diff options
author | Jack Lloyd <[email protected]> | 2019-02-13 08:46:54 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2019-02-13 08:46:54 -0500 |
commit | ba56441fca55ff66ddc790d902689963debe20a5 (patch) | |
tree | 2b879c41b078de711d1be6c34842992e13d41f9d /src/lib/stream | |
parent | dfb4879f73f206387fee61a95a826219fd4f76c4 (diff) |
Support arbitrary key lengths in SHAKE-128 cipher
We need this for Kyber, which uses 34 byte inputs to XOF when
computing the public matrix.
Diffstat (limited to 'src/lib/stream')
-rw-r--r-- | src/lib/stream/shake_cipher/shake_cipher.cpp | 34 | ||||
-rw-r--r-- | src/lib/stream/stream_cipher.cpp | 2 |
2 files changed, 14 insertions, 22 deletions
diff --git a/src/lib/stream/shake_cipher/shake_cipher.cpp b/src/lib/stream/shake_cipher/shake_cipher.cpp index b0e08a700..f1920959e 100644 --- a/src/lib/stream/shake_cipher/shake_cipher.cpp +++ b/src/lib/stream/shake_cipher/shake_cipher.cpp @@ -18,17 +18,19 @@ SHAKE_128_Cipher::SHAKE_128_Cipher() : void SHAKE_128_Cipher::cipher(const uint8_t in[], uint8_t out[], size_t length) { + const size_t SHAKE_128_BYTERATE = (1600-256)/8; + verify_key_set(m_state.empty() == false); - while(length >= m_buffer.size() - m_buf_pos) + while(length >= SHAKE_128_BYTERATE - m_buf_pos) { - xor_buf(out, in, &m_buffer[m_buf_pos], m_buffer.size() - m_buf_pos); - length -= (m_buffer.size() - m_buf_pos); - in += (m_buffer.size() - m_buf_pos); - out += (m_buffer.size() - m_buf_pos); + xor_buf(out, in, &m_buffer[m_buf_pos], SHAKE_128_BYTERATE - m_buf_pos); + length -= (SHAKE_128_BYTERATE - m_buf_pos); + in += (SHAKE_128_BYTERATE - m_buf_pos); + out += (SHAKE_128_BYTERATE - m_buf_pos); SHA_3::permute(m_state.data()); - copy_out_le(m_buffer.data(), m_buffer.size(), m_state.data()); + copy_out_le(m_buffer.data(), SHAKE_128_BYTERATE, m_state.data()); m_buf_pos = 0; } @@ -38,19 +40,13 @@ void SHAKE_128_Cipher::cipher(const uint8_t in[], uint8_t out[], size_t length) void SHAKE_128_Cipher::key_schedule(const uint8_t key[], size_t length) { + const size_t SHAKE_128_BITRATE = (1600-256); m_state.resize(25); - m_buffer.resize((1600 - 256) / 8); + m_buffer.resize(SHAKE_128_BITRATE/8); zeroise(m_state); - for(size_t i = 0; i < length/8; ++i) - { - m_state[i] ^= load_le<uint64_t>(key, i); - } - - m_state[length/8] ^= 0x000000000000001F; - m_state[20] ^= 0x8000000000000000; - - SHA_3::permute(m_state.data()); + const size_t S_pos = SHA_3::absorb(SHAKE_128_BITRATE, m_state, 0, key, length); + SHA_3::finish(SHAKE_128_BITRATE, m_state, S_pos, 0x1F, 0x80); copy_out_le(m_buffer.data(), m_buffer.size(), m_state.data()); } @@ -78,11 +74,7 @@ void SHAKE_128_Cipher::seek(uint64_t) Key_Length_Specification SHAKE_128_Cipher::key_spec() const { - /* - In principle SHAKE can accept arbitrary length inputs, but this - does not seem required for a stream cipher. - */ - return Key_Length_Specification(16, 160, 8); + return Key_Length_Specification(1, 160); } std::string SHAKE_128_Cipher::name() const diff --git a/src/lib/stream/stream_cipher.cpp b/src/lib/stream/stream_cipher.cpp index 692464723..340682ce2 100644 --- a/src/lib/stream/stream_cipher.cpp +++ b/src/lib/stream/stream_cipher.cpp @@ -82,7 +82,7 @@ std::unique_ptr<StreamCipher> StreamCipher::create(const std::string& algo_spec, #endif #if defined(BOTAN_HAS_SHAKE_CIPHER) - if(req.algo_name() == "SHAKE-128") + if(req.algo_name() == "SHAKE-128" || req.algo_name() == "SHAKE-128-XOF") { if(provider.empty() || provider == "base") return std::unique_ptr<StreamCipher>(new SHAKE_128_Cipher); |