CRYPTO_SIGN_INIT_FIRST_PASS_CUSTOM_HASH(3MONOCYPHER) | 3MONOCYPHER | CRYPTO_SIGN_INIT_FIRST_PASS_CUSTOM_HASH(3MONOCYPHER) |
NAME
public key signatures with custom hash functions#include
<monocypher.h>
void
crypto_sign_init_first_pass_custom_hash
(crypto_sign_ctx_abstract
*ctx, const uint8_t secret_key[32],
const uint8_t public_key[32], const
crypto_sign_vtable *hash);
void
crypto_sign_public_key_custom_hash
(uint8_t
public_key[32], const uint8_t secret_key[32],
const crypto_sign_vtable *hash);
void
crypto_check_init_custom_hash
(crypto_sign_ctx_abstract
*ctx, const uint8_t signature[64],
const uint8_t public_key[32], const
crypto_sign_vtable *hash);
DESCRIPTION
These functions are variants of the crypto_sign_init_first_pass() family of functions. They provide the ability to replace the EdDSA hash function with any user-provided hash function.
This is a highly advanced feature. Interoperability of public key signatures with other cryptographic libraries can normally be achieved by using crypto_ed25519_sign() or crypto_ed25519_sign_init_first_pass() already. This interface is exposed only for completeness and to handle special situations (e.g. to use the hash function of the future winner of the NIST lightweight crypto competition on a device with highly constrained resources or taking advantage of hardware support for cryptographic hash functions). Whenever possible, these functions should be avoided.
To make a custom hash algorithm available for use with these functions, a crypto_sign_vtable structure must be provided. It is defined as:
typedef struct { void (*hash)(uint8_t hash[64], const uint8_t *message, size_t message_size); void (*init )(void *ctx); void (*update)(void *ctx, const uint8_t *message, size_t message_size); void (*final )(void *ctx, uint8_t hash[64]); size_t ctx_size; } crypto_sign_vtable;
The context argument to the functions shall be referred to as “outer signing context”. The outer signing context must contain a crypto_sign_ctx_abstract as its first member. Other than that, the outer signing context may be defined freely. Logically, it is required to contain some kind of hash context as well; otherwise it cannot work as a custom hash function.
Because the calling code cannot know the real type of the outer signing context, it is cast to void * when calling the hash functions in the vtable, but the ctx argument to the functions in the vtable is always guaranteed to be the outer signing context.
The hash functions must not fail. If they somehow can fail, they have no way to propagate its error status, and thus the only ways to handle errors are to either assume an error never occurs (if reasonable) or to induce a crash in the code when an error occurs.
The fields of crypto_sign_vtable are:
- hash
- Function that computes a 64-byte hash for a given message and writes the computed hash to hash. The output length must be exactly 64 bytes. This will normally be constructed using the functions that provide the init, update, and final members.
- init
- Function that initialises the hash context of an outer signing context.
- update
- Function that updates the hash context of an outer signing context. It must be able to handle message sizes of at least 32 bytes.
- final
- Function that finalises the hash context of an outer signing context and writes the computed hash to hash. The output length must be exactly 64 bytes. This function should wipe the hash context with crypto_wipe() if it contains pointers to objects outside the outer signing context. Monocypher takes care of wiping the outer signing context.
- ctx_size
- The size of the outer signing context as determined by
sizeof
().
The functions indicated in the crypto_sign_vtable must be thread-safe if any of Monocypher's signing functions are accessed from multiple threads.
After calling
crypto_sign_init_first_pass_custom_hash
()
or
crypto_check_init_custom_hash
(),
the
crypto_sign_update(),
crypto_sign_final(),
crypto_sign_init_second_pass(),
crypto_check_update(),
and
crypto_check_final()
functions can be used as usual. They will call into the hash vtable as
required. The same security considerations and semantics apply.
RETURN VALUES
These functions return nothing.
EXAMPLES
Defining and using a custom implementation of SHA-512 and crudely checking its results against crypto_ed25519_sign():
struct outer_ctx { crypto_sign_ctx_abstract sctx; SHA2_CTX hash_ctx; }; static void my_hash(uint8_t hash[64], const uint8_t *msg, size_t len) { SHA2_CTX ctx; SHA512Init(&ctx); SHA512Update(&ctx, msg, len); SHA512Final(hash, &ctx); } static void my_init(void *ctx) { struct outer_ctx *octx = (struct outer_ctx *)ctx; SHA512Init(&octx->hash_ctx); } static void my_update(void *ctx, const uint8_t *msg, size_t len) { struct outer_ctx *octx = (struct outer_ctx *)ctx; SHA512Update(&octx->hash_ctx, msg, len); } static void my_final(void *ctx, uint8_t *hash) { struct outer_ctx *octx = (struct outer_ctx *)ctx; SHA512Final(hash, &octx->hash_ctx); } static const crypto_sign_vtable my_vtable = { my_hash, my_init, my_update, my_final, sizeof(struct outer_ctx) }; int main(void) { uint8_t theirs[64], mine[64]; uint8_t sk[32] = {0x01, 0x02, 0x03, 0x04}; const uint8_t msg[] = { 0x00, 0x01, 0x02, 0x04 }; crypto_ed25519_sign(theirs, sk, NULL, msg, sizeof(msg)); struct outer_ctx ctx; crypto_sign_ctx_abstract *actx = (crypto_sign_ctx_abstract*)&ctx; crypto_sign_init_first_pass_custom_hash(actx, sk, NULL, &my_vtable); crypto_wipe(sk, sizeof(sk)); crypto_sign_update( actx, msg, sizeof(msg)); crypto_sign_init_second_pass(actx); crypto_sign_update( actx, msg, sizeof(msg)); crypto_sign_final( actx, mine); if (crypto_verify64(theirs, mine) != 0) { fprintf(stderr, "theirs != mine\n"); return 1; } puts("ok"); return 0; }
SEE ALSO
crypto_blake2b(), crypto_sha512(), crypto_sign(), crypto_sign_init_first_pass(), crypto_wipe(), intro()
HISTORY
The
crypto_sign_init_first_pass_custom_hash
(),
crypto_sign_public_key_custom_hash
(), and
crypto_check_init_first_pass_custom_hash
() functions
first appeared in Monocypher 3.0.0.
December 28, 2019 | Debian |