|
16 | 16 | #include <crypto/sha256.h>
|
17 | 17 | #include <crypto/sha3.h>
|
18 | 18 | #include <crypto/sha512.h>
|
19 |
| -#include <crypto/muhash.h> |
20 | 19 | #include <random.h>
|
21 | 20 | #include <span.h>
|
22 | 21 | #include <streams.h>
|
@@ -167,6 +166,57 @@ static void TestChaCha20(const std::string &hex_message, const std::string &hexk
|
167 | 166 | }
|
168 | 167 | }
|
169 | 168 |
|
| 169 | +static void TestFSChaCha20(const std::string& hex_plaintext, const std::string& hexkey, const std::string& hex_rekey_salt, size_t rekey_interval, const std::string& ciphertext_after_rotation) |
| 170 | +{ |
| 171 | + auto key_vec = ParseHex(hexkey); |
| 172 | + BOOST_CHECK_EQUAL(FSCHACHA20_KEYLEN, key_vec.size()); |
| 173 | + std::array<std::byte, FSCHACHA20_KEYLEN> key; |
| 174 | + memcpy(key.data(), key_vec.data(), FSCHACHA20_KEYLEN); |
| 175 | + |
| 176 | + auto salt_vec = ParseHex(hex_rekey_salt); |
| 177 | + BOOST_CHECK_EQUAL(FSCHACHA20_KEYLEN, salt_vec.size()); |
| 178 | + std::array<std::byte, FSCHACHA20_KEYLEN> rekey_salt; |
| 179 | + memcpy(rekey_salt.data(), salt_vec.data(), FSCHACHA20_KEYLEN); |
| 180 | + |
| 181 | + auto plaintext = ParseHex(hex_plaintext); |
| 182 | + |
| 183 | + auto fsc20 = FSChaCha20{key, rekey_salt, rekey_interval}; |
| 184 | + auto c20 = ChaCha20{reinterpret_cast<const unsigned char*>(key.data()), key.size()}; |
| 185 | + |
| 186 | + std::vector<std::byte> fsc20_output; |
| 187 | + fsc20_output.resize(plaintext.size()); |
| 188 | + |
| 189 | + std::vector<unsigned char> c20_output; |
| 190 | + c20_output.resize(plaintext.size()); |
| 191 | + |
| 192 | + for (size_t i = 0; i < rekey_interval; i++) { |
| 193 | + fsc20.Crypt(MakeByteSpan(plaintext), fsc20_output); |
| 194 | + c20.Crypt(plaintext.data(), c20_output.data(), plaintext.size()); |
| 195 | + BOOST_CHECK_EQUAL(0, memcmp(c20_output.data(), fsc20_output.data(), plaintext.size())); |
| 196 | + } |
| 197 | + |
| 198 | + // At the rotation interval, the outputs will no longer match |
| 199 | + fsc20.Crypt(MakeByteSpan(plaintext), fsc20_output); |
| 200 | + c20.Crypt(plaintext.data(), c20_output.data(), plaintext.size()); |
| 201 | + BOOST_CHECK(memcmp(c20_output.data(), fsc20_output.data(), plaintext.size()) != 0); |
| 202 | + |
| 203 | + unsigned char new_key[FSCHACHA20_KEYLEN]; |
| 204 | + auto hasher = CSHA256().Write(UCharCast(rekey_salt.data()), rekey_salt.size()); |
| 205 | + hasher.Write(UCharCast(key.data()), key.size()).Finalize(new_key); |
| 206 | + c20.SetKey(reinterpret_cast<unsigned char*>(new_key), 32); |
| 207 | + |
| 208 | + std::array<std::byte, 12> new_nonce; |
| 209 | + WriteLE32(reinterpret_cast<unsigned char*>(new_nonce.data()), 0); |
| 210 | + WriteLE64(reinterpret_cast<unsigned char*>(new_nonce.data()) + 4, 1); |
| 211 | + c20.SetRFC8439Nonce(new_nonce); |
| 212 | + |
| 213 | + // Outputs should match again after simulating key rotation |
| 214 | + c20.Crypt(plaintext.data(), c20_output.data(), plaintext.size()); |
| 215 | + BOOST_CHECK_EQUAL(0, memcmp(c20_output.data(), fsc20_output.data(), plaintext.size())); |
| 216 | + |
| 217 | + BOOST_CHECK_EQUAL(HexStr(fsc20_output), ciphertext_after_rotation); |
| 218 | +} |
| 219 | + |
170 | 220 | static void TestChaCha20RFC8439(const std::string& hex_key, const std::array<std::byte, 12>& nonce, uint32_t seek, const std::string& hex_expected_keystream, const std::string& hex_input, const std::string& hex_expected_output)
|
171 | 221 | {
|
172 | 222 | auto key = ParseHex(hex_key);
|
@@ -577,6 +627,18 @@ BOOST_AUTO_TEST_CASE(chacha20_testvector)
|
577 | 627 | rfc8439_nonce2, 0, "ecfa254f845f647473d3cb140da9e87606cb33066c447b87bc2666dde3fbb739", "", "");
|
578 | 628 | TestChaCha20RFC8439("1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
|
579 | 629 | rfc8439_nonce2, 0, "965e3bc6f9ec7ed9560808f4d229f94b137ff275ca9b3fcbdd59deaad23310ae", "", "");
|
| 630 | + |
| 631 | + // Forward secure ChaCha20 |
| 632 | + TestFSChaCha20("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f", |
| 633 | + "0000000000000000000000000000000000000000000000000000000000000000", |
| 634 | + "0000000000000000000000000000000000000000000000000000000000000000", 256, |
| 635 | + "65bd1a6644c605995d3e0663d1500e761ebfe174475ee6148ae92b243294c042"); |
| 636 | + TestFSChaCha20("01", "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f", |
| 637 | + "0000000000000000000000000000000000000000000000000000000000000000", 5, "17"); |
| 638 | + TestFSChaCha20("e93fdb5c762804b9a706816aca31e35b11d2aa3080108ef46a5b1f1508819c0a", |
| 639 | + "8ec4c3ccdaea336bdeb245636970be01266509b33f3d2642504eaf412206207a", |
| 640 | + "8bb571662db12d38ee4e2630d4434f6f626cb0e6007e3cc41d2f44dbb32e6e9d", 4096, |
| 641 | + "03988d3808ca6b0f98e2ae6d9d80a65ceb5a799e5bbaf5d161885b4c4cc18118"); |
580 | 642 | }
|
581 | 643 |
|
582 | 644 | BOOST_AUTO_TEST_CASE(chacha20_midblock)
|
|
0 commit comments