Skip to content

Commit 27805f1

Browse files
authoredMar 16, 2023
Add two more ECDH methods, so we have 3 ECDH methods (#7)
1 parent 559439d commit 27805f1

File tree

8 files changed

+231
-60
lines changed

8 files changed

+231
-60
lines changed
 

‎Package.swift

-4
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,10 @@ import PackageDescription
55

66
let package = Package(
77
name: "K1",
8-
98
platforms: [
109
.macOS(.v11),
1110
.iOS(.v13),
1211
],
13-
1412
products: [
1513
.library(
1614
name: "K1",
@@ -19,12 +17,10 @@ let package = Package(
1917
]
2018
),
2119
],
22-
2320
dependencies: [
2421
// Only used by tests
2522
.package(url: "https://github.com/filom/ASN1Decoder", from: "1.8.0")
2623
],
27-
2824
targets: [
2925

3026
// Target `libsecp256k1` https://github.com/bitcoin-core/secp256k1

‎Sources/K1/K1/K1/Error.swift

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ public extension K1 {
2727
case incorrectByteCountOfMessageToValidate
2828
case failedToCompressPublicKey
2929
case failedToUncompressPublicKey
30-
30+
case failedToProduceSharedSecret
3131
case incorrectByteCountOfPublicKey(got: Int, acceptableLengths: [Int])
3232
case failedToParsePublicKeyFromBytes
3333
case failedToParseDERSignature

‎Sources/K1/K1/Keys/PrivateKey/PrivateKey/PrivateKey+Bridge+To+C.swift

+169-45
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ extension Bridge {
3535
}
3636
nonceFunctionArbitraryBytes = [UInt8](nonceFunctionArbitraryData)
3737
}
38-
38+
3939
var signatureRecoverableBridgedToC = secp256k1_ecdsa_recoverable_signature()
4040

4141
try Self.call(
@@ -81,7 +81,7 @@ extension Bridge {
8181
}
8282
nonceFunctionArbitraryBytes = [UInt8](nonceFunctionArbitraryData)
8383
}
84-
84+
8585
var signatureBridgedToC = secp256k1_ecdsa_signature()
8686

8787
try Self.call(
@@ -96,7 +96,7 @@ extension Bridge {
9696
nonceFunctionArbitraryBytes
9797
)
9898
}
99-
99+
100100
return Data(
101101
bytes: &signatureBridgedToC.data,
102102
count: MemoryLayout.size(ofValue: signatureBridgedToC.data)
@@ -114,7 +114,7 @@ extension Bridge {
114114
var signatureOut = [UInt8](repeating: 0, count: 64)
115115

116116
var keyPair = secp256k1_keypair()
117-
117+
118118
try Self.call(
119119
ifFailThrow: .failedToInitializeKeyPairForSchnorrSigning
120120
) { context in
@@ -140,31 +140,62 @@ extension Bridge {
140140
auxilaryRandomBytes
141141
)
142142
}
143-
143+
144144
var publicKey = secp256k1_xonly_pubkey()
145-
145+
146146
try Self.call(
147147
ifFailThrow: .failedToSchnorrSignErrorGettingPubKeyFromKeyPair
148148
) { context in
149149
secp256k1_keypair_xonly_pub(context, &publicKey, nil, &keyPair)
150150
}
151-
151+
152152
try Self.call(
153153
ifFailThrow: .failedToSchnorrSignDigestDidNotPassVerification
154154
) { context in
155155
secp256k1_schnorrsig_verify(context, &signatureOut, message, message.count, &publicKey)
156156
}
157-
157+
158158
return Data(signatureOut)
159159
}
160160

161+
enum ECDHSerializeFunction {
162+
163+
/// Using the `libsecp256k1` default behaviour, which is to SHA256 hash the compressed public key
164+
case libsecp256kDefault
165+
166+
/// Following the [ANSI X9.63][ansix963] standard
167+
///
168+
/// [ansix963]: https://webstore.ansi.org/standards/ascx9/ansix9632011r2017
169+
case ansiX963
170+
171+
/// Following no standard at all, does not hash the shared public point, and returns it in full.
172+
case noHashWholePoint
173+
174+
func hashfp() -> (Optional<@convention(c) (Optional<UnsafeMutablePointer<UInt8>>, Optional<UnsafePointer<UInt8>>, Optional<UnsafePointer<UInt8>>, Optional<UnsafeMutableRawPointer>) -> Int32>) {
175+
switch self {
176+
case .libsecp256kDefault: return secp256k1_ecdh_hash_function_default
177+
case .ansiX963: return ecdh_skip_hash_extract_only_x
178+
case .noHashWholePoint: return ecdh_skip_hash_extract_x_and_y
179+
}
180+
}
181+
182+
var outputByteCount: Int {
183+
switch self {
184+
case .libsecp256kDefault: return K1.Curve.Field.byteCount
185+
case .ansiX963: return K1.Curve.Field.byteCount
186+
case .noHashWholePoint: return K1.Format.uncompressed.length
187+
}
188+
}
189+
}
190+
161191
static func ecdh(
162192
publicKey publicKeyBytes: [UInt8],
163-
privateKey: SecureBytes
193+
privateKey: SecureBytes,
194+
hashFp: ECDHSerializeFunction
164195
) throws -> Data {
165-
196+
166197
var publicKeyBridgedToC = secp256k1_pubkey()
167-
198+
168199
try Self.call(ifFailThrow: .incorrectByteCountOfPublicKey(providedByteCount: publicKeyBytes.count)) { context in
169200
/* Parse a variable-length public key into the pubkey object. */
170201
secp256k1_ec_pubkey_parse(
@@ -174,10 +205,10 @@ extension Bridge {
174205
publicKeyBytes.count
175206
)
176207
}
177-
208+
178209
var sharedPublicPointBytes = [UInt8](
179210
repeating: 0,
180-
count: K1.Format.uncompressed.length
211+
count: hashFp.outputByteCount
181212
)
182213

183214
try Self.call(
@@ -190,7 +221,7 @@ extension Bridge {
190221
&sharedPublicPointBytes, // output
191222
&publicKeyBridgedToC, // pubkey
192223
privateKey.backing.bytes, // seckey
193-
ecdh_skip_hash_extract_x_and_y, // hashfp
224+
hashFp.hashfp(), // hashfp
194225
nil // arbitrary data pointer that is passed through to hashfp
195226
)
196227
}
@@ -259,7 +290,7 @@ extension Bridge {
259290
message: message
260291
)
261292
}
262-
293+
263294
/// Recover an ECDSA public key from a signature.
264295
static func _recoverPublicKey(
265296
rs rsData: Data,
@@ -312,13 +343,13 @@ extension Bridge {
312343
try Self.call(
313344
ifFailThrow: .failedToSerializePublicKeyIntoBytes
314345
) { context in
315-
secp256k1_ec_pubkey_serialize(
316-
context,
317-
pubkeyBytes.baseAddress!,
318-
&pubkeyBytesSerializedCount,
319-
&publicKeyBridgedToC,
320-
publicKeyFormat.rawValue
321-
)
346+
secp256k1_ec_pubkey_serialize(
347+
context,
348+
pubkeyBytes.baseAddress!,
349+
&pubkeyBytesSerializedCount,
350+
&publicKeyBridgedToC,
351+
publicKeyFormat.rawValue
352+
)
322353
}
323354
}
324355
guard
@@ -327,7 +358,7 @@ extension Bridge {
327358
else {
328359
throw K1.Error.failedToSerializePublicKeyIntoBytes
329360
}
330-
361+
331362
return publicPointBytes
332363
}
333364
}
@@ -384,7 +415,7 @@ public extension ECDSASignatureNonRecoverable {
384415
}
385416

386417
public extension K1.PrivateKey {
387-
418+
388419
/// Produces a **recoverable** ECDSA signature.
389420
func ecdsaSignRecoverable<D: DataProtocol>(
390421
hashed message: D,
@@ -394,7 +425,7 @@ public extension K1.PrivateKey {
394425
let raw = try withSecureBytes {
395426
try Bridge.ecdsaSignRecoverable(message: messageBytes, privateKey: $0, mode: mode)
396427
}
397-
428+
398429
return try ECDSASignatureRecoverable.init(rawRepresentation: raw)
399430
}
400431

@@ -407,7 +438,7 @@ public extension K1.PrivateKey {
407438
let signatureData = try withSecureBytes { (secureBytes: SecureBytes) -> Data in
408439
try Bridge.ecdsaSignNonRecoverable(message: messageBytes, privateKey: secureBytes, mode: mode)
409440
}
410-
441+
411442
return try ECDSASignatureNonRecoverable(
412443
rawRepresentation: signatureData
413444
)
@@ -421,12 +452,12 @@ public extension K1.PrivateKey {
421452
let signatureData = try withSecureBytes { (secureBytes: SecureBytes) -> Data in
422453
try Bridge.schnorrSign(message: message, privateKey: secureBytes, input: maybeInput)
423454
}
424-
455+
425456
return try SchnorrSignature(
426457
rawRepresentation: signatureData
427458
)
428459
}
429-
460+
430461
func ecdsaSignNonRecoverable<D: Digest>(
431462
digest: D,
432463
mode: ECDSASignatureNonRecoverable.SigningMode = .default
@@ -470,7 +501,7 @@ public extension K1.PrivateKey {
470501
try schnorrSign(digest: SHA256.hash(data: data), input: maybeInput)
471502
}
472503

473-
504+
474505
func sign<S: ECSignatureScheme, D: DataProtocol>(
475506
hashed: D,
476507
scheme: S.Type,
@@ -487,28 +518,121 @@ public extension K1.PrivateKey {
487518
try S.Signature.by(signing: Array(digest), with: self, mode: mode)
488519
}
489520

490-
func sign<S: ECSignatureScheme, D: DataProtocol>(
491-
unhashed: D,
492-
scheme: S.Type,
493-
mode: S.Signature.SigningMode
494-
) throws -> S.Signature {
495-
try sign(
521+
func sign<S: ECSignatureScheme, D: DataProtocol>(
522+
unhashed: D,
523+
scheme: S.Type,
524+
mode: S.Signature.SigningMode
525+
) throws -> S.Signature {
526+
try sign(
496527
hashed: Data(S.hash(unhashed: unhashed)),
497528
scheme: scheme,
498529
mode: mode
499-
)
500-
}
530+
)
531+
}
532+
}
533+
534+
/// MARK: ECDH
535+
extension K1.PrivateKey {
501536

502-
/// Performs a key agreement with provided public key share.
503-
///
504-
/// - Parameter publicKeyShare: The public key to perform the ECDH with.
505-
/// - Returns: Returns the public point obtain by performing EC mult between
506-
/// this `privateKey` and `publicKeyShare`
507-
/// - Throws: An error occurred while computing the shared secret
508-
func sharedSecret(with publicKeyShare: K1.PublicKey) throws -> Data {
537+
private func _ecdh(
538+
publicKey: K1.PublicKey,
539+
serializeOutputFunction hashFp: Bridge.ECDHSerializeFunction
540+
) throws -> Data {
509541
let sharedSecretData = try withSecureBytes { secureBytes in
510-
try Bridge.ecdh(publicKey: publicKeyShare.uncompressedRaw, privateKey: secureBytes)
542+
try Bridge.ecdh(
543+
publicKey: publicKey.uncompressedRaw,
544+
privateKey: secureBytes,
545+
hashFp: hashFp
546+
)
511547
}
512548
return sharedSecretData
513549
}
550+
551+
552+
553+
/// Computes a shared secret with the provided public key from another party,
554+
/// returning only the `X` coordinate of the point, following [ANSI X9.63][ansix963] standards.
555+
///
556+
/// This is one of three ECDH functions, this library vendors, all three versions
557+
/// uses different serialization of the shared EC Point, specifically:
558+
/// 1. SHA-256 hash the compressed point
559+
/// 2. No hash, return point uncompressed
560+
/// 3. No hash, return only the `X` coordinate of the point <- this function
561+
///
562+
/// This function uses 3. i.e. no hash, and returns only the `X` coordinate of the point.
563+
/// This is following the [ANSI X9.63][ansix963] standard serialization of the shared point.
564+
///
565+
/// Further more this function is compatible with CryptoKit, since it returns a CryptoKit
566+
/// `SharedSecret` struct, thus offering you to use all of CryptoKit's Key Derivation Functions
567+
/// (`KDF`s), which can be called on the `SharedSecret`.
568+
///
569+
/// As seen on [StackExchange][cryptostackexchange], this version is compatible with the following
570+
/// libraries:
571+
/// - JS: `elliptic` (v6.4.0 in nodeJS v8.2.1)
572+
/// - JS: `crypto` (builtin) - uses openssl under the hood (in nodeJS v8.2.1)
573+
/// - .NET: `BouncyCastle` (BC v1.8.1.3, .NET v2.1.4)
574+
///
575+
/// [ansix963]: https://webstore.ansi.org/standards/ascx9/ansix9632011r2017
576+
/// [cryptostackexchange]: https://crypto.stackexchange.com/a/57727
577+
public func sharedSecretFromKeyAgreement(
578+
with publicKeyShare: K1.PublicKey
579+
) throws -> SharedSecret {
580+
let sharedSecretData = try _ecdh(publicKey: publicKeyShare, serializeOutputFunction: .ansiX963)
581+
let __sharedSecret = __SharedSecret(ss: .init(bytes: sharedSecretData))
582+
let sharedSecret = unsafeBitCast(__sharedSecret, to: SharedSecret.self)
583+
guard sharedSecret.withUnsafeBytes({ Data($0).count == sharedSecretData.count }) else {
584+
throw K1.Error.failedToProduceSharedSecret
585+
}
586+
return sharedSecret
587+
}
588+
589+
/// Computes a shared secret with the provided public key from another party,
590+
/// using `libsecp256k1` default behaviour, returning a hashed of the compressed point.
591+
///
592+
/// This is one of three ECDH functions, this library vendors, all three versions
593+
/// uses different serialization of the shared EC Point, specifically:
594+
/// 1. SHA-256 hash the compressed point <- this function
595+
/// 2. No hash, return point uncompressed
596+
/// 3. No hash, return only the `X` coordinate of the point.
597+
///
598+
/// This function uses 1. i.e.SHA-256 hash the compressed point.
599+
/// This is using the [default behaviour of `libsecp256k1`][libsecp256k1], which does not adhere to any
600+
/// other standard.
601+
///
602+
/// As seen on [StackExchange][cryptostackexchange], this version is compatible with all
603+
/// libraries which wraps `libsecp256k1`, e.g.:
604+
/// - Python wrapper: secp256k1 (v0.13.2, for python 3.6.4)
605+
/// - JS wrapper: secp256k1 (v3.5.0, for nodeJS v8.2.1)
606+
///
607+
/// [libsecp256k1]: https://github.com/bitcoin-core/secp256k1/blob/master/src/modules/ecdh/main_impl.h#L27
608+
/// [cryptostackexchange]: https://crypto.stackexchange.com/a/57727
609+
///
610+
public func ecdh(with publicKey: K1.PublicKey) throws -> Data {
611+
try _ecdh(publicKey: publicKey, serializeOutputFunction: .libsecp256kDefault)
612+
}
613+
614+
/// Computes a shared secret with the provided public key from another party,
615+
/// returning an uncompressed public point, unhashed.
616+
///
617+
/// This is one of three ECDH functions, this library vendors, all three versions
618+
/// uses different serialization of the shared EC Point, specifically:
619+
/// 1. SHA-256 hash the compressed point
620+
/// 2. No hash, return point uncompressed <- this function
621+
/// 3. No hash, return only the `X` coordinate of the point.
622+
///
623+
/// This function uses 2. i.e. no hash, return point uncompressed
624+
/// **This is not following any standard at all**, but might be useful if you want to write your
625+
/// cryptographic functions, e.g. some ECIES scheme.
626+
///
627+
public func ecdhPoint(with publicKey: K1.PublicKey) throws -> Data {
628+
try _ecdh(publicKey: publicKey, serializeOutputFunction: .noHashWholePoint)
629+
}
630+
}
631+
632+
// MUST match https://github.com/apple/swift-crypto/blob/main/Sources/Crypto/Key%20Agreement/DH.swift#L34
633+
634+
/// A Key Agreement Result
635+
/// A SharedSecret has to go through a Key Derivation Function before being able to use by a symmetric key operation.
636+
public struct __SharedSecret {
637+
var ss: SecureBytes
514638
}

‎Sources/secp256k1/src/ecdh_no_hashfp.c

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
//
2-
// ecdh_no_hashfp.c.c
2+
// ecdh_no_hashfp.c
33
//
44
//
55
// Created by Alexander Cyon on 2022-01-31.
@@ -16,3 +16,9 @@ int ecdh_skip_hash_extract_x_and_y(unsigned char *output, const unsigned char *x
1616
memcpy(output + 33, y32, 32);
1717
return 1;
1818
}
19+
20+
int ecdh_skip_hash_extract_only_x(unsigned char *output, const unsigned char *x32, const unsigned char *y32, void *data) {
21+
(void)data;
22+
memcpy(output, x32, 32);
23+
return 1;
24+
}

‎Sources/secp256k1/src/ecdh_no_hashfp.h

+6
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,10 @@
1212

1313
int ecdh_skip_hash_extract_x_and_y(unsigned char *output, const unsigned char *x32, const unsigned char *y32, void *data);
1414

15+
16+
int ecdh_skip_hash_extract_only_x(unsigned char *output, const unsigned char *x32, const unsigned char *y32, void *data);
17+
18+
19+
20+
1521
#endif /* ecdh_no_hashfp_h */

‎Tests/K1Tests/TestCases/ECDH/ECDHTests.swift

+40-4
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,54 @@
66
//
77

88
import Foundation
9-
import K1
9+
@testable import K1
1010
import XCTest
1111

1212
final class ECDHTests: XCTestCase {
1313

14-
func testECDH() throws {
14+
func testECDHPoint() throws {
1515
let alice = try K1.PrivateKey.generateNew()
1616
let bob = try K1.PrivateKey.generateNew()
1717

18-
let ab = try alice.sharedSecret(with: bob.publicKey)
19-
let ba = try bob.sharedSecret(with: alice.publicKey)
18+
let ab = try alice.ecdhPoint(with: bob.publicKey)
19+
let ba = try bob.ecdhPoint(with: alice.publicKey)
2020
XCTAssertEqual(ab, ba, "Alice and Bob should be able to agree on the same secret")
2121
}
22+
23+
func testECDHLibsecp256k1() throws {
24+
let alice = try K1.PrivateKey.generateNew()
25+
let bob = try K1.PrivateKey.generateNew()
26+
27+
let ab = try alice.ecdh(with: bob.publicKey)
28+
let ba = try bob.ecdh(with: alice.publicKey)
29+
XCTAssertEqual(ab, ba, "Alice and Bob should be able to agree on the same secret")
30+
}
31+
32+
func testECDHX963() throws {
33+
let alice = try K1.PrivateKey.generateNew()
34+
let bob = try K1.PrivateKey.generateNew()
35+
36+
let ab = try alice.sharedSecretFromKeyAgreement(with: bob.publicKey)
37+
let ba = try bob.sharedSecretFromKeyAgreement(with: alice.publicKey)
38+
XCTAssertEqual(ab, ba, "Alice and Bob should be able to agree on the same secret")
39+
}
40+
41+
/// Test vectors from: https://crypto.stackexchange.com/q/57695
42+
func test_crypto_stackexchange_vector() throws {
43+
let privateKey1 = try PrivateKey(hex: "82fc9947e878fc7ed01c6c310688603f0a41c8e8704e5b990e8388343b0fd465")
44+
let privateKey2 = try PrivateKey(hex: "5f706787ac72c1080275c1f398640fb07e9da0b124ae9734b28b8d0f01eda586")
45+
46+
let libsecp256k1 = try privateKey1.ecdh(with: privateKey2.publicKey)
47+
let ans1X963 = try privateKey1.sharedSecretFromKeyAgreement(with: privateKey2.publicKey).withUnsafeBytes({ Data($0) })
48+
49+
XCTAssertEqual(libsecp256k1.hex, "5935d0476af9df2998efb60383adf2ff23bc928322cfbb738fca88e49d557d7e")
50+
XCTAssertEqual(ans1X963.hex, "3a17fe5fa33c4f2c7e61799a65061214913f39bfcbee178ab351493d5ee17b2f")
51+
52+
}
2253
}
2354

55+
extension K1.PrivateKey {
56+
init(hex: String) throws {
57+
self = try Self.import(rawRepresentation: Data(hex: hex))
58+
}
59+
}

‎Tests/K1Tests/TestCases/ECDH/ECDHWychoproofTests.swift

+7-4
Original file line numberDiff line numberDiff line change
@@ -78,10 +78,13 @@ private extension ECDHWychoproofTests {
7878
var privateBytes = [UInt8]()
7979
privateBytes = try padKeyIfNecessary(vector: testVector.privateKey)
8080
let privateKey = try PrivateKey.import(rawRepresentation: privateBytes)
81-
let expectedXComponent = try Data(hex: testVector.shared)
82-
let sharedPublicKeyPoint = try privateKey.sharedSecret(with: publicKey)
83-
let sharedPublicKeyXComponent = Data(sharedPublicKeyPoint[1..<33]) // slice out just X component
84-
XCTAssertEqual(sharedPublicKeyXComponent, expectedXComponent, file: file, line: line)
81+
82+
/// ANS1 X9.63 serialization of shared secret, returning a `CryptoKit.SharedSecret`
83+
let sharedPublicKeyPoint = try privateKey.sharedSecretFromKeyAgreement(with: publicKey)
84+
let got = sharedPublicKeyPoint.withUnsafeBytes {
85+
Data($0)
86+
}
87+
XCTAssertEqual(got.hex, testVector.shared, file: file, line: line)
8588
} catch {
8689
if testVector.result != "invalid" {
8790
XCTFail("Failed with error: \(String(describing: error)), test vector: \(String(describing: testVector))")

‎Tests/K1Tests/TestCases/ECDSA/ECDSASignatureTrezorTests.swift

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ private extension XCTestCase {
4949
XCTAssertEqual(signatureFromMessage, expectedSignature)
5050
try XCTAssertEqual(signatureRecoverableFromMessage.nonRecoverable(), expectedSignature)
5151
let recid = try signatureRecoverableFromMessage.compact().recoveryID
52-
XCTAssertEqual(signatureRecoverableFromMessage.rawRepresentation.hex, expectedSignature.rawRepresentation.hex + "\(Data([UInt8(recid)]).hex)x")
52+
XCTAssertEqual(signatureRecoverableFromMessage.rawRepresentation.hex, expectedSignature.rawRepresentation.hex + "\(Data([UInt8(recid)]).hex)")
5353
numberOfTestsRun += 1
5454
}
5555
return .init(numberOfTestsRun: numberOfTestsRun, idsOmittedTests: [])

0 commit comments

Comments
 (0)
Please sign in to comment.