diff options
author | Jack Lloyd <[email protected]> | 2018-12-09 07:19:18 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-12-09 07:19:18 -0500 |
commit | 190dd0daa649be2e702eb1730232bb6ff9c6df34 (patch) | |
tree | 0041f740928481393d03f54e9b8b1d901b54ff74 /src | |
parent | e5be97da0c2039fefe4f81ff40c86ae3b88622eb (diff) |
Use a const time algorithm for monty_inverse
Previous EEA leaked information about the low word of the prime,
which is a problem for RSA.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/math/numbertheory/numthry.cpp | 58 | ||||
-rw-r--r-- | src/lib/math/numbertheory/numthry.h | 4 |
2 files changed, 23 insertions, 39 deletions
diff --git a/src/lib/math/numbertheory/numthry.cpp b/src/lib/math/numbertheory/numthry.cpp index 6aa83e098..7af1d13df 100644 --- a/src/lib/math/numbertheory/numthry.cpp +++ b/src/lib/math/numbertheory/numthry.cpp @@ -381,49 +381,33 @@ BigInt inverse_euclid(const BigInt& n, const BigInt& mod) return D; } -word monty_inverse(word input) +word monty_inverse(word a) { - if(input == 0) - throw Invalid_Argument("monty_inverse: divide by zero"); - - word b = input; - word x2 = 1, x1 = 0, y2 = 0, y1 = 1; - - // First iteration, a = n+1 - word q = bigint_divop(1, 0, b); - word r = (MP_WORD_MAX - q*b) + 1; - word x = x2 - q*x1; - word y = y2 - q*y1; - - word a = b; - b = r; - x2 = x1; - x1 = x; - y2 = y1; - y1 = y; - - while(b > 0) + if(a % 2 == 0) + throw Invalid_Argument("monty_inverse only valid for odd integers"); + + /* + * From "A New Algorithm for Inversion mod p^k" by Çetin Kaya Koç + * https://eprint.iacr.org/2017/411.pdf sections 5 and 7. + */ + + word b = 1; + word r = 0; + + for(size_t i = 0; i != BOTAN_MP_WORD_BITS; ++i) { - q = a / b; - r = a - q*b; - x = x2 - q*x1; - y = y2 - q*y1; - - a = b; - b = r; - x2 = x1; - x1 = x; - y2 = y1; - y1 = y; - } + const word bi = b % 2; + r >>= 1; + r += bi << (BOTAN_MP_WORD_BITS - 1); - const word check = y2 * input; - BOTAN_ASSERT_EQUAL(check, 1, "monty_inverse result is inverse of input"); + b -= a * bi; + b >>= 1; + } // Now invert in addition space - y2 = (MP_WORD_MAX - y2) + 1; + r = (MP_WORD_MAX - r) + 1; - return y2; + return r; } /* diff --git a/src/lib/math/numbertheory/numthry.h b/src/lib/math/numbertheory/numthry.h index 7a978cd3f..aab62a838 100644 --- a/src/lib/math/numbertheory/numthry.h +++ b/src/lib/math/numbertheory/numthry.h @@ -150,8 +150,8 @@ BigInt BOTAN_PUBLIC_API(2,0) power_mod(const BigInt& b, BigInt BOTAN_PUBLIC_API(2,0) ressol(const BigInt& x, const BigInt& p); /* -* Compute -input^-1 mod 2^MP_WORD_BITS. Returns zero if input -* is even. If input is odd, input and 2^n are relatively prime +* Compute -input^-1 mod 2^MP_WORD_BITS. Throws an exception if input +* is even. If input is odd, then input and 2^n are relatively prime * and an inverse exists. */ word BOTAN_PUBLIC_API(2,0) monty_inverse(word input); |