/* mqq160-sign.c */ /* C code for MQQ160-SIGN suitable for 8-bit smart cards It is supposed that the private key is "engraved" in the ROM of the smart card - thus it is here stored as predefined const arrays in "MQQ160-SIGN-PrivateKey.h" Programmed by Danilo Gligoroski and Rune Jensen and Daniel Otte March 2010. Verified by Danilo Gligoroski March 2010. */ #include #include #include #include "memxor.h" #include "mqq160-sign.h" #include "cli.h" static uint8_t mod20_table[32] PROGMEM = { 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, }; static void memxor_idx(void* dest, const void* src, uint16_t length, uint8_t dist){ while(length--){ *((uint8_t*)dest) ^= *((uint8_t*)src); dest = (uint8_t*)dest + 1; src = (uint8_t*)src + dist; } } /* This is just for testing purposes. It should be programmed in a more flexible way in the MQQ160-SIGN C Library. */ static void mqq_inv_affine_transformation(const uint8_t* input_bytes, uint8_t* result, const mqq160_sign_key_t* key){ /* The matrix SInv is given as two permutations of 160 elements. */ uint8_t j, byteindex, bitindex, bitindex_d, byteindex_d, rp1, rp5; uint8_t *rp1_ptr, *rp5_ptr; uint8_t h1[20]; /* Initialize H1 and H2 = 0 */ memset(h1, 0, 20); memset(result, 0, 20); /* Fill H1 with bits of InputBytes accordingly to RP1 permutation and fill H2 with bits of InputBytes accordingly to RP5 permutation */ j=160; byteindex_d = 0; bitindex_d = 0x80; rp1_ptr = key->rp1; rp5_ptr = key->rp5; do{ rp1 = *rp1_ptr++; rp5 = *rp5_ptr++; byteindex = rp1>>3; bitindex = 0x80 >> (rp1&0x07); if (input_bytes[byteindex] & bitindex){ h1[byteindex_d] ^= bitindex_d; } byteindex = rp5>>3; bitindex = 0x80 >> (rp5&0x07); if (input_bytes[byteindex] & bitindex){ result[byteindex_d] ^= bitindex_d; } bitindex_d >>= 1; if(bitindex_d==0){ ++byteindex_d; bitindex_d = 0x80; } }while(--j); // cli_putstr_P(PSTR("\r\nDBG (ref): ")); // cli_hexdump(h1, 20); for (j=0; j<20; j++){ result[j] ^= h1[j] ^ h1[pgm_read_byte(j+mod20_table)] ^ h1[pgm_read_byte(8+j+mod20_table)] ^ h1[pgm_read_byte(12+j+mod20_table)]; } } static uint16_t MaskShort[8] = {0x8000, 0x4000, 0x2000, 0x1000, 0x0800, 0x0400, 0x0200, 0x0100}; static uint8_t mqq_q(uint8_t i, uint8_t b1, uint8_t b2, const mqq160_sign_key_t* key){ uint8_t e[9]; uint16_t a[8]; uint8_t result, column, row, k; int8_t j; uint16_t temp; uint8_t *tmp_ptr=key->a; if(i&1){ memcpy(e, key->cc1, 9); while(b1){ if(b1&0x80){ memxor_idx((uint8_t*)e, tmp_ptr, 9, 9); } tmp_ptr++; b1 <<= 1; } }else{ memcpy(e, key->cc2, 9); while(b1){ if(b1&0x80){ memxor((uint8_t*)e, tmp_ptr, 9); } tmp_ptr+=9; b1 <<= 1; } } /* So we finished with obtaining e0 .. e7 and e8 */ /* We XOR e[8] with b2 and that will be initial value to transform in order to solve a linear system of equations */ result=b2 ^ e[8]; /* We can look at the bits of e0 .. e7 as a columns of a given matrix. We want to define 8 variables that have the rows of that matrix. The variables need to be 16-bit because we will put into the upper 8 bits the bits of e0 .. e7, and the bits of the variable result will be the Least Significant Bits of a[0] ... a[7]. */ for(j=0; j<8; ++j){ row = 0; for(k=0; k<8; ++k){ row |= (e[k]&0x80)>>(k); e[k]<<=1; } a[j]=(((uint16_t)row)<<8) | (result>>7); result <<= 1; } /* Now we finally realize Gausian elimination */ /* First we apply upper triangular transformation */ for(column=0; column<8; column++) { row=column; while ((a[row] & MaskShort[column]) == 0){ row++; } if(row>column) { temp=a[column]; a[column]=a[row]; a[row]=temp; } for (j=column+1; j<8; j++) if ((a[j]&MaskShort[column]) !=0){ a[j] ^= a[column]; } } /* Then we eliminate 1s above the main diagonal */ for (column=7; column>0; column--){ for (j=column-1; j>=0; j--){ if ((a[j]&MaskShort[column]) !=0){ a[j] ^= a[column]; } } } /* The result is in the Least Significant Bits of a[0] ... a[7] */ result = 0; for(j=0; j<8; ++j){ result <<=1; result |= a[j]&1; } return(result); } void mqq160_sign(void* dest, const void* hash, const mqq160_sign_key_t* key){ uint8_t i, r1[20], byteindex; mqq_inv_affine_transformation((uint8_t*)hash, (uint8_t*)dest, key); r1[0]=((uint8_t*)dest)[0]; for(i=1; i<20; ++i){ r1[i] = mqq_q(i, r1[i-1], ((uint8_t*)dest)[i], key); } /* Affine transformation is just for the second call. The constant is extracted from the 4 LSBs of the first 40 bytes of RP5[] and xor-ed to input_bytes[]. */ byteindex = 0; for (i=0; i<20; i++){ r1[i] ^= (uint8_t)((key->rp5[byteindex])<<4) | (uint8_t)(key->rp5[byteindex+1]&0x0F); byteindex += 2; } mqq_inv_affine_transformation(r1, (uint8_t*)dest, key); }