Malte
626e2fc27a
rand: added a nessary but missing comment on the big int min/max
2014-05-12 20:32:34 +02:00
Malte
0bdddc12e7
rand: Refactoring finished
...
now there are only 4 static functions left:
static mp_digit read_int_dev_random();
static mp_digit read_int_dev_urandom();
static mp_digit make_small_int(mp_digit random_int, int* sign);
static mp_digit make_big_int(mp_digit random_int, int* sign);
Every function is used twice.
the next goal to copy free code is to make a single function
with function pointer out of these 4:
pb_poly *ntru_get_urnd_poly_small(ntru_context *ctx);
pb_poly *ntru_get_rnd_poly_small(ntru_context *ctx);
pb_poly *ntru_get_urnd_poly_big(ntru_context *ctx);
pb_poly *ntru_get_rnd_poly_big(ntru_context *ctx);
But this need to be checkt by a other group member
2014-05-12 20:32:34 +02:00
Malte
21022c9ff8
rand: extractet some double code into new functions
...
this is the first step, in the next one i a going to remove
static mp_digit get_urnd_int_small(int *sign);
static mp_digit get_rnd_int_small(int *sign);
static mp_digit get_urnd_int_big(int *sign);
static mp_digit get_rnd_int_big(int *sign);
RAND: merged a conflict
2014-05-12 20:32:14 +02:00
60dbab44f5
POLY: fix syntax error within comment
...
RAND: merged conflict
2014-05-12 20:29:59 +02:00
Malte
90a01a03ec
rand: getting small and big polynoms is working
...
pb_poly *ntru_get_urnd_poly_big(ntru_context *ctx)
pb_poly *ntru_get_rnd_poly_big(ntru_context *ctx)
are written but the testing isen working and
i think it is a bad idea to not use function poniters
at the moment we have about 4 functions that do all the same thing
and differ only in the subfunction call.
But at the moment i cat decide of we shold use
function pinter
RAND: merged conflict
2014-05-12 20:28:22 +02:00
99ebda181a
POLY: fix pb_inverse_poly_q()
...
Should be correct now. Had to add get_degree(), because
pb_clamp() in conjunction with pb_cmp() does not give
expected results, see https://github.com/libtom/libtompoly/issues/3
...so don't use it.
2014-05-12 20:17:42 +02:00
f98be67dd3
BUILD: fix possible linker errors
2014-05-12 20:17:42 +02:00
85c48647f5
POLY: cleanup pb_inverse_poly_q()
...
Also avoid side effects.
2014-05-12 20:17:42 +02:00
6990193dcd
POLY: cleanup pb_starmultiply()
...
* avoid side effects
* use MP_DIV instead of MP_MOD
* move mp_modulus initialization to outer scope
2014-05-12 20:17:42 +02:00
01785678f0
DOC: fix doxygen comment in delete_polynom()
2014-05-12 20:17:42 +02:00
ed1fb0f0a9
POLY: add erase_polynom() function
2014-05-12 20:17:42 +02:00
f8b1649279
POLY: use mp_neg() instead of directly modifying struct
2014-05-12 20:17:42 +02:00
5c85862d12
POLY: improve error handling
...
Use MP_ADD, MP_MUL, PB_ADD, PB_MUL etc instead of the mp_add,...
functions to make use of error handling.
2014-05-12 20:17:42 +02:00
85ba70a9c5
POLY: first try of inverting polynomials
2014-05-12 20:17:42 +02:00
3184e9093f
POLY: rm unnecessary cast
2014-05-12 20:17:42 +02:00
3e6345cd47
POLY: fix typo
2014-05-12 20:17:42 +02:00
739feea0fe
BUILD: fix linker errors when playing in main.c
2014-05-12 20:17:42 +02:00
c4f6ad4504
POLY: fix error messages
2014-05-12 20:17:42 +02:00
2d2ccfbf3f
POLY: first try of pb_starmultiply()
2014-05-12 20:17:42 +02:00
0d179a0e7d
POLY: don't clamp polyonmial in build_polynom()
...
Otherwise we might hit problems when using this as an
out-polynom in a arithmetic functions. The caller can clamp
it himself, if he needs so.
2014-05-12 20:17:42 +02:00
f8cac1553f
ALL: set context members to unsigned int
2014-05-12 20:17:42 +02:00
fc4ee3b70b
POLY: add build_polynom() method
...
We can build a polynom via an array of integers or just an empty
one, so that it is initialized and properly allocated.
2014-05-12 20:17:42 +02:00
be28e18cfb
DOC: fix typo
2014-05-12 20:17:42 +02:00
66da54b3a3
BUILD: ignore -Wunused-parameter
...
Can happen in callback functions and so forth.
2014-05-12 20:17:42 +02:00
417ce9c0f2
RAND: use unsigned long instead of mp_digit
...
if we use mp_set_int() instead of mp_set(), then we can use
full unsigned long integers instead of single digits. This
seems a lot safer, especially for future versions of the
random algorithm.
RAND: merged a conflict
2014-05-12 20:16:25 +02:00
0470a5fa6e
POLY: use size_t
2014-05-12 20:13:22 +02:00
22f713fa98
DOC: improve memory handling instructions
2014-05-12 20:13:22 +02:00
Malte
04d5d6d38f
rand:ntru_get_rnd_poly_small: written a function to generate a random polynom
...
like get_urnd_int_small but with the random source from /dev/random
instead of /dev/urandom
2014-05-12 20:13:22 +02:00
Malte
71b8f4cbeb
Added static mp_digit get_rnd_int_small(int *sign)
...
but it takes about ~40minutes to generate a x^500
polynom with /dev/random.
2014-05-12 20:13:22 +02:00
Christoph Prüßner
f8f7634c84
DEC
...
ntru_decrypt now uses pb_normalize
2014-05-12 13:49:00 +02:00
Christoph Prüßner
4030335661
POLY: implemented pb_normalize
...
normalizes a polynom by defining a numerical range
for each factor of a polynom.
2014-05-12 13:46:59 +02:00
Anton Oster
9ff66b8555
ENC: added ecrypt func
2014-05-12 10:33:04 +02:00
Anton Oster
e41438476d
rename files and write pb_encrypt func
2014-05-08 12:50:30 +02:00
Alexander Rolfes
1412ba0d1a
CODE: Fixed missing bracket
2014-05-05 21:56:44 +02:00
Alexander Rolfes
01a08fdafa
CODE: Rename of key-Parameters
...
Renamed private_key and Fp to priv_key and priv_key_inv
2014-05-05 21:53:41 +02:00
Alexander Rolfes
dd73a662a0
DOXYGEN: Documentation of ntru_decrypt function
...
Removed unnecessary comments inside of function and wrote
a Doxygen compliant comment above the function
2014-05-05 21:51:58 +02:00
Alexander Rolfes
eb83c04b93
Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
...
Conflicts:
src/ntru_decrypt.c
src/ntru_decrypt.h
2014-05-05 20:32:23 +02:00
Christoph Prüßner
74a3fa88c7
moved some lines
2014-05-05 13:58:53 +02:00
Christoph Prüßner
4e6bb38260
numerous fixes
2014-05-03 17:18:23 +02:00
Christoph Prüßner
c326654f14
Merge remote-tracking branch 'OberMaster/master'
2014-05-03 16:13:25 +02:00
Christoph Prüßner
5254cf93f3
changed return type of ntru_decrypt, implemented second starmultiply,
...
fixed numerical operations to mp_operations
2014-05-03 16:02:09 +02:00
Christoph Prüßner
fa97531eac
implemented the coefficient shift into a range of -q/2 and q/2
2014-05-03 14:57:05 +02:00
Christoph Prüßner
b4a7870e97
fixed pointer arithmetical mistakes
2014-05-03 14:07:12 +02:00
Christoph Prüßner
7349c7e8be
used pb_starmultiply for the first multiplication and added p, q, N
2014-05-03 14:03:03 +02:00
Christoph Prüßner
4de50e2390
removed redundant multiplication functions
2014-05-03 13:51:00 +02:00
Alexander Rolfes
b4ba4112e5
Revert "first implementation of "pseudocode algorithm" (ms_corourke.pdf)"
...
This reverts commit ecdc32f5e0
.
2014-05-03 13:32:59 +02:00
Alexander Rolfes
916c5f6a96
Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
...
Fixed .gitignore with .project
2014-05-03 13:22:02 +02:00
Christoph Prüßner
06d359936a
deleted .project file
2014-05-03 13:19:25 +02:00
Christoph Prüßner
4d438bb925
changed gitignore
2014-05-03 13:18:15 +02:00
Alexander Rolfes
b44a1892a2
Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
...
Added Basecode for Encryption
2014-05-03 13:15:45 +02:00