https://github.com/CryptDB/cryptdb
Raw File
Tip revision: 7678bc98d3054f1418371779c6d1050cd1a88b2e authored by Raluca Ada Popa on 04 January 2014, 01:31:06 UTC
small changes to readme
Tip revision: 7678bc9
ffx.hh
#pragma once


/*
 * Based on "The FFX Mode of Operation for Format-Preserving Encryption"
 * by Bellare, Rogaway, and Spies.
 * http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec.pdf
 *
 * and the addendum to the above, "A parameter collection for enciphering strings
 * of arbitrary radix and length".
 * http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec2.pdf
 *
 * This implementation follows FFX[2], and is hard-coded to use:
 *   radix:    2 (binary)
 *   addition: 0 (character-wise addition, i.e., XOR)
 *   method:   2 (alternating Feistel)
 */

#include <string.h>
#include <sys/types.h>
#include <crypto/aes.hh>
#include <crypto/cbcmac.hh>

void ffx_mem_to_u64(const uint8_t *p,
                    uint64_t *a, uint64_t *b,
                    uint abits, uint bbits);
void ffx_u64_to_mem(uint64_t a, uint64_t b,
                    uint64_t abits, uint64_t bbits,
                    uint8_t *p);

struct ffx2_mac_header {
    const uint16_t ver;
    const uint8_t method;
    const uint8_t addition;
    const uint8_t radix;
    const uint8_t n;
    const uint8_t s;
    const uint8_t rounds;
    const uint64_t tlen;

    ffx2_mac_header(uint64_t narg, const std::vector<uint8_t> &t)
        : ver(1), method(2), addition(0), radix(2), n(narg),
          s(n/2), rounds(10), tlen(t.size()) {}
};

template<class BlockCipher>
class ffx2 : public ffx2_mac_header {
 public:
    ffx2(const BlockCipher *key, uint nbits, const std::vector<uint8_t> &t)
        : ffx2_mac_header(nbits, t), mac_base(key)
    {
        static_assert(BlockCipher::blocksize >= 8, "Block size too small");
        auto h = static_cast<const ffx2_mac_header *> (this);
        mac_base.update(h, sizeof(*h));
        mac_base.update(&t[0], t.size());
    }

    /*
     * For non-multiple-of-8-bit values, the bits come from MSB.
     */
    void encrypt(const uint8_t *pt, uint8_t *ct) const {
        uint64_t a, b, c;
        ffx_mem_to_u64(pt, &a, &b, s, n - s);

        for (int i = 0; i < rounds; i++) {
            c = a ^ f(i, b);
            a = b;
            b = c;
        }

        ffx_u64_to_mem(a, b, s, n - s, ct);
    }

    void decrypt(const uint8_t *ct, uint8_t *pt) const {
        uint64_t a, b, c;
        ffx_mem_to_u64(ct, &a, &b, s, n - s);

        for (int i = rounds - 1; i >= 0; i--) {
            c = b;
            b = a;
            a = c ^ f(i, b);
        }

        ffx_u64_to_mem(a, b, s, n - s, pt);
    }

 private:
    uint64_t f(uint8_t i, uint64_t b) const {
        auto mac = mac_base;

        struct {
            uint8_t alignpad[7];
            uint8_t i;
            uint64_t b;
        } tail = { { 0 }, i, b };
        mac.update(&tail.i, sizeof(tail) - sizeof(tail.alignpad));

        union {
            uint8_t u8[mac.blocksize];
            uint64_t u64;
        } out;
        mac.final(out.u8);

        uint m = (i % 2) ? (n -  s) : s;
        return out.u64 >> (64 - m);
    }

    cbcmac<BlockCipher> mac_base;
};

template<class BlockCipher, uint nbits>
class ffx2_block_cipher {
 public:
    ffx2_block_cipher(const BlockCipher *key, const std::vector<uint8_t> &t)
        : fi(key, nbits, t)
    {
        static_assert(nbits % 8 == 0, "Not a multiple of 8 bits");
    }

    void block_encrypt(const void *ptext, void *ctext) const {
        fi.encrypt((const uint8_t*) ptext, (uint8_t*) ctext);
    }

    void block_decrypt(const void *ctext, void *ptext) const {
        fi.decrypt((const uint8_t*) ctext, (uint8_t*) ptext);
    }

    static const size_t blocksize = (nbits + 7) / 8;

 private:
    const ffx2<BlockCipher> fi;
};
back to top