X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=pygost%2Fgost3410_vko.py;h=ba489d6acb7bb3e1e64818d9b954487e4c516d38;hb=21a30721c31912c296e1faced73e2fd0db191be9;hp=719c4f40f4d17b5ee9ec311354430ba59d0c31b6;hpb=d9b48dd1937f5acd55c0eb6d92e1b5b98e6d302e;p=pygost.git diff --git a/pygost/gost3410_vko.py b/pygost/gost3410_vko.py index 719c4f4..ba489d6 100644 --- a/pygost/gost3410_vko.py +++ b/pygost/gost3410_vko.py @@ -1,6 +1,6 @@ # coding: utf-8 # PyGOST -- Pure Python GOST cryptographic functions library -# Copyright (C) 2015-2016 Sergey Matveev +# Copyright (C) 2015-2019 Sergey Matveev # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by @@ -14,7 +14,7 @@ # # You should have received a copy of the GNU General Public License # along with this program. If not, see . -"""Diffie-Hellman functions, VKO GOST R 34.10-2001/2012 +"""Key agreement functions, VKO GOST R 34.10-2001/2012 """ from pygost.gost3410 import pub_marshal @@ -33,13 +33,19 @@ def ukm_unmarshal(ukm): return bytes2long(ukm[::-1]) -def vko_34102001(curve, prv, pubkey, ukm): - """ Make Diffie-Hellman computation (34.10-2001, 34.11-94) +def kek(curve, prv, pub, ukm, mode): + key = curve.exp(prv, pub[0], pub[1]) + key = curve.exp(ukm, key[0], key[1]) + return pub_marshal(key, mode) + + +def kek_34102001(curve, prv, pub, ukm): + """ Key agreement (34.10-2001, 34.11-94) :param GOST3410Curve curve: curve to use :param long prv: private key - :param pubkey: public key - :type pubkey: (long, long) + :param pub: public key + :type pub: (long, long) :param long ukm: user keying material, VKO-factor :returns: Key Encryption Key (shared key) :rtype: bytes, 32 bytes @@ -48,38 +54,41 @@ def vko_34102001(curve, prv, pubkey, ukm): :rfc:`4357` VKO GOST R 34.10-2001 with little-endian hash output. """ - key = curve.exp(prv, pubkey[0], pubkey[1]) - key = curve.exp(ukm, key[0], key[1]) - return GOST341194(pub_marshal(key), "GostR3411_94_CryptoProParamSet").digest() + return GOST341194( + kek(curve, prv, pub, ukm, mode=2001), + "GostR3411_94_CryptoProParamSet", + ).digest() -def vko_34102012256(curve, prv, pubkey, ukm=1): - """ Make Diffie-Hellman computation (34.10-2012, 34.11-2012 256 bit) +def kek_34102012256(curve, prv, pub, ukm=1, mode=2012): + """ Key agreement (34.10-2012, 34.11-2012 256 bit) :param GOST3410Curve curve: curve to use :param long prv: private key - :param pubkey: public key - :type pubkey: (long, long) + :param pub: public key + :type pub: (long, long) :param long ukm: user keying material, VKO-factor :returns: Key Encryption Key (shared key) :rtype: bytes, 32 bytes + + Shared Key Encryption Key computation is based on + :rfc:`7836` VKO GOST R 34.10-2012. """ - key = curve.exp(prv, pubkey[0], pubkey[1]) - key = curve.exp(ukm, key[0], key[1]) - return GOST34112012256(pub_marshal(key, mode=2012)).digest() + return GOST34112012256(kek(curve, prv, pub, ukm, mode=mode)).digest() -def vko_34102012512(curve, prv, pubkey, ukm=1): - """ Make Diffie-Hellman computation (34.10-2012, 34.11-2012 512 bit) +def kek_34102012512(curve, prv, pub, ukm=1): + """ Key agreement (34.10-2012, 34.11-2012 512 bit) :param GOST3410Curve curve: curve to use :param long prv: private key - :param pubkey: public key - :type pubkey: (long, long) + :param pub: public key + :type pub: (long, long) :param long ukm: user keying material, VKO-factor :returns: Key Encryption Key (shared key) :rtype: bytes, 32 bytes + + Shared Key Encryption Key computation is based on + :rfc:`7836` VKO GOST R 34.10-2012. """ - key = curve.exp(prv, pubkey[0], pubkey[1]) - key = curve.exp(ukm, key[0], key[1]) - return GOST34112012512(pub_marshal(key, mode=2012)).digest() + return GOST34112012512(kek(curve, prv, pub, ukm, mode=2012)).digest()