spot-the-bug/stream-ciphers/monocypher-3.1.1/doc/man/man3/crypto_curve_to_hidden.3mon...

285 lines
8.9 KiB
Plaintext
Raw Normal View History

2020-09-25 05:58:08 +00:00
.\" This file is dual-licensed. Choose whichever you want.
.\"
.\" The first licence is a regular 2-clause BSD licence. The second licence
.\" is the CC-0 from Creative Commons. It is intended to release Monocypher
.\" to the public domain. The BSD licence serves as a fallback option.
.\"
.\" SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0
.\"
.\" ----------------------------------------------------------------------------
.\"
.\" Copyright (c) 2020 Fabio Scotoni
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions are
.\" met:
.\"
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\"
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the
.\" distribution.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
.\" "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
.\" LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
.\" A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
.\" HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" ----------------------------------------------------------------------------
.\"
.\" Written in 2020 by Fabio Scotoni
.\"
.\" To the extent possible under law, the author(s) have dedicated all copyright
.\" and related neighboring rights to this software to the public domain
.\" worldwide. This software is distributed without any warranty.
.\"
.\" You should have received a copy of the CC0 Public Domain Dedication along
.\" with this software. If not, see
.\" <https://creativecommons.org/publicdomain/zero/1.0/>
.\"
.Dd March 31, 2020
.Dt CRYPTO_CURVE_TO_HIDDEN 3MONOCYPHER
.Os
.Sh NAME
.Nm crypto_curve_to_hidden ,
.Nm crypto_hidden_to_curve ,
.Nm crypto_hidden_key_pair
.Nd hiding of X25519 public keys
.Sh SYNOPSIS
.In monocypher.h
.Ft int
.Fo crypto_curve_to_hidden
.Fa "uint8_t hidden[32]"
.Fa "const uint8_t curve[32]"
.Fa "uint8_t tweak"
.Fc
.Ft void
.Fo crypto_hidden_to_curve
.Fa "uint8_t curve[32]"
.Fa "const uint8_t hidden[32]"
.Fc
.Ft void
.Fo crypto_hidden_key_pair
.Fa "uint8_t hidden[32]"
.Fa "uint8_t secret_key[32]"
.Fa "uint8_t seed[32]"
.Fc
.Sh DESCRIPTION
These functions allow obfuscating X25519 public keys by making
them appear effectively indistinguishable from random noise.
This is of interest for key exchange protocols that require
indistinguishability from randomness, such as padded uniform random
blobs (PURBs).
They are intended for ephemeral (short-lived, possibly just one-time)
X25519 keys, not for long-term public keys.
After an initial key exchange involving hidden keys,
subsequent key exchange messages should be encrypted instead;
see, for example, the Noise protocol.
This is an
.Em advanced feature
\(en unless you are implementing an protocol that requires
indistinguishability of all communications from random noise,
consider
.Xr crypto_key_exchange_public_key 3monocypher
instead.
.Pp
For understanding what these functions do, it is important to note that
a
.Dq public key
in this context refers to a
.Em point on Curve25519 .
This also means that these functions are not compatible with
.Xr crypto_sign 3monocypher
and related functions.
.Pp
.Fn crypto_curve_to_hidden
takes a public key
.Fa curve
and a
.Fa tweak ,
hiding the public key it so that it is effectively indistinguishable
from random noise.
Note that only
.Xr crypto_x25519_dirty_fast 3monocypher
or
.Xr crypto_x25519_dirty_small 3monocypher
can generate a suitable public key;
the
.Xr crypto_x25519 3monocypher
function is insufficient.
The
.Fa tweak
must be chosen at random.
Even then, this operation
.Em may
fail:
Not all curve points are capable of being hidden.
In this case,
.Fn crypto_curve_to_hidden
must be tried again with a new key pair;
the
.Fa tweak
does not need to be changed.
On average, two attempts are needed.
Once a suitable public key has been found,
.Fn crypto_curve_to_hidden
always succeeds for it.
Given the same values for
.Fa tweak
and
.Fa curve ,
.Fn crypto_curve_to_hidden
yields the same output value
.Fa hidden .
.Pp
.Fn crypto_hidden_to_curve
performs the inverse operation:
It decodes a hidden point to a curve point on Curve25519.
.Pp
.Fn crypto_hidden_key_pair
is a convenience function that generates a secret key and its
corresponding public key, which is effectively indistinguishable from
random noise, from a random seed.
.Em The execution time of this function is unpredictable
because it may take many failures until a key pair could be generated
successfully.
.Fn crypto_hidden_key_pair
uses
.Xr crypto_x25519_dirty_fast 3monocypher
internally;
if code size is an important concern,
its functionality can be replicated with
.Xr crypto_x25519_dirty_small 3monocypher
instead.
.Pp
The arguments are:
.Bl -tag -width Ds
.It Fa curve
A point on the curve, which is a Curve25519 public key generated with
either
.Xr crypto_x25519_dirty_fast 3monocypher
or
.Xr crypto_x25519_dirty_small 3monocypher .
.It Fa hidden
The hidden encoding of a point on the curve which is effectively
indistinguishable from random.
.It Fa secret_key
The secret key that was generated from the given
.Fa seed .
.It Fa seed
A 32-byte random number from which to derive a key pair.
See
.Xr intro 3monocypher
for advice about generating random bytes (use the operating system's
random number generator).
The
.Fa seed
is wiped automatically.
.It Fa tweak
A 1-byte random number,
which influences the final output of
.Fn crypto_curve_to_hidden .
.El
.Pp
The
.Fa hidden
and
.Fa curve
arguments may overlap or point at the same buffer.
.Sh RETURN VALUES
.Fn crypto_curve_to_hidden
returns 0 on success, -1 if the given
.Fa curve
argument is unsuitable for hiding.
.Pp
.Fn crypto_hidden_to_curve
and
.Fn crypto_hidden_key_pair
return nothing; they cannot fail.
.Sh EXAMPLES
Generate a key pair manually using
.Xr crypto_x25519_dirty_small 3monocypher
instead of its fast variant:
.Bd -literal -offset indent
uint8_t sk [32]; /* Secret key output */
uint8_t pk [32]; /* Hidden public key output */
uint8_t tweak; /* Random tweak input */
arc4random_buf(&tweak, 1);
for (;;) {
arc4random_buf(sk, 32);
crypto_x25519_dirty_small(pk, sk);
if (crypto_curve_to_hidden(pk, pk, tweak) == 0)
break;
}
/* Now save the secret key and send the hidden public key. */
.Ed
.Pp
Performing a key exchange with the other party's public key having been
hidden:
.Bd -literal -offset indent
uint8_t hidden_pk [32]; /* Their hidden public key */
uint8_t their_pk [32]; /* Their unhidden public key */
uint8_t your_sk [32]; /* Your secret key */
uint8_t shared_key[32]; /* Shared session key */
crypto_hidden_to_curve(their_pk, hidden_pk);
crypto_key_exchange(shared_key, your_sk, their_pk);
/* Wipe secrets if they are no longer needed */
crypto_wipe(your_sk, 32);
.Ed
.Sh SEE ALSO
.Xr crypto_key_exchange 3monocypher ,
.Xr crypto_x25519 3monocypher ,
.Xr crypto_x25519_dirty_small 3monocypher ,
.Xr intro 3monocypher
.Sh STANDARDS
These functions implement the Elligator 2 mapping for Curve25519.
This mapping is incompatible with both the hash-to-curve Internet draft
and the implementation of Elligator 2 in libsodium.
Elligator 2 was described in:
.Rs
.%A Daniel J. Bernstein
.%A Mike Hamburg
.%A Anna Krasnova
.%A Tanja Lange
.%T Elligator: Elliptic-curve points indistinguishable from uniform random strings
.%J CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
.%I Association for Computing Machinery
.%D 2013
.%P pp. 967\(en980
.Re
.Sh HISTORY
The
.Fn crypto_curve_to_hidden ,
.Fn crypto_hidden_to_curve ,
and
.Fn crypto_hidden_key_pair
functions first appeared in Monocypher 3.1.0.
.Sh SECURITY CONSIDERATIONS
The secret keys for the public keys fed into
.Fn crypto_curve_to_hidden
.Sy must be chosen randomly ,
rather than deterministically.
Otherwise, the timing information given by the required number of
retries also leaks information on the secret keys.
.Pp
These functions
.Em help
build highly difficult-to-analyze protocols,
but are insufficient by themselves:
Other metadata, such as the amount of bytes sent in a packet or the size
of the 32-byte random-looking string that represents the curve point
itself, can be very strong indicators of the use of cryptography.
Consider using appropriate padding algorithms, such as PADME,
and obscure other metadata as much as possible.