Commit Graph

356 Commits

Author SHA1 Message Date
Malte
626e2fc27a rand: added a nessary but missing comment on the big int min/max 2014-05-12 20:32:34 +02:00
Malte
0bdddc12e7 rand: Refactoring finished
now there are only 4 static functions left:
static mp_digit read_int_dev_random();
static mp_digit read_int_dev_urandom();
static mp_digit make_small_int(mp_digit random_int, int* sign);
static mp_digit make_big_int(mp_digit random_int, int* sign);
Every function is used twice.
the next goal to copy free code is to make a single function
with function pointer out of these 4:
pb_poly *ntru_get_urnd_poly_small(ntru_context *ctx);
pb_poly *ntru_get_rnd_poly_small(ntru_context *ctx);
pb_poly *ntru_get_urnd_poly_big(ntru_context *ctx);
pb_poly *ntru_get_rnd_poly_big(ntru_context *ctx);
But this need to be checkt by a other group member
2014-05-12 20:32:34 +02:00
Malte
21022c9ff8 rand: extractet some double code into new functions
this is the first step, in the next one i a going to remove
static mp_digit get_urnd_int_small(int *sign);
static mp_digit get_rnd_int_small(int *sign);
static mp_digit get_urnd_int_big(int *sign);
static mp_digit get_rnd_int_big(int *sign);

RAND: merged a conflict
2014-05-12 20:32:14 +02:00
60dbab44f5 POLY: fix syntax error within comment
RAND: merged conflict
2014-05-12 20:29:59 +02:00
Malte
90a01a03ec rand: getting small and big polynoms is working
pb_poly *ntru_get_urnd_poly_big(ntru_context *ctx)
pb_poly *ntru_get_rnd_poly_big(ntru_context *ctx)
are written but the testing isen working and
i think it is a bad idea to not use function poniters
at the moment we have about 4 functions that do all the same thing
and differ only in the subfunction call.
But at the moment i cat decide of we shold use
function pinter

RAND: merged conflict
2014-05-12 20:28:22 +02:00
99ebda181a POLY: fix pb_inverse_poly_q()
Should be correct now. Had to add get_degree(), because
pb_clamp() in conjunction with pb_cmp() does not give
expected results, see https://github.com/libtom/libtompoly/issues/3
...so don't use it.
2014-05-12 20:17:42 +02:00
f98be67dd3 BUILD: fix possible linker errors 2014-05-12 20:17:42 +02:00
85c48647f5 POLY: cleanup pb_inverse_poly_q()
Also avoid side effects.
2014-05-12 20:17:42 +02:00
6990193dcd POLY: cleanup pb_starmultiply()
* avoid side effects
* use MP_DIV instead of MP_MOD
* move mp_modulus initialization to outer scope
2014-05-12 20:17:42 +02:00
01785678f0 DOC: fix doxygen comment in delete_polynom() 2014-05-12 20:17:42 +02:00
ed1fb0f0a9 POLY: add erase_polynom() function 2014-05-12 20:17:42 +02:00
f8b1649279 POLY: use mp_neg() instead of directly modifying struct 2014-05-12 20:17:42 +02:00
5c85862d12 POLY: improve error handling
Use MP_ADD, MP_MUL, PB_ADD, PB_MUL etc instead of the mp_add,...
functions to make use of error handling.
2014-05-12 20:17:42 +02:00
85ba70a9c5 POLY: first try of inverting polynomials 2014-05-12 20:17:42 +02:00
3184e9093f POLY: rm unnecessary cast 2014-05-12 20:17:42 +02:00
3e6345cd47 POLY: fix typo 2014-05-12 20:17:42 +02:00
739feea0fe BUILD: fix linker errors when playing in main.c 2014-05-12 20:17:42 +02:00
c4f6ad4504 POLY: fix error messages 2014-05-12 20:17:42 +02:00
2d2ccfbf3f POLY: first try of pb_starmultiply() 2014-05-12 20:17:42 +02:00
0d179a0e7d POLY: don't clamp polyonmial in build_polynom()
Otherwise we might hit problems when using this as an
out-polynom in a arithmetic functions. The caller can clamp
it himself, if he needs so.
2014-05-12 20:17:42 +02:00
f8cac1553f ALL: set context members to unsigned int 2014-05-12 20:17:42 +02:00
fc4ee3b70b POLY: add build_polynom() method
We can build a polynom via an array of integers or just an empty
one, so that it is initialized and properly allocated.
2014-05-12 20:17:42 +02:00
be28e18cfb DOC: fix typo 2014-05-12 20:17:42 +02:00
66da54b3a3 BUILD: ignore -Wunused-parameter
Can happen in callback functions and so forth.
2014-05-12 20:17:42 +02:00
417ce9c0f2 RAND: use unsigned long instead of mp_digit
if we use mp_set_int() instead of mp_set(), then we can use
full unsigned long integers instead of single digits. This
seems a lot safer, especially for future versions of the
random algorithm.

RAND: merged a conflict
2014-05-12 20:16:25 +02:00
0470a5fa6e POLY: use size_t 2014-05-12 20:13:22 +02:00
22f713fa98 DOC: improve memory handling instructions 2014-05-12 20:13:22 +02:00
Malte
04d5d6d38f rand:ntru_get_rnd_poly_small: written a function to generate a random polynom
like get_urnd_int_small but with the random source from /dev/random
instead of /dev/urandom
2014-05-12 20:13:22 +02:00
Malte
71b8f4cbeb Added static mp_digit get_rnd_int_small(int *sign)
but it takes about ~40minutes to generate a x^500
polynom with /dev/random.
2014-05-12 20:13:22 +02:00
Christoph Prüßner
f8f7634c84 DEC
ntru_decrypt now uses pb_normalize
2014-05-12 13:49:00 +02:00
Christoph Prüßner
4030335661 POLY: implemented pb_normalize
normalizes a polynom by defining a numerical range
for each factor of a polynom.
2014-05-12 13:46:59 +02:00
Anton Oster
9ff66b8555 ENC: added ecrypt func 2014-05-12 10:33:04 +02:00
Anton Oster
e41438476d rename files and write pb_encrypt func 2014-05-08 12:50:30 +02:00
Alexander Rolfes
1412ba0d1a CODE: Fixed missing bracket 2014-05-05 21:56:44 +02:00
Alexander Rolfes
01a08fdafa CODE: Rename of key-Parameters
Renamed private_key and Fp to priv_key and priv_key_inv
2014-05-05 21:53:41 +02:00
Alexander Rolfes
dd73a662a0 DOXYGEN: Documentation of ntru_decrypt function
Removed unnecessary comments inside of function and wrote
a Doxygen compliant comment above the function
2014-05-05 21:51:58 +02:00
Alexander Rolfes
eb83c04b93 Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
Conflicts:
	src/ntru_decrypt.c
	src/ntru_decrypt.h
2014-05-05 20:32:23 +02:00
Christoph Prüßner
74a3fa88c7 moved some lines 2014-05-05 13:58:53 +02:00
Christoph Prüßner
4e6bb38260 numerous fixes 2014-05-03 17:18:23 +02:00
Christoph Prüßner
c326654f14 Merge remote-tracking branch 'OberMaster/master' 2014-05-03 16:13:25 +02:00
Christoph Prüßner
5254cf93f3 changed return type of ntru_decrypt, implemented second starmultiply,
fixed numerical operations to mp_operations
2014-05-03 16:02:09 +02:00
Christoph Prüßner
fa97531eac implemented the coefficient shift into a range of -q/2 and q/2 2014-05-03 14:57:05 +02:00
Christoph Prüßner
b4a7870e97 fixed pointer arithmetical mistakes 2014-05-03 14:07:12 +02:00
Christoph Prüßner
7349c7e8be used pb_starmultiply for the first multiplication and added p, q, N 2014-05-03 14:03:03 +02:00
Christoph Prüßner
4de50e2390 removed redundant multiplication functions 2014-05-03 13:51:00 +02:00
Alexander Rolfes
b4ba4112e5 Revert "first implementation of "pseudocode algorithm" (ms_corourke.pdf)"
This reverts commit ecdc32f5e0.
2014-05-03 13:32:59 +02:00
Alexander Rolfes
916c5f6a96 Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
Fixed .gitignore with .project
2014-05-03 13:22:02 +02:00
Christoph Prüßner
06d359936a deleted .project file 2014-05-03 13:19:25 +02:00
Christoph Prüßner
4d438bb925 changed gitignore 2014-05-03 13:18:15 +02:00
Alexander Rolfes
b44a1892a2 Merge branch 'master' of ssh://gitlab.hasufell.de:22022/Goldi/quantumcrypto
Added Basecode for Encryption
2014-05-03 13:15:45 +02:00