aboutsummaryrefslogtreecommitdiff
path: root/private_join_and_compute/crypto/ec_group.cc
diff options
context:
space:
mode:
Diffstat (limited to 'private_join_and_compute/crypto/ec_group.cc')
-rw-r--r--private_join_and_compute/crypto/ec_group.cc276
1 files changed, 276 insertions, 0 deletions
diff --git a/private_join_and_compute/crypto/ec_group.cc b/private_join_and_compute/crypto/ec_group.cc
new file mode 100644
index 0000000..83cac71
--- /dev/null
+++ b/private_join_and_compute/crypto/ec_group.cc
@@ -0,0 +1,276 @@
+/*
+ * Copyright 2019 Google Inc.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * https://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "private_join_and_compute/crypto/ec_group.h"
+
+#include <algorithm>
+#include <utility>
+
+#define GLOG_NO_ABBREVIATED_SEVERITIES
+#include "absl/strings/str_cat.h"
+#include "absl/strings/string_view.h"
+#include "glog/logging.h"
+#include "private_join_and_compute/crypto/ec_point.h"
+#include "private_join_and_compute/crypto/openssl.inc"
+#include "private_join_and_compute/util/status.inc"
+
+namespace private_join_and_compute {
+
+namespace {
+
+// Returns a group using the predefined underlying operations suggested by
+// OpenSSL.
+StatusOr<ECGroup::ECGroupPtr> CreateGroup(int curve_id) {
+ auto ec_group_ptr = EC_GROUP_new_by_curve_name(curve_id);
+ // If this fails, this is usually due to an invalid curve id.
+ if (ec_group_ptr == nullptr) {
+ return InvalidArgumentError(
+ absl::StrCat("ECGroup::CreateGroup() - Could not create group. ",
+ OpenSSLErrorString()));
+ }
+ return ECGroup::ECGroupPtr(ec_group_ptr);
+}
+
+// Returns the order of the group. For more information, see
+// https://en.wikipedia.org/wiki/Elliptic-curve_cryptography#Domain_parameters.
+StatusOr<BigNum> CreateOrder(const EC_GROUP* group, Context* context) {
+ BIGNUM* bn = BN_new();
+ if (bn == nullptr) {
+ return InternalError(
+ absl::StrCat("ECGroup::CreateOrder - Could not create BIGNUM. ",
+ OpenSSLErrorString()));
+ }
+ BigNum::BignumPtr order = BigNum::BignumPtr(bn);
+ if (EC_GROUP_get_order(group, order.get(), context->GetBnCtx()) != 1) {
+ return InternalError(absl::StrCat(
+ "ECGroup::CreateOrder - Could not get order. ", OpenSSLErrorString()));
+ }
+ return context->CreateBigNum(std::move(order));
+}
+
+// Returns the cofactor of the group.
+StatusOr<BigNum> CreateCofactor(const EC_GROUP* group, Context* context) {
+ BIGNUM* bn = BN_new();
+ if (bn == nullptr) {
+ return InternalError(
+ absl::StrCat("ECGroup::CreateCofactor - Could not create BIGNUM. ",
+ OpenSSLErrorString()));
+ }
+ BigNum::BignumPtr cofactor = BigNum::BignumPtr(bn);
+ if (EC_GROUP_get_cofactor(group, cofactor.get(), context->GetBnCtx()) != 1) {
+ return InternalError(
+ absl::StrCat("ECGroup::CreateCofactor - Could not get cofactor. ",
+ OpenSSLErrorString()));
+ }
+ return context->CreateBigNum(std::move(cofactor));
+}
+
+// Returns the parameters that define the curve. For more information, see
+// https://en.wikipedia.org/wiki/Elliptic-curve_cryptography#Domain_parameters.
+StatusOr<ECGroup::CurveParams> CreateCurveParams(const EC_GROUP* group,
+ Context* context) {
+ BIGNUM* bn1 = BN_new();
+ BIGNUM* bn2 = BN_new();
+ BIGNUM* bn3 = BN_new();
+ if (bn1 == nullptr || bn2 == nullptr || bn3 == nullptr) {
+ return InternalError(
+ absl::StrCat("ECGroup::CreateCurveParams - Could not create BIGNUM. ",
+ OpenSSLErrorString()));
+ }
+ BigNum::BignumPtr p = BigNum::BignumPtr(bn1);
+ BigNum::BignumPtr a = BigNum::BignumPtr(bn2);
+ BigNum::BignumPtr b = BigNum::BignumPtr(bn3);
+ if (EC_GROUP_get_curve_GFp(group, p.get(), a.get(), b.get(),
+ context->GetBnCtx()) != 1) {
+ return InternalError(
+ absl::StrCat("ECGroup::CreateCurveParams - Could not get params. ",
+ OpenSSLErrorString()));
+ }
+ BigNum p_bn = context->CreateBigNum(std::move(p));
+ if (!p_bn.IsPrime()) {
+ return InternalError(absl::StrCat(
+ "ECGroup::CreateCurveParams - p is not prime. ", OpenSSLErrorString()));
+ }
+ return ECGroup::CurveParams{std::move(p_bn),
+ context->CreateBigNum(std::move(a)),
+ context->CreateBigNum(std::move(b))};
+}
+
+// Returns (p - 1) / 2 where p is a curve-defining parameter.
+BigNum GetPMinusOneOverTwo(const ECGroup::CurveParams& curve_params,
+ Context* context) {
+ return (curve_params.p - context->One()) / context->Two();
+}
+
+} // namespace
+
+ECGroup::ECGroup(Context* context, ECGroupPtr group, BigNum order,
+ BigNum cofactor, CurveParams curve_params,
+ BigNum p_minus_one_over_two)
+ : context_(context),
+ group_(std::move(group)),
+ order_(std::move(order)),
+ cofactor_(std::move(cofactor)),
+ curve_params_(std::move(curve_params)),
+ p_minus_one_over_two_(std::move(p_minus_one_over_two)) {}
+
+StatusOr<ECGroup> ECGroup::Create(int curve_id, Context* context) {
+ ASSIGN_OR_RETURN(ECGroupPtr g, CreateGroup(curve_id));
+ ASSIGN_OR_RETURN(BigNum order, CreateOrder(g.get(), context));
+ ASSIGN_OR_RETURN(BigNum cofactor, CreateCofactor(g.get(), context));
+ ASSIGN_OR_RETURN(CurveParams params, CreateCurveParams(g.get(), context));
+ BigNum p_minus_one_over_two = GetPMinusOneOverTwo(params, context);
+ return ECGroup(context, std::move(g), std::move(order), std::move(cofactor),
+ std::move(params), std::move(p_minus_one_over_two));
+}
+
+BigNum ECGroup::GeneratePrivateKey() const {
+ return context_->GenerateRandBetween(context_->One(), order_);
+}
+
+Status ECGroup::CheckPrivateKey(const BigNum& priv_key) const {
+ if (context_->Zero() >= priv_key || priv_key >= order_) {
+ return InvalidArgumentError(
+ "The given key is out of bounds, needs to be in [1, order) instead.");
+ }
+ return OkStatus();
+}
+
+StatusOr<ECPoint> ECGroup::GetPointByHashingToCurveInternal(
+ const BigNum& x) const {
+ BigNum mod_x = x.Mod(curve_params_.p);
+ BigNum y2 = ComputeYSquare(mod_x);
+ if (IsSquare(y2)) {
+ BigNum sqrt = y2.ModSqrt(curve_params_.p);
+ if (sqrt.IsBitSet(0)) {
+ return CreateECPoint(mod_x, sqrt.ModNegate(curve_params_.p));
+ }
+ return CreateECPoint(mod_x, sqrt);
+ }
+ return InternalError("Could not hash x to the curve.");
+}
+
+StatusOr<ECPoint> ECGroup::GetPointByHashingToCurveSha256(
+ absl::string_view m) const {
+ BigNum x = context_->RandomOracleSha256(m, curve_params_.p);
+ while (true) {
+ auto status_or_point = GetPointByHashingToCurveInternal(x);
+ if (status_or_point.ok()) {
+ return status_or_point;
+ }
+ x = context_->RandomOracleSha256(x.ToBytes(), curve_params_.p);
+ }
+}
+
+StatusOr<ECPoint> ECGroup::GetPointByHashingToCurveSha512(
+ absl::string_view m) const {
+ BigNum x = context_->RandomOracleSha512(m, curve_params_.p);
+ while (true) {
+ auto status_or_point = GetPointByHashingToCurveInternal(x);
+ if (status_or_point.ok()) {
+ return status_or_point;
+ }
+ x = context_->RandomOracleSha512(x.ToBytes(), curve_params_.p);
+ }
+}
+
+BigNum ECGroup::ComputeYSquare(const BigNum& x) const {
+ return (x.Exp(context_->Three()) + curve_params_.a * x + curve_params_.b)
+ .Mod(curve_params_.p);
+}
+
+bool ECGroup::IsValid(const ECPoint& point) const {
+ if (!IsOnCurve(point) || IsAtInfinity(point)) {
+ return false;
+ }
+ return true;
+}
+
+bool ECGroup::IsOnCurve(const ECPoint& point) const {
+ return 1 == EC_POINT_is_on_curve(group_.get(), point.point_.get(),
+ context_->GetBnCtx());
+}
+
+bool ECGroup::IsAtInfinity(const ECPoint& point) const {
+ return 1 == EC_POINT_is_at_infinity(group_.get(), point.point_.get());
+}
+
+bool ECGroup::IsSquare(const BigNum& q) const {
+ return q.ModExp(p_minus_one_over_two_, curve_params_.p).IsOne();
+}
+
+StatusOr<ECPoint> ECGroup::GetFixedGenerator() const {
+ const EC_POINT* ssl_generator = EC_GROUP_get0_generator(group_.get());
+ EC_POINT* dup_ssl_generator = EC_POINT_dup(ssl_generator, group_.get());
+ if (dup_ssl_generator == nullptr) {
+ return InternalError(OpenSSLErrorString());
+ }
+ return ECPoint(group_.get(), context_->GetBnCtx(),
+ ECPoint::ECPointPtr(dup_ssl_generator));
+}
+
+StatusOr<ECPoint> ECGroup::GetRandomGenerator() const {
+ ASSIGN_OR_RETURN(ECPoint generator, GetFixedGenerator());
+ return generator.Mul(context_->GenerateRandBetween(context_->One(), order_));
+}
+
+StatusOr<ECPoint> ECGroup::CreateECPoint(const BigNum& x,
+ const BigNum& y) const {
+ ECPoint point = ECPoint(group_.get(), context_->GetBnCtx(), x, y);
+ if (!IsValid(point)) {
+ return InvalidArgumentError(
+ "ECGroup::CreateECPoint(x,y) - The point is not valid.");
+ }
+ return std::move(point);
+}
+
+StatusOr<ECPoint> ECGroup::CreateECPoint(absl::string_view bytes) const {
+ auto raw_ec_point_ptr = EC_POINT_new(group_.get());
+ if (raw_ec_point_ptr == nullptr) {
+ return InternalError("ECGroup::CreateECPoint: Failed to create point.");
+ }
+ ECPoint::ECPointPtr point(raw_ec_point_ptr);
+ if (EC_POINT_oct2point(group_.get(), point.get(),
+ reinterpret_cast<const unsigned char*>(bytes.data()),
+ bytes.size(), context_->GetBnCtx()) != 1) {
+ return InvalidArgumentError(
+ absl::StrCat("ECGroup::CreateECPoint(string) - Could not decode point.",
+ "\n", OpenSSLErrorString()));
+ }
+
+ ECPoint ec_point(group_.get(), context_->GetBnCtx(), std::move(point));
+ if (!IsValid(ec_point)) {
+ return InvalidArgumentError(
+ "ECGroup::CreateECPoint(string) - Decoded point is not valid.");
+ }
+ return std::move(ec_point);
+}
+
+StatusOr<ECPoint> ECGroup::GetPointAtInfinity() const {
+ EC_POINT* new_point = EC_POINT_new(group_.get());
+ if (new_point == nullptr) {
+ return InternalError(
+ "ECGroup::GetPointAtInfinity() - Could not create new point.");
+ }
+ ECPoint::ECPointPtr point(new_point);
+ if (EC_POINT_set_to_infinity(group_.get(), point.get()) != 1) {
+ return InternalError(
+ "ECGroup::GetPointAtInfinity() - Could not get point at infinity.");
+ }
+ ECPoint ec_point(group_.get(), context_->GetBnCtx(), std::move(point));
+ return std::move(ec_point);
+}
+
+} // namespace private_join_and_compute