1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/*
* (C) 2015 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include "apps.h"
#if defined(BOTAN_HAS_MCELIECE)
#include <botan/mceliece.h>
#include <botan/mceies.h>
#include <botan/pkcs8.h>
#include <fstream>
namespace {
int mce(int argc, char* argv[])
{
if(argc < 4)
{
std::cout << "Usage: " << argv[0] << " [keygen n t pass|keybits n t|encrypt file key|decrypt file key pass]\n";
return 1;
}
const std::string cmd = argv[1];
AutoSeeded_RNG rng;
if(cmd == "keygen")
{
const size_t n = std::stol(argv[2]);
const size_t t = std::stol(argv[3]);
const std::string pass = argv[4];
McEliece_PrivateKey pk(rng, n, t);
bool ok = pk.check_key(rng, true);
if(!ok)
{
std::cout << "Keygen failed self-test\n";
return 2;
}
/*
secure_vector<byte> priv = PKCS8::BER_encode(pk);
std::vector<byte> pub = X509::BER_encode(pk);
std::cout << priv.size()/1024.0 << " " << pub.size()/1024.0 << "\n";
*/
std::ofstream pub_file("mce.pub");
pub_file << X509::PEM_encode(pk);
pub_file.close();
std::ofstream priv_file("mce.priv");
priv_file << PKCS8::PEM_encode(pk, rng, pass);
priv_file.close();
}
else if(cmd == "keybits")
{
const size_t n = std::stol(argv[2]);
const size_t t = std::stol(argv[3]);
std::cout << "McEliece key with params (" << n << "," << t << ") has "
<< mceliece_work_factor(n, t) << " bit security\n";
}
else if(cmd == "encrypt")
{
std::unique_ptr<Public_Key> p8(X509::load_key(argv[3]));
const McEliece_PublicKey* key = dynamic_cast<McEliece_PublicKey*>(p8.get());
if(!key)
{
throw std::runtime_error("Loading McEliece public key failed");
}
const std::string input_path = argv[2];
std::ifstream in(input_path, std::ios::binary);
std::string pt((std::istreambuf_iterator<char>(in)), std::istreambuf_iterator<char>());
secure_vector<byte> ct = mceies_encrypt(*key,
reinterpret_cast<const byte*>(pt.data()),
pt.size(),
nullptr, 0, rng, "AES-128/GCM");
std::cout << pt.size() << " -> " << ct.size() << "\n";
std::ofstream out(std::string(input_path) + ".ct", std::ios::binary);
out.write(reinterpret_cast<const char*>(ct.data()), ct.size());
out.close();
}
else if(cmd == "decrypt")
{
const std::string key_file = argv[3];
const std::string pass = argv[4];
std::unique_ptr<Private_Key> p8(PKCS8::load_key(key_file, rng, pass));
const McEliece_PrivateKey* key = dynamic_cast<McEliece_PrivateKey*>(p8.get());
if(!key)
{
throw std::runtime_error("Loading McEliece private key failed");
}
std::ifstream in(argv[2], std::ios::binary);
std::string ct((std::istreambuf_iterator<char>(in)), std::istreambuf_iterator<char>());
secure_vector<byte> pt = mceies_decrypt(*key,
reinterpret_cast<const byte*>(ct.data()),
ct.size(),
nullptr, 0, "AES-128/GCM");
std::ofstream out("mce.plaintext", std::ios::binary);
out.write(reinterpret_cast<const char*>(pt.data()), pt.size());
out.close();
}
return 0;
}
}
REGISTER_APP(mce);
#endif
|