-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathproblem62.py
More file actions
243 lines (184 loc) · 7.02 KB
/
problem62.py
File metadata and controls
243 lines (184 loc) · 7.02 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
from copy import copy
from fractions import Fraction
from operator import itemgetter
import random
import string
from typing import Iterable, List, Tuple, Union
from diffie_hellman import DiffieHellman
from ecdsa import ECDHKeypair, ECDSASignature, hash_msg
from elliptic_curve import WeierstrassCurve
from numtheory import mod_divide, mod_inverse
def create_dh() -> DiffieHellman:
p = 233970423115425145524320034830162017933
curve = WeierstrassCurve(p, -95051, 11279326)
point = (182, 85518893674295321206118380980485522083)
point_order = 29246302889428143187362802287225875743
return DiffieHellman(curve, point, point_order)
def ecdsa_sign_biased(msg: str, keypair: ECDHKeypair):
n = keypair.config.n
k = keypair.config.rand_scalar()
k = (k >> 8) << 8 # Mask off the last 8 bits as suggested
r = keypair.config.scalar_mult_point(k)[0]
s = mod_divide(hash_msg(msg) + keypair.secret * r, k, n)
return ECDSASignature(r, s)
Scalar = Union[int, Fraction, float]
Vector = List[Scalar]
def scalar_product(u: Vector, a: Scalar) -> Vector:
return [a * u[i] for i in range(0, len(u))]
def inner_product(u: Vector, v: Vector) -> Scalar:
assert len(u) == len(v)
return sum(u[i] * v[i] for i in range(0, len(u)))
def test_inner_product():
assert inner_product([1, 2], [2, 3]) == 8
def test_scalar_product():
assert scalar_product([1, 2], 3) == [3, 6]
def proj(u: Vector, v: Vector) -> Vector:
if all(x == 0 for x in u):
return [Fraction(0)] * len(u)
return scalar_product(u, inner_product(v, u) / inner_product(u, u))
def vec_sum(vecs: Iterable[Vector]):
assert len(vecs) > 0, 'Cannot sum over empty vectors'
q = vecs[0]
for vec in vecs[1:]:
assert len(vec) == len(q)
q = [q[i] + vec[i] for i in range(0, len(q))]
return q
def vec_subtract(vec: Vector, *vecs: Vector):
q = copy(vec)
for v in vecs:
assert len(v) == len(vec)
q = [q[i] - v[i] for i in range(0, len(vec))]
return q
def graham_schmidt(b: List[Vector]) -> List[Vector]:
q = [Fraction(0)] * len(b)
for i, v in enumerate(b):
sum_list = [[Fraction(0)] * len(v)] + [proj(u, v) for u in q[:i]]
q[i] = vec_subtract(v, vec_sum(sum_list))
return q
def test_graham_schmidt():
# https://en.wikipedia.org/wiki/Gram%E2%80%93Schmidt_process#Example
result = graham_schmidt([[3, 1], [2, 2]])
assert result == [[3, 1], [Fraction(-2, 5), Fraction(6, 5)]]
u1, u2 = result
assert inner_product(u1, u2) == 0
def lll_reduction(b: List[Vector], delta: Fraction=Fraction(99, 100)):
b = copy(b)
q = [None] * len(b)
B = [None] * len(b)
q[0] = b[0] # Orthogonal basis
B[0] = inner_product(q[0], q[0]) # Length of orthogonal basis vectors
n = len(b)
k = 1
k_max = 0
mu = {} # Projection of v onto u
while k < n:
# 2.6.3 LLL - Step 2 - Incremental Graham-Schmidt
if k > k_max:
k_max = k
q[k] = b[k]
for j in range(k):
mu[(k, j)] = Fraction(inner_product(b[k], q[j]), B[j])
q[k] = vec_subtract(q[k], scalar_product(q[j], mu[(k, j)]))
B[k] = inner_product(q[k], q[k])
# 2.6.3 LLL - Sub-algorithm RED
def reduce_basis(k, l):
m = mu[(k, l)]
if abs(m) <= Fraction(1, 2):
return
b[k] = vec_subtract(b[k], scalar_product(b[l], round(m)))
mu[(k, l)] -= round(m)
for i in range(0, l):
mu[(k, i)] -= round(m) * mu[(l, i)]
# 2.6.3 LLL - Sub-algorithm SWAP
def swap(k):
b[k], b[k - 1] = b[k - 1], b[k]
for j in range(k - 2, -1, -1):
mu[(k, j)], mu[(k - 1, j)] = mu[(k - 1, j)], mu[(k, j)]
m = mu[(k, k - 1)]
B_ = B[k] + m**2 * B[k - 1]
mu[(k, k - 1)] = Fraction(m * B[k - 1], B_)
b_ = q[k - 1]
# b^{*}_{k - 1} = b^{*}_{k} + \mu b
q[k - 1] = vec_sum([q[k], scalar_product(b_, m)])
q[k] = vec_sum([
scalar_product(q[k], -mu[(k, k - 1)]),
scalar_product(b_, Fraction(B[k], B_))
])
B[k] = Fraction(B[k - 1] * B[k], B_)
B[k - 1] = B_
for i in range(k + 1, k_max + 1):
t = mu[(i, k)]
mu[(i, k)] = mu[(i, k - 1)] - m * t
mu[(i, k - 1)] = t + mu[(k, k - 1)] * mu[(i, k)]
# 2.6.3 LLL - Step 3
while True:
reduce_basis(k, k - 1)
if B[k] < (delta - mu[(k, k - 1)]**2) * B[k - 1]:
# 2.6.3 LLL - Sub-algorithm SWAP
swap(k)
k = max(1, k - 1)
# Go to step 3 (repeat loop)
else:
for l in range(k - 2, -1, -1):
reduce_basis(k, l)
k += 1
# Go to step 4 (break loop)
break
return b
def test_lll_reduction_works():
test_basis = [
[ -2, 0, 2, 0],
[ Fraction(1, 2), -1, 0, 0],
[ -1, 0, -2, Fraction(1, 2)],
[ -1, 1, 1, 2],
]
expected_result = [
[ 1/2, -1, 0, 0],
[ -1, 0, -2, 1/2],
[-1/2, 0, 1, 2],
[-3/2, -1, 2, 0],
]
assert lll_reduction(test_basis) == expected_result
def test_lll_reduction_minimum_polynomial():
# this is sqrt(2) + sqrt(3)
# approximations in the ith row is precision * alpha^{i}
test_basis = [
[1, 0, 0, 0, 0, 10000],
[0, 1, 0, 0, 0, 31462],
[0, 0, 1, 0, 0, 98989],
[0, 0, 0, 1, 0, 311448],
[0, 0, 0, 0, 1, 979897]
]
# corresponds with sqrt(2) + sqrt(3) minpoly being x^4 - 10x^2 + 1
assert lll_reduction(test_basis)[0][0:5] == [1, 0, -10, 0, 1]
def test_lll_against_biased_nonce_attack():
dh = create_dh()
chars = string.ascii_lowercase + string.digits
alice_keypair = dh.generate_keypair()
num_signatures = 30
message_length = 40
l = 8 # Number of biased bits
q = dh.config.n
attacker_pairs: List[Tuple[int, int]] = []
for _ in range(num_signatures):
msg = ''.join(random.choices(chars, k=message_length))
sig = ecdsa_sign_biased(msg, alice_keypair)
r, s = sig.r, sig.s
t = mod_divide(r, s * 2**l, q)
u = mod_divide(hash_msg(msg), (-s * 2**l), q)
attacker_pairs.append((u, t))
ct = Fraction(1, 2**l)
cu = Fraction(q, 2**l)
dim = len(attacker_pairs) + 2
basis = []
for i in range(len(attacker_pairs)):
vec = [0] * dim
vec[i] = q
basis.append(vec)
basis.append(list(map(itemgetter(1), attacker_pairs)) + [ct, 0])
basis.append(list(map(itemgetter(0), attacker_pairs)) + [0, cu])
reduction = lll_reduction(basis)
candidate_rows = [v for v in reduction if v[dim - 1] == cu]
candidate_keys = [-1 * v[dim - 2] * 2**l for v in candidate_rows]
assert alice_keypair.secret in candidate_keys, \
f'Should have seen {alice_keypair.secret} in {candidate_keys}'