244 lines
7.0 KiB
C
244 lines
7.0 KiB
C
|
|
/***************************************************************************
|
|
*
|
|
Copyright 2013 CertiVox UK Ltd. *
|
|
*
|
|
This file is part of CertiVox MIRACL Crypto SDK. *
|
|
*
|
|
The CertiVox MIRACL Crypto SDK provides developers with an *
|
|
extensive and efficient set of cryptographic functions. *
|
|
For further information about its features and functionalities please *
|
|
refer to http://www.certivox.com *
|
|
*
|
|
* The CertiVox MIRACL Crypto SDK is free software: you can *
|
|
redistribute it and/or modify it under the terms of the *
|
|
GNU Affero General Public License as published by the *
|
|
Free Software Foundation, either version 3 of the License, *
|
|
or (at your option) any later version. *
|
|
*
|
|
* The CertiVox MIRACL Crypto SDK is distributed in the hope *
|
|
that it will be useful, but WITHOUT ANY WARRANTY; without even the *
|
|
implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. *
|
|
See the GNU Affero General Public License for more details. *
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public *
|
|
License along with CertiVox MIRACL Crypto SDK. *
|
|
If not, see <http://www.gnu.org/licenses/>. *
|
|
*
|
|
You can be released from the requirements of the license by purchasing *
|
|
a commercial license. Buying such a license is mandatory as soon as you *
|
|
develop commercial activities involving the CertiVox MIRACL Crypto SDK *
|
|
without disclosing the source code of your own applications, or shipping *
|
|
the CertiVox MIRACL Crypto SDK with a closed source product. *
|
|
*
|
|
***************************************************************************/
|
|
/*
|
|
* MIRACL cryptographic strong random number generator
|
|
* mrstrong.c
|
|
*
|
|
* Unguessable seed -> SHA -> PRNG internal state -> SHA -> random numbers
|
|
* Slow - but secure
|
|
*
|
|
* See ftp://ftp.rsasecurity.com/pub/pdfs/bull-1.pdf for a justification
|
|
*/
|
|
|
|
#include "miracl.h"
|
|
|
|
#ifndef MR_NO_RAND
|
|
|
|
static mr_unsign32 sbrand(csprng *rng)
|
|
{ /* Marsaglia & Zaman random number generator */
|
|
int i,k;
|
|
mr_unsign32 pdiff,t;
|
|
rng->rndptr++;
|
|
if (rng->rndptr<NK) return rng->ira[rng->rndptr];
|
|
rng->rndptr=0;
|
|
for (i=0,k=NK-NJ;i<NK;i++,k++)
|
|
{ /* calculate next NK values */
|
|
if (k==NK) k=0;
|
|
t=rng->ira[k];
|
|
pdiff=t - rng->ira[i] - rng->borrow;
|
|
if (pdiff<t) rng->borrow=0;
|
|
if (pdiff>t) rng->borrow=1;
|
|
rng->ira[i]=pdiff;
|
|
}
|
|
return rng->ira[0];
|
|
}
|
|
|
|
static void sirand(csprng* rng,mr_unsign32 seed)
|
|
{ /* initialise random number system */
|
|
/* modified so that a subsequent call "stirs" in another seed value */
|
|
/* in this way as many seed bits as desired may be used */
|
|
int i,in;
|
|
mr_unsign32 t,m=1L;
|
|
rng->borrow=0L;
|
|
rng->rndptr=0;
|
|
rng->ira[0]^=seed;
|
|
for (i=1;i<NK;i++)
|
|
{ /* fill initialisation vector */
|
|
in=(NV*i)%NK;
|
|
rng->ira[in]^=m; /* note XOR */
|
|
t=m;
|
|
m=seed-m;
|
|
seed=t;
|
|
}
|
|
for (i=0;i<10000;i++) sbrand(rng ); /* "warm-up" & stir the generator */
|
|
}
|
|
|
|
static void fill_pool(csprng *rng)
|
|
{ /* hash down output of RNG to re-fill the pool */
|
|
int i;
|
|
sha256 sh;
|
|
shs256_init(&sh);
|
|
for (i=0;i<128;i++) shs256_process(&sh,sbrand(rng));
|
|
shs256_hash(&sh,rng->pool);
|
|
rng->pool_ptr=0;
|
|
}
|
|
|
|
void strong_init(csprng *rng,int rawlen,char *raw,mr_unsign32 tod)
|
|
{ /* initialise from at least 128 byte string of raw *
|
|
* random (keyboard?) input, and 32-bit time-of-day */
|
|
int i;
|
|
mr_unsign32 hash[MR_HASH_BYTES/4];
|
|
sha256 sh;
|
|
rng->pool_ptr=0;
|
|
for (i=0;i<NK;i++) rng->ira[i]=0;
|
|
if (rawlen>0)
|
|
{
|
|
shs256_init(&sh);
|
|
for (i=0;i<rawlen;i++)
|
|
shs256_process(&sh,raw[i]);
|
|
shs256_hash(&sh,(char *)hash);
|
|
|
|
/* initialise PRNG from distilled randomness */
|
|
|
|
for (i=0;i<MR_HASH_BYTES/4;i++) sirand(rng,hash[i]);
|
|
}
|
|
sirand(rng,tod);
|
|
|
|
fill_pool(rng);
|
|
}
|
|
|
|
void strong_kill(csprng *rng)
|
|
{ /* kill internal state */
|
|
int i;
|
|
rng->pool_ptr=rng->rndptr=0;
|
|
for (i=0;i<MR_HASH_BYTES;i++) rng->pool[i]=0;
|
|
for (i=0;i<NK;i++) rng->ira[i]=0;
|
|
rng->borrow=0;
|
|
}
|
|
|
|
/* get random byte */
|
|
|
|
int strong_rng(csprng *rng)
|
|
{
|
|
int r;
|
|
r=rng->pool[rng->pool_ptr++];
|
|
if (rng->pool_ptr>=MR_HASH_BYTES) fill_pool(rng);
|
|
return r;
|
|
}
|
|
|
|
void strong_bigrand(_MIPD_ csprng *rng,big w,big x)
|
|
{
|
|
int i, m;
|
|
mr_small r;
|
|
unsigned int ran;
|
|
unsigned int ch;
|
|
|
|
#ifdef MR_OS_THREADS
|
|
miracl *mr_mip=get_mip();
|
|
#endif
|
|
if (mr_mip->ERNUM) return;
|
|
MR_IN(20)
|
|
|
|
m = 0;
|
|
zero(mr_mip->w1);
|
|
|
|
do
|
|
{
|
|
m++;
|
|
mr_mip->w1->len=m;
|
|
for (r = 0, i = 0; i < sizeof(mr_small); i++) {
|
|
ch=(unsigned char)strong_rng(rng);
|
|
ran=ch;
|
|
r = (r << 8) ^ ran;
|
|
}
|
|
if (mr_mip->base==0) mr_mip->w1->w[m-1]=r;
|
|
else mr_mip->w1->w[m-1]=MR_REMAIN(r,mr_mip->base);
|
|
} while (mr_compare(mr_mip->w1,w)<0);
|
|
mr_lzero(mr_mip->w1);
|
|
divide(_MIPP_ mr_mip->w1,w,w);
|
|
|
|
copy(mr_mip->w1,x);
|
|
MR_OUT
|
|
}
|
|
|
|
void strong_bigdig(_MIPD_ csprng *rng,int n,int b,big x)
|
|
{ /* generate random number n digits long *
|
|
* to "printable" base b */
|
|
#ifdef MR_OS_THREADS
|
|
miracl *mr_mip=get_mip();
|
|
#endif
|
|
if (mr_mip->ERNUM) return;
|
|
|
|
MR_IN(19)
|
|
|
|
if (b<2 || b>256)
|
|
{
|
|
mr_berror(_MIPP_ MR_ERR_BASE_TOO_BIG);
|
|
MR_OUT
|
|
return;
|
|
}
|
|
|
|
do
|
|
{ /* repeat if x too small */
|
|
expint(_MIPP_ b,n,mr_mip->w2);
|
|
strong_bigrand(_MIPP_ rng,mr_mip->w2,x);
|
|
subdiv(_MIPP_ mr_mip->w2,b,mr_mip->w2);
|
|
} while (!mr_mip->ERNUM && mr_compare(x,mr_mip->w2)<0);
|
|
|
|
MR_OUT
|
|
}
|
|
|
|
#endif
|
|
|
|
/* test main program
|
|
|
|
#include <stdio.h>
|
|
#include "miracl.h"
|
|
#include <time.h>
|
|
|
|
void main()
|
|
{
|
|
int i;
|
|
char raw[256];
|
|
big x,w;
|
|
time_t seed;
|
|
csprng rng;
|
|
miracl *mip=mirsys(200,256);
|
|
x=mirvar(0);
|
|
w=mirvar(0);
|
|
printf("Enter Raw random string= ");
|
|
scanf("%s",raw);
|
|
getchar();
|
|
time(&seed);
|
|
strong_init(&rng,strlen(raw),raw,(long)seed);
|
|
mip->IOBASE=16;
|
|
expint(2,256,w);
|
|
cotnum(w,stdout);
|
|
for (i=0;i<20;i++)
|
|
{
|
|
strong_bigrand(&rng,w,x);
|
|
cotnum(x,stdout);
|
|
}
|
|
printf("\n");
|
|
for (i=0;i<20;i++)
|
|
{
|
|
strong_bigdig(&rng,128,2,x);
|
|
cotnum(x,stdout);
|
|
}
|
|
}
|
|
|
|
*/
|
|
|