KGC_TEST/miracl/source/mrstrong.c

244 lines
7.0 KiB
C

/***************************************************************************
*
Copyright 2013 CertiVox UK Ltd. *
*
This file is part of CertiVox MIRACL Crypto SDK. *
*
The CertiVox MIRACL Crypto SDK provides developers with an *
extensive and efficient set of cryptographic functions. *
For further information about its features and functionalities please *
refer to http://www.certivox.com *
*
* The CertiVox MIRACL Crypto SDK is free software: you can *
redistribute it and/or modify it under the terms of the *
GNU Affero General Public License as published by the *
Free Software Foundation, either version 3 of the License, *
or (at your option) any later version. *
*
* The CertiVox MIRACL Crypto SDK is distributed in the hope *
that it will be useful, but WITHOUT ANY WARRANTY; without even the *
implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. *
See the GNU Affero General Public License for more details. *
*
* You should have received a copy of the GNU Affero General Public *
License along with CertiVox MIRACL Crypto SDK. *
If not, see <http://www.gnu.org/licenses/>. *
*
You can be released from the requirements of the license by purchasing *
a commercial license. Buying such a license is mandatory as soon as you *
develop commercial activities involving the CertiVox MIRACL Crypto SDK *
without disclosing the source code of your own applications, or shipping *
the CertiVox MIRACL Crypto SDK with a closed source product. *
*
***************************************************************************/
/*
* MIRACL cryptographic strong random number generator
* mrstrong.c
*
* Unguessable seed -> SHA -> PRNG internal state -> SHA -> random numbers
* Slow - but secure
*
* See ftp://ftp.rsasecurity.com/pub/pdfs/bull-1.pdf for a justification
*/
#include "miracl.h"
#ifndef MR_NO_RAND
static mr_unsign32 sbrand(csprng *rng)
{ /* Marsaglia & Zaman random number generator */
int i,k;
mr_unsign32 pdiff,t;
rng->rndptr++;
if (rng->rndptr<NK) return rng->ira[rng->rndptr];
rng->rndptr=0;
for (i=0,k=NK-NJ;i<NK;i++,k++)
{ /* calculate next NK values */
if (k==NK) k=0;
t=rng->ira[k];
pdiff=t - rng->ira[i] - rng->borrow;
if (pdiff<t) rng->borrow=0;
if (pdiff>t) rng->borrow=1;
rng->ira[i]=pdiff;
}
return rng->ira[0];
}
static void sirand(csprng* rng,mr_unsign32 seed)
{ /* initialise random number system */
/* modified so that a subsequent call "stirs" in another seed value */
/* in this way as many seed bits as desired may be used */
int i,in;
mr_unsign32 t,m=1L;
rng->borrow=0L;
rng->rndptr=0;
rng->ira[0]^=seed;
for (i=1;i<NK;i++)
{ /* fill initialisation vector */
in=(NV*i)%NK;
rng->ira[in]^=m; /* note XOR */
t=m;
m=seed-m;
seed=t;
}
for (i=0;i<10000;i++) sbrand(rng ); /* "warm-up" & stir the generator */
}
static void fill_pool(csprng *rng)
{ /* hash down output of RNG to re-fill the pool */
int i;
sha256 sh;
shs256_init(&sh);
for (i=0;i<128;i++) shs256_process(&sh,sbrand(rng));
shs256_hash(&sh,rng->pool);
rng->pool_ptr=0;
}
void strong_init(csprng *rng,int rawlen,char *raw,mr_unsign32 tod)
{ /* initialise from at least 128 byte string of raw *
* random (keyboard?) input, and 32-bit time-of-day */
int i;
mr_unsign32 hash[MR_HASH_BYTES/4];
sha256 sh;
rng->pool_ptr=0;
for (i=0;i<NK;i++) rng->ira[i]=0;
if (rawlen>0)
{
shs256_init(&sh);
for (i=0;i<rawlen;i++)
shs256_process(&sh,raw[i]);
shs256_hash(&sh,(char *)hash);
/* initialise PRNG from distilled randomness */
for (i=0;i<MR_HASH_BYTES/4;i++) sirand(rng,hash[i]);
}
sirand(rng,tod);
fill_pool(rng);
}
void strong_kill(csprng *rng)
{ /* kill internal state */
int i;
rng->pool_ptr=rng->rndptr=0;
for (i=0;i<MR_HASH_BYTES;i++) rng->pool[i]=0;
for (i=0;i<NK;i++) rng->ira[i]=0;
rng->borrow=0;
}
/* get random byte */
int strong_rng(csprng *rng)
{
int r;
r=rng->pool[rng->pool_ptr++];
if (rng->pool_ptr>=MR_HASH_BYTES) fill_pool(rng);
return r;
}
void strong_bigrand(_MIPD_ csprng *rng,big w,big x)
{
int i, m;
mr_small r;
unsigned int ran;
unsigned int ch;
#ifdef MR_OS_THREADS
miracl *mr_mip=get_mip();
#endif
if (mr_mip->ERNUM) return;
MR_IN(20)
m = 0;
zero(mr_mip->w1);
do
{
m++;
mr_mip->w1->len=m;
for (r = 0, i = 0; i < sizeof(mr_small); i++) {
ch=(unsigned char)strong_rng(rng);
ran=ch;
r = (r << 8) ^ ran;
}
if (mr_mip->base==0) mr_mip->w1->w[m-1]=r;
else mr_mip->w1->w[m-1]=MR_REMAIN(r,mr_mip->base);
} while (mr_compare(mr_mip->w1,w)<0);
mr_lzero(mr_mip->w1);
divide(_MIPP_ mr_mip->w1,w,w);
copy(mr_mip->w1,x);
MR_OUT
}
void strong_bigdig(_MIPD_ csprng *rng,int n,int b,big x)
{ /* generate random number n digits long *
* to "printable" base b */
#ifdef MR_OS_THREADS
miracl *mr_mip=get_mip();
#endif
if (mr_mip->ERNUM) return;
MR_IN(19)
if (b<2 || b>256)
{
mr_berror(_MIPP_ MR_ERR_BASE_TOO_BIG);
MR_OUT
return;
}
do
{ /* repeat if x too small */
expint(_MIPP_ b,n,mr_mip->w2);
strong_bigrand(_MIPP_ rng,mr_mip->w2,x);
subdiv(_MIPP_ mr_mip->w2,b,mr_mip->w2);
} while (!mr_mip->ERNUM && mr_compare(x,mr_mip->w2)<0);
MR_OUT
}
#endif
/* test main program
#include <stdio.h>
#include "miracl.h"
#include <time.h>
void main()
{
int i;
char raw[256];
big x,w;
time_t seed;
csprng rng;
miracl *mip=mirsys(200,256);
x=mirvar(0);
w=mirvar(0);
printf("Enter Raw random string= ");
scanf("%s",raw);
getchar();
time(&seed);
strong_init(&rng,strlen(raw),raw,(long)seed);
mip->IOBASE=16;
expint(2,256,w);
cotnum(w,stdout);
for (i=0;i<20;i++)
{
strong_bigrand(&rng,w,x);
cotnum(x,stdout);
}
printf("\n");
for (i=0;i<20;i++)
{
strong_bigdig(&rng,128,2,x);
cotnum(x,stdout);
}
}
*/