diff options
| author | Frank Denis <124872+jedisct1@users.noreply.github.com> | 2022-05-02 20:28:34 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-05-03 05:28:34 +0200 |
| commit | 098bee0e5657bb6dcd92b2b2fa8056ffce893ffc (patch) | |
| tree | 3ff994f4705f5c0fb13f369ce8c1827a5b7b8fa4 /lib | |
| parent | f648a1b0439aaf22be26b29d290e53493f4db16b (diff) | |
| download | zig-098bee0e5657bb6dcd92b2b2fa8056ffce893ffc.tar.gz zig-098bee0e5657bb6dcd92b2b2fa8056ffce893ffc.zip | |
edwards25519 fixes (#11568)
* edwards25519: fix X coordinate of the base point
Reported by @OfekShochat -- Thanks!
* edwards25519: reduce public scalar when the top bit is set, not cleared
This is an optimization for the unexpected case of a scalar
larger than the field size.
Fixes #11563
* edwards25519: add a test implicit reduction of invalid scalars
Diffstat (limited to 'lib')
| -rw-r--r-- | lib/std/crypto/25519/edwards25519.zig | 18 |
1 files changed, 16 insertions, 2 deletions
diff --git a/lib/std/crypto/25519/edwards25519.zig b/lib/std/crypto/25519/edwards25519.zig index fcfc6ee258..b106304a3a 100644 --- a/lib/std/crypto/25519/edwards25519.zig +++ b/lib/std/crypto/25519/edwards25519.zig @@ -62,7 +62,7 @@ pub const Edwards25519 = struct { /// The edwards25519 base point. pub const basePoint = Edwards25519{ - .x = Fe{ .limbs = .{ 3990542415680775, 3398198340507945, 4322667446711068, 2814063955482877, 2839572215813860 } }, + .x = Fe{ .limbs = .{ 1738742601995546, 1146398526822698, 2070867633025821, 562264141797630, 587772402128613 } }, .y = Fe{ .limbs = .{ 1801439850948184, 1351079888211148, 450359962737049, 900719925474099, 1801439850948198 } }, .z = Fe.one, .t = Fe{ .limbs = .{ 1841354044333475, 16398895984059, 755974180946558, 900171276175154, 1821297809914039 } }, @@ -147,7 +147,7 @@ pub const Edwards25519 = struct { } fn slide(s: [32]u8) [2 * 32]i8 { - const reduced = if ((s[s.len - 1] & 0x80) != 0) s else scalar.reduce(s); + const reduced = if ((s[s.len - 1] & 0x80) == 0) s else scalar.reduce(s); var e: [2 * 32]i8 = undefined; for (reduced) |x, i| { e[i * 2 + 0] = @as(i8, @truncate(u4, x)); @@ -549,3 +549,17 @@ test "edwards25519 hash-to-curve operation" { p = Edwards25519.fromString(false, "QUUX-V01-CS02-with-edwards25519_XMD:SHA-512_ELL2_NU_", "abc"); try htest.assertEqual("42fa27c8f5a1ae0aa38bb59d5938e5145622ba5dedd11d11736fa2f9502d7367", p.toBytes()[0..]); } + +test "edwards25519 implicit reduction of invalid scalars" { + const s = [_]u8{0} ** 31 ++ [_]u8{255}; + const p1 = try Edwards25519.basePoint.mulPublic(s); + const p2 = try Edwards25519.basePoint.mul(s); + const p3 = try p1.mulPublic(s); + const p4 = try p1.mul(s); + + try std.testing.expectEqualSlices(u8, p1.toBytes()[0..], p2.toBytes()[0..]); + try std.testing.expectEqualSlices(u8, p3.toBytes()[0..], p4.toBytes()[0..]); + + try htest.assertEqual("339f189ecc5fbebe9895345c72dc07bda6e615f8a40e768441b6f529cd6c671a", p1.toBytes()[0..]); + try htest.assertEqual("a501e4c595a3686d8bee7058c7e6af7fd237f945c47546910e37e0e79b1bafb0", p3.toBytes()[0..]); +} |
