2016-02-19 21:08:20 +03:00
|
|
|
|
% ChaCha20 and Poly1305 for IETF protocols
|
2014-07-29 20:32:14 +04:00
|
|
|
|
% Y. Nir (Check Point), A. Langley (Google Inc), D. McNamee (Galois, Inc)
|
|
|
|
|
% July 28, 2014
|
|
|
|
|
|
|
|
|
|
## Abstract
|
|
|
|
|
|
|
|
|
|
This document defines the ChaCha20 stream cipher, as well as the use
|
|
|
|
|
of the Poly1305 authenticator, both as stand-alone algorithms, and as
|
|
|
|
|
a "combined mode", or Authenticated Encryption with Additional Data
|
|
|
|
|
(AEAD) algorithm.
|
|
|
|
|
|
|
|
|
|
This document does not introduce any new crypto, but is meant to
|
|
|
|
|
serve as a stable reference and an implementation guide.
|
|
|
|
|
|
|
|
|
|
This version of the document is a translation of the IETF draft document
|
|
|
|
|
draft-irtf-cfrg-chacha20-poly1305 into "literate Cryptol".
|
|
|
|
|
This document can be loaded and executed by a Cryptol interpreter.
|
|
|
|
|
There is an open source implementation of Cryptol available at http://cryptol.net
|
|
|
|
|
|
|
|
|
|
## Copyright Notice
|
|
|
|
|
|
|
|
|
|
Copyright (c) 2014 IETF Trust and the persons identified as the
|
|
|
|
|
document authors. All rights reserved.
|
|
|
|
|
|
|
|
|
|
This document is subject to BCP 78 and the IETF Trust's Legal
|
|
|
|
|
Provisions Relating to IETF Documents
|
|
|
|
|
(http://trustee.ietf.org/license-info) in effect on the date of
|
|
|
|
|
publication of this document. Please review these documents
|
|
|
|
|
carefully, as they describe your rights and restrictions with respect
|
|
|
|
|
to this document.
|
|
|
|
|
|
|
|
|
|
# Introduction
|
|
|
|
|
|
|
|
|
|
The Advanced Encryption Standard (AES - [FIPS-197]) has become the
|
|
|
|
|
gold standard in encryption. Its efficient design, wide
|
|
|
|
|
implementation, and hardware support allow for high performance in
|
|
|
|
|
many areas. On most modern platforms, AES is anywhere from 4x to 10x
|
|
|
|
|
as fast as the previous most-used cipher, 3-key Data Encryption
|
|
|
|
|
Standard (3DES - [FIPS-46]), which makes it not only the best choice,
|
|
|
|
|
but the only practical choice.
|
|
|
|
|
|
|
|
|
|
The problem is that if future advances in cryptanalysis reveal a
|
|
|
|
|
weakness in AES, users will be in an unenviable position. With the
|
|
|
|
|
only other widely supported cipher being the much slower 3DES, it is
|
|
|
|
|
not feasible to re-configure implementations to use 3DES.
|
|
|
|
|
[standby-cipher] describes this issue and the need for a standby
|
|
|
|
|
cipher in greater detail.
|
|
|
|
|
|
|
|
|
|
This document defines such a standby cipher. We use ChaCha20
|
|
|
|
|
([chacha]) with or without the Poly1305 ([poly1305]) authenticator.
|
|
|
|
|
These algorithms are not just fast. They are fast even in software-
|
|
|
|
|
only C-language implementations, allowing for much quicker deployment
|
|
|
|
|
when compared with algorithms such as AES that are significantly
|
|
|
|
|
accelerated by hardware implementations.
|
|
|
|
|
|
|
|
|
|
This document does not introduce these new algorithms. They have
|
|
|
|
|
been defined in scientific papers by D. J. Bernstein, which are
|
|
|
|
|
referenced by this document. The purpose of this document is to
|
|
|
|
|
serve as a stable reference for IETF documents making use of these
|
|
|
|
|
algorithms.
|
|
|
|
|
|
|
|
|
|
These algorithms have undergone rigorous analysis. Several papers
|
|
|
|
|
discuss the security of Salsa and ChaCha ([LatinDances],
|
|
|
|
|
[Zhenqing2012]).
|
|
|
|
|
|
|
|
|
|
## Conventions Used in This Document
|
|
|
|
|
|
|
|
|
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|
|
|
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
|
|
|
document are to be interpreted as described in [RFC2119].
|
|
|
|
|
|
|
|
|
|
The description of the ChaCha algorithm will at various time refer to
|
|
|
|
|
the ChaCha state as a "vector" or as a "matrix". This follows the
|
|
|
|
|
use of these terms in DJB's paper. The matrix notation is more
|
|
|
|
|
visually convenient, and gives a better notion as to why some rounds
|
|
|
|
|
are called "column rounds" while others are called "diagonal rounds".
|
|
|
|
|
Here's a diagram of how matrices relate to vectors (using the C
|
|
|
|
|
language convention of zero being the index origin).
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
0 , 1 , 2 , 3,
|
|
|
|
|
4 , 5 , 6 , 7,
|
|
|
|
|
8 , 9 , 10, 11,
|
|
|
|
|
12, 13, 14, 15
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The elements in this vector or matrix are 32-bit unsigned integers.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
module ChaCha20 where
|
|
|
|
|
|
|
|
|
|
type ChaChaState = [16][32]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The algorithm name is "ChaCha". "ChaCha20" is a specific instance where
|
|
|
|
|
20 "rounds" (or 80 quarter rounds - see "The ChaCha Quarter Round", below)
|
|
|
|
|
are used. Other variations are defined, with 8 or 12 rounds, but in this
|
|
|
|
|
document we only describe the 20-round ChaCha, so the names "ChaCha"
|
|
|
|
|
and "ChaCha20" will be used interchangeably.
|
|
|
|
|
|
|
|
|
|
# The Algorithms
|
|
|
|
|
|
|
|
|
|
The subsections below describe the algorithms used and the AEAD
|
|
|
|
|
construction.
|
|
|
|
|
|
|
|
|
|
## The ChaCha Quarter Round
|
|
|
|
|
|
|
|
|
|
The basic operation of the ChaCha algorithm is the quarter round. It
|
|
|
|
|
operates on four 32-bit unsigned integers, denoted a, b, c, and d.
|
|
|
|
|
The operation is as follows:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ChaChaQuarterround : [4][32] -> [4][32]
|
|
|
|
|
ChaChaQuarterround [a, b, c, d] = [a'', b'', c'', d''] where
|
|
|
|
|
a' = a + b
|
|
|
|
|
d' = (d ^ a') <<< 16
|
|
|
|
|
c' = c + d'
|
|
|
|
|
b' = (b ^ c') <<< 12
|
|
|
|
|
a'' = a' + b'
|
|
|
|
|
d'' = (d' ^ a'') <<< 8
|
|
|
|
|
c'' = c' + d''
|
|
|
|
|
b'' = (b' ^ c'') <<< 7
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Where "+" denotes integer addition without carry, "^" denotes a
|
|
|
|
|
bitwise XOR, and "<<< n" denotes an n-bit left rotation (towards the
|
|
|
|
|
high bits).
|
|
|
|
|
|
|
|
|
|
For example, let's see the add, XOR and roll operations from the
|
|
|
|
|
first two lines with sample numbers:
|
|
|
|
|
|
|
|
|
|
* b = 0x01020304
|
|
|
|
|
* a = 0x11111111
|
|
|
|
|
* d = 0x01234567
|
|
|
|
|
* a = a + b = 0x11111111 + 0x01020304 = 0x12131415
|
|
|
|
|
* d = d ^ a = 0x01234567 ^ 0x12131415 = 0x13305172
|
|
|
|
|
* d = d<<<16 = 0x51721330
|
|
|
|
|
|
|
|
|
|
### Test Vector for the ChaCha Quarter Round
|
|
|
|
|
|
|
|
|
|
For a test vector, we will use the same numbers as in the example,
|
|
|
|
|
adding something random for c.
|
|
|
|
|
|
|
|
|
|
After running a Quarter Round on these 4 numbers, we get these:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
property ChaChaQuarterround_passes_test =
|
|
|
|
|
ChaChaQuarterround [ 0x11111111 // a
|
|
|
|
|
, 0x01020304 // b
|
|
|
|
|
, 0x9b8d6f43 // c
|
|
|
|
|
, 0x01234567 // d
|
|
|
|
|
]
|
|
|
|
|
==
|
|
|
|
|
[ 0xea2a92f4
|
|
|
|
|
, 0xcb1cf8ce
|
|
|
|
|
, 0x4581472e
|
|
|
|
|
, 0x5881c4bb
|
|
|
|
|
]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## A Quarter Round on the ChaCha State
|
|
|
|
|
|
|
|
|
|
The ChaCha state does not have 4 integer numbers, but 16. So the
|
|
|
|
|
quarter round operation works on only 4 of them - hence the name.
|
|
|
|
|
Each quarter round operates on 4 pre-determined numbers in the ChaCha
|
|
|
|
|
state. We will denote by QUATERROUND(x,y,z,w) a quarter-round
|
|
|
|
|
operation on the numbers at indexes x, y, z, and w of the ChaCha
|
|
|
|
|
state when viewed as a vector. For example, if we apply
|
|
|
|
|
QUARTERROUND(1,5,9,13) to a state, this means running the quarter
|
|
|
|
|
round operation on the elements marked with an asterisk, while
|
|
|
|
|
leaving the others alone:
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
0 *a 2 3
|
|
|
|
|
4 *b 6 7
|
|
|
|
|
8 *c 10 11
|
|
|
|
|
12 *d 14 15
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Note that this run of quarter round is part of what is called a
|
2016-02-19 21:08:20 +03:00
|
|
|
|
"column round".
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
|
|
|
|
### Test Vector for the Quarter Round on the ChaCha state
|
|
|
|
|
|
|
|
|
|
For a test vector, we will use a ChaCha state that was generated
|
|
|
|
|
randomly:
|
|
|
|
|
|
|
|
|
|
Sample ChaCha State
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
879531e0 c5ecf37d 516461b1 c9a62f8a
|
|
|
|
|
44c20ef3 3390af7f d9fc690b 2a5f714c
|
|
|
|
|
53372767 b00a5631 974c541a 359e9963
|
|
|
|
|
5c971061 3d631689 2098d9d6 91dbd320
|
|
|
|
|
```
|
|
|
|
|
We will apply the QUARTERROUND(2,7,8,13) operation to this state.
|
|
|
|
|
For obvious reasons, this one is part of what is called a "diagonal
|
|
|
|
|
round":
|
|
|
|
|
|
|
|
|
|
After applying QUARTERROUND(2,7,8,13)
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
879531e0 c5ecf37d bdb886dc c9a62f8a
|
|
|
|
|
44c20ef3 3390af7f d9fc690b cfacafd2
|
|
|
|
|
e46bea80 b00a5631 974c541a 359e9963
|
|
|
|
|
5c971061 ccc07c79 2098d9d6 91dbd320
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Note that only the numbers in positions 2, 7, 8, and 13 changed.
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
In the Cryptol implementation of ChaCha20, the ChaChaQuarterround is called on four elements at a time,
|
|
|
|
|
and there is no destructive state modification, so it would be artificial to reproduce the
|
2014-07-29 20:32:14 +04:00
|
|
|
|
above example of the partially-destructively modified matrix. Instead, we show the output of
|
|
|
|
|
calling ChaChaQuarterround on the diagonal elements identified above:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
property ChaChaQuarterround_passes_column_test =
|
|
|
|
|
ChaChaQuarterround [ 0x516461b1 // a
|
|
|
|
|
, 0x2a5f714c // b
|
|
|
|
|
, 0x53372767 // c
|
|
|
|
|
, 0x3d631689 // d
|
|
|
|
|
]
|
|
|
|
|
==
|
|
|
|
|
[ 0xbdb886dc
|
|
|
|
|
, 0xcfacafd2
|
|
|
|
|
, 0xe46bea80
|
|
|
|
|
, 0xccc07c79
|
|
|
|
|
]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## The ChaCha20 block Function
|
|
|
|
|
|
|
|
|
|
The ChaCha block function transforms a ChaCha state by running
|
|
|
|
|
multiple quarter rounds.
|
|
|
|
|
|
|
|
|
|
The inputs to ChaCha20 are:
|
|
|
|
|
|
|
|
|
|
* A 256-bit key, treated as a concatenation of 8 32-bit little-endian integers.
|
|
|
|
|
* A 96-bit nonce, treated as a concatenation of 3 32-bit little-endian integers.
|
|
|
|
|
* A 32-bit block count parameter, treated as a 32-bit little-endian integer.
|
|
|
|
|
|
|
|
|
|
The output is 64 random-looking bytes.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ChaCha20Block : ChaChaKey -> [96] -> [32] -> ChaChaState
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The ChaCha algorithm described here uses a 256-bit key. The original
|
|
|
|
|
algorithm also specified 128-bit keys and 8- and 12-round variants,
|
|
|
|
|
but these are out of scope for this document. In this section we
|
|
|
|
|
describe the ChaCha block function.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
type ChaChaKey = [256]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Note also that the original ChaCha had a 64-bit nonce and 64-bit
|
|
|
|
|
block count. We have modified this here to be more consistent with
|
|
|
|
|
recommendations in section 3.2 of [RFC5116]. This limits the use of
|
|
|
|
|
a single (key,nonce) combination to 2^32 blocks, or 256 GB, but that
|
|
|
|
|
is enough for most uses. In cases where a single key is used by
|
|
|
|
|
multiple senders, it is important to make sure that they don't use
|
|
|
|
|
the same nonces. This can be assured by partitioning the nonce space
|
|
|
|
|
so that the first 32 bits are unique per sender, while the other 64
|
|
|
|
|
bits come from a counter.
|
|
|
|
|
|
|
|
|
|
The ChaCha20 state is initialized as follows:
|
|
|
|
|
|
|
|
|
|
* The first 4 words (0-3) are constants: 0x61707865, 0x3320646e,
|
|
|
|
|
0x79622d32, 0x6b206574.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
FirstRow = [0x61707865, 0x3320646e, 0x79622d32, 0x6b206574]
|
|
|
|
|
property FirstRow_correct = groupBy`{8}(join [ littleendian (split w)
|
|
|
|
|
| w <- FirstRow ])
|
|
|
|
|
== "expand 32-byte k"
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* The next 8 words (4-11) are taken from the 256-bit key by
|
|
|
|
|
reading the bytes in little-endian order, in 4-byte chunks.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
KeyToRows : ChaChaKey -> [8][32]
|
|
|
|
|
KeyToRows key = [littleendian (split words) | words <- (split key)]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* Word 12 is a block counter. Since each block is 64-byte,
|
|
|
|
|
a 32-bit word is enough for 256 Gigabytes of data.
|
|
|
|
|
* Words 13-15 are a nonce, which should not be repeated for the same
|
|
|
|
|
key. The 13th word is the first 32 bits of the input nonce taken
|
|
|
|
|
as a little-endian integer, while the 15th word is the last 32
|
|
|
|
|
bits.
|
|
|
|
|
|
|
|
|
|
```verbatim
|
|
|
|
|
Initial state structure:
|
|
|
|
|
|
|
|
|
|
cccccccc cccccccc cccccccc cccccccc
|
|
|
|
|
kkkkkkkk kkkkkkkk kkkkkkkk kkkkkkkk
|
|
|
|
|
kkkkkkkk kkkkkkkk kkkkkkkk kkkkkkkk
|
|
|
|
|
bbbbbbbb nnnnnnnn nnnnnnnn nnnnnnnn
|
|
|
|
|
|
|
|
|
|
c=constant k=key b=blockcount n=nonce
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
NonceToRow : [96] -> [32] -> [4][32]
|
|
|
|
|
NonceToRow n i = [i] # [ littleendian (split words) | words <- groupBy`{32} n ]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
BuildState : ChaChaKey -> [96] -> [32] -> [16][32]
|
|
|
|
|
BuildState key nonce i = split (join (FirstRow # KeyToRows key # NonceToRow nonce i))
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
ChaCha20 runs 20 rounds, alternating between "column" and "diagonal"
|
|
|
|
|
rounds. Each round is 4 quarter-rounds, and they are run as follows.
|
|
|
|
|
Rounds 1-4 are part of the "column" round, while 5-8 are part of the
|
|
|
|
|
"diagonal" round:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
columns = [ 0, 4, 8, 12, // round 1 - column round
|
|
|
|
|
1, 5, 9, 13, // round 2
|
|
|
|
|
2, 6, 10, 14, // round 3
|
|
|
|
|
3, 7, 11, 15 ] // round 4
|
|
|
|
|
diags = [ 0, 5, 10, 15, // round 5 - diagonal round
|
|
|
|
|
1, 6, 11, 12, // round 6
|
|
|
|
|
2, 7, 8, 13, // round 7
|
|
|
|
|
3, 4, 9, 14 ] // round 8
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The Cryptol pattern of using the `@@` operator on permutations of the indices of
|
|
|
|
|
the matrix creates a new matrix that consists of rows that correspond to the
|
|
|
|
|
quarter-round calls. To restore the element-indices to their original ordering,
|
|
|
|
|
after each application we perform the inverse permutation. Since the column
|
|
|
|
|
round is just a square matrix transposition, it inverts itself, but the
|
|
|
|
|
diagonal round needs to have an inverse permutation calculated, which we do
|
|
|
|
|
here:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
inversePermutation (perms:[a+1]b) = [ indexOf i perms | i <- [ 0 .. a ] ]
|
|
|
|
|
invDiags = inversePermutation diags
|
|
|
|
|
invCols = inversePermutation columns // which happens to be the same as columns
|
|
|
|
|
|
|
|
|
|
ChaChaTwoRounds (xs:ChaChaState) = xs'' where
|
|
|
|
|
xs' = join [ChaChaQuarterround x | x <- groupBy`{4}(xs@@columns) ] @@ invCols
|
|
|
|
|
xs'' = (join [ChaChaQuarterround x | x <- groupBy`{4}(xs'@@diags ) ]) @@ invDiags
|
|
|
|
|
|
|
|
|
|
ChaCha : ChaChaState -> [8] -> ChaChaState
|
|
|
|
|
ChaCha s n = chain@n where
|
|
|
|
|
chain = [s] # [ ChaChaTwoRounds ci | ci <- chain | i <- [0 .. 9] ]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
At the end of 20 rounds, the original input words are added to the
|
|
|
|
|
output words, and the result is serialized by sequencing the words
|
|
|
|
|
one-by-one in little-endian order.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
// ChaCha20Block : ChaChaKey -> [96] -> [32] -> ChaChaState (repeated from above)
|
|
|
|
|
ChaCha20Block key nonce i = (ChaCha initialState 10) + initialState where
|
|
|
|
|
initialState = BuildState key nonce i
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector for the ChaCha20 Block Function
|
|
|
|
|
|
|
|
|
|
For a test vector, we will use the following inputs to the ChaCha20
|
|
|
|
|
block function:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TestKey : ChaChaKey
|
|
|
|
|
TestKey = join (parseHexString
|
|
|
|
|
( "00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f:10:11:12:13:" #
|
|
|
|
|
"14:15:16:17:18:19:1a:1b:1c:1d:1e:1f.") )
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The key is a sequence of octets with no particular structure before we copy it
|
|
|
|
|
into the ChaCha state.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TestNonce : [96]
|
|
|
|
|
TestNonce = join (parseHexString "00:00:00:09:00:00:00:4a:00:00:00:00.")
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
After setting up the ChaCha state, it looks like this:
|
|
|
|
|
|
|
|
|
|
ChaCha State with the key set up.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TestState = BuildState TestKey TestNonce 1
|
|
|
|
|
|
|
|
|
|
property BuildState_correct = TestState == [
|
|
|
|
|
0x61707865, 0x3320646e, 0x79622d32, 0x6b206574,
|
|
|
|
|
0x03020100, 0x07060504, 0x0b0a0908, 0x0f0e0d0c,
|
|
|
|
|
0x13121110, 0x17161514, 0x1b1a1918, 0x1f1e1d1c,
|
|
|
|
|
0x00000001, 0x09000000, 0x4a000000, 0x00000000 ]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
After running 20 rounds (10 column rounds interleaved with 10
|
|
|
|
|
diagonal rounds), the ChaCha state looks like this:
|
|
|
|
|
|
|
|
|
|
ChaCha State after 20 rounds
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ChaCha20_state1 = [
|
|
|
|
|
0x837778ab, 0xe238d763, 0xa67ae21e, 0x5950bb2f,
|
|
|
|
|
0xc4f2d0c7, 0xfc62bb2f, 0x8fa018fc, 0x3f5ec7b7,
|
|
|
|
|
0x335271c2, 0xf29489f3, 0xeabda8fc, 0x82e46ebd,
|
|
|
|
|
0xd19c12b4, 0xb04e16de, 0x9e83d0cb, 0x4e3c50a2
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property ChaChaStateAfter20_correct = ChaCha TestState 10 == ChaCha20_state1
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Finally we add the original state to the result (simple vector or
|
|
|
|
|
matrix addition), giving this:
|
|
|
|
|
|
|
|
|
|
ChaCha State at the end of the ChaCha20 operation
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ChaCha20_block_1 = [
|
|
|
|
|
0xe4e7f110, 0x15593bd1, 0x1fdd0f50, 0xc47120a3,
|
|
|
|
|
0xc7f4d1c7, 0x0368c033, 0x9aaa2204, 0x4e6cd4c3,
|
|
|
|
|
0x466482d2, 0x09aa9f07, 0x05d7c214, 0xa2028bd9,
|
|
|
|
|
0xd19c12b5, 0xb94e16de, 0xe883d0cb, 0x4e3c50a2
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property ChaCha20_test1 = ChaCha20Block TestKey TestNonce 1 == ChaCha20_block_1
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## The ChaCha20 encryption algorithm
|
|
|
|
|
|
|
|
|
|
ChaCha20 is a stream cipher designed by D. J. Bernstein. It is a
|
|
|
|
|
refinement of the Salsa20 algorithm, and uses a 256-bit key.
|
|
|
|
|
|
|
|
|
|
ChaCha20 successively calls the ChaCha20 block function, with the
|
|
|
|
|
same key and nonce, and with successively increasing block counter
|
|
|
|
|
parameters. ChaCha20 then serializes the resulting state by writing
|
|
|
|
|
the numbers in little-endian order, creating a key-stream block.
|
|
|
|
|
Concatenating the key-stream blocks from the successive blocks forms
|
|
|
|
|
a key stream, which is then XOR-ed with the plaintext.
|
|
|
|
|
Alternatively, each key-stream block can be XOR-ed with a plaintext
|
|
|
|
|
block before proceeding to create the next block, saving some memory.
|
|
|
|
|
|
|
|
|
|
There is no requirement for the plaintext to be an integral multiple
|
|
|
|
|
of 512-bits. If there is extra keystream from the last block, it is
|
|
|
|
|
discarded. Specific protocols MAY require that the plaintext and
|
|
|
|
|
ciphertext have certain length. Such protocols need to specify how
|
|
|
|
|
the plaintext is padded, and how much padding it receives.
|
|
|
|
|
|
|
|
|
|
The inputs to ChaCha20 are:
|
|
|
|
|
|
|
|
|
|
* A 256-bit key
|
|
|
|
|
* A 32-bit initial counter. This can be set to any number, but will
|
|
|
|
|
usually be zero or one. It makes sense to use 1 if we use the
|
|
|
|
|
zero block for something else, such as generating a one-time
|
|
|
|
|
authenticator key as part of an AEAD algorithm.
|
|
|
|
|
* A 96-bit nonce. In some protocols, this is known as the
|
|
|
|
|
Initialization Vector.
|
|
|
|
|
* an arbitrary-length plaintext
|
|
|
|
|
|
|
|
|
|
The output is an encrypted message of the same length.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
// TODO: reorder args below, and get rid of this wrapper
|
|
|
|
|
ChaCha20Encrypt : {a} (fin a) => ChaChaKey -> [32] -> [96] -> [a][8] -> [a][8]
|
|
|
|
|
ChaCha20Encrypt k i n msg = ChaCha20EncryptBytes msg k n i
|
|
|
|
|
|
|
|
|
|
ChaCha20EncryptBytes msg k n i= [ m ^ kb | m <- msg | kb <- keystream ] where
|
|
|
|
|
keystream = groupBy`{8}(join (join (ChaCha20ExpandKey k n i)))
|
|
|
|
|
|
|
|
|
|
ChaCha20ExpandKey : ChaChaKey -> [96] -> [32] -> [inf]ChaChaState
|
|
|
|
|
ChaCha20ExpandKey k n i = [ ToLittleEndian (ChaCha20Block k n j)
|
|
|
|
|
| j <- ([i ...]:[_][32])
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Decryption is done in the same way. The ChaCha20 block function is
|
|
|
|
|
used to expand the key into a key stream, which is XOR-ed with the
|
|
|
|
|
ciphertext giving back the plaintext.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ChaCha20DecryptBytes = ChaCha20EncryptBytes
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Example and Test Vector for the ChaCha20 Cipher
|
|
|
|
|
|
|
|
|
|
For a test vector, we will use the following inputs to the ChaCha20
|
|
|
|
|
block function:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Sunscreen_Key = join (parseHexString
|
|
|
|
|
( "00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f:10:11:12:13:"
|
|
|
|
|
# "14:15:16:17:18:19:1a:1b:1c:1d:1e:1f."
|
|
|
|
|
) )
|
|
|
|
|
|
|
|
|
|
Sunscreen_Nonce = join (parseHexString "00:00:00:00:00:00:00:4a:00:00:00:00.")
|
|
|
|
|
Sunscreen_Initial_Counter = 1
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
We use the following for the plaintext. It was chosen to be long
|
|
|
|
|
enough to require more than one block, but not so long that it would
|
|
|
|
|
make this example cumbersome (so, less than 3 blocks):
|
|
|
|
|
|
|
|
|
|
Plaintext Sunscreen:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Plaintext_Sunscreen = "Ladies and Gentlemen of the class of '99: " #
|
|
|
|
|
"If I could offer you only one tip for the " #
|
|
|
|
|
"future, sunscreen would be it."
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The following figure shows 4 ChaCha state matrices:
|
|
|
|
|
|
|
|
|
|
1. First block as it is set up.
|
|
|
|
|
1. Second block as it is set up. Note that these blocks are only
|
|
|
|
|
two bits apart - only the counter in position 12 is different.
|
|
|
|
|
1. Third block is the first block after the ChaCha20 block
|
|
|
|
|
operation.
|
|
|
|
|
1. Final block is the second block after the ChaCha20 block
|
|
|
|
|
operation was applied.
|
|
|
|
|
|
|
|
|
|
After that, we show the keystream.
|
|
|
|
|
|
|
|
|
|
First block setup:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Sunscreen_State1 = [
|
|
|
|
|
0x61707865, 0x3320646e, 0x79622d32, 0x6b206574,
|
|
|
|
|
0x03020100, 0x07060504, 0x0b0a0908, 0x0f0e0d0c,
|
|
|
|
|
0x13121110, 0x17161514, 0x1b1a1918, 0x1f1e1d1c,
|
|
|
|
|
0x00000001, 0x00000000, 0x4a000000, 0x00000000
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property SunscreenBuildState_correct =
|
|
|
|
|
BuildState Sunscreen_Key Sunscreen_Nonce 1 == Sunscreen_State1
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Second block setup:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Sunscreen_State2 = [
|
|
|
|
|
0x61707865, 0x3320646e, 0x79622d32, 0x6b206574,
|
|
|
|
|
0x03020100, 0x07060504, 0x0b0a0908, 0x0f0e0d0c,
|
|
|
|
|
0x13121110, 0x17161514, 0x1b1a1918, 0x1f1e1d1c,
|
|
|
|
|
0x00000002, 0x00000000, 0x4a000000, 0x00000000
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property SunscreenBuildState2_correct =
|
|
|
|
|
BuildState Sunscreen_Key Sunscreen_Nonce 2 == Sunscreen_State2
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
First block after block operation:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
SunscreenAfterBlock1 = [
|
|
|
|
|
0xf3514f22, 0xe1d91b40, 0x6f27de2f, 0xed1d63b8,
|
|
|
|
|
0x821f138c, 0xe2062c3d, 0xecca4f7e, 0x78cff39e,
|
|
|
|
|
0xa30a3b8a, 0x920a6072, 0xcd7479b5, 0x34932bed,
|
|
|
|
|
0x40ba4c79, 0xcd343ec6, 0x4c2c21ea, 0xb7417df0
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property SunscreenBlock1_correct =
|
|
|
|
|
ChaCha20Block Sunscreen_Key Sunscreen_Nonce 1 == SunscreenAfterBlock1
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Second block after block operation:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
SunscreenAfterBlock2 = [
|
|
|
|
|
0x9f74a669, 0x410f633f, 0x28feca22, 0x7ec44dec,
|
|
|
|
|
0x6d34d426, 0x738cb970, 0x3ac5e9f3, 0x45590cc4,
|
|
|
|
|
0xda6e8b39, 0x892c831a, 0xcdea67c1, 0x2b7e1d90,
|
|
|
|
|
0x037463f3, 0xa11a2073, 0xe8bcfb88, 0xedc49139
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
property SunscreenBlock2_correct =
|
|
|
|
|
ChaCha20Block Sunscreen_Key Sunscreen_Nonce 2 == SunscreenAfterBlock2
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Keystream:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
SunscreenKeystream = (parseHexString
|
|
|
|
|
( "22:4f:51:f3:40:1b:d9:e1:2f:de:27:6f:b8:63:1d:ed:8c:13:1f:82:3d:2c:06:"
|
|
|
|
|
# "e2:7e:4f:ca:ec:9e:f3:cf:78:8a:3b:0a:a3:72:60:0a:92:b5:79:74:cd:ed:2b:"
|
|
|
|
|
# "93:34:79:4c:ba:40:c6:3e:34:cd:ea:21:2c:4c:f0:7d:41:b7:69:a6:74:9f:3f:"
|
|
|
|
|
# "63:0f:41:22:ca:fe:28:ec:4d:c4:7e:26:d4:34:6d:70:b9:8c:73:f3:e9:c5:3a:"
|
|
|
|
|
# "c4:0c:59:45:39:8b:6e:da:1a:83:2c:89:c1:67:ea:cd:90:1d:7e:2b:f3:63."
|
|
|
|
|
) )
|
|
|
|
|
|
2015-03-10 00:37:25 +03:00
|
|
|
|
SunscreenKeystream_correct (skref:[skwidth][8]) =
|
2014-07-29 20:32:14 +04:00
|
|
|
|
take`{skwidth}
|
|
|
|
|
(groupBy`{8} (join (join(ChaCha20ExpandKey
|
|
|
|
|
Sunscreen_Key Sunscreen_Nonce 1)))) == skref
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Finally, we XOR the Keystream with the plaintext, yielding the Ciphertext:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Ciphertext_Sunscreen =
|
|
|
|
|
[0x6e, 0x2e, 0x35, 0x9a, 0x25, 0x68, 0xf9, 0x80, 0x41, 0xba, 0x07,
|
|
|
|
|
0x28, 0xdd, 0x0d, 0x69, 0x81, 0xe9, 0x7e, 0x7a, 0xec, 0x1d, 0x43,
|
|
|
|
|
0x60, 0xc2, 0x0a, 0x27, 0xaf, 0xcc, 0xfd, 0x9f, 0xae, 0x0b, 0xf9,
|
|
|
|
|
0x1b, 0x65, 0xc5, 0x52, 0x47, 0x33, 0xab, 0x8f, 0x59, 0x3d, 0xab,
|
|
|
|
|
0xcd, 0x62, 0xb3, 0x57, 0x16, 0x39, 0xd6, 0x24, 0xe6, 0x51, 0x52,
|
|
|
|
|
0xab, 0x8f, 0x53, 0x0c, 0x35, 0x9f, 0x08, 0x61, 0xd8, 0x07, 0xca,
|
|
|
|
|
0x0d, 0xbf, 0x50, 0x0d, 0x6a, 0x61, 0x56, 0xa3, 0x8e, 0x08, 0x8a,
|
|
|
|
|
0x22, 0xb6, 0x5e, 0x52, 0xbc, 0x51, 0x4d, 0x16, 0xcc, 0xf8, 0x06,
|
|
|
|
|
0x81, 0x8c, 0xe9, 0x1a, 0xb7, 0x79, 0x37, 0x36, 0x5a, 0xf9, 0x0b,
|
|
|
|
|
0xbf, 0x74, 0xa3, 0x5b, 0xe6, 0xb4, 0x0b, 0x8e, 0xed, 0xf2, 0x78,
|
|
|
|
|
0x5e, 0x42, 0x87, 0x4d]
|
|
|
|
|
|
|
|
|
|
property ChaCha_encrypt_sunscreen_correct =
|
|
|
|
|
ChaCha20EncryptBytes Plaintext_Sunscreen Sunscreen_Key Sunscreen_Nonce 1
|
|
|
|
|
== Ciphertext_Sunscreen
|
|
|
|
|
|
|
|
|
|
property Sunscreen_decrypt_correct =
|
|
|
|
|
ChaCha20DecryptBytes Ciphertext_Sunscreen Sunscreen_Key Sunscreen_Nonce 1
|
|
|
|
|
== Plaintext_Sunscreen
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
# The Poly1305 algorithm
|
|
|
|
|
|
|
|
|
|
Poly1305 is a one-time authenticator designed by D. J. Bernstein.
|
|
|
|
|
Poly1305 takes a 32-byte one-time key and a message and produces a
|
|
|
|
|
16-byte tag.
|
|
|
|
|
|
|
|
|
|
The original article ([poly1305]) is entitled "The Poly1305-AES
|
|
|
|
|
message-authentication code", and the MAC function there requires a
|
|
|
|
|
128-bit AES key, a 128-bit "additional key", and a 128-bit (non-
|
|
|
|
|
secret) nonce. AES is used there for encrypting the nonce, so as to
|
|
|
|
|
get a unique (and secret) 128-bit string, but as the paper states,
|
|
|
|
|
"There is nothing special about AES here. One can replace AES with
|
|
|
|
|
an arbitrary keyed function from an arbitrary set of nonces to 16-
|
|
|
|
|
byte strings."
|
|
|
|
|
|
|
|
|
|
Regardless of how the key is generated, the key is partitioned into
|
|
|
|
|
two parts, called "r" and "s". The pair ``(r,s)`` should be unique, and
|
|
|
|
|
MUST be unpredictable for each invocation (that is why it was
|
|
|
|
|
originally obtained by encrypting a nonce), while "r" MAY be
|
|
|
|
|
constant, but needs to be modified as follows before being used: ("r"
|
|
|
|
|
is treated as a 16-octet little-endian number):
|
|
|
|
|
|
|
|
|
|
* r[3], r[7], r[11], and r[15] are required to have their top four
|
|
|
|
|
bits clear (be smaller than 16)
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Om = 15 // odd masks - for 3, 7, 11 & 15
|
|
|
|
|
```
|
|
|
|
|
* r[4], r[8], and r[12] are required to have their bottom two bits
|
|
|
|
|
clear (be divisible by 4)
|
|
|
|
|
|
|
|
|
|
The following Cryptol code clamps "r" to be appropriate:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Em = 252 // even masks - for 4, 8 & 12
|
|
|
|
|
nm = 255 // no mask
|
|
|
|
|
|
|
|
|
|
PolyMasks : [16][8] // mask indices
|
|
|
|
|
PolyMasks = [ nm, nm, nm, Om, // 0-3
|
|
|
|
|
Em, nm, nm, Om, // 4-7
|
|
|
|
|
Em, nm, nm, Om, // 8-11
|
|
|
|
|
Em, nm, nm, Om ] // 12-15
|
|
|
|
|
|
|
|
|
|
Poly1305_clamp : [16][8] -> [16][8]
|
|
|
|
|
Poly1305_clamp r = [ re && mask | re <- r | mask <- PolyMasks ]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The "s" should be unpredictable, but it is perfectly acceptable to
|
|
|
|
|
generate both "r" and "s" uniquely each time. Because each of them
|
|
|
|
|
is 128-bit, pseudo-randomly generating them (see "Generating the
|
|
|
|
|
Poly1305 key using ChaCha20") is also acceptable.
|
|
|
|
|
|
|
|
|
|
The inputs to Poly1305 are:
|
|
|
|
|
|
|
|
|
|
* A 256-bit one-time key
|
|
|
|
|
* An arbitrary length message (comprised of `floorBlocks` 16-byte blocks,
|
|
|
|
|
and `rem` bytes left over)
|
|
|
|
|
|
|
|
|
|
The output is a 128-bit tag.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-01-13 03:49:23 +03:00
|
|
|
|
Poly1305 : {m} (fin m)
|
2014-07-29 20:32:14 +04:00
|
|
|
|
=> [256] -> [m][8] -> [16][8]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Set the constant prime "P" be 2^130-5.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
P : [136]
|
|
|
|
|
P = 2^^130 - 5
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
First, the "r" value should be clamped.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Poly1305 key msg = result where
|
2016-01-13 03:49:23 +03:00
|
|
|
|
type floorBlocks = m / 16
|
|
|
|
|
type rem = m - floorBlocks*16
|
2014-07-29 20:32:14 +04:00
|
|
|
|
[ru, su] = split key
|
|
|
|
|
r : [136] // internal arithmetic on (128+8)-bit numbers
|
|
|
|
|
r = littleendian ((Poly1305_clamp (split ru)) # [0x00])
|
|
|
|
|
s = littleendian ((split su) # [0x00])
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Next, divide the message into 16-byte blocks. The last block might be shorter:
|
|
|
|
|
|
|
|
|
|
* Read each block as a little-endian number.
|
|
|
|
|
* Add one bit beyond the number of octets. For a 16-byte block this
|
|
|
|
|
is equivalent to adding 2^128 to the number. For the shorter
|
|
|
|
|
block it can be 2^120, 2^112, or any power of two that is evenly
|
|
|
|
|
divisible by 8, all the way down to 2^8.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
// pad all the blocks uniformly (we'll handle the final block later)
|
|
|
|
|
paddedBlocks = [ 0x01 # (littleendian block)
|
|
|
|
|
| block <- groupBy`{16}(msg # (zero:[inf][8])) ]
|
|
|
|
|
```
|
|
|
|
|
* If the block is not 17 bytes long (the last block), then left-pad it with
|
|
|
|
|
zeros. This is meaningless if you're treating it them as numbers.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
lastBlock : [136]
|
|
|
|
|
lastBlock = zero # 0x01 # (littleendian (drop`{16*floorBlocks} msg))
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* Add the current block to the accumulator.
|
|
|
|
|
* Multiply by "r"
|
2016-02-19 21:08:20 +03:00
|
|
|
|
* Set the accumulator to the result modulo p. To summarize:
|
2014-07-29 20:32:14 +04:00
|
|
|
|
``accum[i+1] = ((accum[i]+block)*r) % p``.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
accum:[_][136]
|
|
|
|
|
accum = [zero:[136]] # [ computeElt a b r P | a <- accum | b <- paddedBlocks ]
|
|
|
|
|
// ^ the accumulator starts at zero
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* If the block division leaves no remainder, the last value of the accumulator is good
|
|
|
|
|
otherwise compute the special-case padded block, and compute the final value of the accumulator
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
lastAccum : [136]
|
|
|
|
|
lastAccum = if `rem == 0
|
|
|
|
|
then accum@`floorBlocks
|
|
|
|
|
else computeElt (accum@`floorBlocks) lastBlock r P
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Finally, the value of the secret key "s" is added to the accumulator,
|
|
|
|
|
and the 128 least significant bits are serialized in little-endian
|
|
|
|
|
order to form the tag.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
result = reverse (groupBy`{8} (drop`{8}(lastAccum + s)))
|
|
|
|
|
|
|
|
|
|
// Compute ((a + b) * r ) % P being pedantic about bit-widths
|
|
|
|
|
computeElt : [136] -> [136] -> [136] -> [136] -> [136]
|
|
|
|
|
computeElt a b r p = (drop`{137}bigResult) where
|
|
|
|
|
bigResult : [273]
|
|
|
|
|
aPlusB : [137]
|
|
|
|
|
aPlusB = (0b0#a) + (0b0#b) // make room for carry
|
|
|
|
|
timesR : [273]
|
|
|
|
|
timesR = ((zero:[136])#aPlusB) * ((zero:[137])#r) // [a]*[b]=[a+b]
|
|
|
|
|
bigResult = timesR % ((zero:[137])#p)
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Poly1305 Example and Test Vector
|
|
|
|
|
|
|
|
|
|
For our example, we will dispense with generating the one-time key
|
|
|
|
|
using AES, and assume that we got the following keying material:
|
|
|
|
|
|
|
|
|
|
* Key Material: 85:d6:be:78:57:55:6d:33:7f:44:52:fe:42:d5:06:a8:01:
|
|
|
|
|
03:80:8a:fb:0d:b2:fd:4a:bf:f6:af:41:49:f5:1b
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-02-19 21:08:20 +03:00
|
|
|
|
Poly1305TestKey = join (parseHexString
|
2014-07-29 20:32:14 +04:00
|
|
|
|
( "85:d6:be:78:57:55:6d:33:7f:44:52:fe:42:d5:06:a8:01:"
|
|
|
|
|
# "03:80:8a:fb:0d:b2:fd:4a:bf:f6:af:41:49:f5:1b."
|
|
|
|
|
) )
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* s as an octet string: 01:03:80:8a:fb:0d:b2:fd:4a:bf:f6:af:41:49:f5:1b
|
|
|
|
|
* s as a 128-bit number: 1bf54941aff6bf4afdb20dfb8a800301
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Poly1305Test_s = parseHexString
|
|
|
|
|
"01:03:80:8a:fb:0d:b2:fd:4a:bf:f6:af:41:49:f5:1b."
|
|
|
|
|
Poly1305Test_sbits = join (reverse Poly1305Test_s)
|
|
|
|
|
|
|
|
|
|
property poly1306Sokay = Poly1305Test_sbits == 0x1bf54941aff6bf4afdb20dfb8a800301
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Poly1305TestMessage = "Cryptographic Forum Research Group"
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* r before clamping: 85:d6:be:78:57:55:6d:33:7f:44:52:fe:42:d5:06:a8
|
|
|
|
|
* Clamped r as a number: 806d5400e52447c036d555408bed685.
|
|
|
|
|
|
|
|
|
|
Since Poly1305 works in 16-byte chunks, the 34-byte message divides
|
|
|
|
|
into 3 blocks. In the following calculation, "Acc" denotes the
|
|
|
|
|
accumulator and "Block" the current block:
|
|
|
|
|
|
|
|
|
|
Here we define a Cryptol function that returns all of the intermediate
|
|
|
|
|
values of the accumulator:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
// TODO: refactor the Poly function in terms of this AccumBlocks
|
|
|
|
|
// challenge: doing so while maintaining the clean literate correspondence with the spec
|
2016-02-19 21:08:20 +03:00
|
|
|
|
AccumBlocks : {m, floorBlocks, rem} (fin m, floorBlocks == m/16, rem == m - floorBlocks*16)
|
2014-07-29 20:32:14 +04:00
|
|
|
|
=> [256] -> [m][8] -> ([_][136], [136])
|
|
|
|
|
|
|
|
|
|
AccumBlocks key msg = (accum, lastAccum) where
|
|
|
|
|
[ru, su] = split key
|
|
|
|
|
r : [136] // internal arithmetic on (128+8)-bit numbers
|
|
|
|
|
r = littleendian ((Poly1305_clamp (split ru)) # [0x00])
|
|
|
|
|
s = littleendian ((split su) # [0x00])
|
|
|
|
|
// pad all the blocks uniformly (we'll handle the final block later)
|
|
|
|
|
paddedBlocks = [ 0x01 # (littleendian block)
|
|
|
|
|
| block <- groupBy`{16}(msg # (zero:[inf][8])) ]
|
|
|
|
|
lastBlock : [136]
|
|
|
|
|
lastBlock = zero # 0x01 # (littleendian (drop`{16*floorBlocks} msg))
|
|
|
|
|
accum:[_][136]
|
|
|
|
|
accum = [zero:[136]] # [ computeElt a b r P | a <- accum | b <- paddedBlocks ]
|
|
|
|
|
// ^ the accumulator starts at zero
|
|
|
|
|
lastAccum : [136]
|
|
|
|
|
lastAccum = if `rem == 0
|
|
|
|
|
then accum@`floorBlocks
|
|
|
|
|
else computeElt (accum@`floorBlocks) lastBlock r P
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
Block #1
|
|
|
|
|
|
|
|
|
|
Acc = 00
|
|
|
|
|
Block = 6f4620636968706172676f7470797243
|
|
|
|
|
Block with 0x01 byte = 016f4620636968706172676f7470797243
|
|
|
|
|
Acc + block = 016f4620636968706172676f7470797243
|
|
|
|
|
(Acc+Block) * r =
|
|
|
|
|
b83fe991ca66800489155dcd69e8426ba2779453994ac90ed284034da565ecf
|
|
|
|
|
Acc = ((Acc+Block)*r) % P = 2c88c77849d64ae9147ddeb88e69c83fc
|
|
|
|
|
|
|
|
|
|
Block #2
|
|
|
|
|
|
|
|
|
|
Acc = 2c88c77849d64ae9147ddeb88e69c83fc
|
|
|
|
|
Block = 6f7247206863726165736552206d7572
|
|
|
|
|
Block with 0x01 byte = 016f7247206863726165736552206d7572
|
|
|
|
|
Acc + block = 437febea505c820f2ad5150db0709f96e
|
|
|
|
|
(Acc+Block) * r =
|
|
|
|
|
21dcc992d0c659ba4036f65bb7f88562ae59b32c2b3b8f7efc8b00f78e548a26
|
|
|
|
|
Acc = ((Acc+Block)*r) % P = 2d8adaf23b0337fa7cccfb4ea344b30de
|
|
|
|
|
|
|
|
|
|
Last Block
|
|
|
|
|
|
|
|
|
|
Acc = 2d8adaf23b0337fa7cccfb4ea344b30de
|
|
|
|
|
Block = 7075
|
|
|
|
|
Block with 0x01 byte = 017075
|
|
|
|
|
Acc + block = 2d8adaf23b0337fa7cccfb4ea344ca153
|
|
|
|
|
(Acc + Block) * r =
|
|
|
|
|
16d8e08a0f3fe1de4fe4a15486aca7a270a29f1e6c849221e4a6798b8e45321f
|
|
|
|
|
((Acc + Block) * r) % P = 28d31b7caff946c77c8844335369d03a7
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-02-19 21:08:20 +03:00
|
|
|
|
property polyBlocksOK =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
(blocks @ 1 == 0x02c88c77849d64ae9147ddeb88e69c83fc) /\
|
|
|
|
|
(blocks @ 2 == 0x02d8adaf23b0337fa7cccfb4ea344b30de) /\
|
2014-07-29 20:32:14 +04:00
|
|
|
|
(lastBlock == 0x028d31b7caff946c77c8844335369d03a7) where
|
|
|
|
|
(blocks, lastBlock) = AccumBlocks Poly1305TestKey Poly1305TestMessage
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Adding s we get this number, and serialize if to get the tag:
|
|
|
|
|
|
|
|
|
|
Acc + s = 2a927010caf8b2bc2c6365130c11d06a8
|
|
|
|
|
|
|
|
|
|
Tag: a8:06:1d:c1:30:51:36:c6:c2:2b:8b:af:0c:01:27:a9
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
```cryptol
|
|
|
|
|
// Putting it all together and testing:
|
|
|
|
|
|
|
|
|
|
Poly1305TestTag = "a8:06:1d:c1:30:51:36:c6:c2:2b:8b:af:0c:01:27:a9."
|
|
|
|
|
|
|
|
|
|
property Poly1305_passes_test = Poly1305 Poly1305TestKey Poly1305TestMessage ==
|
|
|
|
|
parseHexString Poly1305TestTag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Generating the Poly1305 key using ChaCha20
|
|
|
|
|
|
|
|
|
|
As said in the "Poly 1305 Algorithm" section, it is acceptable to generate
|
|
|
|
|
the one-time Poly1305 pseudo-randomly. This section proposes such a method.
|
|
|
|
|
|
|
|
|
|
To generate such a key pair (r,s), we will use the ChaCha20 block
|
|
|
|
|
function described in Section 2.3. This assumes that we have a 256-
|
|
|
|
|
bit session key for the MAC function, such as SK_ai and SK_ar in
|
|
|
|
|
IKEv2 ([RFC5996]), the integrity key in ESP and AH, or the
|
|
|
|
|
client_write_MAC_key and server_write_MAC_key in TLS. Any document
|
|
|
|
|
that specifies the use of Poly1305 as a MAC algorithm for some
|
|
|
|
|
protocol must specify that 256 bits are allocated for the integrity
|
|
|
|
|
key. Note that in the AEAD construction defined in Section 2.8, the
|
|
|
|
|
same key is used for encryption and key generation, so the use of
|
|
|
|
|
SK_a* or *_write_MAC_key is only for stand-alone Poly1305.
|
|
|
|
|
|
|
|
|
|
The method is to call the block function with the following
|
|
|
|
|
parameters:
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
* The 256-bit session integrity key is used as the ChaCha20 key.
|
|
|
|
|
* The block counter is set to zero.
|
|
|
|
|
* The protocol will specify a 96-bit or 64-bit nonce. This MUST be
|
|
|
|
|
unique per invocation with the same key, so it MUST NOT be
|
|
|
|
|
randomly generated. A counter is a good way to implement this,
|
|
|
|
|
but other methods, such as an LFSR are also acceptable. ChaCha20
|
|
|
|
|
as specified here requires a 96-bit nonce. So if the provided
|
|
|
|
|
nonce is only 64-bit, then the first 32 bits of the nonce will be
|
|
|
|
|
set to a constant number. This will usually be zero, but for
|
|
|
|
|
protocols with multiple senders it may be different for each
|
|
|
|
|
sender, but should be the same for all invocations of the function
|
|
|
|
|
with the same key by a particular sender.
|
|
|
|
|
|
|
|
|
|
After running the block function, we have a 512-bit state. We take
|
|
|
|
|
the first 256 bits or the serialized state, and use those as the one-
|
|
|
|
|
time Poly1305 key: The first 128 bits are clamped, and form "r",
|
|
|
|
|
while the next 128 bits become "s". The other 256 bits are
|
|
|
|
|
discarded.
|
|
|
|
|
|
|
|
|
|
Note that while many protocols have provisions for a nonce for
|
|
|
|
|
encryption algorithms (often called Initialization Vectors, or IVs),
|
|
|
|
|
they usually don't have such a provision for the MAC function. In
|
|
|
|
|
that case the per-invocation nonce will have to come from somewhere
|
|
|
|
|
else, such as a message counter.
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
### Poly1305 Key Generation Test Vector
|
|
|
|
|
|
|
|
|
|
For this example, we'll set:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
PolyKeyTest = join (parseHexString (
|
|
|
|
|
"80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f " #
|
|
|
|
|
"90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f "
|
|
|
|
|
))
|
|
|
|
|
|
|
|
|
|
PolyNonceTest : [96]
|
|
|
|
|
PolyNonceTest = join (
|
|
|
|
|
parseHexString ("00 00 00 00 00 01 02 03 04 05 06 07 "))
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The ChaCha state set up with key, nonce, and block counter zero:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
PolyBuildState_testVector = [
|
|
|
|
|
0x61707865, 0x3320646e, 0x79622d32, 0x6b206574,
|
|
|
|
|
0x83828180, 0x87868584, 0x8b8a8988, 0x8f8e8d8c,
|
|
|
|
|
0x93929190, 0x97969594, 0x9b9a9998, 0x9f9e9d9c,
|
|
|
|
|
0x00000000, 0x00000000, 0x03020100, 0x07060504 ]
|
|
|
|
|
|
|
|
|
|
property PolyBuildState_correct = BuildState PolyKeyTest PolyNonceTest 0
|
|
|
|
|
== PolyBuildState_testVector
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The ChaCha state after 20 rounds:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
PolyChaChaState_testVector = [
|
|
|
|
|
0x8ba0d58a, 0xcc815f90, 0x27405081, 0x7194b24a,
|
|
|
|
|
0x37b633a8, 0xa50dfde3, 0xe2b8db08, 0x46a6d1fd,
|
|
|
|
|
0x7da03782, 0x9183a233, 0x148ad271, 0xb46773d1,
|
|
|
|
|
0x3cc1875a, 0x8607def1, 0xca5c3086, 0x7085eb87 ]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
property PolyChaCha_correct = ChaCha20Block PolyKeyTest PolyNonceTest 0 ==
|
|
|
|
|
PolyChaChaState_testVector
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
And that output is also the 32-byte one-time key used for Poly1305.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
PolyOutput = join (parseHexString (
|
|
|
|
|
"8a d5 a0 8b 90 5f 81 cc 81 50 40 27 4a b2 94 71 " #
|
|
|
|
|
"a8 33 b6 37 e3 fd 0d a5 08 db b8 e2 fd d1 a6 46 "))
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
GeneratePolyKeyUsingChaCha k n i = join [littleendian (groupBy`{8}b)
|
2014-07-29 20:32:14 +04:00
|
|
|
|
| b <- take `{8}(ChaCha20Block k n i) ]
|
|
|
|
|
|
|
|
|
|
property Poly_passes_test = GeneratePolyKeyUsingChaCha PolyKeyTest PolyNonceTest 0 == PolyOutput
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## A Pseudo-Random Function for ChaCha/Poly-1305 based Crypto Suites
|
|
|
|
|
|
|
|
|
|
Some protocols such as IKEv2([RFC5996]) require a Pseudo-Random
|
|
|
|
|
Function (PRF), mostly for key derivation. In the IKEv2 definition,
|
|
|
|
|
a PRF is a function that accepts a variable-length key and a
|
|
|
|
|
variable-length input, and returns a fixed-length output. This
|
|
|
|
|
section does not specify such a function.
|
|
|
|
|
|
|
|
|
|
Poly-1305 is an obvious choice, because MAC functions are often used
|
|
|
|
|
as PRFs. However, Poly-1305 prohibits using the same key twice,
|
|
|
|
|
whereas the PRF in IKEv2 is used multiple times with the same key.
|
|
|
|
|
Adding a nonce or a counter to Poly-1305 can solve this issue, much
|
|
|
|
|
as we do when using this function as a MAC, but that would require
|
|
|
|
|
changing the interface for the PRF function.
|
|
|
|
|
|
|
|
|
|
Chacha20 could be used as a key-derivation function, by generating an
|
|
|
|
|
arbitrarily long keystream. However, that is not what protocols such
|
|
|
|
|
as IKEv2 require.
|
|
|
|
|
|
|
|
|
|
For this reason, this document does not specify a PRF, and recommends
|
|
|
|
|
that crypto suites use some other PRF such as PRF_HMAC_SHA2_256
|
|
|
|
|
(section 2.1.2 of [RFC4868])
|
|
|
|
|
|
|
|
|
|
## AEAD Construction
|
|
|
|
|
|
|
|
|
|
AEAD_CHACHA20-POLY1305 is an authenticated encryption with additional
|
|
|
|
|
data algorithm. The inputs to AEAD_CHACHA20-POLY1305 are:
|
|
|
|
|
|
|
|
|
|
* A 256-bit key
|
|
|
|
|
* A 96-bit nonce - different for each invocation with the same key.
|
|
|
|
|
* An arbitrary length plaintext (fewer than 2^64 bytes)
|
|
|
|
|
* Arbitrary length additional data (AAD) (fewer than 2^64 bytes)
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AEAD_CHACHA20_POLY1305 : {m, n}
|
|
|
|
|
(fin m, 64 >= width m
|
|
|
|
|
,fin n, 64 >= width n )
|
|
|
|
|
=> [256] -> [96] -> [m][8] -> [n][8]
|
|
|
|
|
-> [m+16][8]
|
|
|
|
|
|
2015-08-29 01:20:55 +03:00
|
|
|
|
AEAD_CHACHA20_POLY1305 k nonce p aad = (ct # tag) where
|
2014-07-29 20:32:14 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Some protocols may have unique per-invocation inputs that are not 96-
|
|
|
|
|
bit in length. For example, IPsec may specify a 64-bit nonce. In
|
|
|
|
|
such a case, it is up to the protocol document to define how to
|
|
|
|
|
transform the protocol nonce into a 96-bit nonce, for example by
|
|
|
|
|
concatenating a constant value.
|
|
|
|
|
|
|
|
|
|
The ChaCha20 and Poly1305 primitives are combined into an AEAD that
|
|
|
|
|
takes a 256-bit key and 96-bit nonce as follows:
|
|
|
|
|
|
|
|
|
|
* First, a Poly1305 one-time key is generated from the 256-bit key
|
|
|
|
|
and nonce using the procedure described in "Generating the Poly1305 key using ChaCha20".
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
PolyKey = GeneratePolyKeyUsingChaCha k nonce 0
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* Next, the ChaCha20 encryption function is called to encrypt the
|
|
|
|
|
plaintext, using the input key and nonce, and with the initial
|
|
|
|
|
counter set to 1.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-02-19 21:08:20 +03:00
|
|
|
|
ct = ChaCha20EncryptBytes p k nonce 1
|
2014-07-29 20:32:14 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
* Finally, the Poly1305 function is called with the Poly1305 key
|
|
|
|
|
calculated above, and a message constructed as a concatenation of
|
|
|
|
|
the following:
|
|
|
|
|
* The AAD
|
|
|
|
|
* padding1 - the padding is up to 15 zero bytes, and it brings
|
|
|
|
|
the total length so far to an integral multiple of 16. If the
|
|
|
|
|
length of the AAD was already an integral multiple of 16 bytes,
|
|
|
|
|
this field is zero-length.
|
|
|
|
|
* The ciphertext
|
|
|
|
|
* padding2 - the padding is up to 15 zero bytes, and it brings
|
|
|
|
|
the total length so far to an integral multiple of 16. If the
|
|
|
|
|
length of the ciphertext was already an integral multiple of 16
|
|
|
|
|
bytes, this field is zero-length.
|
|
|
|
|
* The length of the additional data in octets (as a 64-bit
|
|
|
|
|
little-endian integer).
|
|
|
|
|
* The length of the ciphertext in octets (as a 64-bit little-
|
|
|
|
|
endian integer).
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
ptlen : [8][8]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
ptlen = groupBy`{8}(littleendian (groupBy`{8}(`m:[64])))
|
2014-07-29 20:32:14 +04:00
|
|
|
|
adlen : [8][8]
|
|
|
|
|
adlen = groupBy`{8}(littleendian (groupBy`{8}(`n:[64])))
|
|
|
|
|
// compute padding
|
2014-08-04 21:52:50 +04:00
|
|
|
|
tag = Poly1305 PolyKey (AeadConstruction aad ct)
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
//ct in this function has tag removed
|
|
|
|
|
AeadConstruction (AAD : [n][8]) (CT : [m][8]) = (AAD # padding1 # CT # padding2 # adlen # ptlen) where
|
2017-10-03 22:31:37 +03:00
|
|
|
|
padding1 = (zero:[n %^ 16][8])
|
|
|
|
|
padding2 = (zero:[m %^ 16][8])
|
2014-08-04 21:52:50 +04:00
|
|
|
|
adlen : [8][8]
|
|
|
|
|
adlen = groupBy`{8}(littleendian (groupBy`{8}(`n:[64])))
|
|
|
|
|
ptlen : [8][8]
|
|
|
|
|
ptlen = groupBy`{8}(littleendian (groupBy`{8}(`m:[64])))
|
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
The output from the AEAD is twofold:
|
|
|
|
|
|
|
|
|
|
* A ciphertext of the same length as the plaintext.
|
|
|
|
|
* A 128-bit tag, which is the output of the Poly1305 function.
|
|
|
|
|
|
|
|
|
|
Decryption is pretty much the same thing.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AEAD_CHACHA20_POLY1305_DECRYPT : {m, n} (fin m, fin n
|
|
|
|
|
,64 >= width m, 64 >= width n)
|
|
|
|
|
=> [256] -> [96]
|
|
|
|
|
-> [m+16][8] -> [n][8]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
-> ([m][8], Bit)
|
2014-07-29 20:32:14 +04:00
|
|
|
|
AEAD_CHACHA20_POLY1305_DECRYPT k nonce ct ad = (pt, valid) where
|
|
|
|
|
inTag = drop`{m}ct
|
|
|
|
|
inCt = take`{m}ct
|
|
|
|
|
PolyKey = GeneratePolyKeyUsingChaCha k nonce 0
|
|
|
|
|
pt = ChaCha20DecryptBytes inCt k nonce 1
|
|
|
|
|
ptlen : [8][8]
|
|
|
|
|
ptlen = groupBy`{8}(littleendian (groupBy`{8}(`m:[64])))
|
|
|
|
|
adlen : [8][8]
|
|
|
|
|
adlen = groupBy`{8}(littleendian (groupBy`{8}(`n:[64])))
|
2014-08-04 21:52:50 +04:00
|
|
|
|
tag = Poly1305 PolyKey (AeadConstruction ad inCt)
|
2014-07-29 20:32:14 +04:00
|
|
|
|
valid = tag == inTag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
A few notes about this design:
|
|
|
|
|
|
|
|
|
|
1. The amount of encrypted data possible in a single invocation is
|
|
|
|
|
2^32-1 blocks of 64 bytes each, because of the size of the block
|
|
|
|
|
counter field in the ChaCha20 block function. This gives a total
|
|
|
|
|
of 247,877,906,880 bytes, or nearly 256 GB. This should be
|
|
|
|
|
enough for traffic protocols such as IPsec and TLS, but may be
|
|
|
|
|
too small for file and/or disk encryption. For such uses, we can
|
|
|
|
|
return to the original design, reduce the nonce to 64 bits, and
|
|
|
|
|
use the integer at position 13 as the top 32 bits of a 64-bit
|
|
|
|
|
block counter, increasing the total message size to over a
|
|
|
|
|
million petabytes (1,180,591,620,717,411,303,360 bytes to be
|
|
|
|
|
exact).
|
|
|
|
|
|
|
|
|
|
1. Despite the previous item, the ciphertext length field in the
|
|
|
|
|
construction of the buffer on which Poly1305 runs limits the
|
|
|
|
|
ciphertext (and hence, the plaintext) size to 2^64 bytes, or
|
|
|
|
|
sixteen thousand petabytes (18,446,744,073,709,551,616 bytes to
|
|
|
|
|
be exact).
|
|
|
|
|
|
|
|
|
|
### Example and Test Vector for AEAD_CHACHA20-POLY1305
|
|
|
|
|
|
|
|
|
|
For a test vector, we will use the following inputs to the
|
|
|
|
|
AEAD_CHACHA20-POLY1305 function:
|
|
|
|
|
|
|
|
|
|
Plaintext:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AeadPt = "Ladies and Gentlemen of the class of '99: " #
|
|
|
|
|
"If I could offer you only one tip for " #
|
|
|
|
|
"the future, sunscreen would be it."
|
|
|
|
|
|
|
|
|
|
AeadAAD = parseHexString "50 51 52 53 c0 c1 c2 c3 c4 c5 c6 c7 "
|
|
|
|
|
|
|
|
|
|
AeadKey = join (parseHexString (
|
|
|
|
|
"80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f " #
|
|
|
|
|
"90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f " ))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
AeadIV = join [ 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47 ]
|
|
|
|
|
|
|
|
|
|
AeadC = join [0x07, 0x00, 0x00, 0x00]
|
|
|
|
|
|
|
|
|
|
AeadNonce = AeadC # AeadIV
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
32-bit fixed-common part:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AeadCT = ChaCha20EncryptBytes AeadPt AeadKey AeadNonce 1
|
|
|
|
|
|
|
|
|
|
AeadPolyKey = GeneratePolyKeyUsingChaCha AeadKey (AeadC # AeadIV) 0
|
|
|
|
|
|
|
|
|
|
ADleLen : [8][8]
|
|
|
|
|
ADleLen = groupBy`{8}(littleendian (groupBy`{8}((width AeadAAD):[64])))
|
|
|
|
|
|
|
|
|
|
CTleLen : [8][8]
|
|
|
|
|
CTleLen = groupBy`{8}(littleendian (groupBy`{8}((width AeadCT):[64])))
|
|
|
|
|
|
|
|
|
|
AeadTag = Poly1305 AeadPolyKey (AeadConstruction AeadAAD AeadCT)
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Set up for generating poly1305 one-time key (sender id=7):
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AeadPolyOneTimeKey_testVector = [
|
|
|
|
|
0x61707865, 0x3320646e, 0x79622d32, 0x6b206574,
|
|
|
|
|
0x83828180, 0x87868584, 0x8b8a8988, 0x8f8e8d8c,
|
|
|
|
|
0x93929190, 0x97969594, 0x9b9a9998, 0x9f9e9d9c,
|
|
|
|
|
0x00000000, 0x00000007, 0x43424140, 0x47464544 ]
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
property AeadPolyKeyBuildState_correct =
|
2014-07-29 20:32:14 +04:00
|
|
|
|
BuildState AeadKey AeadNonce 0 == AeadPolyOneTimeKey_testVector
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
After generating Poly1305 one-time key:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AeadPolyOneTimeKeyState = [
|
|
|
|
|
0x252bac7b, 0xaf47b42d, 0x557ab609, 0x8455e9a4,
|
|
|
|
|
0x73d6e10a, 0xebd97510, 0x7875932a, 0xff53d53e,
|
|
|
|
|
0xdecc7ea2, 0xb44ddbad, 0xe49c17d1, 0xd8430bc9,
|
|
|
|
|
0x8c94b7bc, 0x8b7d4b4b, 0x3927f67d, 0x1669a432]
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
property AeadPolyChaCha_correct =
|
2014-07-29 20:32:14 +04:00
|
|
|
|
ChaCha20Block AeadKey AeadNonce 0 == AeadPolyOneTimeKeyState
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Poly1305 Key:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Poly1305Key_testVector = join (parseHexString (
|
|
|
|
|
"7b ac 2b 25 2d b4 47 af 09 b6 7a 55 a4 e9 55 84 " #
|
|
|
|
|
"0a e1 d6 73 10 75 d9 eb 2a 93 75 78 3e d5 53 ff " ))
|
|
|
|
|
|
|
|
|
|
property poly1305Test_correct = AeadPolyKey == Poly1305Key_testVector
|
|
|
|
|
|
|
|
|
|
Poly1305_r = 0x0455e9a4057ab6080f47b42c052bac7b
|
|
|
|
|
Poly1305_s = 0xff53d53e7875932aebd9751073d6e10a
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```verbatim
|
|
|
|
|
Keystream bytes:
|
|
|
|
|
9f:7b:e9:5d:01:fd:40:ba:15:e2:8f:fb:36:81:0a:ae:
|
|
|
|
|
c1:c0:88:3f:09:01:6e:de:dd:8a:d0:87:55:82:03:a5:
|
|
|
|
|
4e:9e:cb:38:ac:8e:5e:2b:b8:da:b2:0f:fa:db:52:e8:
|
|
|
|
|
75:04:b2:6e:be:69:6d:4f:60:a4:85:cf:11:b8:1b:59:
|
|
|
|
|
fc:b1:c4:5f:42:19:ee:ac:ec:6a:de:c3:4e:66:69:78:
|
|
|
|
|
8e:db:41:c4:9c:a3:01:e1:27:e0:ac:ab:3b:44:b9:cf:
|
|
|
|
|
5c:86:bb:95:e0:6b:0d:f2:90:1a:b6:45:e4:ab:e6:22:
|
|
|
|
|
15:38
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ciphertext:
|
|
|
|
|
000 d3 1a 8d 34 64 8e 60 db 7b 86 af bc 53 ef 7e c2|...4d.`.{...S.~.
|
|
|
|
|
016 a4 ad ed 51 29 6e 08 fe a9 e2 b5 a7 36 ee 62 d6|...Q)n......6.b.
|
|
|
|
|
032 3d be a4 5e 8c a9 67 12 82 fa fb 69 da 92 72 8b|=..^..g....i..r.
|
|
|
|
|
048 1a 71 de 0a 9e 06 0b 29 05 d6 a5 b6 7e cd 3b 36|.q.....)....~.;6
|
|
|
|
|
064 92 dd bd 7f 2d 77 8b 8c 98 03 ae e3 28 09 1b 58|...-w......(..X
|
|
|
|
|
080 fa b3 24 e4 fa d6 75 94 55 85 80 8b 48 31 d7 bc|..$...u.U...H1..
|
|
|
|
|
096 3f f4 de f0 8e 4b 7a 9d e5 76 d2 65 86 ce c6 4b|?....Kz..v.e...K
|
|
|
|
|
112 61 16 |a.
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
AEAD Construction for Poly1305:
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
AeadConstructionTestVector = parseHexString (
|
|
|
|
|
"50:51:52:53:c0:c1:c2:c3:c4:c5:c6:c7:00:00:00:00:" #
|
|
|
|
|
"d3:1a:8d:34:64:8e:60:db:7b:86:af:bc:53:ef:7e:c2:" #
|
|
|
|
|
"a4:ad:ed:51:29:6e:08:fe:a9:e2:b5:a7:36:ee:62:d6:" #
|
|
|
|
|
"3d:be:a4:5e:8c:a9:67:12:82:fa:fb:69:da:92:72:8b:" #
|
|
|
|
|
"1a:71:de:0a:9e:06:0b:29:05:d6:a5:b6:7e:cd:3b:36:" #
|
|
|
|
|
"92:dd:bd:7f:2d:77:8b:8c:98:03:ae:e3:28:09:1b:58:" #
|
|
|
|
|
"fa:b3:24:e4:fa:d6:75:94:55:85:80:8b:48:31:d7:bc:" #
|
|
|
|
|
"3f:f4:de:f0:8e:4b:7a:9d:e5:76:d2:65:86:ce:c6:4b:" #
|
|
|
|
|
"61:16:00:00:00:00:00:00:00:00:00:00:00:00:00:00:" #
|
|
|
|
|
"0c:00:00:00:00:00:00:00:72:00:00:00:00:00:00:00." )
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Note the 4 zero bytes in line 000 and the 14 zero bytes in line 128
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
// Tag:
|
|
|
|
|
AeadTagTestVector = parseHexString "1a:e1:0b:59:4f:09:e2:6a:7e:90:2e:cb:d0:60:06:91."
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-02-19 21:08:20 +03:00
|
|
|
|
property AeadTag_correct = AeadTag == AeadTagTestVector
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
|
|
|
|
property AeadConstruction_correct = (AeadConstruction AeadAAD AeadCT) == AeadConstructionTestVector
|
|
|
|
|
|
2016-08-23 04:14:44 +03:00
|
|
|
|
property AeadDecrypt_correct = ptMatches /\ isValid where
|
2014-07-29 20:32:14 +04:00
|
|
|
|
(pt,isValid) = AEAD_CHACHA20_POLY1305_DECRYPT AeadKey (AeadIV # AeadC) cypherText AeadAAD
|
|
|
|
|
cypherText = (AEAD_CHACHA20_POLY1305 AeadKey (AeadIV # AeadC) AeadPt AeadAAD)
|
|
|
|
|
ptMatches = AeadPt == pt
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
# Implementation Advice
|
|
|
|
|
|
|
|
|
|
Each block of ChaCha20 involves 16 move operations and one increment
|
|
|
|
|
operation for loading the state, 80 each of XOR, addition and Roll
|
|
|
|
|
operations for the rounds, 16 more add operations and 16 XOR
|
|
|
|
|
operations for protecting the plaintext. Section 2.3 describes the
|
|
|
|
|
ChaCha block function as "adding the original input words". This
|
|
|
|
|
implies that before starting the rounds on the ChaCha state, we copy
|
|
|
|
|
it aside, only to add it in later. This is correct, but we can save
|
|
|
|
|
a few operations if we instead copy the state and do the work on the
|
|
|
|
|
copy. This way, for the next block you don't need to recreate the
|
|
|
|
|
state, but only to increment the block counter. This saves
|
|
|
|
|
approximately 5.5% of the cycles.
|
|
|
|
|
|
|
|
|
|
It is not recommended to use a generic big number library such as the
|
|
|
|
|
one in OpenSSL for the arithmetic operations in Poly1305. Such
|
|
|
|
|
libraries use dynamic allocation to be able to handle any-sized
|
|
|
|
|
integer, but that flexibility comes at the expense of performance as
|
|
|
|
|
well as side-channel security. More efficient implementations that
|
|
|
|
|
run in constant time are available, one of them in DJB's own library,
|
|
|
|
|
NaCl ([NaCl]). A constant-time but not optimal approach would be to
|
|
|
|
|
naively implement the arithmetic operations for a 288-bit integers,
|
|
|
|
|
because even a naive implementation will not exceed 2^288 in the
|
|
|
|
|
multiplication of (acc+block) and r. An efficient constant-time
|
|
|
|
|
implementation can be found in the public domain library poly1305-
|
|
|
|
|
donna ([poly1305_donna]).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Security Considerations
|
|
|
|
|
|
|
|
|
|
The ChaCha20 cipher is designed to provide 256-bit security.
|
|
|
|
|
|
|
|
|
|
The Poly1305 authenticator is designed to ensure that forged messages
|
|
|
|
|
are rejected with a probability of 1-(n/(2^102)) for a 16n-byte
|
|
|
|
|
message, even after sending 2^64 legitimate messages, so it is SUF-
|
|
|
|
|
CMA in the terminology of [AE].
|
|
|
|
|
|
|
|
|
|
Proving the security of either of these is beyond the scope of this
|
|
|
|
|
document. Such proofs are available in the referenced academic
|
|
|
|
|
papers.
|
|
|
|
|
|
|
|
|
|
The most important security consideration in implementing this draft
|
|
|
|
|
is the uniqueness of the nonce used in ChaCha20. Counters and LFSRs
|
|
|
|
|
are both acceptable ways of generating unique nonces, as is
|
|
|
|
|
encrypting a counter using a 64-bit cipher such as DES. Note that it
|
|
|
|
|
is not acceptable to use a truncation of a counter encrypted with a
|
|
|
|
|
128-bit or 256-bit cipher, because such a truncation may repeat after
|
|
|
|
|
a short time.
|
|
|
|
|
|
|
|
|
|
The Poly1305 key MUST be unpredictable to an attacker. Randomly
|
|
|
|
|
generating the key would fulfill this requirement, except that
|
|
|
|
|
Poly1305 is often used in communications protocols, so the receiver
|
|
|
|
|
should know the key. Pseudo-random number generation such as by
|
|
|
|
|
encrypting a counter is acceptable. Using ChaCha with a secret key
|
|
|
|
|
and a nonce is also acceptable.
|
|
|
|
|
|
|
|
|
|
The algorithms presented here were designed to be easy to implement
|
|
|
|
|
in constant time to avoid side-channel vulnerabilities. The
|
|
|
|
|
operations used in ChaCha20 are all additions, XORs, and fixed
|
|
|
|
|
rotations. All of these can and should be implemented in constant
|
|
|
|
|
time. Access to offsets into the ChaCha state and the number of
|
|
|
|
|
operations do not depend on any property of the key, eliminating the
|
|
|
|
|
chance of information about the key leaking through the timing of
|
|
|
|
|
cache misses.
|
|
|
|
|
|
|
|
|
|
For Poly1305, the operations are addition, multiplication and
|
|
|
|
|
modulus, all on >128-bit numbers. This can be done in constant time,
|
|
|
|
|
but a naive implementation (such as using some generic big number
|
|
|
|
|
library) will not be constant time. For example, if the
|
|
|
|
|
multiplication is performed as a separate operation from the modulus,
|
|
|
|
|
the result will some times be under 2^256 and some times be above
|
|
|
|
|
2^256. Implementers should be careful about timing side-channels for
|
|
|
|
|
Poly1305 by using the appropriate implementation of these operations.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# IANA Considerations
|
|
|
|
|
|
|
|
|
|
There are no IANA considerations for this document.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Acknowledgements
|
|
|
|
|
|
|
|
|
|
ChaCha20 and Poly1305 were invented by Daniel J. Bernstein. The AEAD
|
|
|
|
|
construction and the method of creating the one-time poly1305 key
|
|
|
|
|
were invented by Adam Langley.
|
|
|
|
|
|
|
|
|
|
Thanks to Robert Ransom, Watson Ladd, Stefan Buhler, and kenny
|
|
|
|
|
patterson for their helpful comments and explanations. Thanks to
|
|
|
|
|
Niels Moeller for suggesting the more efficient AEAD construction in
|
|
|
|
|
this document. Special thanks to Ilari Liusvaara for providing extra
|
|
|
|
|
test vectors, helpful comments, and for being the first to attempt an
|
|
|
|
|
implementation from this draft.
|
|
|
|
|
|
|
|
|
|
# References
|
|
|
|
|
|
|
|
|
|
## Normative References
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
|
|
|
|
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
|
|
|
|
|
|
|
|
|
[chacha] Bernstein, D., "ChaCha, a variant of Salsa20", Jan 2008.
|
|
|
|
|
|
|
|
|
|
[poly1305]
|
|
|
|
|
Bernstein, D., "The Poly1305-AES message-authentication
|
|
|
|
|
code", Mar 2005.
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Informative References
|
|
|
|
|
|
|
|
|
|
```example
|
|
|
|
|
[AE] Bellare, M. and C. Namprempre, "Authenticated Encryption:
|
|
|
|
|
Relations among notions and analysis of the generic
|
|
|
|
|
composition paradigm",
|
|
|
|
|
<http://cseweb.ucsd.edu/~mihir/papers/oem.html>.
|
|
|
|
|
|
|
|
|
|
[FIPS-197]
|
|
|
|
|
National Institute of Standards and Technology, "Advanced
|
|
|
|
|
Encryption Standard (AES)", FIPS PUB 197, November 2001.
|
|
|
|
|
|
|
|
|
|
[FIPS-46] National Institute of Standards and Technology, "Data
|
|
|
|
|
Encryption Standard", FIPS PUB 46-2, December 1993,
|
|
|
|
|
<http://www.itl.nist.gov/fipspubs/fip46-2.htm>.
|
|
|
|
|
|
|
|
|
|
[LatinDances]
|
|
|
|
|
Aumasson, J., Fischer, S., Khazaei, S., Meier, W., and C.
|
|
|
|
|
Rechberger, "New Features of Latin Dances: Analysis of
|
|
|
|
|
Salsa, ChaCha, and Rumba", Dec 2007.
|
|
|
|
|
|
|
|
|
|
[NaCl] Bernstein, D., Lange, T., and P. Schwabe, "NaCl:
|
|
|
|
|
Networking and Cryptography library",
|
|
|
|
|
<http://nacl.cace-project.eu/index.html>.
|
|
|
|
|
|
|
|
|
|
[RFC4868] Kelly, S. and S. Frankel, "Using HMAC-SHA-256, HMAC-SHA-
|
|
|
|
|
384, and HMAC-SHA-512 with IPsec", RFC 4868, May 2007.
|
|
|
|
|
|
|
|
|
|
[RFC5116] McGrew, D., "An Interface and Algorithms for Authenticated
|
|
|
|
|
Encryption", RFC 5116, January 2008.
|
|
|
|
|
|
|
|
|
|
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
|
|
|
|
|
"Internet Key Exchange Protocol Version 2 (IKEv2)",
|
|
|
|
|
RFC 5996, September 2010.
|
|
|
|
|
|
|
|
|
|
[Zhenqing2012]
|
|
|
|
|
Zhenqing, S., Bin, Z., Dengguo, F., and W. Wenling,
|
|
|
|
|
"Improved key recovery attacks on reduced-round salsa20
|
|
|
|
|
and chacha", 2012.
|
|
|
|
|
|
|
|
|
|
[poly1305_donna]
|
|
|
|
|
Floodyberry, A., "Poly1305-donna",
|
|
|
|
|
<https://github.com/floodyberry/poly1305-donna>.
|
|
|
|
|
|
|
|
|
|
[standby-cipher]
|
|
|
|
|
McGrew, D., Grieco, A., and Y. Sheffer, "Selection of
|
|
|
|
|
Future Cryptographic Standards",
|
|
|
|
|
draft-mcgrew-standby-cipher (work in progress).
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors' Addresses
|
|
|
|
|
|
|
|
|
|
```verbatim
|
|
|
|
|
Yoav Nir
|
|
|
|
|
Check Point Software Technologies Ltd.
|
|
|
|
|
5 Hasolelim st.
|
|
|
|
|
Tel Aviv 6789735
|
|
|
|
|
Israel
|
|
|
|
|
Email: ynir.ietf@gmail.com
|
|
|
|
|
|
|
|
|
|
Adam Langley
|
|
|
|
|
Google Inc
|
|
|
|
|
Email: agl@google.com
|
|
|
|
|
|
|
|
|
|
Dylan McNamee
|
|
|
|
|
Galois Inc
|
|
|
|
|
Email: dylan@galois.com
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
# Appendix: Additional test vectors
|
|
|
|
|
|
|
|
|
|
## The ChaCha20 Block Functions
|
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```cryptol
|
2015-03-10 00:37:25 +03:00
|
|
|
|
// helper macros for higher-up properties
|
|
|
|
|
TV_block_correct key nonce blockcounter result = ChaCha20Block key nonce blockcounter == result
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2015-03-10 00:37:25 +03:00
|
|
|
|
TV_block_Keystream_correct key nonce blockcounter keystream =
|
2014-07-30 03:39:50 +04:00
|
|
|
|
take`{0x40} (groupBy`{8} (join (join (ChaCha20ExpandKey key nonce blockcounter)))) == keystream
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
ChaCha20_block_correct key nonce blockcounter result keystream =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV_block_correct key nonce blockcounter result /\
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV_block_Keystream_correct key nonce blockcounter keystream
|
|
|
|
|
```
|
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
### Test Vector #1
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV1_block_Key = zero:ChaChaKey
|
|
|
|
|
TV1_block_Nonce = zero:[96]
|
|
|
|
|
TV1_block_BlockCounter = 0
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV1_block_After20 = [
|
2014-07-29 20:32:14 +04:00
|
|
|
|
0xade0b876, 0x903df1a0, 0xe56a5d40, 0x28bd8653,
|
|
|
|
|
0xb819d2bd, 0x1aed8da0, 0xccef36a8, 0xc70d778b,
|
|
|
|
|
0x7c5941da, 0x8d485751, 0x3fe02477, 0x374ad8b8,
|
|
|
|
|
0xf4b8436a, 0x1ca11815, 0x69b687c3, 0x8665eeb2]
|
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV1_block_KeyStream = [
|
2014-07-29 20:32:14 +04:00
|
|
|
|
0x76, 0xb8, 0xe0, 0xad, 0xa0, 0xf1, 0x3d, 0x90, 0x40, 0x5d, 0x6a, 0xe5, 0x53, 0x86, 0xbd, 0x28,
|
|
|
|
|
0xbd, 0xd2, 0x19, 0xb8, 0xa0, 0x8d, 0xed, 0x1a, 0xa8, 0x36, 0xef, 0xcc, 0x8b, 0x77, 0x0d, 0xc7,
|
|
|
|
|
0xda, 0x41, 0x59, 0x7c, 0x51, 0x57, 0x48, 0x8d, 0x77, 0x24, 0xe0, 0x3f, 0xb8, 0xd8, 0x4a, 0x37,
|
|
|
|
|
0x6a, 0x43, 0xb8, 0xf4, 0x15, 0x18, 0xa1, 0x1c, 0xc3, 0x87, 0xb6, 0x69, 0xb2, 0xee, 0x65, 0x86]
|
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
property TV1_block_correct = ChaCha20_block_correct TV1_block_Key TV1_block_Nonce TV1_block_BlockCounter TV1_block_After20 TV1_block_KeyStream
|
|
|
|
|
|
|
|
|
|
```
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
### Test Vector #2
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV2_block_Key = zero:ChaChaKey
|
|
|
|
|
TV2_block_Nonce = zero:[96]
|
|
|
|
|
TV2_block_BlockCounter = 1
|
|
|
|
|
|
|
|
|
|
TV2_block_After20 = [
|
|
|
|
|
0xbee7079f, 0x7a385155, 0x7c97ba98, 0x0d082d73,
|
|
|
|
|
0xa0290fcb, 0x6965e348, 0x3e53c612, 0xed7aee32,
|
|
|
|
|
0x7621b729, 0x434ee69c, 0xb03371d5, 0xd539d874,
|
|
|
|
|
0x281fed31, 0x45fb0a51, 0x1f0ae1ac, 0x6f4d794b]
|
|
|
|
|
|
|
|
|
|
TV2_block_KeyStream = [
|
|
|
|
|
0x9f, 0x07, 0xe7, 0xbe, 0x55, 0x51, 0x38, 0x7a, 0x98, 0xba, 0x97, 0x7c, 0x73, 0x2d, 0x08, 0x0d,
|
|
|
|
|
0xcb, 0x0f, 0x29, 0xa0, 0x48, 0xe3, 0x65, 0x69, 0x12, 0xc6, 0x53, 0x3e, 0x32, 0xee, 0x7a, 0xed,
|
|
|
|
|
0x29, 0xb7, 0x21, 0x76, 0x9c, 0xe6, 0x4e, 0x43, 0xd5, 0x71, 0x33, 0xb0, 0x74, 0xd8, 0x39, 0xd5,
|
|
|
|
|
0x31, 0xed, 0x1f, 0x28, 0x51, 0x0a, 0xfb, 0x45, 0xac, 0xe1, 0x0a, 0x1f, 0x4b, 0x79, 0x4d, 0x6f]
|
|
|
|
|
|
|
|
|
|
property TV2_block_correct = ChaCha20_block_correct TV2_block_Key TV2_block_Nonce TV2_block_BlockCounter TV2_block_After20 TV2_block_KeyStream
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #3
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV3_block_Key = (zero # 0b1):ChaChaKey
|
|
|
|
|
TV3_block_Nonce = zero:[96]
|
|
|
|
|
TV3_block_BlockCounter = 1
|
|
|
|
|
|
|
|
|
|
TV3_block_After20 = [
|
|
|
|
|
0x2452eb3a, 0x9249f8ec, 0x8d829d9b, 0xddd4ceb1,
|
|
|
|
|
0xe8252083, 0x60818b01, 0xf38422b8, 0x5aaa49c9,
|
|
|
|
|
0xbb00ca8e, 0xda3ba7b4, 0xc4b592d1, 0xfdf2732f,
|
|
|
|
|
0x4436274e, 0x2561b3c8, 0xebdd4aa6, 0xa0136c00]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV3_block_KeyStream = [
|
2016-02-19 21:08:20 +03:00
|
|
|
|
0x3a, 0xeb, 0x52, 0x24, 0xec, 0xf8, 0x49, 0x92, 0x9b, 0x9d, 0x82, 0x8d, 0xb1, 0xce, 0xd4, 0xdd,
|
|
|
|
|
0x83, 0x20, 0x25, 0xe8, 0x01, 0x8b, 0x81, 0x60, 0xb8, 0x22, 0x84, 0xf3, 0xc9, 0x49, 0xaa, 0x5a,
|
|
|
|
|
0x8e, 0xca, 0x00, 0xbb, 0xb4, 0xa7, 0x3b, 0xda, 0xd1, 0x92, 0xb5, 0xc4, 0x2f, 0x73, 0xf2, 0xfd,
|
2014-07-30 03:39:50 +04:00
|
|
|
|
0x4e, 0x27, 0x36, 0x44, 0xc8, 0xb3, 0x61, 0x25, 0xa6, 0x4a, 0xdd, 0xeb, 0x00, 0x6c, 0x13, 0xa0]
|
|
|
|
|
|
|
|
|
|
property TV3_block_correct = ChaCha20_block_correct TV3_block_Key TV3_block_Nonce TV3_block_BlockCounter TV3_block_After20 TV3_block_KeyStream
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #4
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV4_block_Key = ( 0x00ff # zero):ChaChaKey
|
|
|
|
|
TV4_block_Nonce = zero:[96]
|
|
|
|
|
TV4_block_BlockCounter = 2
|
|
|
|
|
|
|
|
|
|
TV4_block_After20 = [
|
|
|
|
|
0xfb4dd572, 0x4bc42ef1, 0xdf922636, 0x327f1394,
|
|
|
|
|
0xa78dea8f, 0x5e269039, 0xa1bebbc1, 0xcaf09aae,
|
|
|
|
|
0xa25ab213, 0x48a6b46c, 0x1b9d9bcb, 0x092c5be6,
|
|
|
|
|
0x546ca624, 0x1bec45d5, 0x87f47473, 0x96f0992e]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV4_block_KeyStream = [
|
2016-02-19 21:08:20 +03:00
|
|
|
|
0x72, 0xd5, 0x4d, 0xfb, 0xf1, 0x2e, 0xc4, 0x4b, 0x36, 0x26, 0x92, 0xdf, 0x94, 0x13, 0x7f, 0x32,
|
|
|
|
|
0x8f, 0xea, 0x8d, 0xa7, 0x39, 0x90, 0x26, 0x5e, 0xc1, 0xbb, 0xbe, 0xa1, 0xae, 0x9a, 0xf0, 0xca,
|
|
|
|
|
0x13, 0xb2, 0x5a, 0xa2, 0x6c, 0xb4, 0xa6, 0x48, 0xcb, 0x9b, 0x9d, 0x1b, 0xe6, 0x5b, 0x2c, 0x09,
|
2014-07-30 03:39:50 +04:00
|
|
|
|
0x24, 0xa6, 0x6c, 0x54, 0xd5, 0x45, 0xec, 0x1b, 0x73, 0x74, 0xf4, 0x87, 0x2e, 0x99, 0xf0, 0x96]
|
|
|
|
|
|
|
|
|
|
property TV4_block_correct = ChaCha20_block_correct TV4_block_Key TV4_block_Nonce TV4_block_BlockCounter TV4_block_After20 TV4_block_KeyStream
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #5
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV5_block_Key = (zero):ChaChaKey
|
|
|
|
|
TV5_block_Nonce = zero # 0x02:[96]
|
|
|
|
|
TV5_block_BlockCounter = 0
|
|
|
|
|
|
|
|
|
|
TV5_block_After20 = [
|
|
|
|
|
0x374dc6c2, 0x3736d58c, 0xb904e24a, 0xcd3f93ef,
|
|
|
|
|
0x88228b1a, 0x96a4dfb3, 0x5b76ab72, 0xc727ee54,
|
|
|
|
|
0x0e0e978a, 0xf3145c95, 0x1b748ea8, 0xf786c297,
|
|
|
|
|
0x99c28f5f, 0x628314e8, 0x398a19fa, 0x6ded1b53]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV5_block_KeyStream = [
|
|
|
|
|
0xc2, 0xc6, 0x4d, 0x37, 0x8c, 0xd5, 0x36, 0x37, 0x4a, 0xe2, 0x04, 0xb9, 0xef, 0x93, 0x3f, 0xcd,
|
|
|
|
|
0x1a, 0x8b, 0x22, 0x88, 0xb3, 0xdf, 0xa4, 0x96, 0x72, 0xab, 0x76, 0x5b, 0x54, 0xee, 0x27, 0xc7,
|
|
|
|
|
0x8a, 0x97, 0x0e, 0x0e, 0x95, 0x5c, 0x14, 0xf3, 0xa8, 0x8e, 0x74, 0x1b, 0x97, 0xc2, 0x86, 0xf7,
|
|
|
|
|
0x5f, 0x8f, 0xc2, 0x99, 0xe8, 0x14, 0x83, 0x62, 0xfa, 0x19, 0x8a, 0x39, 0x53, 0x1b, 0xed, 0x6d]
|
|
|
|
|
|
|
|
|
|
property TV5_block_correct = ChaCha20_block_correct TV5_block_Key TV5_block_Nonce TV5_block_BlockCounter TV5_block_After20 TV5_block_KeyStream
|
|
|
|
|
|
|
|
|
|
property all_block_tests_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV1_block_correct /\
|
|
|
|
|
TV2_block_correct /\
|
|
|
|
|
TV3_block_correct /\
|
|
|
|
|
TV4_block_correct /\
|
2016-02-19 21:08:20 +03:00
|
|
|
|
TV5_block_correct
|
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## ChaCha20 Encryption
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2015-03-10 00:37:25 +03:00
|
|
|
|
ChaCha20_enc_correct key nonce blockcounter plaintext cyphertext = ChaCha20EncryptBytes plaintext key nonce blockcounter == cyphertext
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #1
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV1_enc_Key = (zero):ChaChaKey
|
|
|
|
|
TV1_enc_Nonce = zero:[96]
|
|
|
|
|
TV1_enc_BlockCounter = 0
|
|
|
|
|
|
|
|
|
|
TV1_enc_plaintext = zero:[64][8]
|
|
|
|
|
|
|
|
|
|
TV1_enc_cyphertext = [
|
|
|
|
|
0x76, 0xb8, 0xe0, 0xad, 0xa0, 0xf1, 0x3d, 0x90, 0x40, 0x5d, 0x6a, 0xe5, 0x53, 0x86, 0xbd, 0x28,
|
|
|
|
|
0xbd, 0xd2, 0x19, 0xb8, 0xa0, 0x8d, 0xed, 0x1a, 0xa8, 0x36, 0xef, 0xcc, 0x8b, 0x77, 0x0d, 0xc7,
|
|
|
|
|
0xda, 0x41, 0x59, 0x7c, 0x51, 0x57, 0x48, 0x8d, 0x77, 0x24, 0xe0, 0x3f, 0xb8, 0xd8, 0x4a, 0x37,
|
|
|
|
|
0x6a, 0x43, 0xb8, 0xf4, 0x15, 0x18, 0xa1, 0x1c, 0xc3, 0x87, 0xb6, 0x69, 0xb2, 0xee, 0x65, 0x86]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
property TV1_enc_correct = ChaCha20_enc_correct TV1_enc_Key TV1_enc_Nonce TV1_enc_BlockCounter TV1_enc_plaintext TV1_enc_cyphertext
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #2
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV2_enc_Key = (zero # 0x1):ChaChaKey
|
|
|
|
|
TV2_enc_Nonce = zero # 0x2:[96]
|
|
|
|
|
TV2_enc_BlockCounter = 1
|
|
|
|
|
|
|
|
|
|
IETF_submission_text = [
|
|
|
|
|
0x41, 0x6e, 0x79, 0x20, 0x73, 0x75, 0x62, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x20, 0x74,
|
|
|
|
|
0x6f, 0x20, 0x74, 0x68, 0x65, 0x20, 0x49, 0x45, 0x54, 0x46, 0x20, 0x69, 0x6e, 0x74, 0x65, 0x6e,
|
|
|
|
|
0x64, 0x65, 0x64, 0x20, 0x62, 0x79, 0x20, 0x74, 0x68, 0x65, 0x20, 0x43, 0x6f, 0x6e, 0x74, 0x72,
|
|
|
|
|
0x69, 0x62, 0x75, 0x74, 0x6f, 0x72, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x70, 0x75, 0x62, 0x6c, 0x69,
|
|
|
|
|
0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x20, 0x61, 0x73, 0x20, 0x61, 0x6c, 0x6c, 0x20, 0x6f, 0x72,
|
|
|
|
|
0x20, 0x70, 0x61, 0x72, 0x74, 0x20, 0x6f, 0x66, 0x20, 0x61, 0x6e, 0x20, 0x49, 0x45, 0x54, 0x46,
|
|
|
|
|
0x20, 0x49, 0x6e, 0x74, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x2d, 0x44, 0x72, 0x61, 0x66, 0x74, 0x20,
|
|
|
|
|
0x6f, 0x72, 0x20, 0x52, 0x46, 0x43, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x61, 0x6e, 0x79, 0x20, 0x73,
|
|
|
|
|
0x74, 0x61, 0x74, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x20, 0x6d, 0x61, 0x64, 0x65, 0x20, 0x77, 0x69,
|
|
|
|
|
0x74, 0x68, 0x69, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6f, 0x6e, 0x74, 0x65, 0x78, 0x74,
|
|
|
|
|
0x20, 0x6f, 0x66, 0x20, 0x61, 0x6e, 0x20, 0x49, 0x45, 0x54, 0x46, 0x20, 0x61, 0x63, 0x74, 0x69,
|
|
|
|
|
0x76, 0x69, 0x74, 0x79, 0x20, 0x69, 0x73, 0x20, 0x63, 0x6f, 0x6e, 0x73, 0x69, 0x64, 0x65, 0x72,
|
|
|
|
|
0x65, 0x64, 0x20, 0x61, 0x6e, 0x20, 0x22, 0x49, 0x45, 0x54, 0x46, 0x20, 0x43, 0x6f, 0x6e, 0x74,
|
|
|
|
|
0x72, 0x69, 0x62, 0x75, 0x74, 0x69, 0x6f, 0x6e, 0x22, 0x2e, 0x20, 0x53, 0x75, 0x63, 0x68, 0x20,
|
|
|
|
|
0x73, 0x74, 0x61, 0x74, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x73, 0x20, 0x69, 0x6e, 0x63, 0x6c, 0x75,
|
|
|
|
|
0x64, 0x65, 0x20, 0x6f, 0x72, 0x61, 0x6c, 0x20, 0x73, 0x74, 0x61, 0x74, 0x65, 0x6d, 0x65, 0x6e,
|
|
|
|
|
0x74, 0x73, 0x20, 0x69, 0x6e, 0x20, 0x49, 0x45, 0x54, 0x46, 0x20, 0x73, 0x65, 0x73, 0x73, 0x69,
|
|
|
|
|
0x6f, 0x6e, 0x73, 0x2c, 0x20, 0x61, 0x73, 0x20, 0x77, 0x65, 0x6c, 0x6c, 0x20, 0x61, 0x73, 0x20,
|
|
|
|
|
0x77, 0x72, 0x69, 0x74, 0x74, 0x65, 0x6e, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x65, 0x6c, 0x65, 0x63,
|
|
|
|
|
0x74, 0x72, 0x6f, 0x6e, 0x69, 0x63, 0x20, 0x63, 0x6f, 0x6d, 0x6d, 0x75, 0x6e, 0x69, 0x63, 0x61,
|
|
|
|
|
0x74, 0x69, 0x6f, 0x6e, 0x73, 0x20, 0x6d, 0x61, 0x64, 0x65, 0x20, 0x61, 0x74, 0x20, 0x61, 0x6e,
|
|
|
|
|
0x79, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20, 0x6f, 0x72, 0x20, 0x70, 0x6c, 0x61, 0x63, 0x65, 0x2c,
|
|
|
|
|
0x20, 0x77, 0x68, 0x69, 0x63, 0x68, 0x20, 0x61, 0x72, 0x65, 0x20, 0x61, 0x64, 0x64, 0x72, 0x65,
|
|
|
|
|
0x73, 0x73, 0x65, 0x64, 0x20, 0x74, 0x6f ]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV2_enc_plaintext = IETF_submission_text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
TV2_enc_cyphertext = [
|
|
|
|
|
0xa3, 0xfb, 0xf0, 0x7d, 0xf3, 0xfa, 0x2f, 0xde, 0x4f, 0x37, 0x6c, 0xa2, 0x3e, 0x82, 0x73, 0x70,
|
|
|
|
|
0x41, 0x60, 0x5d, 0x9f, 0x4f, 0x4f, 0x57, 0xbd, 0x8c, 0xff, 0x2c, 0x1d, 0x4b, 0x79, 0x55, 0xec,
|
|
|
|
|
0x2a, 0x97, 0x94, 0x8b, 0xd3, 0x72, 0x29, 0x15, 0xc8, 0xf3, 0xd3, 0x37, 0xf7, 0xd3, 0x70, 0x05,
|
|
|
|
|
0x0e, 0x9e, 0x96, 0xd6, 0x47, 0xb7, 0xc3, 0x9f, 0x56, 0xe0, 0x31, 0xca, 0x5e, 0xb6, 0x25, 0x0d,
|
|
|
|
|
0x40, 0x42, 0xe0, 0x27, 0x85, 0xec, 0xec, 0xfa, 0x4b, 0x4b, 0xb5, 0xe8, 0xea, 0xd0, 0x44, 0x0e,
|
|
|
|
|
0x20, 0xb6, 0xe8, 0xdb, 0x09, 0xd8, 0x81, 0xa7, 0xc6, 0x13, 0x2f, 0x42, 0x0e, 0x52, 0x79, 0x50,
|
|
|
|
|
0x42, 0xbd, 0xfa, 0x77, 0x73, 0xd8, 0xa9, 0x05, 0x14, 0x47, 0xb3, 0x29, 0x1c, 0xe1, 0x41, 0x1c,
|
|
|
|
|
0x68, 0x04, 0x65, 0x55, 0x2a, 0xa6, 0xc4, 0x05, 0xb7, 0x76, 0x4d, 0x5e, 0x87, 0xbe, 0xa8, 0x5a,
|
|
|
|
|
0xd0, 0x0f, 0x84, 0x49, 0xed, 0x8f, 0x72, 0xd0, 0xd6, 0x62, 0xab, 0x05, 0x26, 0x91, 0xca, 0x66,
|
|
|
|
|
0x42, 0x4b, 0xc8, 0x6d, 0x2d, 0xf8, 0x0e, 0xa4, 0x1f, 0x43, 0xab, 0xf9, 0x37, 0xd3, 0x25, 0x9d,
|
|
|
|
|
0xc4, 0xb2, 0xd0, 0xdf, 0xb4, 0x8a, 0x6c, 0x91, 0x39, 0xdd, 0xd7, 0xf7, 0x69, 0x66, 0xe9, 0x28,
|
|
|
|
|
0xe6, 0x35, 0x55, 0x3b, 0xa7, 0x6c, 0x5c, 0x87, 0x9d, 0x7b, 0x35, 0xd4, 0x9e, 0xb2, 0xe6, 0x2b,
|
|
|
|
|
0x08, 0x71, 0xcd, 0xac, 0x63, 0x89, 0x39, 0xe2, 0x5e, 0x8a, 0x1e, 0x0e, 0xf9, 0xd5, 0x28, 0x0f,
|
|
|
|
|
0xa8, 0xca, 0x32, 0x8b, 0x35, 0x1c, 0x3c, 0x76, 0x59, 0x89, 0xcb, 0xcf, 0x3d, 0xaa, 0x8b, 0x6c,
|
|
|
|
|
0xcc, 0x3a, 0xaf, 0x9f, 0x39, 0x79, 0xc9, 0x2b, 0x37, 0x20, 0xfc, 0x88, 0xdc, 0x95, 0xed, 0x84,
|
|
|
|
|
0xa1, 0xbe, 0x05, 0x9c, 0x64, 0x99, 0xb9, 0xfd, 0xa2, 0x36, 0xe7, 0xe8, 0x18, 0xb0, 0x4b, 0x0b,
|
|
|
|
|
0xc3, 0x9c, 0x1e, 0x87, 0x6b, 0x19, 0x3b, 0xfe, 0x55, 0x69, 0x75, 0x3f, 0x88, 0x12, 0x8c, 0xc0,
|
|
|
|
|
0x8a, 0xaa, 0x9b, 0x63, 0xd1, 0xa1, 0x6f, 0x80, 0xef, 0x25, 0x54, 0xd7, 0x18, 0x9c, 0x41, 0x1f,
|
|
|
|
|
0x58, 0x69, 0xca, 0x52, 0xc5, 0xb8, 0x3f, 0xa3, 0x6f, 0xf2, 0x16, 0xb9, 0xc1, 0xd3, 0x00, 0x62,
|
|
|
|
|
0xbe, 0xbc, 0xfd, 0x2d, 0xc5, 0xbc, 0xe0, 0x91, 0x19, 0x34, 0xfd, 0xa7, 0x9a, 0x86, 0xf6, 0xe6,
|
|
|
|
|
0x98, 0xce, 0xd7, 0x59, 0xc3, 0xff, 0x9b, 0x64, 0x77, 0x33, 0x8f, 0x3d, 0xa4, 0xf9, 0xcd, 0x85,
|
|
|
|
|
0x14, 0xea, 0x99, 0x82, 0xcc, 0xaf, 0xb3, 0x41, 0xb2, 0x38, 0x4d, 0xd9, 0x02, 0xf3, 0xd1, 0xab,
|
|
|
|
|
0x7a, 0xc6, 0x1d, 0xd2, 0x9c, 0x6f, 0x21, 0xba, 0x5b, 0x86, 0x2f, 0x37, 0x30, 0xe3, 0x7c, 0xfd,
|
|
|
|
|
0xc4, 0xfd, 0x80, 0x6c, 0x22, 0xf2, 0x21]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
property TV2_enc_correct = ChaCha20_enc_correct TV2_enc_Key TV2_enc_Nonce TV2_enc_BlockCounter TV2_enc_plaintext TV2_enc_cyphertext
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #3
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```cryptol
|
|
|
|
|
TV3_enc_Key = join([
|
|
|
|
|
0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a, 0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
|
|
|
|
|
0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09, 0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0]):ChaChaKey
|
|
|
|
|
TV3_enc_Nonce = zero # 0x2:[96]
|
|
|
|
|
TV3_enc_BlockCounter = 42:[32]
|
|
|
|
|
|
|
|
|
|
jabberwock_text = [
|
|
|
|
|
0x27, 0x54, 0x77, 0x61, 0x73, 0x20, 0x62, 0x72, 0x69, 0x6c, 0x6c, 0x69, 0x67, 0x2c, 0x20, 0x61,
|
|
|
|
|
0x6e, 0x64, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x6c, 0x69, 0x74, 0x68, 0x79, 0x20, 0x74, 0x6f,
|
|
|
|
|
0x76, 0x65, 0x73, 0x0a, 0x44, 0x69, 0x64, 0x20, 0x67, 0x79, 0x72, 0x65, 0x20, 0x61, 0x6e, 0x64,
|
|
|
|
|
0x20, 0x67, 0x69, 0x6d, 0x62, 0x6c, 0x65, 0x20, 0x69, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x77,
|
|
|
|
|
0x61, 0x62, 0x65, 0x3a, 0x0a, 0x41, 0x6c, 0x6c, 0x20, 0x6d, 0x69, 0x6d, 0x73, 0x79, 0x20, 0x77,
|
|
|
|
|
0x65, 0x72, 0x65, 0x20, 0x74, 0x68, 0x65, 0x20, 0x62, 0x6f, 0x72, 0x6f, 0x67, 0x6f, 0x76, 0x65,
|
|
|
|
|
0x73, 0x2c, 0x0a, 0x41, 0x6e, 0x64, 0x20, 0x74, 0x68, 0x65, 0x20, 0x6d, 0x6f, 0x6d, 0x65, 0x20,
|
|
|
|
|
0x72, 0x61, 0x74, 0x68, 0x73, 0x20, 0x6f, 0x75, 0x74, 0x67, 0x72, 0x61, 0x62, 0x65, 0x2e]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV3_enc_plaintext = jabberwock_text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
TV3_enc_cyphertext = [
|
|
|
|
|
0x62, 0xe6, 0x34, 0x7f, 0x95, 0xed, 0x87, 0xa4, 0x5f, 0xfa, 0xe7, 0x42, 0x6f, 0x27, 0xa1, 0xdf,
|
|
|
|
|
0x5f, 0xb6, 0x91, 0x10, 0x04, 0x4c, 0x0d, 0x73, 0x11, 0x8e, 0xff, 0xa9, 0x5b, 0x01, 0xe5, 0xcf,
|
|
|
|
|
0x16, 0x6d, 0x3d, 0xf2, 0xd7, 0x21, 0xca, 0xf9, 0xb2, 0x1e, 0x5f, 0xb1, 0x4c, 0x61, 0x68, 0x71,
|
|
|
|
|
0xfd, 0x84, 0xc5, 0x4f, 0x9d, 0x65, 0xb2, 0x83, 0x19, 0x6c, 0x7f, 0xe4, 0xf6, 0x05, 0x53, 0xeb,
|
|
|
|
|
0xf3, 0x9c, 0x64, 0x02, 0xc4, 0x22, 0x34, 0xe3, 0x2a, 0x35, 0x6b, 0x3e, 0x76, 0x43, 0x12, 0xa6,
|
|
|
|
|
0x1a, 0x55, 0x32, 0x05, 0x57, 0x16, 0xea, 0xd6, 0x96, 0x25, 0x68, 0xf8, 0x7d, 0x3f, 0x3f, 0x77,
|
|
|
|
|
0x04, 0xc6, 0xa8, 0xd1, 0xbc, 0xd1, 0xbf, 0x4d, 0x50, 0xd6, 0x15, 0x4b, 0x6d, 0xa7, 0x31, 0xb1,
|
|
|
|
|
0x87, 0xb5, 0x8d, 0xfd, 0x72, 0x8a, 0xfa, 0x36, 0x75, 0x7a, 0x79, 0x7a, 0xc1, 0x88, 0xd1]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
property TV3_enc_correct = ChaCha20_enc_correct TV3_enc_Key TV3_enc_Nonce TV3_enc_BlockCounter TV3_enc_plaintext TV3_enc_cyphertext
|
|
|
|
|
|
|
|
|
|
property all_enc_tests_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV1_enc_correct /\
|
|
|
|
|
TV2_enc_correct /\
|
2016-02-19 21:08:20 +03:00
|
|
|
|
TV3_enc_correct
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Poly1305 Message Authentication Code
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```cryptol
|
2015-03-10 00:37:25 +03:00
|
|
|
|
poly1305_MAC_correct key text tag = Poly1305 key text == tag
|
2014-07-29 20:32:14 +04:00
|
|
|
|
```
|
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
### Test Vector #1
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV1_MAC_Key = zero:[256]
|
|
|
|
|
|
|
|
|
|
TV1_MAC_text = zero:[64][8]
|
|
|
|
|
|
|
|
|
|
TV1_MAC_tag = zero : [16][8]
|
|
|
|
|
|
|
|
|
|
property TV1_MAC_correct = poly1305_MAC_correct TV1_MAC_Key TV1_MAC_text TV1_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #2
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
reused_key = [0x36, 0xe5, 0xf6, 0xb5, 0xc5, 0xe0, 0x60, 0x70, 0xf0, 0xef, 0xca, 0x96, 0x22, 0x7a, 0x86, 0x3e]
|
|
|
|
|
TV2_MAC_Key = zero # join(reused_key):[256]
|
|
|
|
|
|
|
|
|
|
TV2_MAC_text = IETF_submission_text
|
|
|
|
|
|
|
|
|
|
TV2_MAC_tag = reused_key: [16][8]
|
|
|
|
|
|
|
|
|
|
property TV2_MAC_correct = poly1305_MAC_correct TV2_MAC_Key TV2_MAC_text TV2_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #3
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV3_MAC_Key = join(reused_key) # 0:[256]
|
|
|
|
|
|
|
|
|
|
TV3_MAC_text = IETF_submission_text
|
|
|
|
|
|
|
|
|
|
TV3_MAC_tag = [0xf3, 0x47, 0x7e, 0x7c, 0xd9, 0x54, 0x17, 0xaf, 0x89, 0xa6, 0xb8, 0x79, 0x4c, 0x31, 0x0c, 0xf0]: [16][8]
|
|
|
|
|
|
|
|
|
|
property TV3_MAC_correct = poly1305_MAC_correct TV3_MAC_Key TV3_MAC_text TV3_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #4
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV4_MAC_Key = join(
|
|
|
|
|
[0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a, 0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
|
|
|
|
|
0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09, 0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0]):[256]
|
|
|
|
|
|
|
|
|
|
TV4_MAC_text = jabberwock_text
|
|
|
|
|
|
|
|
|
|
TV4_MAC_tag = [0x45, 0x41, 0x66, 0x9a, 0x7e, 0xaa, 0xee, 0x61, 0xe7, 0x08, 0xdc, 0x7c, 0xbc, 0xc5, 0xeb, 0x62]: [16][8]
|
|
|
|
|
|
|
|
|
|
property TV4_MAC_correct = poly1305_MAC_correct TV4_MAC_Key TV4_MAC_text TV4_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #5
|
|
|
|
|
|
|
|
|
|
If one uses 130-bit partial reduction, does the code
|
|
|
|
|
handle the case where partially reduced final result is not fully
|
|
|
|
|
reduced?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV5_MAC_Key = 0x02 # zero:[256]
|
|
|
|
|
|
|
|
|
|
FF_16 = [0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF]
|
|
|
|
|
TV5_MAC_text = FF_16
|
|
|
|
|
|
|
|
|
|
TV5_MAC_tag = split(0x03 # zero): [16][8]
|
|
|
|
|
|
|
|
|
|
property TV5_MAC_correct = poly1305_MAC_correct TV5_MAC_Key TV5_MAC_text TV5_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #6
|
|
|
|
|
|
|
|
|
|
What happens if addition of s overflows modulo 2^128?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV6_MAC_Key = 0x02 # zero # join(FF_16):[256]
|
|
|
|
|
|
|
|
|
|
TV6_MAC_text = split(0x02 # zero) : [16][8]
|
|
|
|
|
|
|
|
|
|
TV6_MAC_tag = split(0x03 # 0): [16][8]
|
|
|
|
|
|
|
|
|
|
property TV6_MAC_correct = poly1305_MAC_correct TV6_MAC_Key TV6_MAC_text TV6_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #7
|
|
|
|
|
|
|
|
|
|
What happens if data limb is all ones and there is
|
|
|
|
|
carry from lower limb?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV7_MAC_Key = 0x01 # zero:[256]
|
|
|
|
|
|
|
|
|
|
TV7_MAC_text = [
|
|
|
|
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
|
|
|
0xF0, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
|
|
|
0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]
|
|
|
|
|
|
|
|
|
|
TV7_MAC_tag = split(0x05 # zero): [16][8]
|
|
|
|
|
|
|
|
|
|
property TV7_MAC_correct = poly1305_MAC_correct TV7_MAC_Key TV7_MAC_text TV7_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #8
|
|
|
|
|
|
|
|
|
|
What happens if final result from polynomial part is
|
|
|
|
|
exactly 2^130-5?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV8_MAC_Key = 0x01 # zero:[256]
|
|
|
|
|
|
|
|
|
|
TV8_MAC_text = [
|
|
|
|
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
|
|
|
0xFB, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE,
|
|
|
|
|
0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01]
|
|
|
|
|
|
|
|
|
|
TV8_MAC_tag = split(zero): [16][8]
|
|
|
|
|
|
|
|
|
|
property TV8_MAC_correct = poly1305_MAC_correct TV8_MAC_Key TV8_MAC_text TV8_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #9
|
|
|
|
|
|
|
|
|
|
What happens if final result from polynomial part is
|
|
|
|
|
exactly 2^130-6?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV9_MAC_Key = 0x02 # zero:[256]
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
TV9_MAC_text =
|
2014-07-30 03:39:50 +04:00
|
|
|
|
[0xFD, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF]
|
|
|
|
|
|
|
|
|
|
TV9_MAC_tag = [0xFA, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF]: [16][8]
|
|
|
|
|
|
|
|
|
|
property TV9_MAC_correct = poly1305_MAC_correct TV9_MAC_Key TV9_MAC_text TV9_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #10
|
|
|
|
|
|
|
|
|
|
What happens if 5*H+L-type reduction produces 131-
|
|
|
|
|
bit intermediate result?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV10_MAC_Key = join([0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]) # 0 :[256]
|
|
|
|
|
|
|
|
|
|
TV10_MAC_text = [
|
|
|
|
|
0xE3, 0x35, 0x94, 0xD7, 0x50, 0x5E, 0x43, 0xB9, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x33, 0x94, 0xD7, 0x50, 0x5E, 0x43, 0x79, 0xCD, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]
|
|
|
|
|
|
|
|
|
|
TV10_MAC_tag = [0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]: [16][8]
|
|
|
|
|
|
|
|
|
|
property TV10_MAC_correct = poly1305_MAC_correct TV10_MAC_Key TV10_MAC_text TV10_MAC_tag
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #11
|
|
|
|
|
|
|
|
|
|
What happens if 5*H+L-type reduction produces 131-
|
|
|
|
|
bit final result?
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
|
|
|
|
|
TV11_MAC_Key = join([0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]) # 0 :[256]
|
|
|
|
|
|
|
|
|
|
TV11_MAC_text = [
|
|
|
|
|
0xE3, 0x35, 0x94, 0xD7, 0x50, 0x5E, 0x43, 0xB9, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x33, 0x94, 0xD7, 0x50, 0x5E, 0x43, 0x79, 0xCD, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-07-30 03:39:50 +04:00
|
|
|
|
TV11_MAC_tag = split(0x13 # 0): [16][8]
|
|
|
|
|
|
|
|
|
|
property TV11_MAC_correct = poly1305_MAC_correct TV11_MAC_Key TV11_MAC_text TV11_MAC_tag
|
|
|
|
|
|
|
|
|
|
property all_MAC_tests_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV1_MAC_correct /\
|
|
|
|
|
TV2_MAC_correct /\
|
|
|
|
|
TV3_MAC_correct /\
|
|
|
|
|
TV4_MAC_correct /\
|
|
|
|
|
TV5_MAC_correct /\
|
|
|
|
|
TV6_MAC_correct /\
|
|
|
|
|
TV7_MAC_correct /\
|
|
|
|
|
TV8_MAC_correct /\
|
|
|
|
|
TV9_MAC_correct /\
|
|
|
|
|
TV10_MAC_correct /\
|
2016-02-19 21:08:20 +03:00
|
|
|
|
TV11_MAC_correct
|
2014-07-30 03:39:50 +04:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Poly1305 Key Generation Using ChaCha20
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
Poly1305_key_correct key nonce otk = GeneratePolyKeyUsingChaCha key nonce 0 == otk
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #1
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV1_key_Key = zero:ChaChaKey
|
|
|
|
|
TV1_key_Nonce = zero:[96]
|
|
|
|
|
|
|
|
|
|
TV1_key_OneTimeKey = join([
|
|
|
|
|
0x76, 0xb8, 0xe0, 0xad, 0xa0, 0xf1, 0x3d, 0x90, 0x40, 0x5d, 0x6a, 0xe5, 0x53, 0x86, 0xbd, 0x28,
|
|
|
|
|
0xbd, 0xd2, 0x19, 0xb8, 0xa0, 0x8d, 0xed, 0x1a, 0xa8, 0x36, 0xef, 0xcc, 0x8b, 0x77, 0x0d, 0xc7])
|
|
|
|
|
|
|
|
|
|
property TV1_key_correct = Poly1305_key_correct TV1_key_Key TV1_key_Nonce TV1_key_OneTimeKey
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #2
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV2_key_Key = zero # 0x01:ChaChaKey
|
|
|
|
|
TV2_key_Nonce = zero # 0x02:[96]
|
|
|
|
|
|
|
|
|
|
TV2_key_OneTimeKey = join([
|
|
|
|
|
0xec, 0xfa, 0x25, 0x4f, 0x84, 0x5f, 0x64, 0x74, 0x73, 0xd3, 0xcb, 0x14, 0x0d, 0xa9, 0xe8, 0x76,
|
|
|
|
|
0x06, 0xcb, 0x33, 0x06, 0x6c, 0x44, 0x7b, 0x87, 0xbc, 0x26, 0x66, 0xdd, 0xe3, 0xfb, 0xb7, 0x39])
|
|
|
|
|
|
|
|
|
|
property TV2_key_correct = Poly1305_key_correct TV2_key_Key TV2_key_Nonce TV2_key_OneTimeKey
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Test Vector #3
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
TV3_key_Key = join([
|
|
|
|
|
0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a, 0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
|
|
|
|
|
0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09, 0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0]):ChaChaKey
|
|
|
|
|
TV3_key_Nonce = zero # 0x02:[96]
|
|
|
|
|
|
|
|
|
|
TV3_key_OneTimeKey = join([
|
|
|
|
|
0x96, 0x5e, 0x3b, 0xc6, 0xf9, 0xec, 0x7e, 0xd9, 0x56, 0x08, 0x08, 0xf4, 0xd2, 0x29, 0xf9, 0x4b,
|
|
|
|
|
0x13, 0x7f, 0xf2, 0x75, 0xca, 0x9b, 0x3f, 0xcb, 0xdd, 0x59, 0xde, 0xaa, 0xd2, 0x33, 0x10, 0xae])
|
|
|
|
|
|
|
|
|
|
property TV3_key_correct = Poly1305_key_correct TV3_key_Key TV3_key_Nonce TV3_key_OneTimeKey
|
|
|
|
|
|
|
|
|
|
property all_key_tests_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV1_key_correct /\
|
|
|
|
|
TV2_key_correct /\
|
2016-02-19 21:08:20 +03:00
|
|
|
|
TV3_key_correct
|
2014-08-01 20:15:58 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## ChaCha20-Poly1305 AEAD Decryption
|
|
|
|
|
|
|
|
|
|
Below we’ll see decrypting a message. We receive a ciphertext, a
|
|
|
|
|
nonce, and a tag. We know the key. We will check the tag, and then
|
|
|
|
|
(assuming that it validates) decrypt the ciphertext. In this
|
|
|
|
|
particular protocol, we’ll assume that there is no padding of the
|
|
|
|
|
plaintext.
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2016-08-23 04:14:44 +03:00
|
|
|
|
AEAD_correct key nonce cypherText tag AAD = ptMatches /\ isValid where
|
2014-08-01 20:15:58 +04:00
|
|
|
|
(pt,isValid) = AEAD_CHACHA20_POLY1305_DECRYPT key nonce cypherText AAD
|
|
|
|
|
cypherText = (AEAD_CHACHA20_POLY1305 key nonce AeadPt AAD)
|
|
|
|
|
ptMatches = tag == pt
|
|
|
|
|
```
|
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
```cryptol
|
|
|
|
|
//known
|
|
|
|
|
TV1_AEAD_key = join([
|
|
|
|
|
0x1c, 0x92, 0x40, 0xa5, 0xeb, 0x55, 0xd3, 0x8a, 0xf3, 0x33, 0x88, 0x86, 0x04, 0xf6, 0xb5, 0xf0,
|
|
|
|
|
0x47, 0x39, 0x17, 0xc1, 0x40, 0x2b, 0x80, 0x09, 0x9d, 0xca, 0x5c, 0xbc, 0x20, 0x70, 0x75, 0xc0])
|
|
|
|
|
|
|
|
|
|
//sent
|
|
|
|
|
TV1_AEAD_nonce = join([0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08])
|
|
|
|
|
|
|
|
|
|
//sent
|
|
|
|
|
TV1_AEAD_AAD = [0xf3, 0x33, 0x88, 0x86, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x4e, 0x91]
|
|
|
|
|
|
|
|
|
|
// calculated
|
|
|
|
|
TV1_AEAD_known_otk = join([
|
|
|
|
|
0xbd, 0xf0, 0x4a, 0xa9, 0x5c, 0xe4, 0xde, 0x89, 0x95, 0xb1, 0x4b, 0xb6, 0xa1, 0x8f, 0xec, 0xaf,
|
|
|
|
|
0x26, 0x47, 0x8f, 0x50, 0xc0, 0x54, 0xf5, 0x63, 0xdb, 0xc0, 0xa2, 0x1e, 0x26, 0x15, 0x72, 0xaa])
|
2014-08-01 20:15:58 +04:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
//sent
|
|
|
|
|
TV1_AEAD_tag = [0xee, 0xad, 0x9d, 0x67, 0x89, 0x0c, 0xbb, 0x22, 0x39, 0x23, 0x36, 0xfe, 0xa1, 0x85, 0x1f, 0x38]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
TV1_AEAD_cypherText = [
|
|
|
|
|
0x64, 0xa0, 0x86, 0x15, 0x75, 0x86, 0x1a, 0xf4, 0x60, 0xf0, 0x62, 0xc7, 0x9b, 0xe6, 0x43, 0xbd,
|
|
|
|
|
0x5e, 0x80, 0x5c, 0xfd, 0x34, 0x5c, 0xf3, 0x89, 0xf1, 0x08, 0x67, 0x0a, 0xc7, 0x6c, 0x8c, 0xb2,
|
|
|
|
|
0x4c, 0x6c, 0xfc, 0x18, 0x75, 0x5d, 0x43, 0xee, 0xa0, 0x9e, 0xe9, 0x4e, 0x38, 0x2d, 0x26, 0xb0,
|
|
|
|
|
0xbd, 0xb7, 0xb7, 0x3c, 0x32, 0x1b, 0x01, 0x00, 0xd4, 0xf0, 0x3b, 0x7f, 0x35, 0x58, 0x94, 0xcf,
|
|
|
|
|
0x33, 0x2f, 0x83, 0x0e, 0x71, 0x0b, 0x97, 0xce, 0x98, 0xc8, 0xa8, 0x4a, 0xbd, 0x0b, 0x94, 0x81,
|
|
|
|
|
0x14, 0xad, 0x17, 0x6e, 0x00, 0x8d, 0x33, 0xbd, 0x60, 0xf9, 0x82, 0xb1, 0xff, 0x37, 0xc8, 0x55,
|
|
|
|
|
0x97, 0x97, 0xa0, 0x6e, 0xf4, 0xf0, 0xef, 0x61, 0xc1, 0x86, 0x32, 0x4e, 0x2b, 0x35, 0x06, 0x38,
|
|
|
|
|
0x36, 0x06, 0x90, 0x7b, 0x6a, 0x7c, 0x02, 0xb0, 0xf9, 0xf6, 0x15, 0x7b, 0x53, 0xc8, 0x67, 0xe4,
|
|
|
|
|
0xb9, 0x16, 0x6c, 0x76, 0x7b, 0x80, 0x4d, 0x46, 0xa5, 0x9b, 0x52, 0x16, 0xcd, 0xe7, 0xa4, 0xe9,
|
|
|
|
|
0x90, 0x40, 0xc5, 0xa4, 0x04, 0x33, 0x22, 0x5e, 0xe2, 0x82, 0xa1, 0xb0, 0xa0, 0x6c, 0x52, 0x3e,
|
|
|
|
|
0xaf, 0x45, 0x34, 0xd7, 0xf8, 0x3f, 0xa1, 0x15, 0x5b, 0x00, 0x47, 0x71, 0x8c, 0xbc, 0x54, 0x6a,
|
|
|
|
|
0x0d, 0x07, 0x2b, 0x04, 0xb3, 0x56, 0x4e, 0xea, 0x1b, 0x42, 0x22, 0x73, 0xf5, 0x48, 0x27, 0x1a,
|
|
|
|
|
0x0b, 0xb2, 0x31, 0x60, 0x53, 0xfa, 0x76, 0x99, 0x19, 0x55, 0xeb, 0xd6, 0x31, 0x59, 0x43, 0x4e,
|
|
|
|
|
0xce, 0xbb, 0x4e, 0x46, 0x6d, 0xae, 0x5a, 0x10, 0x73, 0xa6, 0x72, 0x76, 0x27, 0x09, 0x7a, 0x10,
|
|
|
|
|
0x49, 0xe6, 0x17, 0xd9, 0x1d, 0x36, 0x10, 0x94, 0xfa, 0x68, 0xf0, 0xff, 0x77, 0x98, 0x71, 0x30,
|
|
|
|
|
0x30, 0x5b, 0xea, 0xba, 0x2e, 0xda, 0x04, 0xdf, 0x99, 0x7b, 0x71, 0x4d, 0x6c, 0x6f, 0x2c, 0x29,
|
|
|
|
|
0xa6, 0xad, 0x5c, 0xb4, 0x02, 0x2b, 0x02, 0x70, 0x9b]
|
|
|
|
|
|
|
|
|
|
TV1_AEAD_Poly_input = [
|
|
|
|
|
0xf3, 0x33, 0x88, 0x86, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x4e, 0x91, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x64, 0xa0, 0x86, 0x15, 0x75, 0x86, 0x1a, 0xf4, 0x60, 0xf0, 0x62, 0xc7, 0x9b, 0xe6, 0x43, 0xbd,
|
|
|
|
|
0x5e, 0x80, 0x5c, 0xfd, 0x34, 0x5c, 0xf3, 0x89, 0xf1, 0x08, 0x67, 0x0a, 0xc7, 0x6c, 0x8c, 0xb2,
|
|
|
|
|
0x4c, 0x6c, 0xfc, 0x18, 0x75, 0x5d, 0x43, 0xee, 0xa0, 0x9e, 0xe9, 0x4e, 0x38, 0x2d, 0x26, 0xb0,
|
|
|
|
|
0xbd, 0xb7, 0xb7, 0x3c, 0x32, 0x1b, 0x01, 0x00, 0xd4, 0xf0, 0x3b, 0x7f, 0x35, 0x58, 0x94, 0xcf,
|
|
|
|
|
0x33, 0x2f, 0x83, 0x0e, 0x71, 0x0b, 0x97, 0xce, 0x98, 0xc8, 0xa8, 0x4a, 0xbd, 0x0b, 0x94, 0x81,
|
|
|
|
|
0x14, 0xad, 0x17, 0x6e, 0x00, 0x8d, 0x33, 0xbd, 0x60, 0xf9, 0x82, 0xb1, 0xff, 0x37, 0xc8, 0x55,
|
|
|
|
|
0x97, 0x97, 0xa0, 0x6e, 0xf4, 0xf0, 0xef, 0x61, 0xc1, 0x86, 0x32, 0x4e, 0x2b, 0x35, 0x06, 0x38,
|
|
|
|
|
0x36, 0x06, 0x90, 0x7b, 0x6a, 0x7c, 0x02, 0xb0, 0xf9, 0xf6, 0x15, 0x7b, 0x53, 0xc8, 0x67, 0xe4,
|
|
|
|
|
0xb9, 0x16, 0x6c, 0x76, 0x7b, 0x80, 0x4d, 0x46, 0xa5, 0x9b, 0x52, 0x16, 0xcd, 0xe7, 0xa4, 0xe9,
|
|
|
|
|
0x90, 0x40, 0xc5, 0xa4, 0x04, 0x33, 0x22, 0x5e, 0xe2, 0x82, 0xa1, 0xb0, 0xa0, 0x6c, 0x52, 0x3e,
|
|
|
|
|
0xaf, 0x45, 0x34, 0xd7, 0xf8, 0x3f, 0xa1, 0x15, 0x5b, 0x00, 0x47, 0x71, 0x8c, 0xbc, 0x54, 0x6a,
|
|
|
|
|
0x0d, 0x07, 0x2b, 0x04, 0xb3, 0x56, 0x4e, 0xea, 0x1b, 0x42, 0x22, 0x73, 0xf5, 0x48, 0x27, 0x1a,
|
|
|
|
|
0x0b, 0xb2, 0x31, 0x60, 0x53, 0xfa, 0x76, 0x99, 0x19, 0x55, 0xeb, 0xd6, 0x31, 0x59, 0x43, 0x4e,
|
|
|
|
|
0xce, 0xbb, 0x4e, 0x46, 0x6d, 0xae, 0x5a, 0x10, 0x73, 0xa6, 0x72, 0x76, 0x27, 0x09, 0x7a, 0x10,
|
|
|
|
|
0x49, 0xe6, 0x17, 0xd9, 0x1d, 0x36, 0x10, 0x94, 0xfa, 0x68, 0xf0, 0xff, 0x77, 0x98, 0x71, 0x30,
|
|
|
|
|
0x30, 0x5b, 0xea, 0xba, 0x2e, 0xda, 0x04, 0xdf, 0x99, 0x7b, 0x71, 0x4d, 0x6c, 0x6f, 0x2c, 0x29,
|
|
|
|
|
0xa6, 0xad, 0x5c, 0xb4, 0x02, 0x2b, 0x02, 0x70, 0x9b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
|
0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
First, we calculate the one-time Poly1305 key
|
|
|
|
|
|
2014-08-01 20:15:58 +04:00
|
|
|
|
```cryptol
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
//generate and check the one time key (leaving out the given states from the document, they will be correct if this is correct)
|
|
|
|
|
property TV1_otk_correct = Poly1305_key_correct TV1_AEAD_key TV1_AEAD_nonce TV1_AEAD_known_otk
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Next, we construct the AEAD buffer
|
|
|
|
|
|
|
|
|
|
```cryptol
|
2015-03-10 00:37:25 +03:00
|
|
|
|
// Helper macros for further properties
|
|
|
|
|
poly_input_correct AeadAAD cypherText result = (AeadConstruction AeadAAD cypherText) == result
|
2014-08-04 21:52:50 +04:00
|
|
|
|
|
|
|
|
|
property TV1_poly_input_correct = (poly_input_correct TV1_AEAD_AAD TV1_AEAD_cypherText TV1_AEAD_Poly_input)
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
We calculate the Poly1305 tag and find that it matches
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
property TV1_tag_correct = poly1305_MAC_correct TV1_AEAD_known_otk (AeadConstruction TV1_AEAD_AAD TV1_AEAD_cypherText) TV1_AEAD_tag
|
|
|
|
|
```
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
```cryptol
|
|
|
|
|
TV1_plaintext = [
|
|
|
|
|
0x49, 0x6e, 0x74, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x2d, 0x44, 0x72, 0x61, 0x66, 0x74, 0x73, 0x20,
|
|
|
|
|
0x61, 0x72, 0x65, 0x20, 0x64, 0x72, 0x61, 0x66, 0x74, 0x20, 0x64, 0x6f, 0x63, 0x75, 0x6d, 0x65,
|
|
|
|
|
0x6e, 0x74, 0x73, 0x20, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x61, 0x20,
|
|
|
|
|
0x6d, 0x61, 0x78, 0x69, 0x6d, 0x75, 0x6d, 0x20, 0x6f, 0x66, 0x20, 0x73, 0x69, 0x78, 0x20, 0x6d,
|
|
|
|
|
0x6f, 0x6e, 0x74, 0x68, 0x73, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x6d, 0x61, 0x79, 0x20, 0x62, 0x65,
|
|
|
|
|
0x20, 0x75, 0x70, 0x64, 0x61, 0x74, 0x65, 0x64, 0x2c, 0x20, 0x72, 0x65, 0x70, 0x6c, 0x61, 0x63,
|
|
|
|
|
0x65, 0x64, 0x2c, 0x20, 0x6f, 0x72, 0x20, 0x6f, 0x62, 0x73, 0x6f, 0x6c, 0x65, 0x74, 0x65, 0x64,
|
|
|
|
|
0x20, 0x62, 0x79, 0x20, 0x6f, 0x74, 0x68, 0x65, 0x72, 0x20, 0x64, 0x6f, 0x63, 0x75, 0x6d, 0x65,
|
|
|
|
|
0x6e, 0x74, 0x73, 0x20, 0x61, 0x74, 0x20, 0x61, 0x6e, 0x79, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x2e,
|
|
|
|
|
0x20, 0x49, 0x74, 0x20, 0x69, 0x73, 0x20, 0x69, 0x6e, 0x61, 0x70, 0x70, 0x72, 0x6f, 0x70, 0x72,
|
|
|
|
|
0x69, 0x61, 0x74, 0x65, 0x20, 0x74, 0x6f, 0x20, 0x75, 0x73, 0x65, 0x20, 0x49, 0x6e, 0x74, 0x65,
|
|
|
|
|
0x72, 0x6e, 0x65, 0x74, 0x2d, 0x44, 0x72, 0x61, 0x66, 0x74, 0x73, 0x20, 0x61, 0x73, 0x20, 0x72,
|
|
|
|
|
0x65, 0x66, 0x65, 0x72, 0x65, 0x6e, 0x63, 0x65, 0x20, 0x6d, 0x61, 0x74, 0x65, 0x72, 0x69, 0x61,
|
|
|
|
|
0x6c, 0x20, 0x6f, 0x72, 0x20, 0x74, 0x6f, 0x20, 0x63, 0x69, 0x74, 0x65, 0x20, 0x74, 0x68, 0x65,
|
|
|
|
|
0x6d, 0x20, 0x6f, 0x74, 0x68, 0x65, 0x72, 0x20, 0x74, 0x68, 0x61, 0x6e, 0x20, 0x61, 0x73, 0x20,
|
|
|
|
|
0x2f, 0xe2, 0x80, 0x9c, 0x77, 0x6f, 0x72, 0x6b, 0x20, 0x69, 0x6e, 0x20, 0x70, 0x72, 0x6f, 0x67,
|
|
|
|
|
0x72, 0x65, 0x73, 0x73, 0x2e, 0x2f, 0xe2, 0x80, 0x9d]
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2014-08-04 21:52:50 +04:00
|
|
|
|
|
|
|
|
|
TV1_calculate_plaintext = AEAD_CHACHA20_POLY1305_DECRYPT TV1_AEAD_key TV1_AEAD_nonce (TV1_AEAD_cypherText # TV1_AEAD_tag) TV1_AEAD_AAD
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
2016-08-23 04:14:44 +03:00
|
|
|
|
property TV1_plaintext_correct = isValid /\ pt == TV1_plaintext where
|
2014-08-04 21:52:50 +04:00
|
|
|
|
(pt,isValid) = TV1_calculate_plaintext
|
2016-02-19 21:08:20 +03:00
|
|
|
|
|
|
|
|
|
property decryption_vector_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
TV1_plaintext_correct /\
|
|
|
|
|
TV1_tag_correct /\
|
2014-08-04 21:52:50 +04:00
|
|
|
|
TV1_otk_correct
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
property all_test_vectors_correct =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
all_block_tests_correct /\
|
|
|
|
|
all_enc_tests_correct /\
|
|
|
|
|
all_MAC_tests_correct /\
|
|
|
|
|
all_key_tests_correct /\
|
2014-08-04 21:52:50 +04:00
|
|
|
|
decryption_vector_correct
|
2014-07-30 03:39:50 +04:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
2014-07-29 20:32:14 +04:00
|
|
|
|
# Appendix: Utility functions
|
|
|
|
|
|
|
|
|
|
```cryptol
|
|
|
|
|
indexOf e (xs:[a+1]b) = ixs ! 0 where
|
|
|
|
|
ixs = [ 0 ] #
|
|
|
|
|
[ if ix == e then j else old
|
|
|
|
|
| ix <- xs
|
|
|
|
|
| j <- [ 0 .. a ]
|
|
|
|
|
| old <- ixs
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
ToLittleEndian : ChaChaState -> ChaChaState
|
|
|
|
|
ToLittleEndian s = [littleendian (split words) | words <- s]
|
|
|
|
|
|
|
|
|
|
// Takes a finite sequence of bytes, and turns them into a word via
|
|
|
|
|
// a little-endian interpretation
|
|
|
|
|
littleendian : {a}(fin a) => [a][8] -> [a*8]
|
|
|
|
|
littleendian b = join(reverse b)
|
|
|
|
|
|
|
|
|
|
// Converts a bytestring encoded like "fe:ed:fa:ce." into a sequence of bytes
|
|
|
|
|
// Note: the trailing punctuation is needed
|
|
|
|
|
parseHexString : {n} (fin n) => [3*n][8] -> [n][8]
|
|
|
|
|
parseHexString hexString = [ charsToByte (take`{2} cs) | cs <- groupBy`{3} hexString ] where
|
|
|
|
|
charsToByte : [2][8] -> [8]
|
|
|
|
|
charsToByte [ ub, lb ] = (charToByte ub) << 4 || (charToByte lb)
|
2016-08-23 04:14:44 +03:00
|
|
|
|
charToByte c = if c >= '0' /\ c <= '9' then c-'0'
|
|
|
|
|
| c >= 'a' /\ c <= 'f' then 10+(c-'a')
|
2014-07-29 20:32:14 +04:00
|
|
|
|
else 0 // error case
|
|
|
|
|
|
|
|
|
|
property parseHexString_check =
|
|
|
|
|
join (parseHexString
|
|
|
|
|
("00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f:10:11:12:13:" #
|
|
|
|
|
"14:15:16:17:18:19:1a:1b:1c:1d:1e:1f.")) ==
|
|
|
|
|
0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
|
|
|
|
|
|
2016-02-19 21:08:20 +03:00
|
|
|
|
property AllPropertiesPass =
|
2016-08-23 04:14:44 +03:00
|
|
|
|
ChaChaQuarterround_passes_test /\
|
|
|
|
|
ChaChaQuarterround_passes_column_test /\
|
|
|
|
|
FirstRow_correct /\
|
|
|
|
|
BuildState_correct /\
|
|
|
|
|
ChaChaStateAfter20_correct /\
|
|
|
|
|
ChaCha20_test1 /\
|
|
|
|
|
SunscreenBuildState_correct /\
|
|
|
|
|
SunscreenBuildState2_correct /\
|
|
|
|
|
SunscreenBlock1_correct /\
|
|
|
|
|
SunscreenBlock2_correct /\
|
|
|
|
|
SunscreenKeystream_correct SunscreenKeystream /\
|
|
|
|
|
ChaCha_encrypt_sunscreen_correct /\
|
|
|
|
|
Sunscreen_decrypt_correct /\
|
|
|
|
|
poly1306Sokay /\
|
|
|
|
|
polyBlocksOK /\
|
|
|
|
|
Poly1305_passes_test /\
|
|
|
|
|
PolyBuildState_correct /\
|
|
|
|
|
PolyChaCha_correct /\
|
|
|
|
|
Poly_passes_test /\
|
|
|
|
|
AeadPolyKeyBuildState_correct /\
|
|
|
|
|
AeadPolyChaCha_correct /\
|
|
|
|
|
poly1305Test_correct /\
|
|
|
|
|
AeadTag_correct /\
|
|
|
|
|
AeadConstruction_correct /\
|
|
|
|
|
AeadDecrypt_correct /\
|
|
|
|
|
parseHexString_check /\
|
2014-08-04 21:52:50 +04:00
|
|
|
|
all_test_vectors_correct
|
2014-07-29 20:32:14 +04:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Since this file is literate Cryptol, the properties above can be checked
|
|
|
|
|
by loading it into a Cryptol interpreter, and running the AllPropertiesPass
|
|
|
|
|
function, like this:
|
|
|
|
|
|
|
|
|
|
```example
|
2016-02-19 21:08:20 +03:00
|
|
|
|
$ cryptol ChaChaPolyCryptolIETF.md
|
2014-07-29 20:32:14 +04:00
|
|
|
|
_ _
|
|
|
|
|
___ _ __ _ _ _ __ | |_ ___ | |
|
|
|
|
|
/ __| '__| | | | '_ \| __/ _ \| |
|
|
|
|
|
| (__| | | |_| | |_) | || (_) | |
|
|
|
|
|
\___|_| \__, | .__/ \__\___/|_|
|
|
|
|
|
|___/|_| version 2.0.0 (62acc96)
|
|
|
|
|
|
|
|
|
|
Loading module Cryptol
|
|
|
|
|
Loading module ChaCha20
|
|
|
|
|
... a bunch of warnings about the use of ambiguous-width constants
|
2016-02-19 21:08:20 +03:00
|
|
|
|
ChaCha20> AllPropertiesPass
|
2014-07-29 20:32:14 +04:00
|
|
|
|
True
|
|
|
|
|
```
|
|
|
|
|
This check verifies the implementation of `ChaCha`, `Poly1305` and the `AEAD`
|
|
|
|
|
construction all work with the provided test vectors.
|