forked from mirror/go-ethereum
parent
78375608a4
commit
475e8719ba
@ -0,0 +1,24 @@ |
|||||||
|
Copyright (c) 2014, tang0th |
||||||
|
All rights reserved. |
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without |
||||||
|
modification, are permitted provided that the following conditions are met: |
||||||
|
* Redistributions of source code must retain the above copyright |
||||||
|
notice, this list of conditions and the following disclaimer. |
||||||
|
* Redistributions in binary form must reproduce the above copyright |
||||||
|
notice, this list of conditions and the following disclaimer in the |
||||||
|
documentation and/or other materials provided with the distribution. |
||||||
|
* Neither the name of tang0th nor the names of its contributors may be |
||||||
|
used to endorse or promote products derived from this software without |
||||||
|
specific prior written permission. |
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND |
||||||
|
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
||||||
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
||||||
|
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY |
||||||
|
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
||||||
|
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||||
|
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
||||||
|
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||||||
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
||||||
|
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
@ -0,0 +1,19 @@ |
|||||||
|
# ECDH |
||||||
|
|
||||||
|
[![Build Status](https://travis-ci.org/wsddn/go-ecdh.svg?branch=master)](https://travis-ci.org/wsddn/go-ecdh) |
||||||
|
|
||||||
|
This is a go implementation of elliptical curve diffie-hellman key exchange method. |
||||||
|
It supports the NIST curves (and any curves using the `elliptic.Curve` go interface) |
||||||
|
as well as djb's curve25519. |
||||||
|
|
||||||
|
The library handles generating of keys, generating a shared secret, and the |
||||||
|
(un)marshalling of the elliptical curve keys into slices of bytes. |
||||||
|
|
||||||
|
## Warning and Disclaimer |
||||||
|
I am not a cryptographer, this was written as part of a personal project to learn about cryptographic systems and protocols. No claims as to the security of this library are made, I would not advise using it for anything that requires any level of security. Pull requests or issues about security flaws are however still welcome. |
||||||
|
|
||||||
|
## Compatibility |
||||||
|
Works with go 1.2 onwards. |
||||||
|
|
||||||
|
## TODO |
||||||
|
* Improve documentation |
@ -0,0 +1,62 @@ |
|||||||
|
package ecdh |
||||||
|
|
||||||
|
import ( |
||||||
|
"crypto" |
||||||
|
"io" |
||||||
|
|
||||||
|
"golang.org/x/crypto/curve25519" |
||||||
|
) |
||||||
|
|
||||||
|
type curve25519ECDH struct { |
||||||
|
ECDH |
||||||
|
} |
||||||
|
|
||||||
|
// NewCurve25519ECDH creates a new ECDH instance that uses djb's curve25519
|
||||||
|
// elliptical curve.
|
||||||
|
func NewCurve25519ECDH() ECDH { |
||||||
|
return &curve25519ECDH{} |
||||||
|
} |
||||||
|
|
||||||
|
func (e *curve25519ECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) { |
||||||
|
var pub, priv [32]byte |
||||||
|
var err error |
||||||
|
|
||||||
|
_, err = io.ReadFull(rand, priv[:]) |
||||||
|
if err != nil { |
||||||
|
return nil, nil, err |
||||||
|
} |
||||||
|
|
||||||
|
priv[0] &= 248 |
||||||
|
priv[31] &= 127 |
||||||
|
priv[31] |= 64 |
||||||
|
|
||||||
|
curve25519.ScalarBaseMult(&pub, &priv) |
||||||
|
|
||||||
|
return &priv, &pub, nil |
||||||
|
} |
||||||
|
|
||||||
|
func (e *curve25519ECDH) Marshal(p crypto.PublicKey) []byte { |
||||||
|
pub := p.(*[32]byte) |
||||||
|
return pub[:] |
||||||
|
} |
||||||
|
|
||||||
|
func (e *curve25519ECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) { |
||||||
|
var pub [32]byte |
||||||
|
if len(data) != 32 { |
||||||
|
return nil, false |
||||||
|
} |
||||||
|
|
||||||
|
copy(pub[:], data) |
||||||
|
return &pub, true |
||||||
|
} |
||||||
|
|
||||||
|
func (e *curve25519ECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) { |
||||||
|
var priv, pub, secret *[32]byte |
||||||
|
|
||||||
|
priv = privKey.(*[32]byte) |
||||||
|
pub = pubKey.(*[32]byte) |
||||||
|
secret = new([32]byte) |
||||||
|
|
||||||
|
curve25519.ScalarMult(secret, priv, pub) |
||||||
|
return secret[:], nil |
||||||
|
} |
@ -0,0 +1,14 @@ |
|||||||
|
package ecdh |
||||||
|
|
||||||
|
import ( |
||||||
|
"crypto" |
||||||
|
"io" |
||||||
|
) |
||||||
|
|
||||||
|
// The main interface for ECDH key exchange.
|
||||||
|
type ECDH interface { |
||||||
|
GenerateKey(io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) |
||||||
|
Marshal(crypto.PublicKey) []byte |
||||||
|
Unmarshal([]byte) (crypto.PublicKey, bool) |
||||||
|
GenerateSharedSecret(crypto.PrivateKey, crypto.PublicKey) ([]byte, error) |
||||||
|
} |
@ -0,0 +1,87 @@ |
|||||||
|
package ecdh |
||||||
|
|
||||||
|
import ( |
||||||
|
"crypto" |
||||||
|
"crypto/elliptic" |
||||||
|
"io" |
||||||
|
"math/big" |
||||||
|
) |
||||||
|
|
||||||
|
type ellipticECDH struct { |
||||||
|
ECDH |
||||||
|
curve elliptic.Curve |
||||||
|
} |
||||||
|
|
||||||
|
type ellipticPublicKey struct { |
||||||
|
elliptic.Curve |
||||||
|
X, Y *big.Int |
||||||
|
} |
||||||
|
|
||||||
|
type ellipticPrivateKey struct { |
||||||
|
D []byte |
||||||
|
} |
||||||
|
|
||||||
|
// NewEllipticECDH creates a new instance of ECDH with the given elliptic.Curve curve
|
||||||
|
// to use as the elliptical curve for elliptical curve diffie-hellman.
|
||||||
|
func NewEllipticECDH(curve elliptic.Curve) ECDH { |
||||||
|
return &ellipticECDH{ |
||||||
|
curve: curve, |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
func (e *ellipticECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) { |
||||||
|
var d []byte |
||||||
|
var x, y *big.Int |
||||||
|
var priv *ellipticPrivateKey |
||||||
|
var pub *ellipticPublicKey |
||||||
|
var err error |
||||||
|
|
||||||
|
d, x, y, err = elliptic.GenerateKey(e.curve, rand) |
||||||
|
if err != nil { |
||||||
|
return nil, nil, err |
||||||
|
} |
||||||
|
|
||||||
|
priv = &ellipticPrivateKey{ |
||||||
|
D: d, |
||||||
|
} |
||||||
|
pub = &ellipticPublicKey{ |
||||||
|
Curve: e.curve, |
||||||
|
X: x, |
||||||
|
Y: y, |
||||||
|
} |
||||||
|
|
||||||
|
return priv, pub, nil |
||||||
|
} |
||||||
|
|
||||||
|
func (e *ellipticECDH) Marshal(p crypto.PublicKey) []byte { |
||||||
|
pub := p.(*ellipticPublicKey) |
||||||
|
return elliptic.Marshal(e.curve, pub.X, pub.Y) |
||||||
|
} |
||||||
|
|
||||||
|
func (e *ellipticECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) { |
||||||
|
var key *ellipticPublicKey |
||||||
|
var x, y *big.Int |
||||||
|
|
||||||
|
x, y = elliptic.Unmarshal(e.curve, data) |
||||||
|
if x == nil || y == nil { |
||||||
|
return key, false |
||||||
|
} |
||||||
|
key = &ellipticPublicKey{ |
||||||
|
Curve: e.curve, |
||||||
|
X: x, |
||||||
|
Y: y, |
||||||
|
} |
||||||
|
return key, true |
||||||
|
} |
||||||
|
|
||||||
|
// GenerateSharedSecret takes in a public key and a private key
|
||||||
|
// and generates a shared secret.
|
||||||
|
//
|
||||||
|
// RFC5903 Section 9 states we should only return x.
|
||||||
|
func (e *ellipticECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) { |
||||||
|
priv := privKey.(*ellipticPrivateKey) |
||||||
|
pub := pubKey.(*ellipticPublicKey) |
||||||
|
|
||||||
|
x, _ := e.curve.ScalarMult(pub.X, pub.Y, priv.D) |
||||||
|
return x.Bytes(), nil |
||||||
|
} |
Loading…
Reference in new issue