mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-01-22 05:10:56 +00:00
cosi: typehints, documentation, removed selftest
This commit is contained in:
parent
0e8fe9e743
commit
a0f73b726d
@ -1,96 +1,72 @@
|
||||
import sys
|
||||
from functools import reduce
|
||||
import binascii
|
||||
from typing import Iterable, Tuple
|
||||
|
||||
from trezorlib import _ed25519
|
||||
|
||||
# XXX, these could be NewType's, but that would infect users of the cosi module with these types as well.
|
||||
# Unsure if we want that.
|
||||
Ed25519PrivateKey = bytes
|
||||
Ed25519PublicPoint = bytes
|
||||
Ed25519Signature = bytes
|
||||
|
||||
def combine_keys(pks):
|
||||
|
||||
def combine_keys(pks: Iterable[Ed25519PublicPoint]) -> Ed25519PublicPoint:
|
||||
"""Combine a list of Ed25519 points into a "global" CoSi key."""
|
||||
P = [_ed25519.decodepoint(pk) for pk in pks]
|
||||
combine = reduce(_ed25519.edwards, P)
|
||||
return _ed25519.encodepoint(combine)
|
||||
return Ed25519PublicPoint(_ed25519.encodepoint(combine))
|
||||
|
||||
|
||||
def combine_sig(R, sigs):
|
||||
def combine_sig(global_R: Ed25519PublicPoint, sigs: Iterable[Ed25519Signature]) -> Ed25519Signature:
|
||||
"""Combine a list of signatures into a single CoSi signature."""
|
||||
S = [_ed25519.decodeint(si) for si in sigs]
|
||||
s = sum(S) % _ed25519.l
|
||||
sig = R + _ed25519.encodeint(s)
|
||||
return sig
|
||||
sig = global_R + _ed25519.encodeint(s)
|
||||
return Ed25519Signature(sig)
|
||||
|
||||
|
||||
def get_nonce(sk, data, ctr):
|
||||
def get_nonce(sk: Ed25519PrivateKey, data: bytes, ctr: int = 0) -> Tuple[int, Ed25519PublicPoint]:
|
||||
"""Calculate CoSi nonces for given data.
|
||||
These differ from Ed25519 deterministic nonces in that there is a counter appended at end.
|
||||
|
||||
Returns both the private point `r` and the partial signature `R`.
|
||||
`r` is returned for performance reasons: :func:`sign_with_privkey`
|
||||
takes it as its `nonce` argument so that it doesn't repeat the `get_nonce` call.
|
||||
|
||||
`R` should be combined with other partial signatures through :func:`combine_keys`
|
||||
to obtain a "global commitment".
|
||||
"""
|
||||
h = _ed25519.H(sk)
|
||||
b = _ed25519.b
|
||||
r = _ed25519.Hint(bytes([h[i] for i in range(b >> 3, b >> 2)]) + data + binascii.unhexlify('%08x' % ctr))
|
||||
R = _ed25519.scalarmult(_ed25519.B, r)
|
||||
return r, _ed25519.encodepoint(R)
|
||||
return r, Ed25519PublicPoint(_ed25519.encodepoint(R))
|
||||
|
||||
|
||||
def verify(signature, digest, pub_key):
|
||||
def verify(signature: Ed25519Signature, digest: bytes, pub_key: Ed25519PublicPoint) -> None:
|
||||
"""Verify Ed25519 signature. Raise exception if the signature is invalid."""
|
||||
# XXX this *might* change to bool function
|
||||
_ed25519.checkvalid(signature, digest, pub_key)
|
||||
|
||||
|
||||
def pubkey_from_privkey(privkey):
|
||||
return _ed25519.publickey(privkey)
|
||||
def pubkey_from_privkey(privkey: Ed25519PrivateKey) -> Ed25519PublicPoint:
|
||||
"""Interpret 32 bytes of data as an Ed25519 private key.
|
||||
Calculate and return the corresponding public key.
|
||||
"""
|
||||
return Ed25519PublicPoint(_ed25519.publickey(privkey))
|
||||
|
||||
|
||||
def sign_with_privkey(digest, privkey, global_pubkey, nonce, global_commit):
|
||||
def sign_with_privkey(digest: bytes, privkey: Ed25519PrivateKey,
|
||||
global_pubkey: Ed25519PublicPoint,
|
||||
nonce: int,
|
||||
global_commit: Ed25519PublicPoint) -> Ed25519Signature:
|
||||
"""Create a CoSi signature of `digest` with the supplied private key.
|
||||
This function needs to know the global public key and global commitment.
|
||||
"""
|
||||
h = _ed25519.H(privkey)
|
||||
b = _ed25519.b
|
||||
a = 2 ** (b - 2) + sum(2 ** i * _ed25519.bit(h, i) for i in range(3, b - 2))
|
||||
S = (nonce + _ed25519.Hint(global_commit + global_pubkey + digest) * a) % _ed25519.l
|
||||
return _ed25519.encodeint(S)
|
||||
|
||||
|
||||
def self_test(digest):
|
||||
|
||||
def to_hex(by):
|
||||
return binascii.hexlify(by).decode()
|
||||
|
||||
N = 3
|
||||
|
||||
digest = binascii.unhexlify(digest)
|
||||
print('Digest: %s' % to_hex(digest))
|
||||
sks = []
|
||||
pks = []
|
||||
nonces = []
|
||||
commits = []
|
||||
sigs = []
|
||||
for i in range(0, N):
|
||||
print('----- Key %d ------' % (i + 1))
|
||||
seckey = (chr(0x41 + i) * 32).encode()
|
||||
pubkey = _ed25519.publickey(seckey)
|
||||
print('Secret Key: %s' % to_hex(seckey))
|
||||
print('Public Key: %s' % to_hex(pubkey))
|
||||
sks.append(seckey)
|
||||
pks.append(pubkey)
|
||||
ctr = 0
|
||||
r, R = get_nonce(seckey, digest, ctr)
|
||||
print('Local nonce: %s' % to_hex(_ed25519.encodeint(r)))
|
||||
print('Local commit: %s' % to_hex(R))
|
||||
nonces.append(r)
|
||||
commits.append(R)
|
||||
|
||||
global_pk = combine_keys(pks)
|
||||
global_R = combine_keys(commits)
|
||||
print('-----------------')
|
||||
print('Global pubkey: %s' % to_hex(global_pk))
|
||||
print('Global commit: %s' % to_hex(global_R))
|
||||
print('-----------------')
|
||||
|
||||
sigs = [sign_with_privkey(digest, sks[i], global_pk, nonces[i], global_R) for i in range(N)]
|
||||
for sig in sigs:
|
||||
print('Local signature: %s' % to_hex(sig))
|
||||
|
||||
print('-----------------')
|
||||
sig = combine_sig(global_R, sigs)
|
||||
print('Global sig: %s' % to_hex(sig))
|
||||
verify(sig, digest, global_pk)
|
||||
print('Valid Signature!')
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
if len(sys.argv) > 1:
|
||||
self_test(digest=sys.argv[1])
|
||||
else:
|
||||
self_test(digest='4a5e1e4baab89f3a32518a88c31bc87f618f76673e2cc77ab2127b7afdeda33b')
|
||||
return Ed25519Signature(_ed25519.encodeint(S))
|
||||
|
Loading…
Reference in New Issue
Block a user