X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=pygost%2Fgost3410.py;h=c5dd37378e1a4c4fda7490fd26a135996f9b4a88;hb=0fcc8bc147ada51d2a9a912f18ac362d54b7d49a;hp=e3e2c91d809b4c8dd4158eb98c0d353931b744dd;hpb=34c9c9a4f95eecfee75fc36d75d2ee45d1054a25;p=pygost.git diff --git a/pygost/gost3410.py b/pygost/gost3410.py index e3e2c91..c5dd373 100644 --- a/pygost/gost3410.py +++ b/pygost/gost3410.py @@ -1,6 +1,6 @@ # coding: utf-8 # PyGOST -- Pure Python GOST cryptographic functions library -# Copyright (C) 2015-2016 Sergey Matveev +# Copyright (C) 2015-2019 Sergey Matveev # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by @@ -23,18 +23,19 @@ key, digest and signature lengths. from os import urandom -from pygost.gost3411_94 import GOST341194 from pygost.utils import bytes2long from pygost.utils import hexdec from pygost.utils import long2bytes from pygost.utils import modinvert -SIZE_3410_2001 = 32 -SIZE_3410_2012 = 64 +MODE2SIZE = { + 2001: 32, + 2012: 64, +} -DEFAULT_CURVE = "GostR3410_2001_CryptoPro_A_ParamSet" +DEFAULT_CURVE = "id-GostR3410-2001-CryptoPro-A-ParamSet" # Curve parameters are the following: p, q, a, b, x, y CURVE_PARAMS = { "GostR3410_2001_ParamSet_cc": ( @@ -45,7 +46,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000002", "a20e034bf8813ef5c18d01105e726a17eb248b264ae9706f440bedc8ccb6b22c", ), - "GostR3410_2001_TestParamSet": ( + "id-GostR3410-2001-TestParamSet": ( "8000000000000000000000000000000000000000000000000000000000000431", "8000000000000000000000000000000150FE8A1892976154C59CFC193ACCF5B3", "0000000000000000000000000000000000000000000000000000000000000007", @@ -53,7 +54,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000002", "08E2A8A0E65147D4BD6316030E16D19C85C97F0A9CA267122B96ABBCEA7E8FC8", ), - "GostR3410_2001_CryptoPro_A_ParamSet": ( + "id-GostR3410-2001-CryptoPro-A-ParamSet": ( "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD97", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF6C611070995AD10045841B09B761B893", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD94", @@ -61,7 +62,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000001", "8D91E471E0989CDA27DF505A453F2B7635294F2DDF23E3B122ACC99C9E9F1E14", ), - "GostR3410_2001_CryptoPro_B_ParamSet": ( + "id-GostR3410-2001-CryptoPro-B-ParamSet": ( "8000000000000000000000000000000000000000000000000000000000000C99", "800000000000000000000000000000015F700CFFF1A624E5E497161BCC8A198F", "8000000000000000000000000000000000000000000000000000000000000C96", @@ -69,7 +70,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000001", "3FA8124359F96680B83D1C3EB2C070E5C545C9858D03ECFB744BF8D717717EFC", ), - "GostR3410_2001_CryptoPro_C_ParamSet": ( + "id-GostR3410-2001-CryptoPro-C-ParamSet": ( "9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D759B", "9B9F605F5A858107AB1EC85E6B41C8AA582CA3511EDDFB74F02F3A6598980BB9", "9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D7598", @@ -77,7 +78,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000000", "41ECE55743711A8C3CBF3783CD08C0EE4D4DC440D4641A8F366E550DFDB3BB67", ), - "GostR3410_2001_CryptoPro_XchA_ParamSet": ( + "id-GostR3410-2001-CryptoPro-XchA-ParamSet": ( "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD97", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF6C611070995AD10045841B09B761B893", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD94", @@ -85,7 +86,7 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000001", "8D91E471E0989CDA27DF505A453F2B7635294F2DDF23E3B122ACC99C9E9F1E14", ), - "GostR3410_2001_CryptoPro_XchB_ParamSet": ( + "id-GostR3410-2001-CryptoPro-XchB-ParamSet": ( "9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D759B", "9B9F605F5A858107AB1EC85E6B41C8AA582CA3511EDDFB74F02F3A6598980BB9", "9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D7598", @@ -93,7 +94,15 @@ CURVE_PARAMS = { "0000000000000000000000000000000000000000000000000000000000000000", "41ECE55743711A8C3CBF3783CD08C0EE4D4DC440D4641A8F366E550DFDB3BB67", ), - "GostR3410_2012_TC26_ParamSetA": ( + "id-tc26-gost-3410-2012-256-paramSetA": ( + "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD97", + "400000000000000000000000000000000FD8CDDFC87B6635C115AF556C360C67", + "C2173F1513981673AF4892C23035A27CE25E2013BF95AA33B22C656F277E7335", + "295F9BAE7428ED9CCC20E7C359A9D41A22FCCD9108E17BF7BA9337A6F8AE9513", + "91E38443A5E82C0D880923425712B2BB658B9196932E02C78B2582FE742DAA28", + "32879423AB1A0375895786C4BB46E9565FDE0B5344766740AF268ADB32322E5C", + ), + "id-tc26-gost-3410-12-512-paramSetA": ( "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC7", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF27E69532F48D89116FF22B8D4E0560609B4B38ABFAD2B85DCACDB1411F10B275", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC4", @@ -101,7 +110,7 @@ CURVE_PARAMS = { "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003", "7503CFE87A836AE3A61B8816E25450E6CE5E1C93ACF1ABC1778064FDCBEFA921DF1626BE4FD036E93D75E6A50E3A41E98028FE5FC235F5B889A589CB5215F2A4", ), - "GostR3410_2012_TC26_ParamSetB": ( + "id-tc26-gost-3410-12-512-paramSetB": ( "8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006F", "800000000000000000000000000000000000000000000000000000000000000149A1EC142565A545ACFDB77BD9D40CFA8B996712101BEA0EC6346C54374F25BD", "8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006C", @@ -109,6 +118,14 @@ CURVE_PARAMS = { "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002", "1A8F7EDA389B094C2C071E3647A8940F3C123B697578C213BE6DD9E6C8EC7335DCB228FD1EDF4A39152CBCAAF8C0398828041055F94CEEEC7E21340780FE41BD" ), + "id-tc26-gost-3410-2012-512-paramSetC": ( + "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC7", + "3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC98CDBA46506AB004C33A9FF5147502CC8EDA9E7A769A12694623CEF47F023ED", + "DC9203E514A721875485A529D2C722FB187BC8980EB866644DE41C68E143064546E861C0E2C9EDD92ADE71F46FCF50FF2AD97F951FDA9F2A2EB6546F39689BD3", + "B4C4EE28CEBC6C2C8AC12952CF37F16AC7EFB6A9F69F4B57FFDA2E4F0DE5ADE038CBC2FFF719D2C18DE0284B8BFEF3B52B8CC7A5F5BF0A3C8D2319A5312557E1", + "E2E31EDFC23DE7BDEBE241CE593EF5DE2295B7A9CBAEF021D385F7074CEA043AA27272A7AE602BF2A7B9033DB9ED3610C6FB85487EAE97AAC5BC7928C1950148", + "F5CE40D95B5EB899ABBCCFF5911CB8577939804D6527378B8C108C3D2090FF9BE18E2D33E3021ED2EF32D85822423B6304F726AA854BAE07D0396E9A9ADDC40F", + ), } for c, params in CURVE_PARAMS.items(): CURVE_PARAMS[c] = [hexdec(param) for param in params] @@ -117,12 +134,12 @@ for c, params in CURVE_PARAMS.items(): class GOST3410Curve(object): """ GOST 34.10 validated curve - >>> p, q, a, b, x, y = CURVE_PARAMS["GostR3410_2001_TestParamSet"] + >>> p, q, a, b, x, y = CURVE_PARAMS["id-GostR3410-2001-TestParamSet"] >>> curve = GOST3410Curve(p, q, a, b, x, y) - >>> priv = bytes2long(urandom(32)) - >>> signature = sign(curve, priv, GOST341194(data).digest()) - >>> pubX, pubY = public_key(curve, priv) - >>> verify(curve, pubX, pubY, GOST341194(data).digest(), signature) + >>> prv = prv_unmarshal(urandom(32)) + >>> signature = sign(curve, prv, GOST341194(data).digest()) + >>> pub = public_key(curve, prv) + >>> verify(curve, pub, GOST341194(data).digest(), signature) True """ def __init__(self, p, q, a, b, x, y): @@ -161,9 +178,9 @@ class GOST3410Curve(object): y = y or self.y tx = x ty = y - degree -= 1 if degree == 0: raise ValueError("Bad degree value") + degree -= 1 while degree != 0: if degree & 1 == 1: tx, ty = self._add(tx, ty, x, y) @@ -172,55 +189,28 @@ class GOST3410Curve(object): return tx, ty -def public_key(curve, private_key): +def public_key(curve, prv): """ Generate public key from the private one :param GOST3410Curve curve: curve to use - :param long private_key: private key - :return: public key's parts, X and Y + :param long prv: private key + :returns: public key's parts, X and Y :rtype: (long, long) """ - return curve.exp(private_key) - - -def kek(curve, private_key, ukm, pubkey): - """ Make Diffie-Hellman computation - - :param GOST3410Curve curve: curve to use - :param long private_key: private key - :param ukm: UKM value (VKO-factor) - :type ukm: bytes, 8 bytes - :param pubkey: public key's part - :type pubkey: (long, long) - :return: Key Encryption Key (shared key) - :rtype: bytes, 32 bytes - - Shared Key Encryption Key computation is based on - :rfc:`4357` VKO GOST 34.10-2001 with little-endian - hash output. - """ - key = curve.exp(private_key, pubkey[0], pubkey[1]) - key = curve.exp(bytes2long(24 * b'\x00' + ukm), key[0], key[1]) - return GOST341194( - (long2bytes(key[1]) + long2bytes(key[0]))[::-1], - "GostR3411_94_CryptoProParamSet" - ).digest()[::-1] + return curve.exp(prv) -def sign(curve, private_key, digest, size=SIZE_3410_2001): +def sign(curve, prv, digest, mode=2001): """ Calculate signature for provided digest :param GOST3410Curve curve: curve to use - :param long private_key: private key + :param long prv: private key :param digest: digest for signing - :type digest: bytes, 32 bytes - :param size: signature size - :type size: 32 (for 34.10-2001) or 64 (for 34.10-2012) - :return: signature - :rtype: bytes, 64 bytes + :type digest: bytes, 32 or 64 bytes + :returns: signature + :rtype: bytes, 64 or 128 bytes """ - if len(digest) != size: - raise ValueError("Invalid digest length") + size = MODE2SIZE[mode] q = curve.q e = bytes2long(digest) % q if e == 0: @@ -233,7 +223,7 @@ def sign(curve, private_key, digest, size=SIZE_3410_2001): r %= q if r == 0: continue - d = private_key * r + d = prv * r k *= e s = (d + k) % q if s == 0: @@ -242,22 +232,18 @@ def sign(curve, private_key, digest, size=SIZE_3410_2001): return long2bytes(s, size) + long2bytes(r, size) -def verify(curve, pubkeyX, pubkeyY, digest, signature, size=SIZE_3410_2001): +def verify(curve, pub, digest, signature, mode=2001): """ Verify provided digest with the signature :param GOST3410Curve curve: curve to use - :param long pubkeyX: public key's X - :param long pubkeyY: public key's Y + :type pub: (long, long) :param digest: digest needed to check - :type digest: bytes, 32 bytes + :type digest: bytes, 32 or 64 bytes :param signature: signature to verify with - :type signature: bytes, 64 bytes - :param size: signature size - :type size: 32 (for 34.10-2001) or 64 (for 34.10-2012) + :type signature: bytes, 64 or 128 bytes :rtype: bool """ - if len(digest) != size: - raise ValueError("Invalid digest length") + size = MODE2SIZE[mode] if len(signature) != size * 2: raise ValueError("Invalid signature length") q = curve.q @@ -273,7 +259,7 @@ def verify(curve, pubkeyX, pubkeyY, digest, signature, size=SIZE_3410_2001): z1 = s * v % q z2 = q - r * v % q p1x, p1y = curve.exp(z1) - q1x, q1y = curve.exp(z2, pubkeyX, pubkeyY) + q1x, q1y = curve.exp(z2, pub[0], pub[1]) lm = q1x - p1x if lm < 0: lm += p @@ -288,3 +274,33 @@ def verify(curve, pubkeyX, pubkeyY, digest, signature, size=SIZE_3410_2001): lm %= q # This is not constant time comparison! return lm == r + + +def prv_unmarshal(prv): + """Unmarshal private key + + :param bytes prv: serialized private key + :rtype: long + """ + return bytes2long(prv[::-1]) + + +def pub_marshal(pub, mode=2001): + """Marshal public key + + :type pub: (long, long) + :rtype: bytes + """ + size = MODE2SIZE[mode] + return (long2bytes(pub[1], size) + long2bytes(pub[0], size))[::-1] + + +def pub_unmarshal(pub, mode=2001): + """Unmarshal public key + + :type pub: bytes + :rtype: (long, long) + """ + size = MODE2SIZE[mode] + pub = pub[::-1] + return (bytes2long(pub[size:]), bytes2long(pub[:size]))