ed25519 1.0.0-jruby
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +15 -0
- data/.rspec +5 -0
- data/.rubocop.yml +35 -0
- data/.travis.yml +13 -0
- data/CHANGES.md +16 -0
- data/CODE_OF_CONDUCT.md +74 -0
- data/Gemfile +12 -0
- data/LICENSE +22 -0
- data/README.md +159 -0
- data/Rakefile +27 -0
- data/ed25519.gemspec +32 -0
- data/ed25519.png +0 -0
- data/ext/ed25519_java/org/cryptosphere/ed25519.java +228 -0
- data/ext/ed25519_ref10/api.h +4 -0
- data/ext/ed25519_ref10/base.h +1344 -0
- data/ext/ed25519_ref10/base2.h +40 -0
- data/ext/ed25519_ref10/d.h +1 -0
- data/ext/ed25519_ref10/d2.h +1 -0
- data/ext/ed25519_ref10/ed25519_ref10.c +99 -0
- data/ext/ed25519_ref10/ed25519_ref10.h +33 -0
- data/ext/ed25519_ref10/extconf.rb +9 -0
- data/ext/ed25519_ref10/fe.h +56 -0
- data/ext/ed25519_ref10/fe_0.c +19 -0
- data/ext/ed25519_ref10/fe_1.c +19 -0
- data/ext/ed25519_ref10/fe_add.c +57 -0
- data/ext/ed25519_ref10/fe_cmov.c +63 -0
- data/ext/ed25519_ref10/fe_copy.c +29 -0
- data/ext/ed25519_ref10/fe_frombytes.c +71 -0
- data/ext/ed25519_ref10/fe_invert.c +14 -0
- data/ext/ed25519_ref10/fe_isnegative.c +16 -0
- data/ext/ed25519_ref10/fe_isnonzero.c +19 -0
- data/ext/ed25519_ref10/fe_mul.c +252 -0
- data/ext/ed25519_ref10/fe_neg.c +45 -0
- data/ext/ed25519_ref10/fe_pow22523.c +13 -0
- data/ext/ed25519_ref10/fe_sq.c +148 -0
- data/ext/ed25519_ref10/fe_sq2.c +159 -0
- data/ext/ed25519_ref10/fe_sub.c +57 -0
- data/ext/ed25519_ref10/fe_tobytes.c +119 -0
- data/ext/ed25519_ref10/ge.h +95 -0
- data/ext/ed25519_ref10/ge_add.c +11 -0
- data/ext/ed25519_ref10/ge_add.h +97 -0
- data/ext/ed25519_ref10/ge_double_scalarmult.c +96 -0
- data/ext/ed25519_ref10/ge_frombytes.c +50 -0
- data/ext/ed25519_ref10/ge_madd.c +11 -0
- data/ext/ed25519_ref10/ge_madd.h +88 -0
- data/ext/ed25519_ref10/ge_msub.c +11 -0
- data/ext/ed25519_ref10/ge_msub.h +88 -0
- data/ext/ed25519_ref10/ge_p1p1_to_p2.c +12 -0
- data/ext/ed25519_ref10/ge_p1p1_to_p3.c +13 -0
- data/ext/ed25519_ref10/ge_p2_0.c +8 -0
- data/ext/ed25519_ref10/ge_p2_dbl.c +11 -0
- data/ext/ed25519_ref10/ge_p2_dbl.h +73 -0
- data/ext/ed25519_ref10/ge_p3_0.c +9 -0
- data/ext/ed25519_ref10/ge_p3_dbl.c +12 -0
- data/ext/ed25519_ref10/ge_p3_to_cached.c +17 -0
- data/ext/ed25519_ref10/ge_p3_to_p2.c +12 -0
- data/ext/ed25519_ref10/ge_p3_tobytes.c +14 -0
- data/ext/ed25519_ref10/ge_precomp_0.c +8 -0
- data/ext/ed25519_ref10/ge_scalarmult_base.c +104 -0
- data/ext/ed25519_ref10/ge_sub.c +11 -0
- data/ext/ed25519_ref10/ge_sub.h +97 -0
- data/ext/ed25519_ref10/ge_tobytes.c +14 -0
- data/ext/ed25519_ref10/keypair.c +22 -0
- data/ext/ed25519_ref10/open.c +47 -0
- data/ext/ed25519_ref10/pow22523.h +160 -0
- data/ext/ed25519_ref10/pow225521.h +160 -0
- data/ext/ed25519_ref10/sc.h +17 -0
- data/ext/ed25519_ref10/sc_muladd.c +366 -0
- data/ext/ed25519_ref10/sc_reduce.c +272 -0
- data/ext/ed25519_ref10/sha512.c +304 -0
- data/ext/ed25519_ref10/sha512.h +8 -0
- data/ext/ed25519_ref10/sign.c +41 -0
- data/ext/ed25519_ref10/sqrtm1.h +1 -0
- data/ext/ed25519_ref10/verify.c +40 -0
- data/lib/ed25519.rb +65 -0
- data/lib/ed25519/provider/jruby.rb +39 -0
- data/lib/ed25519/signing_key.rb +39 -0
- data/lib/ed25519/verify_key.rb +44 -0
- data/lib/ed25519/version.rb +5 -0
- data/lib/ed25519_java.jar +0 -0
- metadata +138 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 7ae17b8d776a0e09bfba306d42f817e806cdeb14
|
4
|
+
data.tar.gz: f7551dd72b2361acc584c0e8a7f8406f1a395532
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: c4997f60634446a3b948b9ddcd2c228b2d2a4ce2a23ef9cb5f09b933d090273b898c3e97c802cad9c4f85710ed4b588aac9f414f9aa2a01699bcd48f5aaded4b
|
7
|
+
data.tar.gz: 406ec016f0cdae858fc6276895e36cd3ffc0276b1e1f46ff99b726b33cf7f9daff67ed7e4e21f3b610a6c2e093b7efa591c8d21889736570207b0ef0336b8e9b
|
data/.gitignore
ADDED
data/.rspec
ADDED
data/.rubocop.yml
ADDED
@@ -0,0 +1,35 @@
|
|
1
|
+
AllCops:
|
2
|
+
TargetRubyVersion: 2.4
|
3
|
+
DisplayCopNames: true
|
4
|
+
|
5
|
+
#
|
6
|
+
# Style
|
7
|
+
#
|
8
|
+
|
9
|
+
Style/StringLiterals:
|
10
|
+
EnforcedStyle: double_quotes
|
11
|
+
|
12
|
+
#
|
13
|
+
# Metrics
|
14
|
+
#
|
15
|
+
|
16
|
+
Metrics/AbcSize:
|
17
|
+
Enabled: false
|
18
|
+
|
19
|
+
Metrics/CyclomaticComplexity:
|
20
|
+
Enabled: false
|
21
|
+
|
22
|
+
Metrics/PerceivedComplexity:
|
23
|
+
Enabled: false
|
24
|
+
|
25
|
+
Metrics/BlockLength:
|
26
|
+
Max: 100
|
27
|
+
|
28
|
+
Metrics/ClassLength:
|
29
|
+
Max: 100
|
30
|
+
|
31
|
+
Metrics/LineLength:
|
32
|
+
Max: 128
|
33
|
+
|
34
|
+
Metrics/MethodLength:
|
35
|
+
Max: 25
|
data/.travis.yml
ADDED
data/CHANGES.md
ADDED
@@ -0,0 +1,16 @@
|
|
1
|
+
# [1.0.0] (2017-12-12)
|
2
|
+
|
3
|
+
[1.0.0]: https://github.com/cryptosphere/x25519/compare/v0.1.0...v1.0.0
|
4
|
+
|
5
|
+
* [#7](https://github.com/cryptosphere/ed25519/pull/7)
|
6
|
+
Keypair refactor
|
7
|
+
|
8
|
+
* [#6](https://github.com/cryptosphere/ed25519/pull/6)
|
9
|
+
Switch from "ref" C implementation to SUPERCOP "ref10"
|
10
|
+
|
11
|
+
* [#5](https://github.com/cryptosphere/ed25519/pull/5)
|
12
|
+
Raise Ed25519::VerifyError if signature verification fails
|
13
|
+
|
14
|
+
# 0.1.0 (2017-12-11)
|
15
|
+
|
16
|
+
* Initial release
|
data/CODE_OF_CONDUCT.md
ADDED
@@ -0,0 +1,74 @@
|
|
1
|
+
# Contributor Covenant Code of Conduct
|
2
|
+
|
3
|
+
## Our Pledge
|
4
|
+
|
5
|
+
In the interest of fostering an open and welcoming environment, we as
|
6
|
+
contributors and maintainers pledge to making participation in our project and
|
7
|
+
our community a harassment-free experience for everyone, regardless of age, body
|
8
|
+
size, disability, ethnicity, gender identity and expression, level of experience,
|
9
|
+
nationality, personal appearance, race, religion, or sexual identity and
|
10
|
+
orientation.
|
11
|
+
|
12
|
+
## Our Standards
|
13
|
+
|
14
|
+
Examples of behavior that contributes to creating a positive environment
|
15
|
+
include:
|
16
|
+
|
17
|
+
* Using welcoming and inclusive language
|
18
|
+
* Being respectful of differing viewpoints and experiences
|
19
|
+
* Gracefully accepting constructive criticism
|
20
|
+
* Focusing on what is best for the community
|
21
|
+
* Showing empathy towards other community members
|
22
|
+
|
23
|
+
Examples of unacceptable behavior by participants include:
|
24
|
+
|
25
|
+
* The use of sexualized language or imagery and unwelcome sexual attention or
|
26
|
+
advances
|
27
|
+
* Trolling, insulting/derogatory comments, and personal or political attacks
|
28
|
+
* Public or private harassment
|
29
|
+
* Publishing others' private information, such as a physical or electronic
|
30
|
+
address, without explicit permission
|
31
|
+
* Other conduct which could reasonably be considered inappropriate in a
|
32
|
+
professional setting
|
33
|
+
|
34
|
+
## Our Responsibilities
|
35
|
+
|
36
|
+
Project maintainers are responsible for clarifying the standards of acceptable
|
37
|
+
behavior and are expected to take appropriate and fair corrective action in
|
38
|
+
response to any instances of unacceptable behavior.
|
39
|
+
|
40
|
+
Project maintainers have the right and responsibility to remove, edit, or
|
41
|
+
reject comments, commits, code, wiki edits, issues, and other contributions
|
42
|
+
that are not aligned to this Code of Conduct, or to ban temporarily or
|
43
|
+
permanently any contributor for other behaviors that they deem inappropriate,
|
44
|
+
threatening, offensive, or harmful.
|
45
|
+
|
46
|
+
## Scope
|
47
|
+
|
48
|
+
This Code of Conduct applies both within project spaces and in public spaces
|
49
|
+
when an individual is representing the project or its community. Examples of
|
50
|
+
representing a project or community include using an official project e-mail
|
51
|
+
address, posting via an official social media account, or acting as an appointed
|
52
|
+
representative at an online or offline event. Representation of a project may be
|
53
|
+
further defined and clarified by project maintainers.
|
54
|
+
|
55
|
+
## Enforcement
|
56
|
+
|
57
|
+
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
58
|
+
reported by contacting the project team at bascule@gmail.com. All
|
59
|
+
complaints will be reviewed and investigated and will result in a response that
|
60
|
+
is deemed necessary and appropriate to the circumstances. The project team is
|
61
|
+
obligated to maintain confidentiality with regard to the reporter of an incident.
|
62
|
+
Further details of specific enforcement policies may be posted separately.
|
63
|
+
|
64
|
+
Project maintainers who do not follow or enforce the Code of Conduct in good
|
65
|
+
faith may face temporary or permanent repercussions as determined by other
|
66
|
+
members of the project's leadership.
|
67
|
+
|
68
|
+
## Attribution
|
69
|
+
|
70
|
+
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
|
71
|
+
available at [http://contributor-covenant.org/version/1/4][version]
|
72
|
+
|
73
|
+
[homepage]: http://contributor-covenant.org
|
74
|
+
[version]: http://contributor-covenant.org/version/1/4/
|
data/Gemfile
ADDED
@@ -0,0 +1,12 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
source "https://rubygems.org"
|
4
|
+
|
5
|
+
gemspec
|
6
|
+
|
7
|
+
group :development, :test do
|
8
|
+
gem "rake", require: false
|
9
|
+
gem "rake-compiler", "~> 1.0", require: false
|
10
|
+
gem "rspec", "~> 3.7", require: false
|
11
|
+
gem "rubocop", "0.51.0", require: false
|
12
|
+
end
|
data/LICENSE
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
Copyright (c) 2012-2017 Tony Arcieri
|
2
|
+
|
3
|
+
MIT License
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
6
|
+
a copy of this software and associated documentation files (the
|
7
|
+
"Software"), to deal in the Software without restriction, including
|
8
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
9
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
10
|
+
permit persons to whom the Software is furnished to do so, subject to
|
11
|
+
the following conditions:
|
12
|
+
|
13
|
+
The above copyright notice and this permission notice shall be
|
14
|
+
included in all copies or substantial portions of the Software.
|
15
|
+
|
16
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
17
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
18
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
19
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
20
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
21
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
22
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,159 @@
|
|
1
|
+
# ed25519.rb [![Latest Version][gem-shield]][gem-link] [![Build Status][build-image]][build-link] [![Yard Docs][docs-image]][docs-link] [![License: MIT][license-image]][license-link]
|
2
|
+
|
3
|
+
[gem-shield]: https://badge.fury.io/rb/ed25519.svg
|
4
|
+
[gem-link]: https://rubygems.org/gems/ed25519
|
5
|
+
[build-image]: https://travis-ci.org/cryptosphere/ed25519.svg?branch=master
|
6
|
+
[build-link]: https://travis-ci.org/cryptosphere/ed25519
|
7
|
+
[docs-image]: https://img.shields.io/badge/yard-docs-blue.svg
|
8
|
+
[docs-link]: http://www.rubydoc.info/gems/ed25519
|
9
|
+
[license-image]: https://img.shields.io/badge/license-MIT-blue.svg
|
10
|
+
[license-link]: https://github.com/cryptosphere/ed25519/blob/master/LICENSE
|
11
|
+
|
12
|
+
A Ruby binding to the Ed25519 elliptic curve public-key signature system
|
13
|
+
described in [RFC 8032].
|
14
|
+
|
15
|
+
Two implementations are provided: a MRI C extension which uses the "ref10"
|
16
|
+
implementation from the SUPERCOP benchmark suite, and a pure Java version
|
17
|
+
which is a direct port of the Python implementation.
|
18
|
+
|
19
|
+
[RFC 8032]: https://tools.ietf.org/html/rfc8032
|
20
|
+
|
21
|
+
## What is Ed25519?
|
22
|
+
|
23
|
+
Ed25519 is a modern implementation of a [Schnorr signature] system using
|
24
|
+
elliptic curve groups.
|
25
|
+
|
26
|
+
Ed25519 provides a 128-bit security level, that is to say, all known attacks
|
27
|
+
take at least 2^128 operations, providing the same security level as AES-128,
|
28
|
+
NIST P-256, and RSA-3072.
|
29
|
+
|
30
|
+

|
31
|
+
|
32
|
+
Ed25519 has a number of unique properties that make it one of the best-in-class
|
33
|
+
digital signature algorithms:
|
34
|
+
|
35
|
+
* ***Small keys***: Ed25519 keys are only 256-bits (32 bytes), making them
|
36
|
+
small enough to easily copy around. Ed25519 also allows the public key
|
37
|
+
to be derived from the private key, meaning that it doesn't need to be
|
38
|
+
included in a serialized private key in cases you want both.
|
39
|
+
* ***Small signatures***: Ed25519 signatures are only 512-bits (64 bytes),
|
40
|
+
one of the smallest signature sizes available.
|
41
|
+
* ***Deterministic***: Unlike (EC)DSA, Ed25519 does not rely on an entropy
|
42
|
+
source when signing messages. This can be a potential attack vector if
|
43
|
+
the entropy source is not generating good random numbers. Ed25519 avoids
|
44
|
+
this problem entirely and will always generate the same signature for the
|
45
|
+
same data.
|
46
|
+
* ***Collision Resistant***: Hash-function collisions do not break this
|
47
|
+
system. This adds a layer of defense against the possibility of weakness
|
48
|
+
in the selected hash function.
|
49
|
+
|
50
|
+
You can read more on [Dan Bernstein's Ed25519 site](http://ed25519.cr.yp.to/).
|
51
|
+
|
52
|
+
[Schnorr signature]: https://en.wikipedia.org/wiki/Schnorr_signature
|
53
|
+
|
54
|
+
## Installation
|
55
|
+
|
56
|
+
Add this line to your application's Gemfile:
|
57
|
+
|
58
|
+
gem 'ed25519'
|
59
|
+
|
60
|
+
And then execute:
|
61
|
+
|
62
|
+
$ bundle
|
63
|
+
|
64
|
+
Or install it yourself as:
|
65
|
+
|
66
|
+
$ gem install ed25519
|
67
|
+
|
68
|
+
# Usage
|
69
|
+
|
70
|
+
Require **ed25519.rb** in your Ruby program:
|
71
|
+
|
72
|
+
```ruby
|
73
|
+
require "ed25519"
|
74
|
+
```
|
75
|
+
|
76
|
+
Generate a new random signing key:
|
77
|
+
|
78
|
+
```ruby
|
79
|
+
signing_key = Ed25519::SigningKey.generate
|
80
|
+
```
|
81
|
+
|
82
|
+
Sign a message with the signing key:
|
83
|
+
|
84
|
+
```ruby
|
85
|
+
signature = signing_key.sign(message)
|
86
|
+
```
|
87
|
+
|
88
|
+
Obtain the verify key for a given signing key:
|
89
|
+
|
90
|
+
```ruby
|
91
|
+
verify_key = signing_key.verify_key
|
92
|
+
```
|
93
|
+
|
94
|
+
Check the validity of a signature:
|
95
|
+
|
96
|
+
```ruby
|
97
|
+
verify_key.verify(signature, message)
|
98
|
+
```
|
99
|
+
|
100
|
+
The verify method will return `true` if the signature verifies, or raise
|
101
|
+
`Ed25519::VerifyError` if verification fails.
|
102
|
+
|
103
|
+
### Serializing Keys
|
104
|
+
|
105
|
+
Keys can be serialized as 32-byte binary strings as follows:
|
106
|
+
|
107
|
+
```ruby
|
108
|
+
signature_key_bytes = signing_key.to_bytes
|
109
|
+
verify_key_bytes = verify_key.to_bytes
|
110
|
+
```
|
111
|
+
|
112
|
+
The binary serialization can be passed directly into the constructor for a given key type:
|
113
|
+
|
114
|
+
```ruby
|
115
|
+
signing_key = Ed25519::SigningKey.new(signature_key_bytes)
|
116
|
+
verify_key = Ed25519::VerifyKey.new(verify_key_bytes)
|
117
|
+
```
|
118
|
+
|
119
|
+
## Security Notes
|
120
|
+
|
121
|
+
The Ed25519 "ref" implementation from SUPERCOP was lovingly crafted by expert
|
122
|
+
security boffins with great care taken to prevent timing attacks. The same
|
123
|
+
cannot be said for the C code used in the **ed25519.rb** C extension or in the
|
124
|
+
entirety of the provided Java implementation.
|
125
|
+
|
126
|
+
Care should be taken to avoid leaking to the attacker how long it takes to
|
127
|
+
generate keys or sign messages (at least until **ed25519.rb** itself can be audited
|
128
|
+
by experts who can fix any potential timing vulnerabilities)
|
129
|
+
|
130
|
+
**ed25519.rb** relies on a strong `SecureRandom` for key generation.
|
131
|
+
Weaknesses in the random number source can potentially result in insecure keys.
|
132
|
+
|
133
|
+
## JRuby Notes
|
134
|
+
|
135
|
+
**ed25519.rb** provides a pure Java backend, however this backend is much slower
|
136
|
+
than the C-based version. While **ed25519.rb** will function on JRuby, it may be
|
137
|
+
too slow to be usable for a given use case. You should benchmark your
|
138
|
+
application to determine if it will be fast enough for your purposes.
|
139
|
+
|
140
|
+
## Contributing
|
141
|
+
|
142
|
+
Bug reports and pull requests are welcome on GitHub at https://github.com/cryptosphere/ed25519.
|
143
|
+
This project is intended to be a safe, welcoming space for collaboration,
|
144
|
+
and contributors areexpected to adhere to the [Contributor Covenant](http://contributor-covenant.org)
|
145
|
+
code of conduct.
|
146
|
+
|
147
|
+
## License
|
148
|
+
|
149
|
+
Copyright (c) 2012-2017 Tony Arcieri. Distributed under the MIT License. See
|
150
|
+
[LICENSE] for further details.
|
151
|
+
|
152
|
+
[LICENSE]: https://github.com/cryptosphere/ed25519/blob/master/LICENSE
|
153
|
+
|
154
|
+
## Code of Conduct
|
155
|
+
|
156
|
+
Everyone interacting in the **ed25519.rb** project’s codebases, issue trackers, chat
|
157
|
+
rooms and mailing lists is expected to follow the [code of conduct].
|
158
|
+
|
159
|
+
[code of conduct]: https://github.com/cryptosphere/ed25519/blob/master/CODE_OF_CONDUCT.md
|
data/Rakefile
ADDED
@@ -0,0 +1,27 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "bundler/gem_tasks"
|
4
|
+
|
5
|
+
require "rake/clean"
|
6
|
+
CLEAN.include("**/*.o", "**/*.so", "**/*.bundle", "pkg", "tmp")
|
7
|
+
|
8
|
+
if defined? JRUBY_VERSION
|
9
|
+
require "rake/javaextensiontask"
|
10
|
+
Rake::JavaExtensionTask.new("ed25519_java") do |ext|
|
11
|
+
ext.ext_dir = "ext/ed25519_java"
|
12
|
+
end
|
13
|
+
else
|
14
|
+
require "rake/extensiontask"
|
15
|
+
|
16
|
+
Rake::ExtensionTask.new("ed25519_ref10") do |ext|
|
17
|
+
ext.ext_dir = "ext/ed25519_ref10"
|
18
|
+
end
|
19
|
+
end
|
20
|
+
|
21
|
+
require "rspec/core/rake_task"
|
22
|
+
RSpec::Core::RakeTask.new
|
23
|
+
|
24
|
+
require "rubocop/rake_task"
|
25
|
+
RuboCop::RakeTask.new
|
26
|
+
|
27
|
+
task default: %w[compile spec rubocop]
|
data/ed25519.gemspec
ADDED
@@ -0,0 +1,32 @@
|
|
1
|
+
|
2
|
+
# frozen_string_literal: true
|
3
|
+
|
4
|
+
require File.expand_path("lib/ed25519/version", __dir__)
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "ed25519"
|
8
|
+
spec.version = Ed25519::VERSION
|
9
|
+
spec.authors = ["Tony Arcieri"]
|
10
|
+
spec.email = ["tony.arcieri@gmail.com"]
|
11
|
+
spec.summary = "An efficient digital signature library providing the Ed25519 algorithm"
|
12
|
+
spec.description = <<-DESCRIPTION.strip.gsub(/\s+/, " ")
|
13
|
+
A Ruby binding to the Ed25519 elliptic curve public-key signature system
|
14
|
+
described in RFC 8032.
|
15
|
+
DESCRIPTION
|
16
|
+
spec.homepage = "https://github.com/cryptosphere/ed25519"
|
17
|
+
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
18
|
+
spec.bindir = "exe"
|
19
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
20
|
+
spec.require_paths = ["lib"]
|
21
|
+
|
22
|
+
if defined? JRUBY_VERSION
|
23
|
+
spec.platform = "jruby"
|
24
|
+
spec.files << "lib/ed25519_java.jar"
|
25
|
+
else
|
26
|
+
spec.platform = Gem::Platform::RUBY
|
27
|
+
spec.extensions = ["ext/ed25519_ref10/extconf.rb"]
|
28
|
+
end
|
29
|
+
|
30
|
+
spec.required_ruby_version = ">= 2.2.2"
|
31
|
+
spec.add_development_dependency "bundler", "~> 1.16"
|
32
|
+
end
|
data/ed25519.png
ADDED
Binary file
|
@@ -0,0 +1,228 @@
|
|
1
|
+
package org.cryptosphere;
|
2
|
+
|
3
|
+
import java.math.BigInteger;
|
4
|
+
import java.nio.ByteBuffer;
|
5
|
+
import java.security.MessageDigest;
|
6
|
+
import java.security.NoSuchAlgorithmException;
|
7
|
+
import java.util.Arrays;
|
8
|
+
|
9
|
+
/* Written by k3d3
|
10
|
+
* Released to the public domain
|
11
|
+
*/
|
12
|
+
|
13
|
+
public class ed25519 {
|
14
|
+
static final int b = 256;
|
15
|
+
static final BigInteger q = new BigInteger("57896044618658097711785492504343953926634992332820282019728792003956564819949");
|
16
|
+
static final BigInteger qm2 = new BigInteger("57896044618658097711785492504343953926634992332820282019728792003956564819947");
|
17
|
+
static final BigInteger qp3 = new BigInteger("57896044618658097711785492504343953926634992332820282019728792003956564819952");
|
18
|
+
static final BigInteger l = new BigInteger("7237005577332262213973186563042994240857116359379907606001950938285454250989");
|
19
|
+
static final BigInteger d = new BigInteger("-4513249062541557337682894930092624173785641285191125241628941591882900924598840740");
|
20
|
+
static final BigInteger I = new BigInteger("19681161376707505956807079304988542015446066515923890162744021073123829784752");
|
21
|
+
static final BigInteger By = new BigInteger("46316835694926478169428394003475163141307993866256225615783033603165251855960");
|
22
|
+
static final BigInteger Bx = new BigInteger("15112221349535400772501151409588531511454012693041857206046113283949847762202");
|
23
|
+
static final BigInteger[] B = {Bx.mod(q),By.mod(q)};
|
24
|
+
static final BigInteger un = new BigInteger("57896044618658097711785492504343953926634992332820282019728792003956564819967");
|
25
|
+
|
26
|
+
static byte[] H(byte[] m) {
|
27
|
+
MessageDigest md;
|
28
|
+
try {
|
29
|
+
md = MessageDigest.getInstance("SHA-512");
|
30
|
+
md.reset();
|
31
|
+
return md.digest(m);
|
32
|
+
} catch (NoSuchAlgorithmException e) {
|
33
|
+
e.printStackTrace();
|
34
|
+
System.exit(1);
|
35
|
+
}
|
36
|
+
return null;
|
37
|
+
}
|
38
|
+
|
39
|
+
static BigInteger expmod(BigInteger b, BigInteger e, BigInteger m) {
|
40
|
+
//System.out.println("expmod open with b=" + b + " e=" + e + " m=" + m);
|
41
|
+
if (e.equals(BigInteger.ZERO)) {
|
42
|
+
//System.out.println("expmod close with 1z");
|
43
|
+
return BigInteger.ONE;
|
44
|
+
}
|
45
|
+
BigInteger t = expmod(b, e.divide(BigInteger.valueOf(2)), m).pow(2).mod(m);
|
46
|
+
//System.out.println("expmod 1/2 t="+t+" e="+e+" testbit="+(e.testBit(0)?1:0));
|
47
|
+
if (e.testBit(0)) {
|
48
|
+
t = t.multiply(b).mod(m);
|
49
|
+
}
|
50
|
+
//System.out.println("expmod close with " + t);
|
51
|
+
return t;
|
52
|
+
}
|
53
|
+
|
54
|
+
static BigInteger inv(BigInteger x) {
|
55
|
+
//System.out.println("inv open with " + x);
|
56
|
+
//System.out.println("inv close with " + expmod(x, qm2, q));
|
57
|
+
return expmod(x, qm2, q);
|
58
|
+
}
|
59
|
+
|
60
|
+
static BigInteger xrecover(BigInteger y) {
|
61
|
+
BigInteger y2 = y.multiply(y);
|
62
|
+
BigInteger xx = (y2.subtract(BigInteger.ONE)).multiply(inv(d.multiply(y2).add(BigInteger.ONE)));
|
63
|
+
BigInteger x = expmod(xx, qp3.divide(BigInteger.valueOf(8)), q);
|
64
|
+
if (!x.multiply(x).subtract(xx).mod(q).equals(BigInteger.ZERO)) x = (x.multiply(I).mod(q));
|
65
|
+
if (!x.mod(BigInteger.valueOf(2)).equals(BigInteger.ZERO)) x = q.subtract(x);
|
66
|
+
return x;
|
67
|
+
}
|
68
|
+
|
69
|
+
static BigInteger[] edwards(BigInteger[] P, BigInteger[] Q) {
|
70
|
+
BigInteger x1 = P[0];
|
71
|
+
BigInteger y1 = P[1];
|
72
|
+
BigInteger x2 = Q[0];
|
73
|
+
BigInteger y2 = Q[1];
|
74
|
+
BigInteger dtemp = d.multiply(x1).multiply(x2).multiply(y1).multiply(y2);
|
75
|
+
//System.out.println("edwards open with "+x1+","+x2+" "+y1+","+y2+" d="+d+" dtemp="+dtemp);
|
76
|
+
BigInteger x3 = ((x1.multiply(y2)).add((x2.multiply(y1)))).multiply(inv(BigInteger.ONE.add(dtemp)));
|
77
|
+
//System.out.println("edwards 1/2 with "+x1+","+x2+" "+y1+","+y2+" d="+d+" dtemp="+dtemp);
|
78
|
+
BigInteger y3 = ((y1.multiply(y2)).add((x1.multiply(x2)))).multiply(inv(BigInteger.ONE.subtract(dtemp)));
|
79
|
+
//System.out.println("edwards 2/2 with "+x1+","+x2+" "+y1+","+y2+" d="+d+" dtemp="+dtemp);
|
80
|
+
//System.out.println("edwards close with "+x3.mod(q)+","+y3.mod(q));
|
81
|
+
return new BigInteger[]{x3.mod(q), y3.mod(q)};
|
82
|
+
}
|
83
|
+
|
84
|
+
static BigInteger[] scalarmult(BigInteger[] P, BigInteger e) {
|
85
|
+
//System.out.println("scalarmult open with e = " + e);
|
86
|
+
if (e.equals(BigInteger.ZERO)) {
|
87
|
+
//System.out.println("scalarmult close with Q = 0,1");
|
88
|
+
return new BigInteger[]{BigInteger.ZERO, BigInteger.ONE};
|
89
|
+
}
|
90
|
+
BigInteger[] Q = scalarmult(P, e.divide(BigInteger.valueOf(2)));
|
91
|
+
//System.out.println("scalarmult asQ = " + Q[0] + "," + Q[1]);
|
92
|
+
Q = edwards(Q, Q);
|
93
|
+
//System.out.println("scalarmult aeQ = " + Q[0] + "," + Q[1] + " e="+e+" testbit="+(e.testBit(0)?1:0));
|
94
|
+
if (e.testBit(0)) Q = edwards(Q, P);
|
95
|
+
//System.out.println("scalarmult close with Q = " + Q[0] + "," + Q[1]);
|
96
|
+
return Q;
|
97
|
+
}
|
98
|
+
|
99
|
+
static byte[] encodeint(BigInteger y) {
|
100
|
+
byte[] in = y.toByteArray();
|
101
|
+
byte[] out = new byte[in.length];
|
102
|
+
for (int i=0;i<in.length;i++) {
|
103
|
+
out[i] = in[in.length-1-i];
|
104
|
+
}
|
105
|
+
return out;
|
106
|
+
}
|
107
|
+
|
108
|
+
static byte[] encodepoint(BigInteger[] P) {
|
109
|
+
BigInteger x = P[0];
|
110
|
+
BigInteger y = P[1];
|
111
|
+
byte[] out = encodeint(y);
|
112
|
+
//System.out.println("encodepoint x="+x+" testbit="+(x.testBit(0) ? 1 : 0));
|
113
|
+
out[out.length-1] |= (x.testBit(0) ? 0x80 : 0);
|
114
|
+
return out;
|
115
|
+
}
|
116
|
+
|
117
|
+
static int bit(byte[] h, int i) {
|
118
|
+
//System.out.println("bit open with i="+i);
|
119
|
+
//System.out.println("bit close with "+(h[i/8] >> (i%8) & 1));
|
120
|
+
return h[i/8] >> (i%8) & 1;
|
121
|
+
}
|
122
|
+
|
123
|
+
static byte[] publickey(byte[] sk) {
|
124
|
+
byte[] h = H(sk);
|
125
|
+
//System.out.println("publickey open with h=" + test.getHex(h));
|
126
|
+
BigInteger a = BigInteger.valueOf(2).pow(b-2);
|
127
|
+
for (int i=3;i<(b-2);i++) {
|
128
|
+
BigInteger apart = BigInteger.valueOf(2).pow(i).multiply(BigInteger.valueOf(bit(h,i)));
|
129
|
+
//System.out.println("publickey apart="+apart);
|
130
|
+
a = a.add(apart);
|
131
|
+
}
|
132
|
+
BigInteger[] A = scalarmult(B,a);
|
133
|
+
//System.out.println("publickey close with A="+A[0]+","+A[1]+" out="+test.getHex(encodepoint(A)));
|
134
|
+
return encodepoint(A);
|
135
|
+
}
|
136
|
+
|
137
|
+
static BigInteger Hint(byte[] m) {
|
138
|
+
byte[] h = H(m);
|
139
|
+
BigInteger hsum = BigInteger.ZERO;
|
140
|
+
for (int i=0;i<2*b;i++) {
|
141
|
+
hsum = hsum.add(BigInteger.valueOf(2).pow(i).multiply(BigInteger.valueOf(bit(h,i))));
|
142
|
+
}
|
143
|
+
return hsum;
|
144
|
+
}
|
145
|
+
|
146
|
+
static byte[] signature(byte[] m, byte[] sk, byte[] pk) {
|
147
|
+
byte[] h = H(sk);
|
148
|
+
//System.out.println("signature open with m="+test.getHex(m)+" h="+test.getHex(h)+" pk="+test.getHex(pk));
|
149
|
+
BigInteger a = BigInteger.valueOf(2).pow(b-2);
|
150
|
+
for (int i=3;i<(b-2);i++) {
|
151
|
+
a = a.add(BigInteger.valueOf(2).pow(i).multiply(BigInteger.valueOf(bit(h,i))));
|
152
|
+
}
|
153
|
+
//System.out.println("signature a="+a);
|
154
|
+
ByteBuffer rsub = ByteBuffer.allocate((b/8)+m.length);
|
155
|
+
rsub.put(h, b/8, b/4-b/8).put(m);
|
156
|
+
//System.out.println("signature rsub="+test.getHex(rsub.array()));
|
157
|
+
BigInteger r = Hint(rsub.array());
|
158
|
+
//System.out.println("signature r="+r);
|
159
|
+
BigInteger[] R = scalarmult(B,r);
|
160
|
+
ByteBuffer Stemp = ByteBuffer.allocate(32+pk.length+m.length);
|
161
|
+
Stemp.put(encodepoint(R)).put(pk).put(m);
|
162
|
+
BigInteger S = r.add(Hint(Stemp.array()).multiply(a)).mod(l);
|
163
|
+
ByteBuffer out = ByteBuffer.allocate(64);
|
164
|
+
out.put(encodepoint(R)).put(encodeint(S));
|
165
|
+
return out.array();
|
166
|
+
}
|
167
|
+
|
168
|
+
static boolean isoncurve(BigInteger[] P) {
|
169
|
+
BigInteger x = P[0];
|
170
|
+
BigInteger y = P[1];
|
171
|
+
//System.out.println("isoncurve open with P="+x+","+y);
|
172
|
+
BigInteger xx = x.multiply(x);
|
173
|
+
BigInteger yy = y.multiply(y);
|
174
|
+
BigInteger dxxyy = d.multiply(yy).multiply(xx);
|
175
|
+
//System.out.println("isoncurve close with "+xx.negate().add(yy).subtract(BigInteger.ONE).subtract(dxxyy).mod(q));
|
176
|
+
return xx.negate().add(yy).subtract(BigInteger.ONE).subtract(dxxyy).mod(q).equals(BigInteger.ZERO);
|
177
|
+
}
|
178
|
+
|
179
|
+
static BigInteger decodeint(byte[] s) {
|
180
|
+
byte[] out = new byte[s.length];
|
181
|
+
for (int i=0;i<s.length;i++) {
|
182
|
+
out[i] = s[s.length-1-i];
|
183
|
+
}
|
184
|
+
return new BigInteger(out).and(un);
|
185
|
+
}
|
186
|
+
|
187
|
+
static BigInteger[] decodepoint(byte[] s) throws Exception {
|
188
|
+
byte[] ybyte = new byte[s.length];
|
189
|
+
for (int i=0;i<s.length;i++) {
|
190
|
+
ybyte[i] = s[s.length-1-i];
|
191
|
+
}
|
192
|
+
//System.out.println("decodepoint open with s="+test.getHex(s)+" ybyte="+test.getHex(ybyte));
|
193
|
+
BigInteger y = new BigInteger(ybyte).and(un);
|
194
|
+
//System.out.println("decodepoint y="+y);
|
195
|
+
BigInteger x = xrecover(y);
|
196
|
+
//System.out.println("decodepoint x="+x+" testbit="+(x.testBit(0)?1:0)+" bit="+bit(s, b-1));
|
197
|
+
if ((x.testBit(0)?1:0) != bit(s, b-1)) {
|
198
|
+
x = q.subtract(x);
|
199
|
+
}
|
200
|
+
BigInteger[] P = {x,y};
|
201
|
+
if (!isoncurve(P)) throw new Exception("decoding point that is not on curve");
|
202
|
+
return P;
|
203
|
+
}
|
204
|
+
|
205
|
+
static boolean checkvalid(byte[] s, byte[] m, byte[] pk) throws Exception {
|
206
|
+
if (s.length != b/4) throw new Exception("signature length is wrong");
|
207
|
+
if (pk.length != b/8) throw new Exception("public-key length is wrong");
|
208
|
+
//System.out.println("checkvalid open with s="+test.getHex(s)+" m="+test.getHex(m)+" pk="+test.getHex(pk));
|
209
|
+
byte[] Rbyte = Arrays.copyOfRange(s, 0, b/8);
|
210
|
+
//System.out.println("checkvalid Rbyte="+test.getHex(Rbyte));
|
211
|
+
BigInteger[] R = decodepoint(Rbyte);
|
212
|
+
BigInteger[] A = decodepoint(pk);
|
213
|
+
//System.out.println("checkvalid R="+R[0]+","+R[1]+" A="+A[0]+","+A[1]);
|
214
|
+
byte[] Sbyte = Arrays.copyOfRange(s, b/8, b/4);
|
215
|
+
//System.out.println("checkvalid Sbyte="+test.getHex(Sbyte));
|
216
|
+
BigInteger S = decodeint(Sbyte);
|
217
|
+
//System.out.println("checkvalid S="+S);
|
218
|
+
ByteBuffer Stemp = ByteBuffer.allocate(32+pk.length+m.length);
|
219
|
+
Stemp.put(encodepoint(R)).put(pk).put(m);
|
220
|
+
BigInteger h = Hint(Stemp.array());
|
221
|
+
BigInteger[] ra = scalarmult(B,S);
|
222
|
+
BigInteger[] rb = edwards(R,scalarmult(A,h));
|
223
|
+
//System.out.println("checkvalid ra="+ra[0]+","+ra[1]+" rb="+rb[0]+","+rb[1]);
|
224
|
+
if (!ra[0].equals(rb[0]) || !ra[1].equals(rb[1])) // Constant time comparison
|
225
|
+
return false;
|
226
|
+
return true;
|
227
|
+
}
|
228
|
+
}
|