use core::ops::Deref; use std::io::{self, Read}; use rand_core::{RngCore, CryptoRng}; use zeroize::{Zeroize, Zeroizing}; use subtle::ConstantTimeEq; use digest::{Digest, Output}; pub use ciphersuite::{ group::{ ff::{Field, PrimeField}, Group, }, Ciphersuite, }; #[cfg(any(feature = "ristretto", feature = "ed25519"))] mod dalek; #[cfg(feature = "ristretto")] pub use dalek::{Ristretto, IetfRistrettoHram}; #[cfg(feature = "ed25519")] pub use dalek::{Ed25519, IetfEd25519Hram}; #[cfg(any(feature = "secp256k1", feature = "p256"))] mod kp256; #[cfg(feature = "secp256k1")] pub use kp256::{Secp256k1, IetfSecp256k1Hram}; #[cfg(feature = "p256")] pub use kp256::{P256, IetfP256Hram}; #[cfg(feature = "ed448")] mod ed448; #[cfg(feature = "ed448")] pub use ed448::{Ed448, IetfEd448Hram}; #[cfg(all(test, feature = "ed448"))] pub(crate) use ed448::Ietf8032Ed448Hram; /// FROST Ciphersuite. /// /// This exclude the signing algorithm specific H2, making this solely the curve, its associated /// hash function, and the functions derived from it. pub trait Curve: Ciphersuite { /// Context string for this curve. const CONTEXT: &'static [u8]; /// Hash the given dst and data to a byte vector. Used to instantiate H4 and H5. fn hash(dst: &[u8], data: &[u8]) -> Output { Self::H::digest([Self::CONTEXT, dst, data].concat()) } /// Field element from hash. Used during key gen and by other crates under Serai as a general /// utility. Used to instantiate H1 and H3. #[allow(non_snake_case)] fn hash_to_F(dst: &[u8], msg: &[u8]) -> Self::F { ::hash_to_F(&[Self::CONTEXT, dst].concat(), msg) } /// Hash the message for the binding factor. H4 from the IETF draft. fn hash_msg(msg: &[u8]) -> Output { Self::hash(b"msg", msg) } /// Hash the commitments for the binding factor. H5 from the IETF draft. fn hash_commitments(commitments: &[u8]) -> Output { Self::hash(b"com", commitments) } /// Hash the commitments and message to calculate the binding factor. H1 from the IETF draft. // // This may return 0, which is invalid according to the FROST preprint, as all binding factors // are expected to be in the multiplicative subgroup. This isn't a practical issue, as there's a // negligible probability of this returning 0. // // When raised in // https://github.com/cfrg/draft-irtf-cfrg-frost/issues/451#issuecomment-1715985505, // the negligible probbility was seen as sufficient reason not to edit the spec to be robust in // this regard. // // While that decision may be disagreeable, this library cannot implement a robust scheme while // following the specification. Following the specification is preferred to being robust against // an impractical probability enabling a complex attack (made infeasible by the impractical // probability required). // // We could still panic on the 0-hash, preferring correctness to liveliness. Finding the 0-hash // is as computationally complex as simply calculating the group key's discrete log however, // making it not worth having a panic (as this library is expected not to panic). fn hash_binding_factor(binding: &[u8]) -> Self::F { ::hash_to_F(b"rho", binding) } /// Securely generate a random nonce. H3 from the IETF draft. fn random_nonce( secret: &Zeroizing, rng: &mut R, ) -> Zeroizing { let mut seed = Zeroizing::new(vec![0; 32]); rng.fill_bytes(seed.as_mut()); let mut repr = secret.to_repr(); // Perform rejection sampling until we reach a non-zero nonce // While the IETF spec doesn't explicitly require this, generating a zero nonce will produce // commitments which will be rejected for being zero (and if they were used, leak the secret // share) // Rejection sampling here will prevent an honest participant from ever generating 'malicious' // values and ensure safety let mut res; while { seed.extend(repr.as_ref()); res = Zeroizing::new(::hash_to_F(b"nonce", seed.deref())); res.ct_eq(&Self::F::ZERO).into() } { seed = Zeroizing::new(vec![0; 32]); rng.fill_bytes(&mut seed); } repr.as_mut().zeroize(); res } /// Read a point from a reader, rejecting identity. #[allow(non_snake_case)] fn read_G(reader: &mut R) -> io::Result { let res = ::read_G(reader)?; if res.is_identity().into() { Err(io::Error::new(io::ErrorKind::Other, "identity point"))?; } Ok(res) } }