diff options
author | David Hook <dgh@cryptoworkshop.com> | 2013-05-31 11:07:45 +0400 |
---|---|---|
committer | David Hook <dgh@cryptoworkshop.com> | 2013-05-31 11:07:45 +0400 |
commit | 2b976f5364cfdbc37d3086019d93483c983eb80b (patch) | |
tree | cb846af3fd1d43f9c2562a1fb2d06b997ad8f229 /core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java | |
parent | 5f714bd92fbd780d22406f4bc3681be005f6f04a (diff) |
initial reshuffle
Diffstat (limited to 'core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java')
-rw-r--r-- | core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java | 163 |
1 files changed, 163 insertions, 0 deletions
diff --git a/core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java b/core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java new file mode 100644 index 00000000..a8fc194e --- /dev/null +++ b/core/src/main/java/org/bouncycastle/crypto/signers/DSTU4145Signer.java @@ -0,0 +1,163 @@ +package org.bouncycastle.crypto.signers; + +import java.math.BigInteger; +import java.security.SecureRandom; + +import org.bouncycastle.crypto.CipherParameters; +import org.bouncycastle.crypto.DSA; +import org.bouncycastle.crypto.params.ECKeyParameters; +import org.bouncycastle.crypto.params.ECPrivateKeyParameters; +import org.bouncycastle.crypto.params.ECPublicKeyParameters; +import org.bouncycastle.crypto.params.ParametersWithRandom; +import org.bouncycastle.math.ec.ECAlgorithms; +import org.bouncycastle.math.ec.ECCurve; +import org.bouncycastle.math.ec.ECFieldElement; +import org.bouncycastle.math.ec.ECPoint; +import org.bouncycastle.util.Arrays; + +/** + * DSTU 4145-2002 + * <p> + * National Ukrainian standard of digital signature based on elliptic curves (DSTU 4145-2002). + * </p> + */ +public class DSTU4145Signer + implements DSA +{ + private static final BigInteger ONE = BigInteger.valueOf(1); + + private ECKeyParameters key; + private SecureRandom random; + + public void init(boolean forSigning, CipherParameters param) + { + if (forSigning) + { + if (param instanceof ParametersWithRandom) + { + ParametersWithRandom rParam = (ParametersWithRandom)param; + + this.random = rParam.getRandom(); + param = rParam.getParameters(); + } + else + { + this.random = new SecureRandom(); + } + + this.key = (ECPrivateKeyParameters)param; + } + else + { + this.key = (ECPublicKeyParameters)param; + } + + } + + public BigInteger[] generateSignature(byte[] message) + { + ECFieldElement h = hash2FieldElement(key.getParameters().getCurve(), message); + if (h.toBigInteger().signum() == 0) + { + h = key.getParameters().getCurve().fromBigInteger(ONE); + } + + BigInteger e, r, s; + ECFieldElement Fe, y; + + do + { + do + { + do + { + e = generateRandomInteger(key.getParameters().getN(), random); + Fe = key.getParameters().getG().multiply(e).getX(); + } + while (Fe.toBigInteger().signum() == 0); + + y = h.multiply(Fe); + r = fieldElement2Integer(key.getParameters().getN(), y); + } + while (r.signum() == 0); + + s = r.multiply(((ECPrivateKeyParameters)key).getD()).add(e).mod(key.getParameters().getN()); + } + while (s.signum() == 0); + + return new BigInteger[]{r, s}; + } + + public boolean verifySignature(byte[] message, BigInteger r, BigInteger s) + { + if (r.signum() == 0 || s.signum() == 0) + { + return false; + } + if (r.compareTo(key.getParameters().getN()) >= 0 || s.compareTo(key.getParameters().getN()) >= 0) + { + return false; + } + + ECFieldElement h = hash2FieldElement(key.getParameters().getCurve(), message); + if (h.toBigInteger().signum() == 0) + { + h = key.getParameters().getCurve().fromBigInteger(ONE); + } + + ECPoint R = ECAlgorithms.sumOfTwoMultiplies(key.getParameters().getG(), s, ((ECPublicKeyParameters)key).getQ(), r); + + // components must be bogus. + if (R.isInfinity()) + { + return false; + } + + ECFieldElement y = h.multiply(R.getX()); + return fieldElement2Integer(key.getParameters().getN(), y).compareTo(r) == 0; + } + + /** + * Generates random integer such, than its bit length is less than that of n + */ + private static BigInteger generateRandomInteger(BigInteger n, SecureRandom random) + { + return new BigInteger(n.bitLength() - 1, random); + } + + private static void reverseBytes(byte[] bytes) + { + byte tmp; + + for (int i=0; i<bytes.length/2; i++) + { + tmp=bytes[i]; + bytes[i]=bytes[bytes.length-1-i]; + bytes[bytes.length-1-i]=tmp; + } + } + + private static ECFieldElement hash2FieldElement(ECCurve curve, byte[] hash) + { + byte[] data = Arrays.clone(hash); + reverseBytes(data); + BigInteger num = new BigInteger(1, data); + while (num.bitLength() >= curve.getFieldSize()) + { + num = num.clearBit(num.bitLength() - 1); + } + + return curve.fromBigInteger(num); + } + + private static BigInteger fieldElement2Integer(BigInteger n, ECFieldElement fieldElement) + { + BigInteger num = fieldElement.toBigInteger(); + while (num.bitLength() >= n.bitLength()) + { + num = num.clearBit(num.bitLength() - 1); + } + + return num; + } +} |