From 1ff02271ad7e388f39558c61960e22bf222c9706 Mon Sep 17 00:00:00 2001 From: K Shiva Kiran Date: Wed, 13 Mar 2024 08:57:08 +0530 Subject: [PATCH] working on export --- examples/encryption.rs | 11 +++++--- src/convert.rs | 62 ++++++++++++++++++++---------------------- src/encoding.rs | 32 +++++++++++++++++----- src/false_bottom.rs | 44 ++++++++++++++++-------------- 4 files changed, 86 insertions(+), 63 deletions(-) diff --git a/examples/encryption.rs b/examples/encryption.rs index 253aeef..39c4789 100644 --- a/examples/encryption.rs +++ b/examples/encryption.rs @@ -4,20 +4,23 @@ fn main() { let real_msg = "The troops are headed due north"; let fake_msg = "The troops are headed due south"; - let mut fb = FBCrypt::init(12, 12).unwrap(); + let mut fb = FBCrypt::init(18, 12).unwrap(); let real_key = fb.add(&real_msg.as_bytes()).unwrap(); let fake_key = fb.add(&fake_msg.as_bytes()).unwrap(); - let real_decr = fb.decrypt(&real_key).unwrap(); - let fake_decr = fb.decrypt(&fake_key).unwrap(); + let cipher = fb.export().unwrap(); + let mut fb_new = FBCrypt::import(&cipher).unwrap(); + + let real_decr = fb_new.decrypt(&real_key).unwrap(); + let fake_decr = fb_new.decrypt(&fake_key).unwrap(); let real_str = String::from_utf8(real_decr).unwrap(); let fake_str = String::from_utf8(fake_decr).unwrap(); - let cipher = fb.export(); println!("Cipher: {cipher}"); println!("Decrypted Contents:"); println!("Real: {real_str}\nFake: {fake_str}"); assert_eq!(real_msg, real_str); + } diff --git a/src/convert.rs b/src/convert.rs index 7b04abf..d6e2677 100644 --- a/src/convert.rs +++ b/src/convert.rs @@ -5,38 +5,36 @@ use crypto_bigint::{U128, Encoding}; // all 128 bit integers are within the prime field (i.e < 2^128 - 159) // As of now, this is achieved by utilizing only 120 bits out of 128 bits -impl FBCrypt { - pub(crate) fn to_u128_blocks(inp: &[u8]) -> Result, FBError> { - if inp.len() == 0 { - return Err(FBError::EmptyInput); - } - let mut out: Vec = inp.chunks_exact(15) - .map(|chunk| { - let mut padded_chunk = [0_u8; 16]; - padded_chunk[..chunk.len()].copy_from_slice(chunk); - U128::from_le_bytes(padded_chunk) - }) - .collect(); - let rem = inp.chunks_exact(15) - .remainder(); - if rem.len() > 0 { - let mut rem_chunk: [u8; 16] = [0; 16]; - rem_chunk[..rem.len()].copy_from_slice(rem); - rem_chunk[15] = 16 - rem.len() as u8; - out.push(U128::from_le_bytes(rem_chunk)); - } - Ok(out) +pub(crate) fn msg_to_u128_blocks(inp: &[u8]) -> Result, FBError> { + if inp.len() == 0 { + return Err(FBError::EmptyInput); } - - pub(crate) fn to_bytes(inp: &[U128]) -> Result, FBError> { - if inp.len() == 0 { - return Err(FBError::EmptyInput) - } - let mut out: Vec = inp.iter() - .flat_map(|big_num| big_num.to_le_bytes()[..15].to_vec()) - .collect(); - let pad = inp.last().unwrap().to_le_bytes()[15]; - out.truncate(out.len()+1-pad as usize); - Ok(out) + let mut out: Vec = inp.chunks_exact(15) + .map(|chunk| { + let mut padded_chunk = [0_u8; 16]; + padded_chunk[..15].copy_from_slice(chunk); + U128::from_le_bytes(padded_chunk) + }) + .collect(); + let rem = inp.chunks_exact(15) + .remainder(); + if rem.len() > 0 { + let mut rem_chunk: [u8; 16] = [0; 16]; + rem_chunk[..rem.len()].copy_from_slice(rem); + rem_chunk[15] = 16 - rem.len() as u8; + out.push(U128::from_le_bytes(rem_chunk)); } + Ok(out) +} + +pub(crate) fn to_msg_bytes(inp: &[U128]) -> Result, FBError> { + if inp.len() == 0 { + return Err(FBError::EmptyInput) + } + let mut out: Vec = inp.iter() + .flat_map(|big_num| big_num.to_le_bytes()[..15].to_vec()) + .collect(); + let pad = inp.last().unwrap().to_le_bytes()[15]; + out.truncate(out.len()+1-pad as usize); + Ok(out) } diff --git a/src/encoding.rs b/src/encoding.rs index 3024521..090ea38 100644 --- a/src/encoding.rs +++ b/src/encoding.rs @@ -1,23 +1,41 @@ use base64::prelude::*; +use crypto_bigint::{U128, Encoding}; use crate::{ FBCrypt, errors::FBError, }; impl FBCrypt { - pub fn export(&self) -> String { - BASE64_STANDARD.encode( - FBCrypt::to_bytes(&self.c).unwrap_or("".into()) - ) + pub fn export(&self) -> Result { + let c_bytes: Vec = self.c.iter() + .flat_map(|bigint| bigint.to_le_bytes().to_vec()) + .collect(); + let r_bytes: Vec = self.r.iter() + .flat_map(|bigint| bigint.to_le_bytes().to_vec()) + .collect(); + Ok( + BASE64_STANDARD.encode(c_bytes) + ":" + + &BASE64_STANDARD.encode(r_bytes) + ) } - pub fn import(c_str: &str, r_str: &str) -> Result { + pub fn import(string: &str) -> Result { + let (c_str, r_str) = string.split_once(':') + .ok_or_else(|| FBError::DecodeError)?; let c_bytes = BASE64_STANDARD.decode(c_str) .map_err(|_| FBError::DecodeError)?; - let c = FBCrypt::to_u128_blocks(&c_bytes)?; + let c: Vec = c_bytes.chunks_exact(16) + .map(|chunk| U128::from_le_bytes(chunk.try_into().unwrap())) + .collect(); let r_bytes = BASE64_STANDARD.decode(r_str) .map_err(|_| FBError::DecodeError)?; - let r = FBCrypt::to_u128_blocks(&r_bytes)?; + let r: Vec = r_bytes.chunks_exact(16) + .map(|chunk| U128::from_le_bytes(chunk.try_into().unwrap())) + .collect(); Ok(FBCrypt {c, r}) } } + +impl FBKey { + +} diff --git a/src/false_bottom.rs b/src/false_bottom.rs index e9ab76e..e949185 100644 --- a/src/false_bottom.rs +++ b/src/false_bottom.rs @@ -1,14 +1,15 @@ use rand::{Rng, seq::IteratorRandom}; -use crate::{errors::FBError}; +use crate::{errors::FBError, convert::*}; use crypto_bigint::{U128, RandomMod, NonZero, rand_core::OsRng, Limb}; pub struct FBCrypt { - pub(crate) r: Vec, pub(crate) c: Vec, + pub(crate) r: Vec, } pub struct FBKey { - pub(crate) indices: Vec<(usize, usize)>, + pub(crate) r: Vec, + pub(crate) indices: Vec>, } // Prime number value @@ -28,28 +29,31 @@ impl FBCrypt { let c: Vec = (0..n) .map(|_| U128::random_mod(&mut OsRng, &MODULUS)) .collect(); - Ok(FBCrypt {r, c}) + Ok(FBCrypt {c, r}) } - pub fn add(&mut self, m: &[u8]) -> Result, FBError> { - let msg: Vec = FBCrypt::to_u128_blocks(m)?; - let mut keys: Vec = Vec::new(); + pub fn add(&mut self, m: &[u8]) -> Result { + let msg: Vec = msg_to_u128_blocks(m)?; + let mut key = FBKey { + r: self.r.clone(), + indices: Vec::new() + }; for m in msg { - keys.push(self.add_u128(&m)?) + key.indices.push(self.add_u128(&m)?) } - Ok(keys) + Ok(key) } - pub fn decrypt(&mut self, keys: &[FBKey]) -> Result, FBError> { + pub fn decrypt(&mut self, key: &FBKey) -> Result, FBError> { let mut decrypted: Vec = Vec::new(); - for key in keys { - decrypted.push(self.decrypt_u128(&key)?) + for indices in &key.indices { + decrypted.push(self.decrypt_u128(&indices)?) } - let msg = FBCrypt::to_bytes(&decrypted)?; + let msg = to_msg_bytes(&decrypted)?; Ok(msg) } - fn add_u128(&mut self, m: &U128) -> Result { + fn add_u128(&mut self, m: &U128) -> Result, FBError> { if m.ge(&P) { return Err(FBError::IntegerTooLarge); } @@ -82,15 +86,15 @@ impl FBCrypt { let indices: Vec<(usize, usize)> = c_i.into_iter() .zip(r_i.into_iter()) .collect(); - Ok(FBKey {indices}) + Ok(indices) } - fn decrypt_u128(&self, key: &FBKey) -> Result { - if key.indices.len() > self.c.len() { + fn decrypt_u128(&self, indices: &[(usize, usize)]) -> Result { + if indices.len() > self.c.len() { return Err(FBError::InvalidKey) } let mut m: U128 = U128::ZERO; - for &(ci, ri) in &key.indices { + for &(ci, ri) in indices { m = m.add_mod( &self.c[ci].mul_mod_special(&self.r[ri], P_POS), &P); @@ -112,7 +116,7 @@ fn encrypt_u128() { fn encrypt_bytes() { let input = vec![0xff; 150]; let mut fb = FBCrypt::init(21, 12).unwrap(); - let keys = fb.add(&input).unwrap(); - let decrypted = fb.decrypt(&keys).unwrap(); + let key = fb.add(&input).unwrap(); + let decrypted = fb.decrypt(&key).unwrap(); assert_eq!(input, decrypted); }