aboutsummaryrefslogtreecommitdiff
path: root/ed25519
diff options
context:
space:
mode:
authorPavel V. Shatov (Meister) <meisterpaul1@yandex.ru>2018-09-24 21:38:37 +0300
committerPavel V. Shatov (Meister) <meisterpaul1@yandex.ru>2018-09-24 21:38:37 +0300
commit250716dfed0da0bdcf8f975293fbf72c2b56c247 (patch)
treebba9012c8775317506f62a1d6b58d9196c11f35f /ed25519
parented6437839977023ffe1eb95d87760d4f1b2c518b (diff)
Ed25519-specific code (curve base point multiplication)
Diffstat (limited to 'ed25519')
-rw-r--r--ed25519/ed25519_fpga_curve.h118
-rw-r--r--ed25519/ed25519_fpga_curve_abstract.cpp295
-rw-r--r--ed25519/ed25519_fpga_curve_microcode.cpp299
3 files changed, 712 insertions, 0 deletions
diff --git a/ed25519/ed25519_fpga_curve.h b/ed25519/ed25519_fpga_curve.h
new file mode 100644
index 0000000..3a16bb6
--- /dev/null
+++ b/ed25519/ed25519_fpga_curve.h
@@ -0,0 +1,118 @@
+//------------------------------------------------------------------------------
+//
+// ed25519_fpga_curve.h
+// ------------------------------------------------
+// Elliptic curve arithmetic procedures for Ed25519
+//
+// Authors: Pavel Shatov
+//
+// Copyright (c) 2018 NORDUnet A/S
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are met:
+//
+// - Redistributions of source code must retain the above copyright notice,
+// this list of conditions and the following disclaimer.
+//
+// - Redistributions in binary form must reproduce the above copyright notice,
+// this list of conditions and the following disclaimer in the documentation
+// and/or other materials provided with the distribution.
+//
+// - Neither the name of the NORDUnet nor the names of its contributors may be
+// used to endorse or promote products derived from this software without
+// specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+// POSSIBILITY OF SUCH DAMAGE.
+//
+//------------------------------------------------------------------------------
+
+
+//------------------------------------------------------------------------------
+// Ed25519 Parameters
+//------------------------------------------------------------------------------
+
+/* x-coordinate of the base point */
+#define ED25519_G_X_INIT {0x216936d3, 0xcd6e53fe, 0xc0a4e231, 0xfdd6dc5c, \
+ 0x692cc760, 0x9525a7b2, 0xc9562d60, 0x8f25d51a}
+
+/* y-coordinate of the base point */
+#define ED25519_G_Y_INIT {0x66666666, 0x66666666, 0x66666666, 0x66666666, \
+ 0x66666666, 0x66666666, 0x66666666, 0x66666658}
+
+/* z-coordinate of the base point */
+#define ED25519_G_Z_INIT {0x00000000, 0x00000000, 0x00000000, 0x00000000, \
+ 0x00000000, 0x00000000, 0x00000000, 0x00000001}
+
+/* t-coordinate of the base point */
+#define ED25519_G_T_INIT {0x67875f0f, 0xd78b7665, 0x66ea4e8e, 0x64abe37d, \
+ 0x20f09f80, 0x775152f5, 0x6dde8ab3, 0xa5b7dda3}
+
+
+//------------------------------------------------------------------------------
+// Globals
+//------------------------------------------------------------------------------
+extern FPGA_BUFFER ED25519_G_X; // the base point
+extern FPGA_BUFFER ED25519_G_Y; //
+extern FPGA_BUFFER ED25519_G_Z; //
+extern FPGA_BUFFER ED25519_G_T; //
+
+
+
+//------------------------------------------------------------------------------
+// Implementation switch
+//------------------------------------------------------------------------------
+#ifdef USE_MICROCODE
+#define fpga_curve_ed25519_base_scalar_multiply fpga_curve_ed25519_base_scalar_multiply_microcode
+#else
+#define fpga_curve_ed25519_base_scalar_multiply fpga_curve_ed25519_base_scalar_multiply_abstract
+#endif
+
+
+//------------------------------------------------------------------------------
+// Prototypes
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_init ();
+
+void fpga_curve_ed25519_base_scalar_multiply_abstract (const FPGA_BUFFER *K, FPGA_BUFFER *Q_Y);
+void fpga_curve_ed25519_base_scalar_multiply_microcode (const FPGA_BUFFER *K, FPGA_BUFFER *Q_Y);
+
+void fpga_curve_ed25519_double (const FPGA_BUFFER *P_X,
+ const FPGA_BUFFER *P_Y,
+ const FPGA_BUFFER *P_Z,
+ const FPGA_BUFFER *P_T,
+ FPGA_BUFFER *Q_X,
+ FPGA_BUFFER *Q_Y,
+ FPGA_BUFFER *Q_Z,
+ FPGA_BUFFER *Q_T);
+
+void fpga_curve_ed25519_add (const FPGA_BUFFER *P_X,
+ const FPGA_BUFFER *P_Y,
+ const FPGA_BUFFER *P_Z,
+ const FPGA_BUFFER *P_T,
+ const FPGA_BUFFER *Q_X,
+ const FPGA_BUFFER *Q_Y,
+ const FPGA_BUFFER *Q_Z,
+ const FPGA_BUFFER *Q_T,
+ FPGA_BUFFER *R_X,
+ FPGA_BUFFER *R_Y,
+ FPGA_BUFFER *R_Z,
+ FPGA_BUFFER *R_T);
+
+void fpga_curve_ed25519_to_affine (const FPGA_BUFFER *P_X, const FPGA_BUFFER *P_Y,
+ const FPGA_BUFFER *P_Z,
+ FPGA_BUFFER *Q_X, FPGA_BUFFER *Q_Y);
+
+
+//------------------------------------------------------------------------------
+// End-of-File
+//------------------------------------------------------------------------------
diff --git a/ed25519/ed25519_fpga_curve_abstract.cpp b/ed25519/ed25519_fpga_curve_abstract.cpp
new file mode 100644
index 0000000..e5b1dd0
--- /dev/null
+++ b/ed25519/ed25519_fpga_curve_abstract.cpp
@@ -0,0 +1,295 @@
+//------------------------------------------------------------------------------
+//
+// ed25519_fpga_curve_abstract.cpp
+// ------------------------------------------------
+// Elliptic curve arithmetic procedures for Ed25519
+//
+// Authors: Pavel Shatov
+//
+// Copyright (c) 2018 NORDUnet A/S
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are met:
+//
+// - Redistributions of source code must retain the above copyright notice,
+// this list of conditions and the following disclaimer.
+//
+// - Redistributions in binary form+ must reproduce the above copyright notice,
+// this list of conditions and the following disclaimer in the documentation
+// and/or other materials provided with the distribution.
+//
+// - Neither the name of the NORDUnet nor the names of its contributors may be
+// used to endorse or promote products derived from this software without
+// specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+// POSSIBILITY OF SUCH DAMAGE.
+//
+//------------------------------------------------------------------------------
+
+
+#include <stdio.h>
+
+
+//------------------------------------------------------------------------------
+// Headers
+//------------------------------------------------------------------------------
+#include "ed25519_fpga_model.h"
+
+
+//------------------------------------------------------------------------------
+// Globals
+//------------------------------------------------------------------------------
+FPGA_BUFFER ED25519_G_X; // x-coordinate of the base point
+FPGA_BUFFER ED25519_G_Y; // y-coordinate of the base point
+FPGA_BUFFER ED25519_G_Z; // z-coordinate of the base point
+FPGA_BUFFER ED25519_G_T; // y-coordinate of the base point
+
+
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_init()
+//------------------------------------------------------------------------------
+{
+ int w_src, w_dst; // word counters
+
+ FPGA_WORD TMP_G_X[FPGA_OPERAND_NUM_WORDS] = ED25519_G_X_INIT;
+ FPGA_WORD TMP_G_Y[FPGA_OPERAND_NUM_WORDS] = ED25519_G_Y_INIT;
+ FPGA_WORD TMP_G_Z[FPGA_OPERAND_NUM_WORDS] = ED25519_G_Z_INIT;
+ FPGA_WORD TMP_G_T[FPGA_OPERAND_NUM_WORDS] = ED25519_G_T_INIT;
+
+ /* fill buffers for large multi-word integers */
+ for ( w_src = 0, w_dst = FPGA_OPERAND_NUM_WORDS - 1;
+ w_src < FPGA_OPERAND_NUM_WORDS;
+ w_src++, w_dst--)
+ {
+ ED25519_G_X.words[w_dst] = TMP_G_X[w_src];
+ ED25519_G_Y.words[w_dst] = TMP_G_Y[w_src];
+ ED25519_G_Z.words[w_dst] = TMP_G_Z[w_src];
+ ED25519_G_T.words[w_dst] = TMP_G_T[w_src];
+ }
+}
+
+
+//------------------------------------------------------------------------------
+//
+// Elliptic curve base point scalar multiplication routine.
+//
+// This uses Algorithm 4 ("Joye double-and-add") from "Fast and Regular
+// Algorithms for Scalar Multiplication over Elliptic Curves"
+// https://eprint.iacr.org/2011/338.pdf
+//
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_base_scalar_multiply_abstract(const FPGA_BUFFER *K, FPGA_BUFFER *Q_Y)
+//------------------------------------------------------------------------------
+{
+ int word_count, bit_count; // counters
+
+ // temporary buffers
+ FPGA_BUFFER R0_X;
+ FPGA_BUFFER R0_Y;
+ FPGA_BUFFER R0_Z;
+ FPGA_BUFFER R0_T;
+
+ FPGA_BUFFER R1_X;
+ FPGA_BUFFER R1_Y;
+ FPGA_BUFFER R1_Z;
+ FPGA_BUFFER R1_T;
+
+ FPGA_BUFFER T_X;
+ FPGA_BUFFER T_Y;
+ FPGA_BUFFER T_Z;
+ FPGA_BUFFER T_T;
+
+ // initialization
+ fpga_multiword_copy(&CURVE25519_ZERO, &R0_X);
+ fpga_multiword_copy(&CURVE25519_ONE, &R0_Y);
+ fpga_multiword_copy(&CURVE25519_ONE, &R0_Z);
+ fpga_multiword_copy(&CURVE25519_ZERO, &R0_T);
+
+ fpga_multiword_copy(&ED25519_G_X, &R1_X);
+ fpga_multiword_copy(&ED25519_G_Y, &R1_Y);
+ fpga_multiword_copy(&ED25519_G_Z, &R1_Z);
+ fpga_multiword_copy(&ED25519_G_T, &R1_T);
+
+ // force zero bits
+ FPGA_BUFFER K_INT;
+ fpga_multiword_copy(K, &K_INT);
+
+ K_INT.words[0] &= 0xFFFFFFF8;
+ K_INT.words[FPGA_OPERAND_NUM_WORDS-1] &= 0x3FFFFFFF;
+ K_INT.words[FPGA_OPERAND_NUM_WORDS-1] |= 0x40000000;
+
+
+ // handy vars
+ FPGA_WORD k_word;
+ bool k_bit = false;
+
+ // multiply
+ for (word_count=0; word_count<FPGA_OPERAND_NUM_WORDS; word_count++)
+ {
+ for (bit_count=0; bit_count<FPGA_WORD_WIDTH; bit_count++)
+ {
+ // get current bit of K
+ k_word = K_INT.words[word_count] >> bit_count;
+ k_bit = (k_word & (FPGA_WORD)1) == 1;
+
+ // symmetric processing scheme regardless of the current private bit value
+ if (k_bit)
+ {
+ // T = double(R0)
+ fpga_curve_ed25519_double( &R0_X, &R0_Y, &R0_Z, &R0_T,
+ &T_X, &T_Y, &T_Z, &T_T);
+
+ // R0 = add(T, R1)
+ fpga_curve_ed25519_add( &T_X, &T_Y, &T_Z, &T_T,
+ &R1_X, &R1_Y, &R1_Z, &R1_T,
+ &R0_X, &R0_Y, &R0_Z, &R0_T);
+ }
+ else
+ {
+ // T = double(R1)
+ fpga_curve_ed25519_double( &R1_X, &R1_Y, &R1_Z, &R1_T,
+ &T_X, &T_Y, &T_Z, &T_T);
+
+ // R1 = add(T, R0)
+ fpga_curve_ed25519_add( &T_X, &T_Y, &T_Z, &T_T,
+ &R0_X, &R0_Y, &R0_Z, &R0_T,
+ &R1_X, &R1_Y, &R1_Z, &R1_T);
+ }
+ }
+ }
+
+ // now conversion to affine coordinates
+ fpga_curve_ed25519_to_affine(&R0_X, &R0_Y, &R0_Z, &R1_X, &R1_Y);
+
+ // so far we've done everything modulo 2*P, we now need
+ // to do final reduction modulo P, this can be done using
+ // our modular adder this way:
+ fpga_modular_add(&R1_X, &CURVE25519_ZERO, &R0_X, &CURVE25519_1P);
+ fpga_modular_add(&R1_Y, &CURVE25519_ZERO, &R0_Y, &CURVE25519_1P);
+
+ // process "sign" of x, see this Cryptography Stack Exchange
+ // answer for more details:
+ //
+ // https://crypto.stackexchange.com/questions/58921/decoding-a-ed25519-key-per-rfc8032
+ //
+ // the short story is that odd values of x are negative, so we
+ // just copy the lsb of x into msb of y
+ R0_Y.words[FPGA_OPERAND_NUM_WORDS-1] |= (R0_X.words[0] & (FPGA_WORD)1) << 31;
+
+ // store result
+ fpga_multiword_copy(&R0_Y, Q_Y);
+}
+
+
+//------------------------------------------------------------------------------
+//
+// Elliptic curve point doubling routine.
+//
+// This implements the "dbl-2008-hwcd" formulae set from
+// https://hyperelliptic.org/EFD/g1p/auto-twisted-extended-1.html
+//
+// The only difference is that E, F, G and H have opposite signs, this is
+// equivalent to the original algorithm, because the end result depends on
+// (E * F) and (G * H). If both variables have opposite signs, then the
+// sign of the product doesn't change.
+//
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_double( const FPGA_BUFFER *P_X, const FPGA_BUFFER *P_Y, const FPGA_BUFFER *P_Z, const FPGA_BUFFER *P_T,
+ FPGA_BUFFER *Q_X, FPGA_BUFFER *Q_Y, FPGA_BUFFER *Q_Z, FPGA_BUFFER *Q_T)
+{
+ FPGA_BUFFER A, B, C, D, E, F, G, H, I;
+
+ fpga_modular_mul(P_X, P_X, &A, &CURVE25519_2P); // A = (qx * qx) % mod
+ fpga_modular_mul(P_Y, P_Y, &B, &CURVE25519_2P); // B = (qy * qy) % mod
+
+ fpga_modular_mul(P_Z, P_Z, &I, &CURVE25519_2P); // I = (qz * qz) % mod
+ fpga_modular_add( &I, &I, &C, &CURVE25519_2P); // C = ( I + I) % mod
+ fpga_modular_add(P_X, P_Y, &I, &CURVE25519_2P); // I = (qx + qy) % mod
+ fpga_modular_mul( &I, &I, &D, &CURVE25519_2P); // D = ( I * I) % mod
+
+ fpga_modular_add( &A, &B, &H, &CURVE25519_2P); // H = ( A + B) % mod
+ fpga_modular_sub( &H, &D, &E, &CURVE25519_2P); // E = ( H - D) % mod
+ fpga_modular_sub( &A, &B, &G, &CURVE25519_2P); // G = ( A - B) % mod
+ fpga_modular_add( &C, &G, &F, &CURVE25519_2P); // F = ( C + G) % mod
+
+ fpga_modular_mul( &E, &F, Q_X, &CURVE25519_2P); // rx = ( E * F) % mod
+ fpga_modular_mul( &G, &H, Q_Y, &CURVE25519_2P); // ry = ( G * H) % mod
+ fpga_modular_mul( &E, &H, Q_T, &CURVE25519_2P); // rt = ( E * H) % mod
+ fpga_modular_mul( &F, &G, Q_Z, &CURVE25519_2P); // rz = ( F * G) % mod
+}
+
+
+//------------------------------------------------------------------------------
+//
+// Elliptic curve point addition routine.
+//
+// This implements the "add-2008-hwcd-4" formulae set from
+// https://hyperelliptic.org/EFD/g1p/auto-twisted-extended-1.html
+//
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_add( const FPGA_BUFFER *P_X, const FPGA_BUFFER *P_Y, const FPGA_BUFFER *P_Z, const FPGA_BUFFER *P_T,
+ const FPGA_BUFFER *Q_X, const FPGA_BUFFER *Q_Y, const FPGA_BUFFER *Q_Z, const FPGA_BUFFER *Q_T,
+ FPGA_BUFFER *R_X, FPGA_BUFFER *R_Y, FPGA_BUFFER *R_Z, FPGA_BUFFER *R_T)
+{
+ FPGA_BUFFER A, B, C, D, E, F, G, H, I, J;
+
+ fpga_modular_sub(P_Y, P_X, &I, &CURVE25519_2P); // I = (qy - qx) % mod
+ fpga_modular_add(Q_Y, Q_X, &J, &CURVE25519_2P); // J = (py + px) % mod
+ fpga_modular_mul( &I, &J, &A, &CURVE25519_2P); // A = ( I * J) % mod
+
+ fpga_modular_add(P_Y, P_X, &I, &CURVE25519_2P); // I = (qy + qx) % mod
+ fpga_modular_sub(Q_Y, Q_X, &J, &CURVE25519_2P); // J = (py - px) % mod
+ fpga_modular_mul( &I, &J, &B, &CURVE25519_2P); // B = ( I * J) % mod
+
+ fpga_modular_mul(P_Z, Q_T, &I, &CURVE25519_2P); // I = (qz * pt) % mod
+ fpga_modular_add( &I, &I, &C, &CURVE25519_2P); // C = ( I + I) % mod
+ fpga_modular_mul(P_T, Q_Z, &I, &CURVE25519_2P); // I = (qt * pz) % mod
+ fpga_modular_add( &I, &I, &D, &CURVE25519_2P); // D = ( I + I) % mod
+
+ fpga_modular_add( &D, &C, &E, &CURVE25519_2P); // E = (D + C) % mod
+ fpga_modular_sub( &B, &A, &F, &CURVE25519_2P); // F = (B - A) % mod
+ fpga_modular_add( &B, &A, &G, &CURVE25519_2P); // G = (B + A) % mod
+ fpga_modular_sub( &D, &C, &H, &CURVE25519_2P); // H = (D - C) % mod
+
+ fpga_modular_mul( &E, &F, R_X, &CURVE25519_2P); // rx = (E * F) % mod
+ fpga_modular_mul( &G, &H, R_Y, &CURVE25519_2P); // ry = (G * H) % mod
+ fpga_modular_mul( &E, &H, R_T, &CURVE25519_2P); // rt = (E * H) % mod
+ fpga_modular_mul( &F, &G, R_Z, &CURVE25519_2P); // rz = (F * G) % mod
+}
+
+
+//------------------------------------------------------------------------------
+//
+// Conversion to affine coordinates.
+//
+// Q_X = P_X / P_Z = P_X * P_Z ^ -1
+// Q_Y = P_Y / P_Z = P_Y * P_Z ^ -1
+//
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_to_affine (const FPGA_BUFFER *P_X, const FPGA_BUFFER *P_Y,
+ const FPGA_BUFFER *P_Z,
+ FPGA_BUFFER *Q_X, FPGA_BUFFER *Q_Y)
+//------------------------------------------------------------------------------
+{
+ FPGA_BUFFER P_Z_1;
+
+ fpga_modular_inv_abstract(P_Z, &P_Z_1, &CURVE25519_2P);
+
+ fpga_modular_mul(P_X, &P_Z_1, Q_X, &CURVE25519_2P);
+ fpga_modular_mul(P_Y, &P_Z_1, Q_Y, &CURVE25519_2P);
+}
+
+
+//------------------------------------------------------------------------------
+// End-of-File
+//------------------------------------------------------------------------------
diff --git a/ed25519/ed25519_fpga_curve_microcode.cpp b/ed25519/ed25519_fpga_curve_microcode.cpp
new file mode 100644
index 0000000..25826c5
--- /dev/null
+++ b/ed25519/ed25519_fpga_curve_microcode.cpp
@@ -0,0 +1,299 @@
+//------------------------------------------------------------------------------
+//
+// ed25519_fpga_curve_microcode.cpp
+// -----------------------------------------------
+// Elliptic curve arithmetic procedures for Ed25519
+//
+// Authors: Pavel Shatov
+//
+// Copyright (c) 2018 NORDUnet A/S
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are met:
+//
+// - Redistributions of source code must retain the above copyright notice,
+// this list of conditions and the following disclaimer.
+//
+// - Redistributions in binary form must reproduce the above copyright notice,
+// this list of conditions and the following disclaimer in the documentation
+// and/or other materials provided with the distribution.
+//
+// - Neither the name of the NORDUnet nor the names of its contributors may be
+// used to endorse or promote products derived from this software without
+// specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+// POSSIBILITY OF SUCH DAMAGE.
+//
+//------------------------------------------------------------------------------
+
+
+//------------------------------------------------------------------------------
+// Headers
+//------------------------------------------------------------------------------
+#include "ed25519_fpga_model.h"
+
+
+//------------------------------------------------------------------------------
+enum ED25519_UOP_OPERAND
+//------------------------------------------------------------------------------
+{
+ CONST_G_X = CURVE25519_UOP_OPERAND_COUNT + 1,
+ CONST_G_Y,
+ CONST_G_T,
+
+ CYCLE_R0_X,
+ CYCLE_R0_Y,
+ CYCLE_R0_Z,
+ CYCLE_R0_T,
+
+ CYCLE_R1_X,
+ CYCLE_R1_Y,
+ CYCLE_R1_Z,
+ CYCLE_R1_T,
+
+ CYCLE_S_X,
+ CYCLE_S_Y,
+ CYCLE_S_Z,
+ CYCLE_S_T,
+
+ CYCLE_T_X,
+ CYCLE_T_Y,
+ CYCLE_T_Z,
+ CYCLE_T_T,
+
+ CYCLE_U_X,
+ CYCLE_U_Y,
+ CYCLE_U_Z,
+ CYCLE_U_T,
+
+ CYCLE_V_X,
+ CYCLE_V_Y,
+ CYCLE_V_Z,
+ CYCLE_V_T,
+
+ PROC_A,
+ PROC_B,
+ PROC_C,
+ PROC_D,
+ PROC_E,
+ PROC_F,
+ PROC_G,
+ PROC_H,
+ PROC_I,
+ PROC_J,
+
+ ED25519_UOP_OPERAND_COUNT
+};
+
+
+//------------------------------------------------------------------------------
+// Storage Buffers
+//------------------------------------------------------------------------------
+static FPGA_BUFFER BUF_LO[ED25519_UOP_OPERAND_COUNT];
+static FPGA_BUFFER BUF_HI[ED25519_UOP_OPERAND_COUNT];
+
+
+//------------------------------------------------------------------------------
+//
+// Elliptic curve point scalar multiplication routine.
+//
+//------------------------------------------------------------------------------
+void fpga_curve_ed25519_base_scalar_multiply_microcode(const FPGA_BUFFER *K, FPGA_BUFFER *QY)
+//------------------------------------------------------------------------------
+{
+ bool k_bit; // 1-bit values
+ FPGA_WORD k_word; // current word of multiplier
+ int word_count, bit_count; // counters
+
+ // initialize internal banks
+ fpga_multiword_copy(&CURVE25519_ZERO, &BUF_LO[CONST_ZERO]);
+ fpga_multiword_copy(&CURVE25519_ZERO, &BUF_HI[CONST_ZERO]);
+
+ fpga_multiword_copy(&CURVE25519_ONE, &BUF_LO[CONST_ONE]);
+ fpga_multiword_copy(&CURVE25519_ONE, &BUF_HI[CONST_ONE]);
+
+ fpga_multiword_copy(&ED25519_G_X, &BUF_LO[CONST_G_X]);
+ fpga_multiword_copy(&ED25519_G_X, &BUF_HI[CONST_G_X]);
+
+ fpga_multiword_copy(&ED25519_G_Y, &BUF_LO[CONST_G_Y]);
+ fpga_multiword_copy(&ED25519_G_Y, &BUF_HI[CONST_G_Y]);
+
+ fpga_multiword_copy(&ED25519_G_T, &BUF_LO[CONST_G_T]);
+ fpga_multiword_copy(&ED25519_G_T, &BUF_HI[CONST_G_T]);
+
+ // force certain bit values
+ FPGA_BUFFER K_INT;
+ fpga_multiword_copy(K, &K_INT);
+
+ K_INT.words[0] &= 0xFFFFFFF8;
+ K_INT.words[FPGA_OPERAND_NUM_WORDS-1] &= 0x3FFFFFFF;
+ K_INT.words[FPGA_OPERAND_NUM_WORDS-1] |= 0x40000000;
+
+ // initialization
+ uop_move(BANK_HI, CONST_ZERO, BANK_LO, CYCLE_R0_X, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_ONE, BANK_LO, CYCLE_R0_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_ONE, BANK_LO, CYCLE_R0_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_ZERO, BANK_LO, CYCLE_R0_T, BUF_LO, BUF_HI);
+
+ uop_move(BANK_HI, CONST_G_X, BANK_LO, CYCLE_R1_X, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_G_Y, BANK_LO, CYCLE_R1_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_ONE, BANK_LO, CYCLE_R1_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_HI, CONST_G_T, BANK_LO, CYCLE_R1_T, BUF_LO, BUF_HI);
+
+ // multiply
+ for (word_count=0; word_count<FPGA_OPERAND_NUM_WORDS; word_count++)
+ {
+ for (bit_count=0; bit_count<FPGA_WORD_WIDTH; bit_count++)
+ {
+ // get current bit of K
+ k_word = K_INT.words[word_count] >> bit_count;
+ k_bit = (k_word & (FPGA_WORD)1) == 1;
+
+ if (k_bit)
+ {
+ // U = R0
+ // V = R1
+
+ uop_move(BANK_LO, CYCLE_R0_X, BANK_HI, CYCLE_U_X, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_Y, BANK_HI, CYCLE_U_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_Z, BANK_HI, CYCLE_U_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_T, BANK_HI, CYCLE_U_T, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_X, BANK_HI, CYCLE_V_X, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_Y, BANK_HI, CYCLE_V_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_Z, BANK_HI, CYCLE_V_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_T, BANK_HI, CYCLE_V_T, BUF_LO, BUF_HI);
+ }
+ else
+ {
+ // U = R1
+ // V = R0
+
+ uop_move(BANK_LO, CYCLE_R0_X, BANK_HI, CYCLE_V_X, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_Y, BANK_HI, CYCLE_V_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_Z, BANK_HI, CYCLE_V_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R0_T, BANK_HI, CYCLE_V_T, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_X, BANK_HI, CYCLE_U_X, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_Y, BANK_HI, CYCLE_U_Y, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_Z, BANK_HI, CYCLE_U_Z, BUF_LO, BUF_HI);
+ uop_move(BANK_LO, CYCLE_R1_T, BANK_HI, CYCLE_U_T, BUF_LO, BUF_HI);
+ }
+
+ // S = double(U)
+ uop_calc(MUL, BANK_HI, CYCLE_U_X, CYCLE_U_X, BANK_LO, PROC_A, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul(P_X, P_X, &A, &CURVE25519_2P);
+ uop_calc(MUL, BANK_HI, CYCLE_U_Y, CYCLE_U_Y, BANK_LO, PROC_B, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul(P_Y, P_Y, &B, &CURVE25519_2P);
+
+ uop_calc(MUL, BANK_HI, CYCLE_U_Z, CYCLE_U_Z, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul(P_Z, P_Z, &I, &CURVE25519_2P);
+ uop_calc(ADD, BANK_LO, PROC_I, PROC_I, BANK_HI, PROC_C, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_add( &I, &I, &C, &CURVE25519_2P);
+ uop_calc(ADD, BANK_HI, CYCLE_U_X, CYCLE_U_Y, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_add(P_X, P_Y, &I, &CURVE25519_2P);
+ uop_calc(MUL, BANK_LO, PROC_I, PROC_I, BANK_HI, PROC_D, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul( &I, &I, &D, &CURVE25519_2P);
+
+ uop_calc(ADD, BANK_LO, PROC_A, PROC_B, BANK_HI, PROC_H, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_add( &A, &B, &H, &CURVE25519_2P);
+ uop_calc(SUB, BANK_HI, PROC_H, PROC_D, BANK_LO, PROC_E, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_sub( &H, &D, &E, &CURVE25519_2P);
+ uop_calc(SUB, BANK_LO, PROC_A, PROC_B, BANK_HI, PROC_G, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_sub( &A, &B, &G, &CURVE25519_2P);
+ uop_calc(ADD, BANK_HI, PROC_C, PROC_G, BANK_LO, PROC_F, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_add( &C, &G, &F, &CURVE25519_2P);
+
+ uop_move2(BANK_HI, PROC_G, PROC_H, BANK_LO, PROC_G, PROC_H, BUF_LO, BUF_HI);
+
+ uop_calc(MUL, BANK_LO, PROC_E, PROC_F, BANK_HI, CYCLE_S_X, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul( &E, &F, Q_X, &CURVE25519_2P);
+ uop_calc(MUL, BANK_LO, PROC_G, PROC_H, BANK_HI, CYCLE_S_Y, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul( &G, &H, Q_Y, &CURVE25519_2P);
+
+ uop_calc(MUL, BANK_LO, PROC_E, PROC_H, BANK_HI, CYCLE_S_T, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul( &E, &H, Q_T, &CURVE25519_2P);
+ uop_calc(MUL, BANK_LO, PROC_F, PROC_G, BANK_HI, CYCLE_S_Z, BUF_LO, BUF_HI, MOD_2P); // fpga_modular_mul( &F, &G, Q_Z, &CURVE25519_2P);
+
+ // T = add(S, V)
+ uop_calc(SUB, BANK_HI, CYCLE_S_Y, CYCLE_S_X, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_sub(S_Y, S_X, &I, &CURVE25519_2P); // I = (qy - qx) % mod
+ uop_calc(ADD, BANK_HI, CYCLE_V_Y, CYCLE_V_X, BANK_LO, PROC_J, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add(V_Y, V_X, &J, &CURVE25519_2P); // J = (py + px) % mod
+ uop_calc(MUL, BANK_LO, PROC_I, PROC_J, BANK_HI, PROC_A, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &I, &J, &A, &CURVE25519_2P); // A = ( I * J) % mod
+
+ uop_calc(ADD, BANK_HI, CYCLE_S_Y, CYCLE_S_X, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add(S_Y, S_X, &I, &CURVE25519_2P); // I = (qy + qx) % mod
+ uop_calc(SUB, BANK_HI, CYCLE_V_Y, CYCLE_V_X, BANK_LO, PROC_J, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_sub(V_Y, V_X, &J, &CURVE25519_2P); // J = (py - px) % mod
+ uop_calc(MUL, BANK_LO, PROC_I, PROC_J, BANK_HI, PROC_B, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &I, &J, &B, &CURVE25519_2P); // B = ( I * J) % mod
+
+ uop_calc(MUL, BANK_HI, CYCLE_S_Z, CYCLE_V_T, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul(S_Z, V_T, &I, &CURVE25519_2P); // I = (qz * pt) % mod
+ uop_calc(ADD, BANK_LO, PROC_I, PROC_I, BANK_HI, PROC_C, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add( &I, &I, &C, &CURVE25519_2P); // C = ( I + I) % mod
+ uop_calc(MUL, BANK_HI, CYCLE_S_T, CYCLE_V_Z, BANK_LO, PROC_I, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul(S_T, V_Z, &I, &CURVE25519_2P); // I = (qt * pz) % mod
+ uop_calc(ADD, BANK_LO, PROC_I, PROC_I, BANK_HI, PROC_D, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add( &I, &I, &D, &CURVE25519_2P); // D = ( I + I) % mod
+
+ uop_calc(ADD, BANK_HI, PROC_C, PROC_D, BANK_LO, PROC_E, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add( &D, &C, &E, &CURVE25519_2P); // E = (D + C) % mod
+ uop_calc(SUB, BANK_HI, PROC_B, PROC_A, BANK_LO, PROC_F, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_sub( &B, &A, &F, &CURVE25519_2P); // F = (B - A) % mod
+ uop_calc(ADD, BANK_HI, PROC_B, PROC_A, BANK_LO, PROC_G, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_add( &B, &A, &G, &CURVE25519_2P); // G = (B + A) % mod
+ uop_calc(SUB, BANK_HI, PROC_D, PROC_C, BANK_LO, PROC_H, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_sub( &D, &C, &H, &CURVE25519_2P); // H = (D - C) % mod
+
+ uop_calc(MUL, BANK_LO, PROC_E, PROC_F, BANK_HI, CYCLE_T_X, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &E, &F, R_X, &CURVE25519_2P); // rx = (E * F) % mod
+ uop_calc(MUL, BANK_LO, PROC_G, PROC_H, BANK_HI, CYCLE_T_Y, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &G, &H, R_Y, &CURVE25519_2P); // ry = (G * H) % mod
+ uop_calc(MUL, BANK_LO, PROC_E, PROC_H, BANK_HI, CYCLE_T_T, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &E, &H, R_T, &CURVE25519_2P); // rt = (E * H) % mod
+ uop_calc(MUL, BANK_LO, PROC_F, PROC_G, BANK_HI, CYCLE_T_Z, BUF_LO, BUF_HI, MOD_2P); //fpga_modular_mul( &F, &G, R_Z, &CURVE25519_2P); // rz = (F * G) % mod
+
+ if (k_bit)
+ {
+ // R0 = T
+
+ uop_move2(BANK_HI, CYCLE_T_X, CYCLE_T_Y, BANK_LO, CYCLE_R0_X, CYCLE_R0_Y, BUF_LO, BUF_HI);
+ uop_move2(BANK_HI, CYCLE_T_Z, CYCLE_T_T, BANK_LO, CYCLE_R0_Z, CYCLE_R0_T, BUF_LO, BUF_HI);
+ }
+ else
+ {
+ // R1 = T
+
+ uop_move2(BANK_HI, CYCLE_T_X, CYCLE_T_Y, BANK_LO, CYCLE_R1_X, CYCLE_R1_Y, BUF_LO, BUF_HI);
+ uop_move2(BANK_HI, CYCLE_T_Z, CYCLE_T_T, BANK_LO, CYCLE_R1_Z, CYCLE_R1_T, BUF_LO, BUF_HI);
+ }
+ }
+ }
+
+ // inversion expects result to be in LO: T1
+ uop_move2(BANK_LO, CYCLE_R0_Z, CYCLE_R0_Z, BANK_HI, CYCLE_R0_Z, CYCLE_R0_Z, BUF_LO, BUF_HI);
+ uop_move2(BANK_HI, CYCLE_R0_Z, CYCLE_R0_Z, BANK_LO, INVERT_T_1, INVERT_T_1, BUF_LO, BUF_HI);
+
+ // just call piece of microcode
+ fpga_modular_inv_microcode(BUF_LO, BUF_HI);
+
+ // inversion places result in HI: R1
+ // coordinates are in HI: R0_X, R0_Y
+
+ uop_move2(BANK_HI, INVERT_R1, INVERT_R1, BANK_LO, INVERT_R1, INVERT_R1, BUF_LO, BUF_HI);
+ uop_calc(MUL, BANK_LO, INVERT_R1, CYCLE_R0_X, BANK_HI, CYCLE_R0_X, BUF_LO, BUF_HI, MOD_2P);
+ uop_calc(MUL, BANK_LO, INVERT_R1, CYCLE_R0_Y, BANK_HI, CYCLE_R0_Y, BUF_LO, BUF_HI, MOD_2P);
+
+ // finally reduce to just 1*P
+ uop_calc(ADD, BANK_HI, CYCLE_R0_X, CONST_ZERO, BANK_LO, CYCLE_R0_X, BUF_LO, BUF_HI, MOD_1P); // !!!
+ uop_calc(ADD, BANK_HI, CYCLE_R0_Y, CONST_ZERO, BANK_LO, CYCLE_R0_Y, BUF_LO, BUF_HI, MOD_1P); // !!!
+
+ // poke sign bit
+ BUF_LO[CYCLE_R0_Y].words[FPGA_OPERAND_NUM_WORDS-1] |=
+ (FPGA_WORD)((BUF_LO[CYCLE_R0_X].words[0] & (FPGA_WORD)1) << 31);
+
+ // store result
+ uop_stor(BUF_LO, BUF_HI, BANK_LO, CYCLE_R0_Y, QY);
+
+
+
+ /*
+ // process "sign" of x, see this Cryptography Stack Exchange
+ // answer for more details:
+ //
+ // https://crypto.stackexchange.com/questions/58921/decoding-a-ed25519-key-per-rfc8032
+ //
+ // the short story is that odd values of x are negative, so we
+ // just copy the lsb of x into msb of y
+ R0_Y.words[FPGA_OPERAND_NUM_WORDS-1] |= (R0_X.words[0] & (FPGA_WORD)1) << 31;
+
+ // store result
+ fpga_multiword_copy(&R0_Y, QY);
+ */
+}
+
+
+//------------------------------------------------------------------------------
+// End-of-File
+//------------------------------------------------------------------------------