Skip to content

Commit d459059

Browse files
committed
ecdsa_sign_to_contract: add Anti Nonce Covert Channel util functions
1 parent 679edae commit d459059

File tree

3 files changed

+288
-3
lines changed

3 files changed

+288
-3
lines changed

include/secp256k1_ecdsa_sign_to_contract.h

+68
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,74 @@ SECP256K1_API int secp256k1_ecdsa_s2c_verify_commit(
5454
const secp256k1_s2c_opening *opening
5555
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4);
5656

57+
/** Compute commitment on the client as part of the ECDSA Anti Nonce Covert Channel Protocol.
58+
*
59+
* ECDSA Anti Nonce Covert Channel Protocol:
60+
* 1. The host draws randomness `k2`, commits to it with sha256 and sends the commitment to the client.
61+
* 2. The client commits to its original nonce `k1` using the host commitment by calling
62+
* `secp256k1_ecdsa_anti_covert_channel_client_commit`. The client sends the resulting commitment
63+
* `R1` to the host.
64+
* 3. The host replies with `k2` generated in step 1.
65+
* 4. The client signs with `secp256k1_ecdsa_s2c_sign`, using the `k2` as `s2c_data` and
66+
* sends the signature and opening to the host.
67+
* 5. The host verifies that `R_x = (R1 + H(R1, k2)*G)_x`, where R_x is the `r` part of the signature by using
68+
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify` with the client's
69+
* commitment from step 2 and the signature and opening received in step 4. If verification does
70+
* not succeed, the protocol failed and can be restarted.
71+
*
72+
* Returns 1 on success, 0 on failure.
73+
* Args: ctx: pointer to a context object (cannot be NULL)
74+
* Out: client_commit: pointer to a pubkey where the clients public nonce will be
75+
* placed. (cannot be NULL)
76+
* In: msg32: the 32-byte message hash to be signed (cannot be NULL)
77+
* seckey32: the 32-byte secret key used for signing (cannot be NULL)
78+
* noncefp: pointer to a nonce generation function. If NULL, secp256k1_nonce_function_default is used
79+
* rand_commitment32: the 32-byte randomness commitment from the host (cannot be NULL)
80+
*/
81+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(
82+
const secp256k1_context* ctx,
83+
secp256k1_pubkey *client_commit,
84+
const unsigned char *msg32,
85+
const unsigned char *seckey32,
86+
unsigned char *rand_commitment32
87+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);
88+
89+
/** Create a randomness commitment on the host as part of the ECDSA Anti Nonce Covert Channel Protocol.
90+
*
91+
* Returns 1 on success, 0 on failure.
92+
* Args: ctx: pointer to a context object (cannot be NULL)
93+
* Out: rand_commitment32: pointer to 32-byte array to store the returned commitment (cannot be NULL)
94+
* In: rand32: the 32-byte randomness to commit to (cannot be NULL)
95+
*/
96+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(
97+
secp256k1_context *ctx,
98+
unsigned char *rand_commitment32,
99+
const unsigned char *rand32
100+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);
101+
102+
/** Verify that a clients signature contains the hosts randomness as part of the Anti
103+
* Nonce Covert Channel Protocol. Does not verify the signature itself.
104+
*
105+
* Returns 1 on success, 0 on failure.
106+
* Args: ctx: pointer to a context object (cannot be NULL)
107+
* In: sig: pointer to the signature whose randomness should be verified
108+
* (cannot be NULL)
109+
* rand32: pointer to the 32-byte randomness from the host which should
110+
* be included by the signature (cannot be NULL)
111+
* opening: pointer to the opening produced by the client when signing
112+
* with `rand32` as `s2c_data` (cannot be NULL)
113+
* client_commit: pointer to the client's commitment created in
114+
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit`
115+
* (cannot be NULL)
116+
*/
117+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(
118+
secp256k1_context *ctx,
119+
const secp256k1_ecdsa_signature *sig,
120+
const unsigned char *rand32,
121+
const secp256k1_s2c_opening *opening,
122+
const secp256k1_pubkey *client_commit
123+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);
124+
57125
#ifdef __cplusplus
58126
}
59127
#endif

src/modules/ecdsa_sign_to_contract/main_impl.h

+78
Original file line numberDiff line numberDiff line change
@@ -136,4 +136,82 @@ int secp256k1_ecdsa_s2c_verify_commit(const secp256k1_context* ctx, const secp25
136136

137137
}
138138

139+
int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(const secp256k1_context* ctx, secp256k1_pubkey *client_commit, const unsigned char *msg32, const unsigned char *seckey32, unsigned char *rand_commitment32) {
140+
unsigned char nonce32[32];
141+
secp256k1_scalar k;
142+
secp256k1_gej rj;
143+
secp256k1_ge r;
144+
unsigned int count = 0;
145+
VERIFY_CHECK(ctx != NULL);
146+
ARG_CHECK(secp256k1_ecmult_gen_context_is_built(&ctx->ecmult_gen_ctx));
147+
ARG_CHECK(client_commit != NULL);
148+
ARG_CHECK(msg32 != NULL);
149+
ARG_CHECK(seckey32 != NULL);
150+
ARG_CHECK(rand_commitment32 != NULL);
151+
152+
while (1) {
153+
int overflow = 0;
154+
if (!secp256k1_nonce_function_default(nonce32, msg32, seckey32, NULL, rand_commitment32, count)) {
155+
return 0;
156+
}
157+
158+
secp256k1_scalar_set_b32(&k, nonce32, &overflow);
159+
if (!overflow && !secp256k1_scalar_is_zero(&k)) {
160+
break;
161+
}
162+
count++;
163+
}
164+
165+
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &rj, &k);
166+
secp256k1_ge_set_gej(&r, &rj);
167+
secp256k1_pubkey_save(client_commit, &r);
168+
return 1;
169+
}
170+
171+
int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(secp256k1_context *ctx, const secp256k1_ecdsa_signature *sig, const unsigned char *rand32, const secp256k1_s2c_opening *opening, const secp256k1_pubkey *client_commit) {
172+
173+
secp256k1_ge gcommit;
174+
secp256k1_ge gopening;
175+
secp256k1_gej pj;
176+
177+
VERIFY_CHECK(ctx != NULL);
178+
ARG_CHECK(sig != NULL);
179+
ARG_CHECK(rand32 != NULL);
180+
ARG_CHECK(opening != NULL);
181+
ARG_CHECK(secp256k1_s2c_commit_is_init(opening));
182+
ARG_CHECK(client_commit != NULL);
183+
184+
/* Check that client_commit == opening->original_pubnonce */
185+
secp256k1_gej_set_infinity(&pj);
186+
if (!secp256k1_pubkey_load(ctx, &gcommit, client_commit)) {
187+
return 0;
188+
}
189+
secp256k1_ge_neg(&gcommit, &gcommit);
190+
secp256k1_gej_add_ge(&pj, &pj, &gcommit);
191+
if (!secp256k1_pubkey_load(ctx, &gopening, &opening->original_pubnonce)) {
192+
return 0;
193+
}
194+
secp256k1_gej_add_ge(&pj, &pj, &gopening);
195+
if (!secp256k1_gej_is_infinity(&pj)) {
196+
return 0;
197+
}
198+
if (!secp256k1_ecdsa_s2c_verify_commit(ctx, sig, rand32, opening)) {
199+
return 0;
200+
}
201+
return 1;
202+
}
203+
204+
int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(secp256k1_context *ctx, unsigned char *rand_commitment32, const unsigned char *rand32) {
205+
secp256k1_sha256 sha;
206+
207+
VERIFY_CHECK(ctx != NULL);
208+
ARG_CHECK(rand_commitment32 != NULL);
209+
ARG_CHECK(rand32 != NULL);
210+
211+
secp256k1_sha256_initialize(&sha);
212+
secp256k1_sha256_write(&sha, rand32, 32);
213+
secp256k1_sha256_finalize(&sha, rand_commitment32);
214+
return 1;
215+
}
216+
139217
#endif /* SECP256K1_ECDSA_SIGN_TO_CONTRACT_MAIN_H */

src/modules/ecdsa_sign_to_contract/tests_impl.h

+142-3
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ static void test_ecdsa_s2c_api(void) {
147147
CHECK(secp256k1_ecdsa_s2c_sign(sign, &signature, &s2c_opening, message, privkey, NULL, NULL, NULL) == 0);
148148
CHECK(ecount == 2);
149149
}
150-
{ /* verify_commit, ctx */
150+
{ /* verify_commit: ctx */
151151
ecount = 0;
152152
CHECK(secp256k1_ecdsa_s2c_sign(sign, &signature, &s2c_opening, message, privkey, s2c_data, NULL, NULL) == 1);
153153
CHECK(secp256k1_ecdsa_s2c_verify_commit(none, &signature, s2c_data, &s2c_opening) == 0);
@@ -159,7 +159,7 @@ static void test_ecdsa_s2c_api(void) {
159159
CHECK(secp256k1_ecdsa_s2c_verify_commit(both, &signature, s2c_data, &s2c_opening) == 1);
160160
CHECK(ecount == 2);
161161
}
162-
{ /* verify_commit, NULL signature, s2c_data, s2c_opening */
162+
{ /* verify_commit: NULL signature, s2c_data, s2c_opening */
163163
ecount = 0;
164164
CHECK(secp256k1_ecdsa_s2c_sign(sign, &signature, &s2c_opening, message, privkey, s2c_data, NULL, NULL) == 1);
165165
CHECK(secp256k1_ecdsa_s2c_verify_commit(vrfy, NULL, s2c_data, &s2c_opening) == 0);
@@ -169,12 +169,75 @@ static void test_ecdsa_s2c_api(void) {
169169
CHECK(secp256k1_ecdsa_s2c_verify_commit(vrfy, &signature, s2c_data, NULL) == 0);
170170
CHECK(ecount == 3);
171171
}
172-
{ /* verify_commit, invalid opening */
172+
{ /* verify_commit: invalid opening */
173173
secp256k1_s2c_opening invalid_opening = {0};
174174
ecount = 0;
175175
CHECK(secp256k1_ecdsa_s2c_verify_commit(vrfy, &signature, s2c_data, &invalid_opening) == 0);
176176
CHECK(ecount == 1);
177177
}
178+
{ /* anti_nonce_covert_channel_client_commit: ctx */
179+
secp256k1_pubkey commitment;
180+
uint8_t rand_commitment[32] = {0};
181+
ecount = 0;
182+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(none, &commitment, message, privkey, rand_commitment) == 0);
183+
CHECK(ecount == 1);
184+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(sign, &commitment, message, privkey, rand_commitment) == 1);
185+
CHECK(ecount == 1);
186+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(vrfy, &commitment, message, privkey, rand_commitment) == 0);
187+
CHECK(ecount == 2);
188+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(both, &commitment, message, privkey, rand_commitment) == 1);
189+
CHECK(ecount == 2);
190+
}
191+
{ /* anti_nonce_covert_channel_client_commit: client_commitment, msg32, seckey32, rand_commitment32 */
192+
secp256k1_pubkey commitment;
193+
uint8_t rand_commitment[32] = {0};
194+
ecount = 0;
195+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(sign, NULL, message, privkey, rand_commitment) == 0);
196+
CHECK(ecount == 1);
197+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(sign, &commitment, NULL, privkey, rand_commitment) == 0);
198+
CHECK(ecount == 2);
199+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(sign, &commitment, message, NULL, rand_commitment) == 0);
200+
CHECK(ecount == 3);
201+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(sign, &commitment, message, privkey, NULL) == 0);
202+
CHECK(ecount == 4);
203+
}
204+
{ /* anti_nonce_covert_channel_host_verify */
205+
uint8_t host_nonce[32] = {0};
206+
uint8_t host_commitment[32] = {0};
207+
secp256k1_pubkey client_commitment = {0};
208+
secp256k1_s2c_opening invalid_opening = {0};
209+
secp256k1_pubkey invalid_pubkey = {0};
210+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(ctx, &client_commitment, message, privkey, host_commitment) == 1);
211+
ecount = 0;
212+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, NULL, host_nonce, &s2c_opening, &client_commitment) == 0);
213+
CHECK(ecount == 1);
214+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, NULL, &s2c_opening, &client_commitment) == 0);
215+
CHECK(ecount == 2);
216+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, host_nonce, NULL, &client_commitment) == 0);
217+
CHECK(ecount == 3);
218+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, host_nonce, &invalid_opening, &client_commitment) == 0);
219+
CHECK(ecount == 4);
220+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, host_nonce, &s2c_opening, NULL) == 0);
221+
CHECK(ecount == 5);
222+
/* invalid client commitment */
223+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, host_nonce, &s2c_opening, &invalid_pubkey) == 0);
224+
CHECK(ecount == 6);
225+
/* invalid original pubnonce */
226+
memset(&s2c_opening.original_pubnonce, 0, sizeof(s2c_opening.original_pubnonce));
227+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(vrfy, &signature, host_nonce, &s2c_opening, &client_commitment) == 0);
228+
CHECK(ecount == 7);
229+
}
230+
{ /* anti_nonce_covert_channel_host_commit */
231+
uint8_t rand_commitment[32];
232+
uint8_t rand[32] = {1};
233+
ecount = 0;
234+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(none, rand_commitment, rand) == 1);
235+
CHECK(ecount == 0);
236+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(none, NULL, rand) == 0);
237+
CHECK(ecount == 1);
238+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(none, rand_commitment, NULL) == 0);
239+
CHECK(ecount == 2);
240+
}
178241
}
179242

180243
static void test_ecdsa_s2c_sign_verify(void) {
@@ -263,12 +326,88 @@ static void test_ecdsa_s2c_sign_verify(void) {
263326
}
264327
}
265328

329+
static void test_ecdsa_s2c_anti_nonce_covert_channel_client_commit(void) {
330+
size_t i;
331+
unsigned char privkey[32] = {
332+
0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55,
333+
0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55,
334+
};
335+
unsigned char message[32] = {
336+
0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88,
337+
0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88, 0x88,
338+
};
339+
secp256k1_pubkey client_commit;
340+
unsigned char pubnonce[33];
341+
/*
342+
Check that original pubnonce is derived from s2c_data and ndata.
343+
*/
344+
for (i = 0; i < sizeof(ecdsa_s2c_tests) / sizeof(ecdsa_s2c_tests[0]); i++) {
345+
size_t pubnonce_size = 33;
346+
const ecdsa_s2c_test *test = &ecdsa_s2c_tests[i];
347+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(ctx, &client_commit, message, privkey, (unsigned char*)test->host_commitment) == 1);
348+
CHECK(secp256k1_ec_pubkey_serialize(ctx, pubnonce, &pubnonce_size, &client_commit, SECP256K1_EC_COMPRESSED) == 1);
349+
CHECK(memcmp(test->expected_pubnonce, pubnonce, pubnonce_size) == 0);
350+
}
351+
}
352+
353+
/* This tests the full ECDSA Anti Nonce Covert Channel Protocol */
354+
static void test_ecdsa_s2c_anti_nonce_covert_channel(void) {
355+
unsigned char client_privkey[32];
356+
unsigned char host_msg[32];
357+
unsigned char host_commitment[32];
358+
unsigned char host_nonce_contribution[32];
359+
secp256k1_pubkey client_commitment;
360+
secp256k1_ecdsa_signature signature;
361+
secp256k1_s2c_opening s2c_opening;
362+
363+
/* Generate a random key, message. */
364+
{
365+
secp256k1_scalar key;
366+
random_scalar_order_test(&key);
367+
secp256k1_scalar_get_b32(client_privkey, &key);
368+
secp256k1_rand256_test(host_msg);
369+
secp256k1_rand256_test(host_nonce_contribution);
370+
}
371+
372+
/* Protocol step 1. */
373+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(ctx, host_commitment, host_nonce_contribution) == 1);
374+
/* Protocol step 2. */
375+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(ctx, &client_commitment, host_msg, client_privkey, host_commitment) == 1);
376+
/* Protocol step 3: host_nonce_contribution send to client to be used in step 4. */
377+
/* Protocol step 4. */
378+
CHECK(secp256k1_ecdsa_s2c_sign(ctx, &signature, &s2c_opening, host_msg, client_privkey, host_nonce_contribution, NULL, NULL) == 1);
379+
/* Protocol step 5. */
380+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(ctx, &signature, host_nonce_contribution, &s2c_opening, &client_commitment) == 1);
381+
382+
{ /* host_verify: commitment does not match */
383+
uint8_t sigbytes[64];
384+
size_t i;
385+
CHECK(secp256k1_ecdsa_signature_serialize_compact(ctx, sigbytes, &signature) == 1);
386+
for(i = 0; i < 32; i++) {
387+
/* change one byte */
388+
sigbytes[i] = (((int)sigbytes[i]) + 1) % 256;
389+
CHECK(secp256k1_ecdsa_signature_parse_compact(ctx, &signature, sigbytes) == 1);
390+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(ctx, &signature, host_nonce_contribution, &s2c_opening, &client_commitment) == 0);
391+
/* revert */
392+
sigbytes[i] = (((int)sigbytes[i]) + 255) % 256;
393+
}
394+
}
395+
{ /* host_verify: client commitment != opening original pubnonce */
396+
397+
uint8_t tweak[32] = {1};
398+
CHECK(secp256k1_ec_pubkey_tweak_add(ctx, &client_commitment, tweak) == 1);
399+
CHECK(secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(ctx, &signature, host_nonce_contribution, &s2c_opening, &client_commitment) == 0);
400+
}
401+
}
402+
266403
static void run_ecdsa_sign_to_contract_tests(void) {
267404
int i;
268405
test_ecdsa_s2c_api();
269406
test_ecdsa_s2c_original_pubnonce();
407+
test_ecdsa_s2c_anti_nonce_covert_channel_client_commit();
270408
for (i = 0; i < count; i++) {
271409
test_ecdsa_s2c_sign_verify();
410+
test_ecdsa_s2c_anti_nonce_covert_channel();
272411
}
273412
}
274413

0 commit comments

Comments
 (0)