Skip to content

Commit 6304e45

Browse files
jonasnickdeadalnix
authored andcommitted
schnorrsig: Add BIP-340 nonce function
Summary: This is a partial backport of secp256k1 [[bitcoin-core/secp256k1#558 | PR558]] : bitcoin-core/secp256k1@7332d2d Depends on D7646 Test Plan: ninja check-secp256k1 Reviewers: #bitcoin_abc, Fabien Reviewed By: #bitcoin_abc, Fabien Differential Revision: https://reviews.bitcoinabc.org/D7647
1 parent 7cf7dc4 commit 6304e45

File tree

5 files changed

+226
-3
lines changed

5 files changed

+226
-3
lines changed

src/secp256k1/include/secp256k1_schnorrsig.h

+49-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,55 @@
88
extern "C" {
99
#endif
1010

11-
/* TODO */
11+
/** This module implements a variant of Schnorr signatures compliant with
12+
* Bitcoin Improvement Proposal 340 "Schnorr Signatures for secp256k1"
13+
* (https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki).
14+
*/
15+
16+
/** A pointer to a function to deterministically generate a nonce.
17+
*
18+
* Same as secp256k1_nonce function with the exception of accepting an
19+
* additional pubkey argument and not requiring an attempt argument. The pubkey
20+
* argument can protect signature schemes with key-prefixed challenge hash
21+
* inputs against reusing the nonce when signing with the wrong precomputed
22+
* pubkey.
23+
*
24+
* Returns: 1 if a nonce was successfully generated. 0 will cause signing to
25+
* return an error.
26+
* Out: nonce32: pointer to a 32-byte array to be filled by the function.
27+
* In: msg32: the 32-byte message hash being verified (will not be NULL)
28+
* key32: pointer to a 32-byte secret key (will not be NULL)
29+
* xonly_pk32: the 32-byte serialized xonly pubkey corresponding to key32
30+
* (will not be NULL)
31+
* algo16: pointer to a 16-byte array describing the signature
32+
* algorithm (will not be NULL).
33+
* data: Arbitrary data pointer that is passed through.
34+
*
35+
* Except for test cases, this function should compute some cryptographic hash of
36+
* the message, the key, the pubkey, the algorithm description, and data.
37+
*/
38+
typedef int (*secp256k1_nonce_function_hardened)(
39+
unsigned char *nonce32,
40+
const unsigned char *msg32,
41+
const unsigned char *key32,
42+
const unsigned char *xonly_pk32,
43+
const unsigned char *algo16,
44+
void *data
45+
);
46+
47+
/** An implementation of the nonce generation function as defined in Bitcoin
48+
* Improvement Proposal 340 "Schnorr Signatures for secp256k1"
49+
* (https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki).
50+
*
51+
* If a data pointer is passed, it is assumed to be a pointer to 32 bytes of
52+
* auxiliary random data as defined in BIP-340. If the data pointer is NULL,
53+
* schnorrsig_sign does not produce BIP-340 compliant signatures. The algo16
54+
* argument must be non-NULL, otherwise the function will fail and return 0.
55+
* The hash will be tagged with algo16 after removing all terminating null
56+
* bytes. Therefore, to create BIP-340 compliant signatures, algo16 must be set
57+
* to "BIP0340/nonce\0\0\0"
58+
*/
59+
SECP256K1_API extern const secp256k1_nonce_function_hardened secp256k1_nonce_function_bip340;
1260

1361
#ifdef __cplusplus
1462
}

src/secp256k1/src/modules/schnorrsig/main_impl.h

+81-1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,86 @@
1111
#include "include/secp256k1_schnorrsig.h"
1212
#include "hash.h"
1313

14-
/* TODO */
14+
/* Initializes SHA256 with fixed midstate. This midstate was computed by applying
15+
* SHA256 to SHA256("BIP0340/nonce")||SHA256("BIP0340/nonce"). */
16+
static void secp256k1_nonce_function_bip340_sha256_tagged(secp256k1_sha256 *sha) {
17+
secp256k1_sha256_initialize(sha);
18+
sha->s[0] = 0x46615b35ul;
19+
sha->s[1] = 0xf4bfbff7ul;
20+
sha->s[2] = 0x9f8dc671ul;
21+
sha->s[3] = 0x83627ab3ul;
22+
sha->s[4] = 0x60217180ul;
23+
sha->s[5] = 0x57358661ul;
24+
sha->s[6] = 0x21a29e54ul;
25+
sha->s[7] = 0x68b07b4cul;
26+
27+
sha->bytes = 64;
28+
}
29+
30+
/* Initializes SHA256 with fixed midstate. This midstate was computed by applying
31+
* SHA256 to SHA256("BIP0340/aux")||SHA256("BIP0340/aux"). */
32+
static void secp256k1_nonce_function_bip340_sha256_tagged_aux(secp256k1_sha256 *sha) {
33+
secp256k1_sha256_initialize(sha);
34+
sha->s[0] = 0x24dd3219ul;
35+
sha->s[1] = 0x4eba7e70ul;
36+
sha->s[2] = 0xca0fabb9ul;
37+
sha->s[3] = 0x0fa3166dul;
38+
sha->s[4] = 0x3afbe4b1ul;
39+
sha->s[5] = 0x4c44df97ul;
40+
sha->s[6] = 0x4aac2739ul;
41+
sha->s[7] = 0x249e850aul;
42+
43+
sha->bytes = 64;
44+
}
45+
46+
/* algo16 argument for nonce_function_bip340 to derive the nonce exactly as stated in BIP-340
47+
* by using the correct tagged hash function. */
48+
static const unsigned char bip340_algo16[16] = "BIP0340/nonce\0\0\0";
49+
50+
static int nonce_function_bip340(unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, const unsigned char *xonly_pk32, const unsigned char *algo16, void *data) {
51+
secp256k1_sha256 sha;
52+
unsigned char masked_key[32];
53+
int i;
54+
55+
if (algo16 == NULL) {
56+
return 0;
57+
}
58+
59+
if (data != NULL) {
60+
secp256k1_nonce_function_bip340_sha256_tagged_aux(&sha);
61+
secp256k1_sha256_write(&sha, data, 32);
62+
secp256k1_sha256_finalize(&sha, masked_key);
63+
for (i = 0; i < 32; i++) {
64+
masked_key[i] ^= key32[i];
65+
}
66+
}
67+
68+
/* Tag the hash with algo16 which is important to avoid nonce reuse across
69+
* algorithms. If this nonce function is used in BIP-340 signing as defined
70+
* in the spec, an optimized tagging implementation is used. */
71+
if (memcmp(algo16, bip340_algo16, 16) == 0) {
72+
secp256k1_nonce_function_bip340_sha256_tagged(&sha);
73+
} else {
74+
int algo16_len = 16;
75+
/* Remove terminating null bytes */
76+
while (algo16_len > 0 && !algo16[algo16_len - 1]) {
77+
algo16_len--;
78+
}
79+
secp256k1_sha256_initialize_tagged(&sha, algo16, algo16_len);
80+
}
81+
82+
/* Hash (masked-)key||pk||msg using the tagged hash as per the spec */
83+
if (data != NULL) {
84+
secp256k1_sha256_write(&sha, masked_key, 32);
85+
} else {
86+
secp256k1_sha256_write(&sha, key32, 32);
87+
}
88+
secp256k1_sha256_write(&sha, xonly_pk32, 32);
89+
secp256k1_sha256_write(&sha, msg32, 32);
90+
secp256k1_sha256_finalize(&sha, nonce32);
91+
return 1;
92+
}
93+
94+
const secp256k1_nonce_function_hardened secp256k1_nonce_function_bip340 = nonce_function_bip340;
1595

1696
#endif

src/secp256k1/src/modules/schnorrsig/tests_impl.h

+89-1
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,96 @@
1010

1111
#include "secp256k1_schnorrsig.h"
1212

13+
/* Checks that a bit flip in the n_flip-th argument (that has n_bytes many
14+
* bytes) changes the hash function
15+
*/
16+
void nonce_function_bip340_bitflip(unsigned char **args, size_t n_flip, size_t n_bytes) {
17+
unsigned char nonces[2][32];
18+
CHECK(nonce_function_bip340(nonces[0], args[0], args[1], args[2], args[3], args[4]) == 1);
19+
secp256k1_rand_flip(args[n_flip], n_bytes);
20+
CHECK(nonce_function_bip340(nonces[1], args[0], args[1], args[2], args[3], args[4]) == 1);
21+
CHECK(memcmp(nonces[0], nonces[1], 32) != 0);
22+
}
23+
24+
/* Tests for the equality of two sha256 structs. This function only produces a
25+
* correct result if an integer multiple of 64 many bytes have been written
26+
* into the hash functions. */
27+
void test_sha256_eq(const secp256k1_sha256 *sha1, const secp256k1_sha256 *sha2) {
28+
/* Is buffer fully consumed? */
29+
CHECK((sha1->bytes & 0x3F) == 0);
30+
31+
CHECK(sha1->bytes == sha2->bytes);
32+
CHECK(memcmp(sha1->s, sha2->s, sizeof(sha1->s)) == 0);
33+
}
34+
35+
void run_nonce_function_bip340_tests(void) {
36+
unsigned char tag[13] = "BIP0340/nonce";
37+
unsigned char aux_tag[11] = "BIP0340/aux";
38+
unsigned char algo16[16] = "BIP0340/nonce\0\0\0";
39+
secp256k1_sha256 sha;
40+
secp256k1_sha256 sha_optimized;
41+
unsigned char nonce[32];
42+
unsigned char msg[32];
43+
unsigned char key[32];
44+
unsigned char pk[32];
45+
unsigned char aux_rand[32];
46+
unsigned char *args[5];
47+
int i;
48+
49+
/* Check that hash initialized by
50+
* secp256k1_nonce_function_bip340_sha256_tagged has the expected
51+
* state. */
52+
secp256k1_sha256_initialize_tagged(&sha, tag, sizeof(tag));
53+
secp256k1_nonce_function_bip340_sha256_tagged(&sha_optimized);
54+
test_sha256_eq(&sha, &sha_optimized);
55+
56+
/* Check that hash initialized by
57+
* secp256k1_nonce_function_bip340_sha256_tagged_aux has the expected
58+
* state. */
59+
secp256k1_sha256_initialize_tagged(&sha, aux_tag, sizeof(aux_tag));
60+
secp256k1_nonce_function_bip340_sha256_tagged_aux(&sha_optimized);
61+
test_sha256_eq(&sha, &sha_optimized);
62+
63+
secp256k1_rand256(msg);
64+
secp256k1_rand256(key);
65+
secp256k1_rand256(pk);
66+
secp256k1_rand256(aux_rand);
67+
68+
/* Check that a bitflip in an argument results in different nonces. */
69+
args[0] = msg;
70+
args[1] = key;
71+
args[2] = pk;
72+
args[3] = algo16;
73+
args[4] = aux_rand;
74+
for (i = 0; i < count; i++) {
75+
nonce_function_bip340_bitflip(args, 0, 32);
76+
nonce_function_bip340_bitflip(args, 1, 32);
77+
nonce_function_bip340_bitflip(args, 2, 32);
78+
/* Flip algo16 special case "BIP0340/nonce" */
79+
nonce_function_bip340_bitflip(args, 3, 16);
80+
/* Flip algo16 again */
81+
nonce_function_bip340_bitflip(args, 3, 16);
82+
nonce_function_bip340_bitflip(args, 4, 32);
83+
}
84+
85+
/* NULL algo16 is disallowed */
86+
CHECK(nonce_function_bip340(nonce, msg, key, pk, NULL, NULL) == 0);
87+
/* Empty algo16 is fine */
88+
memset(algo16, 0x00, 16);
89+
CHECK(nonce_function_bip340(nonce, msg, key, pk, algo16, NULL) == 1);
90+
/* algo16 with terminating null bytes is fine */
91+
algo16[1] = 65;
92+
CHECK(nonce_function_bip340(nonce, msg, key, pk, algo16, NULL) == 1);
93+
/* Other algo16 is fine */
94+
memset(algo16, 0xFF, 16);
95+
CHECK(nonce_function_bip340(nonce, msg, key, pk, algo16, NULL) == 1);
96+
97+
/* NULL aux_rand argument is allowed. */
98+
CHECK(nonce_function_bip340(nonce, msg, key, pk, algo16, NULL) == 1);
99+
}
100+
13101
void run_schnorrsig_tests(void) {
14-
/* TODO */
102+
run_nonce_function_bip340_tests();
15103
}
16104

17105
#endif

src/secp256k1/src/testrand.h

+3
Original file line numberDiff line numberDiff line change
@@ -35,4 +35,7 @@ static void secp256k1_rand256_test(unsigned char *b32);
3535
/** Generate pseudorandom bytes with long sequences of zero and one bits. */
3636
static void secp256k1_rand_bytes_test(unsigned char *bytes, size_t len);
3737

38+
/** Flip a single random bit in a byte array */
39+
static void secp256k1_rand_flip(unsigned char *b, size_t len);
40+
3841
#endif /* SECP256K1_TESTRAND_H */

src/secp256k1/src/testrand_impl.h

+4
Original file line numberDiff line numberDiff line change
@@ -107,4 +107,8 @@ static void secp256k1_rand256_test(unsigned char *b32) {
107107
secp256k1_rand_bytes_test(b32, 32);
108108
}
109109

110+
static void secp256k1_rand_flip(unsigned char *b, size_t len) {
111+
b[secp256k1_rand_int(len)] ^= (1 << secp256k1_rand_int(8));
112+
}
113+
110114
#endif /* SECP256K1_TESTRAND_IMPL_H */

0 commit comments

Comments
 (0)