uint8_t ntru_encrypt(uint8_t *msg, uint16_t msg_len, NtruEncPubKey *pub, const NtruEncParams *params, NtruRandContext *rand_ctx, uint8_t *enc) { uint16_t N = params->N; uint16_t q = params->q; uint16_t db = params->db; uint16_t max_len_bytes = ntru_max_msg_len(params); uint16_t dm0 = params->dm0; if (max_len_bytes > 255) return NTRU_ERR_INVALID_MAX_LEN; if (msg_len > max_len_bytes) return NTRU_ERR_MSG_TOO_LONG; for (;;) { /* M = b|octL|msg|p0 */ uint8_t b[db/8]; if (ntru_rand_generate(b, db/8, rand_ctx) != NTRU_SUCCESS) return NTRU_ERR_PRNG; uint16_t M_len = db/8 + 1 + max_len_bytes + 1; uint8_t M[M_len]; memcpy(&M, &b, db/8); uint8_t *M_head = (uint8_t*)&M + db/8; *M_head = msg_len; M_head++; memcpy(M_head, msg, msg_len); M_head += msg_len; memset(M_head, 0, max_len_bytes+1-msg_len); NtruIntPoly mtrin; ntru_from_sves((uint8_t*)&M, M_len, N, &mtrin); uint16_t blen = params->db / 8; uint16_t sdata_len = sizeof(params->oid) + msg_len + blen + blen; uint8_t sdata[sdata_len]; ntru_get_seed(msg, msg_len, &pub->h, (uint8_t*)&b, params, (uint8_t*)&sdata); NtruIntPoly R; NtruPrivPoly r; ntru_gen_blind_poly((uint8_t*)&sdata, sdata_len, params, &r); ntru_mult_priv(&r, &pub->h, &R, q); uint16_t oR4_len = (N*2+7) / 8; uint8_t oR4[oR4_len]; ntru_to_arr4(&R, (uint8_t*)&oR4); NtruIntPoly mask; ntru_MGF((uint8_t*)&oR4, oR4_len, params, &mask); ntru_add_int(&mtrin, &mask); ntru_mod3(&mtrin); if (!ntru_check_rep_weight(&mtrin, dm0)) continue; ntru_add_int(&R, &mtrin); ntru_to_arr(&R, q, enc); return NTRU_SUCCESS; } }
uint8_t ntru_decrypt(uint8_t *enc, NtruEncKeyPair *kp, const NtruEncParams *params, uint8_t *dec, uint16_t *dec_len) { ntru_set_optimized_impl(); uint16_t N = params->N; uint16_t q = params->q; uint16_t db = params->db; uint16_t max_len_bytes = ntru_max_msg_len(params); uint16_t dm0 = params->dm0; if (q & (q-1)) /* check that modulus is a power of 2 */ return NTRU_ERR_INVALID_PARAM; if (max_len_bytes > 255) return NTRU_ERR_INVALID_MAX_LEN; uint16_t blen = db / 8; uint8_t retcode = NTRU_SUCCESS; NtruIntPoly e; ntru_from_arr(enc, N, q, &e); NtruIntPoly ci; ntru_decrypt_poly(&e, &kp->priv, q, &ci); if (!ntru_check_rep_weight(&ci, dm0) && retcode==NTRU_SUCCESS) retcode = NTRU_ERR_DM0_VIOLATION; NtruIntPoly cR = e; ntru_sub(&cR, &ci); ntru_mod_mask(&cR, q-1); uint16_t coR4_len = (N*2+7) / 8; uint8_t coR4[coR4_len]; ntru_to_arr4(&cR, (uint8_t*)&coR4); NtruIntPoly mask; ntru_MGF((uint8_t*)&coR4, coR4_len, params, &mask); NtruIntPoly cmtrin = ci; ntru_sub(&cmtrin, &mask); ntru_mod3(&cmtrin); uint16_t cM_len_bits = (N*3+1) / 2; uint16_t cM_len_bytes = (cM_len_bits+7) / 8; uint8_t cM[cM_len_bytes+3]; /* 3 extra bytes for ntru_to_sves() */ if (!ntru_to_sves(&cmtrin, (uint8_t*)&cM) && retcode==NTRU_SUCCESS) retcode = NTRU_ERR_INVALID_ENCODING; uint8_t cb[blen]; uint8_t *cM_head = cM; memcpy(cb, cM_head, blen); cM_head += blen; uint8_t cl = *cM_head; /* llen=1, so read one byte */ cM_head++; if (cl > max_len_bytes) { if (retcode == NTRU_SUCCESS) retcode = NTRU_ERR_MSG_TOO_LONG; cl = max_len_bytes; /* prevent buffer overrun in memcpy below */ } memcpy(dec, cM_head, cl); cM_head += cl; uint8_t *i; for (i=cM_head; i<cM+cM_len_bytes; i++) if (*i && retcode==NTRU_SUCCESS) retcode = NTRU_ERR_NO_ZERO_PAD; uint16_t sdata_len = sizeof(params->oid) + cl + blen + db/8; uint8_t sdata[sdata_len]; ntru_get_seed(dec, cl, &kp->pub.h, (uint8_t*)&cb, params, (uint8_t*)&sdata); NtruPrivPoly cr; ntru_gen_blind_poly((uint8_t*)&sdata, sdata_len, params, &cr); NtruIntPoly cR_prime; ntru_mult_priv(&cr, &kp->pub.h, &cR_prime, q-1); if (!ntru_equals_int(&cR_prime, &cR) && retcode==NTRU_SUCCESS) retcode = NTRU_ERR_INVALID_ENCODING; *dec_len = cl; return retcode; }