| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| from Crypto.Util.py3compat import is_native_int |
| from Crypto.Util import number |
| from Crypto.Util.number import long_to_bytes, bytes_to_long |
| from Crypto.Random import get_random_bytes as rng |
|
|
|
|
| def _mult_gf2(f1, f2): |
| """Multiply two polynomials in GF(2)""" |
|
|
| |
| if f2 > f1: |
| f1, f2 = f2, f1 |
| z = 0 |
| while f2: |
| if f2 & 1: |
| z ^= f1 |
| f1 <<= 1 |
| f2 >>= 1 |
| return z |
|
|
|
|
| def _div_gf2(a, b): |
| """ |
| Compute division of polynomials over GF(2). |
| Given a and b, it finds two polynomials q and r such that: |
| |
| a = b*q + r with deg(r)<deg(b) |
| """ |
|
|
| if (a < b): |
| return 0, a |
|
|
| deg = number.size |
| q = 0 |
| r = a |
| d = deg(b) |
| while deg(r) >= d: |
| s = 1 << (deg(r) - d) |
| q ^= s |
| r ^= _mult_gf2(b, s) |
| return (q, r) |
|
|
|
|
| class _Element(object): |
| """Element of GF(2^128) field""" |
|
|
| |
| irr_poly = 1 + 2 + 4 + 128 + 2 ** 128 |
|
|
| def __init__(self, encoded_value): |
| """Initialize the element to a certain value. |
| |
| The value passed as parameter is internally encoded as |
| a 128-bit integer, where each bit represents a polynomial |
| coefficient. The LSB is the constant coefficient. |
| """ |
|
|
| if is_native_int(encoded_value): |
| self._value = encoded_value |
| elif len(encoded_value) == 16: |
| self._value = bytes_to_long(encoded_value) |
| else: |
| raise ValueError("The encoded value must be an integer or a 16 byte string") |
|
|
| def __eq__(self, other): |
| return self._value == other._value |
|
|
| def __int__(self): |
| """Return the field element, encoded as a 128-bit integer.""" |
| return self._value |
|
|
| def encode(self): |
| """Return the field element, encoded as a 16 byte string.""" |
| return long_to_bytes(self._value, 16) |
|
|
| def __mul__(self, factor): |
|
|
| f1 = self._value |
| f2 = factor._value |
|
|
| |
| if f2 > f1: |
| f1, f2 = f2, f1 |
|
|
| if self.irr_poly in (f1, f2): |
| return _Element(0) |
|
|
| mask1 = 2 ** 128 |
| v, z = f1, 0 |
| while f2: |
| |
| mask2 = int(bin(f2 & 1)[2:] * 128, base=2) |
| z = (mask2 & (z ^ v)) | ((mask1 - mask2 - 1) & z) |
| v <<= 1 |
| |
| mask3 = int(bin((v >> 128) & 1)[2:] * 128, base=2) |
| v = (mask3 & (v ^ self.irr_poly)) | ((mask1 - mask3 - 1) & v) |
| f2 >>= 1 |
| return _Element(z) |
|
|
| def __add__(self, term): |
| return _Element(self._value ^ term._value) |
|
|
| def inverse(self): |
| """Return the inverse of this element in GF(2^128).""" |
|
|
| |
| |
|
|
| if self._value == 0: |
| raise ValueError("Inversion of zero") |
|
|
| r0, r1 = self._value, self.irr_poly |
| s0, s1 = 1, 0 |
| while r1 > 0: |
| q = _div_gf2(r0, r1)[0] |
| r0, r1 = r1, r0 ^ _mult_gf2(q, r1) |
| s0, s1 = s1, s0 ^ _mult_gf2(q, s1) |
| return _Element(s0) |
|
|
| def __pow__(self, exponent): |
| result = _Element(self._value) |
| for _ in range(exponent - 1): |
| result = result * self |
| return result |
|
|
|
|
| class Shamir(object): |
| """Shamir's secret sharing scheme. |
| |
| A secret is split into ``n`` shares, and it is sufficient to collect |
| ``k`` of them to reconstruct the secret. |
| """ |
|
|
| @staticmethod |
| def split(k, n, secret, ssss=False): |
| """Split a secret into ``n`` shares. |
| |
| The secret can be reconstructed later using just ``k`` shares |
| out of the original ``n``. |
| Each share must be kept confidential to the person it was |
| assigned to. |
| |
| Each share is associated to an index (starting from 1). |
| |
| Args: |
| k (integer): |
| The sufficient number of shares to reconstruct the secret (``k < n``). |
| n (integer): |
| The number of shares that this method will create. |
| secret (byte string): |
| A byte string of 16 bytes (e.g. the AES 128 key). |
| ssss (bool): |
| If ``True``, the shares can be used with the ``ssss`` utility. |
| Default: ``False``. |
| |
| Return (tuples): |
| ``n`` tuples. A tuple is meant for each participant and it contains two items: |
| |
| 1. the unique index (an integer) |
| 2. the share (a byte string, 16 bytes) |
| """ |
|
|
| |
| |
| |
| |
| |
| |
| |
|
|
| coeffs = [_Element(rng(16)) for i in range(k - 1)] |
| coeffs.append(_Element(secret)) |
|
|
| |
| |
|
|
| def make_share(user, coeffs, ssss): |
| idx = _Element(user) |
| share = _Element(0) |
| for coeff in coeffs: |
| share = idx * share + coeff |
| if ssss: |
| share += _Element(user) ** len(coeffs) |
| return share.encode() |
|
|
| return [(i, make_share(i, coeffs, ssss)) for i in range(1, n + 1)] |
|
|
| @staticmethod |
| def combine(shares, ssss=False): |
| """Recombine a secret, if enough shares are presented. |
| |
| Args: |
| shares (tuples): |
| The *k* tuples, each containin the index (an integer) and |
| the share (a byte string, 16 bytes long) that were assigned to |
| a participant. |
| ssss (bool): |
| If ``True``, the shares were produced by the ``ssss`` utility. |
| Default: ``False``. |
| |
| Return: |
| The original secret, as a byte string (16 bytes long). |
| """ |
|
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| k = len(shares) |
|
|
| gf_shares = [] |
| for x in shares: |
| idx = _Element(x[0]) |
| value = _Element(x[1]) |
| if any(y[0] == idx for y in gf_shares): |
| raise ValueError("Duplicate share") |
| if ssss: |
| value += idx ** k |
| gf_shares.append((idx, value)) |
|
|
| result = _Element(0) |
| for j in range(k): |
| x_j, y_j = gf_shares[j] |
|
|
| numerator = _Element(1) |
| denominator = _Element(1) |
|
|
| for m in range(k): |
| x_m = gf_shares[m][0] |
| if m != j: |
| numerator *= x_m |
| denominator *= x_j + x_m |
| result += y_j * numerator * denominator.inverse() |
| return result.encode() |
|
|