/* * Proposed Digital Signature Standard (DSS) * * Elliptic Curve Variation GF(2^m) - See Dr. Dobbs Journal April 1997 * * This program verifies the signature given to a in * .ecs generated by program ecsign2 * * The curve is y^2+xy = x^3+Ax^2+B over GF(2^m) using a trinomial or * pentanomial basis (t^m+t^a+1 or t^m+t^a+t^b+t^c+1), These parameters * can be generated using the findbase.cpp example program, or taken from tables * provided, for example in IEEE-P1363 Annex A * * The file common2.ecs is presumed to exist and contain * {m,A,B,q,x,y,a,b,c} where A and B are parameters of the equation * above, (x,y) is an initial point on the curve, {m,a,b,c} are the field * parameters, (b is zero for a trinomial) and q is the order of the * (x,y) point, itself a large prime. The number of points on the curve is * cf.q where cf is the "co-factor", normally 2 or 4. * */ #include #include "miracl.h" #include #include #ifdef MR_COUNT_OPS int fpm2; int fpi2; int fpc; int fpa; int fpx; #endif void strip(char *name) { /* strip off filename extension */ int i; for (i=0;name[i]!='\0';i++) { if (name[i]!='.') continue; name[i]='\0'; break; } } static void hashing(FILE *fp,big hash) { /* compute hash function */ char h[20]; sha sh; int i,ch; shs_init(&sh); while ((ch=fgetc(fp))!=EOF) shs_process(&sh,ch); shs_hash(&sh,h); bytes_to_big(20,h,hash); } int main() { FILE *fp; int ep,m,a,b,c; miracl *mip; epoint *g,*public; char ifname[50],ofname[50]; big a2,a6,q,x,y,v,u1,u2,r,s,hash; /* get public data */ fp=fopen("common2.ecs","rt"); if (fp==NULL) { printf("file common2.ecs does not exist\n"); return 0; } fscanf(fp,"%d\n",&m); mip=mirsys(MR_ROUNDUP(abs(m),4),16); a2=mirvar(0); a6=mirvar(0); q=mirvar(0); x=mirvar(0); y=mirvar(0); v=mirvar(0); u1=mirvar(0); u2=mirvar(0); s=mirvar(0); r=mirvar(0); hash=mirvar(0); innum(a2,fp); innum(a6,fp); innum(q,fp); innum(x,fp); innum(y,fp); fscanf(fp,"%d\n",&a); fscanf(fp,"%d\n",&b); fscanf(fp,"%d\n",&c); fclose(fp); ecurve2_init(m,a,b,c,a2,a6,FALSE,MR_BEST); /* initialise curve */ g=epoint_init(); epoint2_set(x,y,0,g); /* initialise point of order q */ /* get public key of signer */ fp=fopen("public.ecs","rt"); if (fp==NULL) { printf("file public.ecs does not exist\n"); return 0; } fscanf(fp,"%d",&ep); innum(x,fp); fclose(fp); public=epoint_init(); epoint2_set(x,x,ep,public); /* decompress */ /* get message */ printf("signed file = "); gets(ifname); strcpy(ofname,ifname); strip(ofname); strcat(ofname,".ecs"); if ((fp=fopen(ifname,"rb"))==NULL) { /* no message */ printf("Unable to open file %s\n",ifname); return 0; } hashing(fp,hash); fclose(fp); fp=fopen(ofname,"rt"); if (fp==NULL) { /* no signature */ printf("signature file %s does not exist\n",ofname); return 0; } innum(r,fp); innum(s,fp); fclose(fp); if (mr_compare(r,q)>=0 || mr_compare(s,q)>=0) { printf("Signature is NOT verified\n"); return 0; } xgcd(s,q,s,s,s); mad(hash,s,s,q,q,u1); mad(r,s,s,q,q,u2); #ifdef MR_COUNT_OPS fpm2=fpi2=0; #endif ecurve2_mult2(u2,public,u1,g,g); #ifdef MR_COUNT_OPS printf("Number of modmuls= %d, inverses= %d\n",fpm2,fpi2); #endif epoint2_get(g,v,v); divide(v,q,q); if (mr_compare(v,r)==0) printf("Signature is verified\n"); else printf("Signature is NOT verified\n"); return 0; }