diff options
| -rw-r--r-- | pyecsca/ec/countermeasures.py | 134 | ||||
| -rw-r--r-- | test/ec/test_countermeasures.py | 77 |
2 files changed, 147 insertions, 64 deletions
diff --git a/pyecsca/ec/countermeasures.py b/pyecsca/ec/countermeasures.py index 217e12d..eff10c2 100644 --- a/pyecsca/ec/countermeasures.py +++ b/pyecsca/ec/countermeasures.py @@ -21,18 +21,25 @@ class ScalarMultiplierCountermeasure(ABC): and provides some scalar-splitting countermeasure. """ - mult: ScalarMultiplier + mult: "ScalarMultiplier | ScalarMultiplierCountermeasure" + """The underlying scalar multiplier (or another countermeasure).""" params: Optional[DomainParameters] + """The domain parameters, if any.""" point: Optional[Point] + """The point to multiply, if any.""" + bits: Optional[int] + """The bit-length to use, if any.""" - def __init__(self, mult: ScalarMultiplier): + def __init__(self, mult: "ScalarMultiplier | ScalarMultiplierCountermeasure"): self.mult = mult - def init(self, params: DomainParameters, point: Point): + def init(self, params: DomainParameters, point: Point, bits: Optional[int] = None): """Initialize the countermeasure with the parameters and the point.""" self.params = params self.point = point - self.mult.init(self.params, self.point) + if bits is None: + bits = params.full_order.bit_length() + self.bits = bits @abstractmethod def multiply(self, scalar: int) -> Point: @@ -66,7 +73,11 @@ class GroupScalarRandomization(ScalarMultiplierCountermeasure): rand_bits: int - def __init__(self, mult: ScalarMultiplier, rand_bits: int = 32): + def __init__( + self, + mult: "ScalarMultiplier | ScalarMultiplierCountermeasure", + rand_bits: int = 32, + ): """ :param mult: The multiplier to use. :param rand_bits: How many random bits to sample. @@ -74,22 +85,19 @@ class GroupScalarRandomization(ScalarMultiplierCountermeasure): super().__init__(mult) self.rand_bits = rand_bits - def init(self, params: DomainParameters, point: Point): - self.params = params - self.point = point - self.mult.init( - self.params, - self.point, - bits=params.full_order.bit_length() + self.rand_bits, - ) - def multiply(self, scalar: int) -> Point: - if self.params is None or self.point is None: + if self.params is None or self.point is None or self.bits is None: raise ValueError("Not initialized.") with ScalarMultiplicationAction(self.point, self.params, scalar) as action: order = self.params.order mask = int(Mod.random(1 << self.rand_bits)) masked_scalar = scalar + mask * order + bits = max(self.bits, self.rand_bits + order.bit_length()) + 1 + self.mult.init( + self.params, + self.point, + bits=bits, + ) return action.exit(self.mult.multiply(masked_scalar)) @@ -110,7 +118,11 @@ class AdditiveSplitting(ScalarMultiplierCountermeasure): add: Optional[AdditionFormula] - def __init__(self, mult: ScalarMultiplier, add: Optional[AdditionFormula] = None): + def __init__( + self, + mult: "ScalarMultiplier | ScalarMultiplierCountermeasure", + add: Optional[AdditionFormula] = None, + ): """ :param mult: The multiplier to use. :param add: Addition formula to use, if None, the formula from the multiplier is used. @@ -118,21 +130,29 @@ class AdditiveSplitting(ScalarMultiplierCountermeasure): super().__init__(mult) self.add = add + def _add(self, R: Point, S: Point) -> Point: # noqa + if self.add is None: + try: + return self.mult._add(R, S) # type: ignore + except AttributeError: + raise ValueError("No addition formula available.") + else: + return self.add( + self.params.curve.prime, R, S, **self.params.curve.parameters # type: ignore + )[0] + def multiply(self, scalar: int) -> Point: - if self.params is None or self.point is None: + if self.params is None or self.point is None or self.bits is None: raise ValueError("Not initialized.") with ScalarMultiplicationAction(self.point, self.params, scalar) as action: order = self.params.order r = Mod.random(order) s = scalar - r + bits = max(self.bits, order.bit_length()) + 1 + self.mult.init(self.params, self.point, bits) R = self.mult.multiply(int(r)) S = self.mult.multiply(int(s)) - if self.add is None: - res = self.mult._add(R, S) # noqa: This is OK. - else: - res = self.add( - self.params.curve.prime, R, S, **self.params.curve.parameters - )[0] + res = self._add(R, S) return action.exit(res) @@ -154,7 +174,11 @@ class MultiplicativeSplitting(ScalarMultiplierCountermeasure): rand_bits: int - def __init__(self, mult: ScalarMultiplier, rand_bits: int = 32): + def __init__( + self, + mult: "ScalarMultiplier | ScalarMultiplierCountermeasure", + rand_bits: int = 32, + ): """ :param mult: The multiplier to use. :param rand_bits: How many random bits to sample. @@ -163,13 +187,16 @@ class MultiplicativeSplitting(ScalarMultiplierCountermeasure): self.rand_bits = rand_bits def multiply(self, scalar: int) -> Point: - if self.params is None or self.point is None: + if self.params is None or self.point is None or self.bits is None: raise ValueError("Not initialized.") with ScalarMultiplicationAction(self.point, self.params, scalar) as action: r = Mod.random(1 << self.rand_bits) + self.mult.init(self.params, self.point, self.rand_bits) R = self.mult.multiply(int(r)) - self.mult.init(self.params, R) + self.mult.init( + self.params, R, max(self.bits, self.params.order.bit_length()) + ) kr_inv = scalar * mod(int(r), self.params.order).inverse() return action.exit(self.mult.multiply(int(kr_inv))) @@ -195,7 +222,11 @@ class EuclideanSplitting(ScalarMultiplierCountermeasure): add: Optional[AdditionFormula] - def __init__(self, mult: ScalarMultiplier, add: Optional[AdditionFormula] = None): + def __init__( + self, + mult: "ScalarMultiplier | ScalarMultiplierCountermeasure", + add: Optional[AdditionFormula] = None, + ): """ :param mult: The multiplier to use. :param add: Addition formula to use, if None, the formula from the multiplier is used. @@ -203,27 +234,34 @@ class EuclideanSplitting(ScalarMultiplierCountermeasure): super().__init__(mult) self.add = add + def _add(self, R: Point, S: Point) -> Point: # noqa + if self.add is None: + try: + return self.mult._add(R, S) # type: ignore + except AttributeError: + raise ValueError("No addition formula available.") + else: + return self.add( + self.params.curve.prime, R, S, **self.params.curve.parameters # type: ignore + )[0] + def multiply(self, scalar: int) -> Point: - if self.params is None or self.point is None: + if self.params is None or self.point is None or self.bits is None: raise ValueError("Not initialized.") with ScalarMultiplicationAction(self.point, self.params, scalar) as action: - half_bits = self.params.order.bit_length() // 2 + half_bits = self.bits // 2 r = Mod.random(1 << half_bits) - R = self.mult.multiply(int(r)) + self.mult.init(self.params, self.point, half_bits) + R = self.mult.multiply(int(r)) # r bounded by half_bits k1 = scalar % int(r) k2 = scalar // int(r) - T = self.mult.multiply(k1) + T = self.mult.multiply(k1) # k1 bounded by half_bits - self.mult.init(self.params, R) - S = self.mult.multiply(k2) + self.mult.init(self.params, R, self.bits) + S = self.mult.multiply(k2) # k2 (in worst case) bounded by bits, but in practice closer to half_bits - if self.add is None: - res = self.mult._add(S, T) # noqa: This is OK. - else: - res = self.add( - self.params.curve.prime, S, T, **self.params.curve.parameters - )[0] + res = self._add(S, T) return action.exit(res) @@ -246,20 +284,16 @@ class BrumleyTuveri(ScalarMultiplierCountermeasure): """ - def init(self, params: DomainParameters, point: Point): - self.params = params - self.point = point - self.mult.init( - self.params, - self.point, - bits=params.full_order.bit_length() + 1, - ) - def multiply(self, scalar: int) -> Point: - if self.params is None or self.point is None: + if self.params is None or self.point is None or self.bits is None: raise ValueError("Not initialized.") with ScalarMultiplicationAction(self.point, self.params, scalar) as action: - n = self.params.full_order + n = self.params.order + self.mult.init( + self.params, + self.point, + bits=max(self.bits, n.bit_length()) + 1, + ) scalar += n if scalar.bit_length() <= n.bit_length(): scalar += n diff --git a/test/ec/test_countermeasures.py b/test/ec/test_countermeasures.py index 1bf1477..5d059f9 100644 --- a/test/ec/test_countermeasures.py +++ b/test/ec/test_countermeasures.py @@ -7,7 +7,8 @@ from pyecsca.ec.countermeasures import ( GroupScalarRandomization, AdditiveSplitting, MultiplicativeSplitting, - EuclideanSplitting, BrumleyTuveri, + EuclideanSplitting, + BrumleyTuveri, ) from pyecsca.ec.mult import * @@ -122,7 +123,10 @@ def mults(secp128r1, add, dbl): ) for combination in product(*bgmw_options.values()) ] - comb_options = {"width": (2, 3, 4, 5), "accumulation_order": tuple(AccumulationOrder)} + comb_options = { + "width": (2, 3, 4, 5), + "accumulation_order": tuple(AccumulationOrder), + } combs = [ CombMultiplier( add, dbl, scl=scale, **dict(zip(comb_options.keys(), combination)) @@ -131,18 +135,18 @@ def mults(secp128r1, add, dbl): ] return ( - ltrs - + rtls - + bnafs - + wnafs - + booths - + [CoronMultiplier(add, dbl, scale)] - + ladders - + fixeds - + slides - + precomps - + bgmws - + combs + ltrs + + rtls + + bnafs + + wnafs + + booths + + [CoronMultiplier(add, dbl, scale)] + + ladders + + fixeds + + slides + + precomps + + bgmws + + combs ) @@ -239,3 +243,48 @@ def test_brumley_tuveri(mults, secp128r1, num): bt.init(secp128r1, secp128r1.generator) masked = bt.multiply(num) assert raw.equals(masked) + + +@pytest.mark.parametrize("scalar", [ + 3253857902090173296443513219124437746, + 1234567893141592653589793238464338327, + 86728612699079982903603364383639280149, + 60032993417060801067503559426926851620 +]) +@pytest.mark.parametrize( + "one,two", + product( + ( + GroupScalarRandomization, + AdditiveSplitting, + MultiplicativeSplitting, + EuclideanSplitting, + BrumleyTuveri, + ), + repeat=2, + ), +) +def test_combination(scalar, one, two, secp128r1): + if one == two: + pytest.skip("Skip identical combinations.") + mult = LTRMultiplier( + secp128r1.curve.coordinate_model.formulas["add-2015-rcb"], + secp128r1.curve.coordinate_model.formulas["dbl-2015-rcb"] + ) + mult.init(secp128r1, secp128r1.generator) + raw = mult.multiply(scalar) + + add = mult.formulas["add"] + + if one in (AdditiveSplitting, EuclideanSplitting): + layer_one = one(mult, add) + else: + layer_one = one(mult) + + if two in (AdditiveSplitting, EuclideanSplitting): + combo = two(layer_one, add) + else: + combo = two(layer_one) + combo.init(secp128r1, secp128r1.generator) + masked = combo.multiply(scalar) + assert raw.equals(masked) |
