blob: 2ddc371b2479c08b0c025993ddb113b7f3ec43b0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
|
/*
* ECDH implemenation
* (C) 2007 Manuel Hartl, FlexSecure GmbH
* 2007 Falko Strenzke, FlexSecure GmbH
* 2008-2010 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
#include <botan/ecdh.h>
#include <iostream>
namespace Botan {
ECDH_PublicKey::ECDH_PublicKey(const EC_Domain_Params& dom_par,
const PointGFp& pub_point)
{
domain_params = dom_par;
public_key = pub_point;
if(domain().get_curve() != public_point().get_curve())
throw Invalid_Argument("ECDH_PublicKey: curve mismatch in constructor");
}
ECDH_PrivateKey::ECDH_PrivateKey(RandomNumberGenerator& rng,
const EC_Domain_Params& dom_pars)
{
domain_params = dom_pars;
generate_private_key(rng);
}
/**
* Derive a key
*/
SecureVector<byte> ECDH_PrivateKey::derive_key(const byte key[],
u32bit key_len) const
{
MemoryVector<byte> key_x(key, key_len); // FIXME: nasty/slow
PointGFp point = OS2ECP(key_x, public_point().get_curve());
return derive_key(point);
}
/**
* Derive a key
*/
SecureVector<byte> ECDH_PrivateKey::derive_key(const ECDH_PublicKey& key) const
{
return derive_key(key.public_point());
}
/**
* Derive a key
*/
SecureVector<byte> ECDH_PrivateKey::derive_key(const PointGFp& point) const
{
const BigInt& cofactor = domain().get_cofactor();
const BigInt& n = domain().get_order();
BigInt l = inverse_mod(cofactor, n); // can precompute this
PointGFp S = (cofactor * point) * (private_value() * l);
S.check_invariants();
//PointGFp S = point * private_value();
return BigInt::encode_1363(S.get_affine_x(),
point.get_curve().get_p().bytes());
}
}
|