,11068,10359,4991,713,3613,9294,8350,4704, + 672,96,7036,9783,11931,3460,5761,823,10651,12055,10500,1500,5481,783,3623,11051, + 8601,8251,8201,11705,10450,5004,4226,7626,2845,2162,3820,7568,9859,3164,452,10598, + 1514,5483,6050,6131,4387,7649,8115,6426,918,8909,8295,1185,5436,11310,8638,1234, + 5443,11311,5127,2488,2111,10835,5059,7745,2862,3920,560,80,1767,2008,3798,11076, + 6849,2734,10924,12094,8750,1250,10712,6797,971,7161,1023,8924,4786,7706,4612,4170, + 7618,6355,4419,5898,11376,10403,10264,6733,4473,639,5358,2521,9138,3061,5704,4326, + 618,5355,765,5376,768,7132,4530,9425,3102,9221,6584,11474,10417,10266,12000,6981, + 6264,4406,2385,7363,4563,4163,7617,9866,3165,9230,11852,10471,5007,5982,11388,5138, + 734,3616,11050,12112,6997,11533,12181,10518,12036,3475,2252,7344,9827,4915,9480,6621, + 4457,7659,9872,6677,4465,4149,7615,4599,657,3605,515,10607,6782,4480,640,1847, + 3775,5806,2585,5636,9583,1369,10729,8555,10000,11962,5220,7768,8132,8184,9947,1421, + 203,29,8782,11788,1684,10774,10317,4985,9490,8378,4708,11206,5112,5997,7879,11659, + 12199,8765,10030,4944,5973,6120,6141,6144,7900,11662,1666,238,34,3516,5769,9602, + 8394,9977,6692,956,10670,6791,9748,11926,8726,11780,5194,742,106,8793,10034,3189, + 10989,5081,4237,5872,4350,2377,10873,6820,6241,11425,10410,10265,3222,5727,9596,4882, + 2453,2106,3812,11078,12116,5242,4260,11142,8614,11764,12214,5256,4262,4120,11122,5100, + 11262,5120,2487,5622,9581,8391,8221,2930,10952,12098,6995,6266,9673,4893,699,3611, + 4027,5842,11368,1624,232,8811,8281,1183,169,8802,3013,2186,5579,797,3625,4029, + 11109,1587,7249,11569,8675,6506,2685,10917,12093,12261,12285,1755,7273,1039,1904,272, + 3550,9285,3082,5707,6082,4380,7648,11626,5172,4250,9385,8363,8217,4685,5936,848, + 8899,6538,934,1889,3781,9318,10109,10222,6727,961,5404,772,5377,9546,8386,1198, + 8949,3034,2189,7335,4559,5918,2601,10905,5069,9502,3113,7467,8089,11689,5181,9518, + 8382,2953,3933,4073,4093,7607,8109,2914,5683,4323,11151,1593,10761,6804,972,3650, + 2277,5592,4310,7638,9869,4921,703,1856,9043,4803,9464,1352,8971,11815,5199,7765, + 6376,4422,7654,2849,407,8836,6529,7955,2892,9191,1313,10721,12065,12257,1751,9028, + 8312,2943,2176,3822,546,78,8789,11789,10462,12028,6985,4509,9422,1346,5459,4291, + 613,10621,6784,9747,3148,7472,2823,5670,810,7138,8042,4660,7688,6365,6176,6149, + 2634,5643,9584,10147,11983,5223,9524,11894,10477,8519,1217,3685,2282,326,10580,3267, + 7489,4581,2410,5611,11335,6886,8006,8166,11700,3427,11023,8597,10006,3185,455,65, + 5276,7776,4622,5927,7869,9902,11948,5218,2501,5624,2559,10899,1557,1978,10816,10323, + 8497,4725,675,1852,10798,12076,10503,3256,9243,3076,2195,10847,12083,10504,12034,10497}; + +#else +#error "NEWHOPE_N must be either 512 or 1024" +#endif diff --git a/dap-sdk/crypto/src/newhope/reduce.c b/dap-sdk/crypto/src/newhope/reduce.c new file mode 100644 index 0000000000000000000000000000000000000000..e3fb9c5088c2d573fe85648e7d62787f39cb8d63 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/reduce.c @@ -0,0 +1,27 @@ +#include "reduce.h" +#include "params.h" + +static const uint32_t qinv = 12287; // -inverse_mod(p,2^18) +static const uint32_t rlog = 18; + +/************************************************* +* Name: montgomery_reduce_newhope +* +* Description: Montgomery reduction; given a 32-bit integer a, computes +* 16-bit integer congruent to a * R^-1 mod q, +* where R=2^18 (see value of rlog) +* +* Arguments: - uint32_t a: input unsigned integer to be reduced; has to be in {0,...,1073491968} +* +* Returns: unsigned integer in {0,...,2^14-1} congruent to a * R^-1 modulo q. +**************************************************/ +uint16_t montgomery_reduce_newhope(uint32_t a) +{ + uint32_t u; + + u = (a * qinv); + u &= ((1<<rlog)-1); + u *= NEWHOPE_Q; + a = a + u; + return a >> 18; +} diff --git a/dap-sdk/crypto/src/newhope/reduce.h b/dap-sdk/crypto/src/newhope/reduce.h new file mode 100644 index 0000000000000000000000000000000000000000..79b62103603a9b921ca32a0f8dfdad3a2bd4f8a1 --- /dev/null +++ b/dap-sdk/crypto/src/newhope/reduce.h @@ -0,0 +1,8 @@ +#ifndef REDUCE_H +#define REDUCE_H + +#include <stdint.h> + +uint16_t montgomery_reduce_newhope(uint32_t a); + +#endif diff --git a/dap-sdk/crypto/test/crypto/dap_enc_newhope_test.c b/dap-sdk/crypto/test/crypto/dap_enc_newhope_test.c new file mode 100644 index 0000000000000000000000000000000000000000..b1c879be6142803539238bdcdf19571ac2f35228 --- /dev/null +++ b/dap-sdk/crypto/test/crypto/dap_enc_newhope_test.c @@ -0,0 +1,66 @@ +#include "dap_enc_newhope.h" + +#include "dap_common.h" +#include"dap_test.h" +#include<stdio.h> + +static void init_test_case() +{ + dap_enc_key_init(); +} + +static void cleanup_test_case() +{ + dap_enc_key_deinit(); +} +void test_newhope_kem(); +void dap_enc_newhope_tests_run(const int times) +{ + dap_print_module_name("dap_enc_newhope"); + init_test_case(); + char tmp_buf[256]; + sprintf_s(tmp_buf, 256, "Key Exchange %d times", times); + + benchmark_mgs_time(tmp_buf, benchmark_test_time(test_newhope_kem, times)); + + cleanup_test_case(); +} + +void test_newhope_kem() +{ + //Alice generates a public key + dap_enc_key_t* alice_key = dap_enc_key_new_generate(DAP_ENC_KEY_TYPE_RLWE_NEWHOPE_CPA_KEM, NULL, 0, NULL, 0, 0); + uint8_t *al_pub = alice_key->pub_key_data; + size_t al_pub_size = alice_key->pub_key_data_size; + uint8_t *sendb = NULL; + + //Bob derives a secret key and creates a response + dap_enc_key_t* bob_key = dap_enc_key_new(DAP_ENC_KEY_TYPE_RLWE_NEWHOPE_CPA_KEM); + size_t sendb_size = bob_key->gen_bob_shared_key(bob_key, al_pub, al_pub_size,(void**)&sendb); + dap_assert_PIF(sendb_size == NEWHOPE_CPAKEM_CIPHERTEXTBYTES, "Bob gen shared key"); + + + //Alice uses Bobs response to get her secre key + alice_key->gen_alice_shared_key(alice_key, NULL, sendb_size, sendb); + + uint8_t *a_key = alice_key->priv_key_data, + *b_key = bob_key->priv_key_data; + int verify = memcmp(a_key, b_key, alice_key->priv_key_data_size) + || alice_key->priv_key_data_size != bob_key->priv_key_data_size; + dap_assert_PIF(!verify, "Verifying KEM Shared key"); +// if(!verify) +// { +// int j; +// for(j=0;j<32;j++) +// printf("%02x ", a_key[j]); +// printf("\n"); +// for(j=0;j<32;j++) +// printf("%02x ", b_key[j]); +// printf("\n"); +// printf("newhope KEM ERROR\n"); +// } + DAP_DEL_Z(sendb); + dap_enc_key_delete(alice_key); + dap_enc_key_delete(bob_key); +} + diff --git a/dap-sdk/crypto/test/crypto/main.c b/dap-sdk/crypto/test/crypto/main.c index 9815690c257a5cdb572465904b8f5367209bee95..fe0887d99f357598c5d9eedbefd79a7f94e6049d 100755 --- a/dap-sdk/crypto/test/crypto/main.c +++ b/dap-sdk/crypto/test/crypto/main.c @@ -20,7 +20,8 @@ int main(void) // switch off debug info from library dap_log_level_set(L_CRITICAL); const int test_numbers = 100; - //dap_enc_newhope_tests_run(test_numbers); + //dap_enc_multi_sign_tests_run();return 0; + dap_enc_newhope_tests_run(test_numbers); test_encypt_decrypt (test_numbers, DAP_ENC_KEY_TYPE_SEED_OFB, 32); test_encypt_decrypt_fast (test_numbers, DAP_ENC_KEY_TYPE_SEED_OFB, 32); test_encypt_decrypt (test_numbers, DAP_ENC_KEY_TYPE_SALSA2012, 32); @@ -51,6 +52,5 @@ int main(void) dap_enc_base58_tests_run(); dap_enc_defeo_tests_run(); dap_enc_tesla_tests_run(); - dap_enc_multi_sign_tests_run(); }