/* * Copyright 2014-2026 The GmSSL Project. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the License); you may * not use this file except in compliance with the License. * * http://www.apache.org/licenses/LICENSE-2.0 */ #include #include #include #include #include #include #include #include #include #include #include void kyber_h_hash(const uint8_t *in, size_t inlen, uint8_t out[32]) { SM3_CTX ctx; sm3_init(&ctx); sm3_update(&ctx, in, inlen); sm3_finish(&ctx, out); } void kyber_g_hash(const uint8_t *in, size_t inlen, uint8_t out[64]) { SM3_CTX ctx; uint8_t ctr[4] = {0}; sm3_init(&ctx); sm3_update(&ctx, in, inlen); sm3_update(&ctx, ctr, 4); sm3_finish(&ctx, out); ctr[3] = 1; sm3_init(&ctx); sm3_update(&ctx, in, inlen); sm3_update(&ctx, ctr, 4); sm3_finish(&ctx, out + 32); } // https://www.cryptosys.net/pki/manpki/pki_prfxof.html static int kyber_prf(const uint8_t seed[32], uint8_t N, size_t outlen, uint8_t *out) { uint8_t salt[1]; uint8_t key[32]; size_t len; salt[0] = (uint8_t)N; if (sm3_hkdf_extract(NULL, 0, seed, 32, key) != 1) { error_print(); return -1; } sm3_hkdf_expand(key, &N, 1, outlen, out); return 1; } static int kyber_kdf(const uint8_t in[64], uint8_t out[32]) { uint8_t key[32]; sm3_hkdf_extract(NULL, 0, in, 64, key); sm3_hkdf_expand(key, NULL, 0, 32, out); gmssl_secure_clear(key, 32); return 1; } int kyber_poly_print(FILE *fp, int fmt, int ind, const char *label, const kyber_poly_t a) { int i; format_print(fp, fmt, ind, "%s: [", label); for (i = 0; i < 256; i++) { if (i % 16 == 0) printf("\n"); fprintf(fp, "%d, ", a[i]); } fprintf(fp, "]\n"); return 1; } void kyber_poly_set_zero(kyber_poly_t r) { int i; for (i = 0; i < 256; i++) { r[i] = 0; } } static void kyber_poly_set_all(kyber_poly_t r, int16_t val) { int i; for (i = 0; i < 256; i++) { r[i] = val; } } int kyber_poly_rand(kyber_poly_t r) { int i; rand_bytes((uint8_t *)r, sizeof(kyber_poly_t)); for (i = 0; i < 256; i++) { r[i] = (r[i] & 0xfff) % KYBER_Q; } return 1; } int kyber_poly_uniform_sample(kyber_poly_t r, const uint8_t rho[32], uint8_t j, uint8_t i) { SM3_CTX ctx; uint8_t seed[32 + 2 + 4]; uint8_t rand[32 * 3]; uint32_t counter = 0; size_t n; int16_t *out = r; int16_t *end = r + 256; memcpy(seed, rho, 32); seed[32] = j; seed[33] = i; for (;;) { for (n = 0; n < sizeof(rand)/32; n++) { PUTU32(seed + 34, counter); counter++; sm3_init(&ctx); sm3_update(&ctx, seed, sizeof(seed)); sm3_finish(&ctx, rand + 32 * n); } for (n = 0; n < sizeof(rand); n += 3) { int16_t a0 = rand[n] | ((int16_t)(rand[n + 1] & 0xf) << 8); int16_t a1 = (rand[n + 1] >> 4) | ((int16_t)rand[n + 2] << 4); if (a0 < KYBER_Q) { *out++ = a0; if (out >= end) { goto end; } } if (a1 < KYBER_Q) { *out++ = a1; if (out >= end) { goto end; } } } } end: return 1; } int kyber_poly_cbd_sample(kyber_poly_t r, int eta, const uint8_t secret[32], uint8_t n) { int i; if (eta == 2) { uint8_t in[128]; kyber_prf(secret, n, sizeof(in), in); for (i = 0; i < 128; i++) { uint8_t t = (in[i] & 0x55) + ((in[i] >> 1) & 0x55); r[2*i] = (t & 0x3) - ((t >> 2) & 0x3); r[2*i + 1] = ((t >> 4) & 0x3) - ((t >> 6) & 0x3); } gmssl_secure_clear(in, sizeof(in)); } else if (eta == 3) { uint8_t bytes[192]; uint32_t b24; kyber_prf(secret, n, sizeof(bytes), bytes); //format_bytes(stderr, 0, 0, "prf_bytes", bytes, 192); for (i = 0; i < 64; i++) { b24 = bytes[3*i] | ((uint32_t)bytes[3*i+1] << 8) | ((uint32_t)bytes[3*i+2] << 16); b24 = (b24 & 0x249249) + ((b24 >> 1) & 0x249249) + ((b24 >> 2) & 0x249249); r[4*i] = (b24 & 0x7) - ((b24 >> 3) & 0x7); r[4*i + 1] = ((b24 >> 6) & 0x7) - ((b24 >> 9) & 0x7); r[4*i + 2] = ((b24 >> 12) & 0x7) - ((b24 >> 15) & 0x7); r[4*i + 3] = ((b24 >> 18) & 0x7) - ((b24 >> 21) & 0x7); } gmssl_secure_clear(bytes, sizeof(bytes)); } for (i = 0; i < 256; i++) { if (r[i] < 0) { r[i] += KYBER_Q; } } return 1; } int kyber_poly_equ(const kyber_poly_t a, const kyber_poly_t b) { int i; for (i = 0; i < 256; i++) { if (a[i] != b[i]) { return 0; } } return 1; } void kyber_poly_add(kyber_poly_t r, const kyber_poly_t a, const kyber_poly_t b) { int i; for (i = 0; i < 256; i++) { r[i] = (a[i] + b[i]) % 3329; } } void kyber_poly_sub(kyber_poly_t r, const kyber_poly_t a, const kyber_poly_t b) { int i; for (i = 0; i < 256; i++) { r[i] = (a[i] + 3329 - b[i]) % 3329; } } int16_t zeta[256]; void init_zeta(void) { int i; zeta[0] = 1; for (i = 1; i < sizeof(zeta)/sizeof(zeta[0]); i++) { zeta[i] = (zeta[i - 1] * 17) % 3329; } } static uint8_t br7(uint8_t i) { int j; uint8_t r = 0; for (j = 0; j < 7; j++) { r <<= 1; r |= i & 0x1; i >>= 1; } return r; } int kyber_poly_ntt(int16_t a[256]) { int br_i = 1; int n = 128; int g; int i; for (n = 128; n >= 2; n /= 2) { int16_t *A = a; for (g = 0; g < 256/(2*n); g++) { for (i = 0; i < n; i++) { int t = (A[n + i] * zeta[br7(br_i)]) % 3329; A[n + i] = (A[i] + 3329 - t) % 3329; A[i ] = (A[i] + t) % 3329; } br_i++; A += 2*n; } } return 1; } static int16_t div2(int16_t a) { if (a & 1) { return (a + 3329)/2; } else { return a/2; } } int kyber_poly_inv_ntt(int16_t a[256]) { int br_i = 127; int n; int g; int i; for (n = 2; n <= 128; n *= 2) { int16_t *A = a; for (g = 0; g < 256/(2*n); g++) { for (i = 0; i < n; i++) { int t0 = (A[i] + A[n + i]) % 3329; t0 = div2(t0); int t1 = (A[i] + 3329 - A[n + i]) % 3329; t1 = (t1 * (3329 - zeta[br7(br_i)])) % 3329; t1 = div2(t1); A[i] = (int16_t)t0; A[n+i]=(int16_t)t1; } br_i--; A += 2*n; } } return 1; } // (a0 + a1*X) * (b0 + b1*X) = (a0*b0 + a1*b1*zeta) + (a0*b1 + a1*b0)*X static void kyber_linear_poly_mul(int16_t r[2], const int16_t a[2], const int16_t b[2], int zeta) { r[0] = (a[0] * b[0] + ((a[1] * b[1])%3329) * zeta) % 3329; r[1] = (a[0] * b[1] + a[1] * b[0]) % 3329; } int kyber_poly_ntt_mul(kyber_poly_t r, const kyber_poly_t a, const kyber_poly_t b) { int i; for (i = 0; i < 64; i++) { kyber_linear_poly_mul(r, a, b, zeta[br7(64 + i)]); r += 2; a += 2; b += 2; kyber_linear_poly_mul(r, a, b, 3329 - zeta[br7(64 + i)]); r += 2; a += 2; b += 2; } return 1; } void kyber_poly_copy(kyber_poly_t r, const kyber_poly_t a) { int i; for (i = 0; i < 256; i++) { r[i] = a[i]; } } int kyber_poly_mul(kyber_poly_t r, const kyber_poly_t a, const kyber_poly_t b) { kyber_poly_t ntt_a; kyber_poly_t ntt_b; kyber_poly_t ntt_r; kyber_poly_copy(ntt_a, a); kyber_poly_ntt(ntt_a); kyber_poly_copy(ntt_b, b); kyber_poly_ntt(ntt_b); kyber_poly_ntt_mul(ntt_r, ntt_a, ntt_b); kyber_poly_inv_ntt(ntt_r); kyber_poly_copy(r, ntt_r); return 1; } void kyber_poly_ntt_mul_scalar(kyber_poly_t r, int scalar, const kyber_poly_t a) { int i; scalar %= KYBER_Q; for (i = 0; i < 256; i++) { r[i] = (scalar * a[i]) % KYBER_Q; } } int kyber_poly_to_signed(const kyber_poly_t a, kyber_poly_t r) { int i; for (i = 0; i < 256; i++) { if (a[i] < 0 || a[i] >= KYBER_Q) { error_print(); return -1; } if (a[i] > (KYBER_Q - 1)/2) { r[i] = a[i] - KYBER_Q; } else { r[i] = a[i]; } } return 1; } int kyber_poly_from_signed(kyber_poly_t r, const kyber_poly_t a) { int i; for (i = 0; i < 256; i++) { if (a[i] < -(KYBER_Q - 1)/2 || a[i] > (KYBER_Q - 1)/2) { return -1; } if (a[i] < 0) { r[i] = a[i] + KYBER_Q; } else { r[i] = a[i]; } } return 1; } int kyber_poly_compress(const kyber_poly_t a, int dbits, kyber_poly_t z) { int i; int d = 1 << dbits; for (i = 0; i < 256; i++) { z[i] = (a[i] * d + (KYBER_Q +1)/2)/KYBER_Q; z[i] = z[i] % d; } return 1; } int kyber_poly_decompress(kyber_poly_t r, int dbits, const kyber_poly_t z) { int i; int d = 1 << dbits; for (i = 0; i < 256; i++) { r[i] = (z[i] * KYBER_Q + d/2)/d; } return 1; } int kyber_poly_encode12(const kyber_poly_t a, uint8_t out[384]) { const int16_t *in = a; int i; for (i = 0; i < 256; i++) { if (a[i] < 0 || a[i] >= KYBER_Q) { error_print(); return -1; } } for (i = 0; i < 256/2; i++) { out[0] = in[0]; out[1] = (in[1] << 4) | (in[0] >> 8); out[2] = in[1] >> 4; in += 2; out += 3; } return 1; } int kyber_poly_decode12(kyber_poly_t r, const uint8_t in[384]) { int16_t *out = r; int i; for (i = 0; i < 384; i += 3) { *out++ = (((int16_t)in[i + 1] & 0xf) << 8) | in[i]; *out++ = ((int16_t)in[i + 2] << 4) | (in[i + 1] >> 4); } for (i = 0; i < 256; i++) { if (r[i] >= KYBER_Q) { error_print(); return -1; } } return 1; } int kyber_poly_encode10(const kyber_poly_t a, uint8_t out[320]) { const int16_t *in = a; int i; for (i = 0; i < 256; i++) { if (a[i] < 0 || a[i] >= (1 << 10)) { error_print(); return -1; } } for (i = 0; i < 256/4; i++) { out[0] = in[0]; out[1] = (in[1] << 2) | (in[0] >> 8); out[2] = (in[2] << 4) | (in[1] >> 6); out[3] = (in[3] << 6) | (in[2] >> 4); out[4] = in[3] >> 2; in += 4; out += 5; } return 1; } int kyber_poly_decode10(kyber_poly_t r, const uint8_t in[320]) { int i; int16_t *out = r; for (i = 0; i < 256/4; i++) { out[0] = (((int16_t)in[1] << 8) | in[0]) & 0x3ff; out[1] = (((int16_t)in[2] << 6) | (in[1] >> 2)) & 0x3ff; out[2] = (((int16_t)in[3] << 4) | (in[2] >> 4)) & 0x3ff; out[3] = ((int16_t)in[4] << 2) | (in[3] >> 6); in += 5; out += 4; } return 1; } int kyber_poly_encode4(const kyber_poly_t a, uint8_t out[128]) { int i; for (i = 0; i < 256; i++) { if (a[i] < 0 || a[i] >= (1<<4)) { error_print(); return -1; } } for (i = 0; i < 256; i += 2) { *out++ = a[i] | (a[i + 1] << 4); } return 1; } void kyber_poly_decode4(kyber_poly_t r, const uint8_t in[128]) { int i; for (i = 0; i < 128; i++) { r[2 * i] = in[i] & 0xf; r[2 * i + 1] = in[i] >> 4; } } void kyber_poly_decode1(kyber_poly_t r, const uint8_t in[32]) { int i, j; for (i = 0; i < 32; i++) { for (j = 0; j < 8; j++) { r[8*i + j] = ((in[i] >> j) & 1); } } } int kyber_poly_encode1(const kyber_poly_t a, uint8_t out[32]) { int i, j; for (i = 0; i < 32; i++) { out[i] = 0; for (j = 0; j < 8; j++) { if (a[8*i + j] >> 1) { error_print(); return -1; } out[i] |= (a[8*i + j] & 1) << j; } } return 1; } int kyber_cpa_key_generate_ex(KYBER_CPA_KEY *key, const uint8_t random[32]) { kyber_poly_t A[KYBER_K][KYBER_K]; kyber_poly_t s[KYBER_K]; kyber_poly_t e[KYBER_K]; kyber_poly_t t[KYBER_K]; uint8_t d[64]; uint8_t *rho = d; uint8_t *sigma = d + 32; uint8_t N = 0; int i,j; if (random) { memcpy(d, random, 32); } else { if (rand_bytes(d, 32) != 1) { error_print(); return -1; } } kyber_g_hash(d, 32, d); // AHat[i][j] = Parse(XOR(rho, j, i)) for (i = 0; i < KYBER_K; i++) { for (j = 0; j < KYBER_K; j++) { kyber_poly_uniform_sample(A[i][j], rho, j, i); } } // s[i] = CBD_eta1(PRF(sigma, N++)) for (i = 0; i < KYBER_K; i++) { kyber_poly_cbd_sample(s[i], KYBER_ETA1, sigma, N); N++; } // e[i] = CBD_eta1(PRF(sigma, N++)) for (i = 0; i < KYBER_K; i++) { kyber_poly_cbd_sample(e[i], KYBER_ETA1, sigma, N); N++; } // sHat = NTT(s) for (i = 0; i < KYBER_K; i++) { kyber_poly_ntt(s[i]); } // eHat = NTT(e) for (i = 0; i < KYBER_K; i++) { kyber_poly_ntt(e[i]); } for (i = 0; i < KYBER_K; i++) { kyber_poly_set_zero(t[i]); } // t = A*s + e for (i = 0; i < KYBER_K; i++) { for (j = 0; j < KYBER_K; j++) { kyber_poly_t tmp; kyber_poly_ntt_mul(tmp, A[i][j], s[j]); kyber_poly_add(t[i], t[i], tmp); } kyber_poly_add(t[i], t[i], e[i]); } // output (pk, sk) for (i = 0; i < KYBER_K; i++) { kyber_poly_encode12(t[i], key->public_key.t[i]); kyber_poly_encode12(s[i], key->s[i]); } memcpy(key->public_key.rho, rho, 32); gmssl_secure_clear(d, sizeof(d)); gmssl_secure_clear(s, sizeof(s)); gmssl_secure_clear(e, sizeof(e)); return 1; } void kyber_cpa_key_cleanup(KYBER_CPA_KEY *key) { if (key) { gmssl_secure_clear(key->s, sizeof(key->s)); } } int kyber_cpa_public_key_to_bytes(const KYBER_CPA_KEY *key, uint8_t **out, size_t *outlen) { if (!key || !outlen) { error_print(); return -1; } if (out && *out) { memcpy(*out, key->public_key.t, sizeof(key->public_key.t)); *out += sizeof(key->public_key.t); memcpy(*out, key->public_key.rho, sizeof(key->public_key.rho)); *out += sizeof(key->public_key.rho); } *outlen += sizeof(key->public_key.t); *outlen += sizeof(key->public_key.rho); return 1; } int kyber_cpa_public_key_from_bytes(KYBER_CPA_KEY *key, const uint8_t **in, size_t *inlen) { if (!key || !in || !(*in) || !inlen) { error_print(); return -1; } if (*inlen < sizeof(key->public_key.t) + sizeof(key->public_key.rho)) { error_print(); return -1; } memset(key, 0, sizeof(*key)); memcpy(key->public_key.t, *in, sizeof(key->public_key.t)); *in += sizeof(key->public_key.t); *inlen -= sizeof(key->public_key.t); memcpy(key->public_key.rho, *in, sizeof(key->public_key.rho)); *in += sizeof(key->public_key.rho); *inlen -= sizeof(key->public_key.rho); return 1; } int kyber_cpa_private_key_to_bytes(const KYBER_CPA_KEY *key, uint8_t **out, size_t *outlen) { if (!key || !outlen) { error_print(); return -1; } if (kyber_cpa_public_key_to_bytes(key, out, outlen) != 1) { error_print(); return -1; } if (out && *out) { memcpy(*out, key->s, sizeof(key->s)); } *outlen += sizeof(key->s); return 1; } int kyber_cpa_private_key_from_bytes(KYBER_CPA_KEY *key, const uint8_t **in, size_t *inlen) { if (!key || !in || !(*in) || !inlen) { error_print(); return -1; } memset(key, 0, sizeof(*key)); if (kyber_cpa_public_key_from_bytes(key, in, inlen) != 1) { error_print(); return -1; } if (*inlen < sizeof(key->s)) { error_print(); return -1; } memcpy(key->s, *in, sizeof(key->s)); *in += sizeof(key->s); *inlen -= sizeof(key->s); return 1; } int kyber_cpa_public_key_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_CPA_KEY *key) { int i; format_print(fp, fmt, ind, "%s\n", label); ind += 4; for (i = 0; i < KYBER_K; i++) { format_print(fp, fmt, ind, "ntt(t[%d])", i); format_bytes(fp, fmt, 0, "", key->public_key.t[i], 384); } format_bytes(fp, fmt, ind, "rho", key->public_key.rho, 32); return 1; } int kyber_cpa_private_key_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_CPA_KEY *key) { int i; format_print(fp, fmt, ind, "%s\n", label); ind += 4; kyber_cpa_public_key_print(fp, fmt, ind, "public_key", key); for (i = 0; i < KYBER_K; i++) { format_print(fp, fmt, ind, "ntt(s[%d])", i); format_bytes(fp, fmt, 0, "", key->s[i], 384); } return 1; } /* t = A * s + e u = A * r + e1 v = t * r + e2 + M v - u * s = (t * r + e2 + M) - (A * r + e1) * s = (A * s + e)*r + e2 + M - A*r*s - e1*s = A*r*s + e*r + e2 + M - A*r*s - e1*s = M + e*r + e2 - e1*s when A is matrix, s, r is vector: (A * s)^T * r == (A^T * r)^T * s == s^T * (A^T * r) */ int kyber_cpa_ciphertext_to_bytes(const KYBER_CPA_CIPHERTEXT *ciphertext, uint8_t **out, size_t *outlen) { if (!ciphertext || !outlen) { error_print(); return -1; } if (out && *out) { memcpy(*out, ciphertext->c1, sizeof(ciphertext->c1)); *out += sizeof(ciphertext->c1); memcpy(*out, ciphertext->c2, sizeof(ciphertext->c2)); *out += sizeof(ciphertext->c2); } *outlen += sizeof(ciphertext->c1); *outlen += sizeof(ciphertext->c2); return 1; } int kyber_cpa_ciphertext_from_bytes(KYBER_CPA_CIPHERTEXT *ciphertext, const uint8_t **in, size_t *inlen) { if (!ciphertext || !in || !(*in) || !inlen) { error_print(); return -1; } if (*inlen < sizeof(ciphertext->c1) + sizeof(ciphertext->c2)) { error_print(); return -1; } memcpy(ciphertext->c1, *in, sizeof(ciphertext->c1)); *in += sizeof(ciphertext->c1); *inlen -= sizeof(ciphertext->c1); memcpy(ciphertext->c2, *in, sizeof(ciphertext->c2)); *in += sizeof(ciphertext->c2); *inlen -= sizeof(ciphertext->c2); return 1; } int kyber_cpa_ciphertext_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_CPA_CIPHERTEXT *c) { int i; format_print(fp, fmt, ind, "%s\n", label); ind += 4; for (i = 0; i < KYBER_K; i++) { format_print(fp, fmt, ind, "c1[%d] (Compress10(u[%d]))", i, i); format_bytes(fp, fmt, 0, "", c->c1[i], KYBER_C1_SIZE); } format_bytes(fp, fmt, ind, "c2 (Compress4(v))", c->c2, KYBER_C2_SIZE); return 1; } int kyber_cpa_encrypt(const KYBER_CPA_KEY *key, const uint8_t in[32], const uint8_t rand[32], KYBER_CPA_CIPHERTEXT *out) { kyber_poly_t A[KYBER_K][KYBER_K]; kyber_poly_t t[KYBER_K]; kyber_poly_t r[KYBER_K]; kyber_poly_t u[KYBER_K]; kyber_poly_t e1[KYBER_K]; kyber_poly_t e2; kyber_poly_t v; kyber_poly_t m; int i, j; int N = 0; // tHat = Decode12(pk) for (i = 0; i < KYBER_K; i++) { kyber_poly_decode12(t[i], key->public_key.t[i]); } // AHat^T[i][j] = Parse(XOR(rho, i, j)) for (i = 0; i < KYBER_K; i++) { for (j = 0; j < KYBER_K; j++) { kyber_poly_uniform_sample(A[i][j], key->public_key.rho, i, j); } } // r[i] = CBD_eta1(PRF(rand, N++)) for (i = 0; i < KYBER_K; i++) { kyber_poly_cbd_sample(r[i], KYBER_ETA1, rand, N); N++; } // e1[i] = CBD_eta2(PRF(rand, N++)) for (i = 0; i < KYBER_K; i++) { kyber_poly_cbd_sample(e1[i], KYBER_ETA2, rand, N); N++; } // e2 = CBD_eta2(PRF(rand, N)) kyber_poly_cbd_sample(e2, KYBER_ETA2, rand, N); // rHat = NTT(r) for (i = 0; i < KYBER_K; i++) { kyber_poly_ntt(r[i]); } // u = NTT^-1(A^T * r) + e1 for (i = 0; i < KYBER_K; i++) { kyber_poly_set_zero(u[i]); } for (i = 0; i < KYBER_K; i++) { for (j = 0; j < KYBER_K; j++) { kyber_poly_t tmp; kyber_poly_ntt_mul(tmp, A[i][j], r[j]); kyber_poly_add(u[i], u[i], tmp); } kyber_poly_inv_ntt(u[i]); kyber_poly_add(u[i], u[i], e1[i]); } // v = NTT^-1( t^T * r ) + e2 + round(q/2)*m kyber_poly_set_zero(v); for (i = 0; i < KYBER_K; i++) { kyber_poly_t tmp; kyber_poly_ntt_mul(tmp, t[i], r[i]); kyber_poly_add(v, v, tmp); } kyber_poly_inv_ntt(v); kyber_poly_add(v, v, e2); if (0) { kyber_poly_t s[KYBER_K]; kyber_poly_t v_; kyber_poly_t tmp; for (i = 0; i < KYBER_K; i++) { kyber_poly_set_all(s[i], 1); } kyber_poly_set_zero(v_); for (i = 0; i < KYBER_K; i++) { kyber_poly_mul(tmp, s[i], u[i]); kyber_poly_add(v_, v_, tmp); } kyber_poly_sub(v_, v_, v); kyber_poly_to_signed(v_, v_); kyber_poly_print(stderr, 0, 0, "delta", v_); } kyber_poly_decode1(m, in); kyber_poly_decompress(m, 1, m); kyber_poly_add(v, v, m); // c1 = Encode10(Compress(u, 10)) for (i = 0; i < KYBER_K; i++) { kyber_poly_compress(u[i], 10, u[i]); kyber_poly_encode10(u[i], out->c1[i]); } // c2 = Encode4(Compress(v, 4)) kyber_poly_compress(v, 4, v); kyber_poly_encode4(v, out->c2); gmssl_secure_clear(m, sizeof(m)); gmssl_secure_clear(r, sizeof(r)); gmssl_secure_clear(e1, sizeof(e1)); gmssl_secure_clear(e2, sizeof(e2)); return 1; } int kyber_cpa_decrypt(const KYBER_CPA_KEY *key, const KYBER_CPA_CIPHERTEXT *in, uint8_t out[32]) { kyber_poly_t u[KYBER_K]; kyber_poly_t s[KYBER_K]; kyber_poly_t v; kyber_poly_t m; int i; // u = Decompress(Decode_du(c1), du) for (i = 0; i < KYBER_K; i++) { kyber_poly_decode10(u[i], in->c1[i]); kyber_poly_decompress(u[i], KYBER_DU, u[i]); } // v = Decompress(Decode_dv(c2), dv) kyber_poly_decode4(v, in->c2); kyber_poly_decompress(v, 4, v); // s = Decode_12(sk) for (i = 0; i < KYBER_K; i++) { kyber_poly_decode12(s[i], key->s[i]); } // m = Encode_1(Compress(v - NTT^-1(s^T * NTT(u)), 1)) for (i = 0; i < KYBER_K; i++) { kyber_poly_ntt(u[i]); } kyber_poly_set_zero(m); for (i = 0; i < KYBER_K; i++) { kyber_poly_t tmp; kyber_poly_ntt_mul(tmp, s[i], u[i]); kyber_poly_add(m, m, tmp); } kyber_poly_inv_ntt(m); kyber_poly_sub(m, v, m); kyber_poly_compress(m, 1, m); kyber_poly_encode1(m, out); gmssl_secure_clear(s, sizeof(s)); gmssl_secure_clear(m, sizeof(m)); return 1; } int kyber_key_generate_ex(KYBER_KEY *key, const uint8_t random[32]) { if (!key) { error_print(); return -1; } if (kyber_cpa_key_generate_ex(&key->cpa_key, random) != 1) { error_print(); return -1; } kyber_h_hash((uint8_t *)key, sizeof(KYBER_CPA_PUBLIC_KEY), key->pk_hash); if (rand_bytes(key->z, 32) != 1) { kyber_cpa_key_cleanup(&key->cpa_key); error_print(); return -1; } return 1; } void kyber_key_cleanup(KYBER_KEY *key) { if (key) { kyber_cpa_key_cleanup(&key->cpa_key); gmssl_secure_clear(key->z, sizeof(key->z)); } } int kyber_public_key_to_bytes(const KYBER_KEY *key, uint8_t **out, size_t *outlen) { if (!key || !outlen) { error_print(); return -1; } if (kyber_cpa_public_key_to_bytes(&key->cpa_key, out, outlen) != 1) { error_print(); return -1; } return 1; } int kyber_public_key_from_bytes(KYBER_KEY *key, const uint8_t **in, size_t *inlen) { if (!key || !in || !(*in) || !inlen) { error_print(); return -1; } memset(key, 0, sizeof(*key)); if (kyber_cpa_public_key_from_bytes(&key->cpa_key, in, inlen) != 1) { error_print(); return -1; } return 1; } int kyber_private_key_to_bytes(const KYBER_KEY *key, uint8_t **out, size_t *outlen) { if (!key || !outlen) { error_print(); return -1; } if (kyber_cpa_private_key_to_bytes(&key->cpa_key, out, outlen) != 1) { error_print(); return -1; } if (out && *out) { memcpy(*out, key->pk_hash, sizeof(key->pk_hash)); *out += sizeof(key->pk_hash); memcpy(*out, key->z, sizeof(key->z)); *out += sizeof(key->z); } *outlen += sizeof(key->pk_hash); *outlen += sizeof(key->z); return 1; } int kyber_private_key_from_bytes(KYBER_KEY *key, const uint8_t **in, size_t *inlen) { if (!key || !in || !(*in) || !inlen) { error_print(); return -1; } memset(key, 0, sizeof(*key)); if (kyber_cpa_private_key_from_bytes(&key->cpa_key, in, inlen) != 1) { error_print(); return -1; } if (*inlen < sizeof(key->pk_hash) + sizeof(key->z)) { error_print(); return -1; } memcpy(key->pk_hash, *in, sizeof(key->pk_hash)); *in += sizeof(key->pk_hash); *inlen -= sizeof(key->pk_hash); memcpy(key->z, *in, sizeof(key->z)); *in += sizeof(key->z); *inlen -= sizeof(key->z); return 1; } int kyber_public_key_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_KEY *key) { return kyber_cpa_public_key_print(fp, fmt, ind, label, &key->cpa_key); } int kyber_private_key_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_KEY *key) { kyber_cpa_private_key_print(fp, fmt, ind, label, &key->cpa_key); ind += 4; format_bytes(fp, fmt, ind, "publicKeyHash", key->pk_hash, 32); format_bytes(fp, fmt, ind, "z", key->z, 32); return 1; } int kyber_encap(const KYBER_KEY *key, KYBER_CIPHERTEXT *c, uint8_t K[32]) { uint8_t m_h[64]; uint8_t K_r[64]; uint8_t *m = m_h; uint8_t *h = m_h + 32; uint8_t *K_ = K_r; uint8_t *r = K_r + 32; // m = rand(32) if (rand_bytes(m, 32) != 1) { error_print(); return -1; } // m = H(m) kyber_h_hash(m, 32, m); // h = H(pk) kyber_h_hash((const uint8_t *)key, sizeof(KYBER_PUBLIC_KEY), h); // (K_, r) = G(m || H(pk)) kyber_g_hash(m_h, 64, K_r); // c = Kyber.CPA.Enc(pk, m, r) if (kyber_cpa_encrypt(&key->cpa_key, m, r, c) != 1) { error_print(); return -1; } // H(c) kyber_h_hash((uint8_t *)c, sizeof(KYBER_CIPHERTEXT), r); // K = KDF(K_ || H(c)) kyber_kdf(K_r, K); gmssl_secure_clear(m_h, sizeof(m_h)); gmssl_secure_clear(K_r, sizeof(K_r)); return 1; } int kyber_decap(const KYBER_KEY *key, const KYBER_CIPHERTEXT *c, uint8_t K[32]) { uint8_t m_h[64]; uint8_t K_r[64]; uint8_t *m = m_h; uint8_t *h = m_h + 32; uint8_t *K_ = K_r; uint8_t *r = K_r + 32; KYBER_CIPHERTEXT c_; uint8_t c_hash[32]; // m' = Dec(sk, c) if (kyber_cpa_decrypt(&key->cpa_key, c, m) != 1) { error_print(); return -1; } // h = H(pk) memcpy(h, key->pk_hash, 32); // (K_, r) = G(m || h) kyber_g_hash(m_h, 64, K_r); // c_ = CPA.Enc(pk, m, r) if (kyber_cpa_encrypt(&key->cpa_key, m, r, &c_) != 1) { gmssl_secure_clear(m_h, sizeof(m_h)); gmssl_secure_clear(K_r, sizeof(K_r)); error_print(); return -1; } // H(c) kyber_h_hash((uint8_t *)c, sizeof(KYBER_CIPHERTEXT), r); if (memcmp(c, &c_, sizeof(KYBER_CIPHERTEXT)) == 0) { // K = KDF(K_||H(c)) kyber_kdf(K_r, K); } else { error_print(); memcpy(K_r, key->z, 32); // TODO: const time kyber_kdf(K_r, K); } gmssl_secure_clear(m_h, sizeof(m_h)); gmssl_secure_clear(K_r, sizeof(K_r)); return 1; } int kyber_ciphertext_to_bytes(const KYBER_CIPHERTEXT *ciphertext, uint8_t **out, size_t *outlen) { if (kyber_cpa_ciphertext_to_bytes(ciphertext, out, outlen) != 1) { error_print(); return -1; } return 1; } int kyber_ciphertext_from_bytes(KYBER_CIPHERTEXT *ciphertext, const uint8_t **in, size_t *inlen) { if (kyber_cpa_ciphertext_from_bytes(ciphertext, in, inlen) != 1) { error_print(); return -1; } return 1; } int kyber_ciphertext_print(FILE *fp, int fmt, int ind, const char *label, const KYBER_CIPHERTEXT *c) { return kyber_cpa_ciphertext_print(fp, fmt, ind, label, c); }