math is good hangs on a big loop or some stupppppid thing
This commit is contained in:
94
main.c
94
main.c
@@ -24,8 +24,8 @@ uint64_t *dec_to_bin(uint64_t d, uint64_t *length) {
|
|||||||
return binary_form;
|
return binary_form;
|
||||||
}
|
}
|
||||||
|
|
||||||
uint64_t quick_pow(uint64_t *d_binary, uint64_t a, uint64_t n, uint64_t length) {
|
unsigned __int128 quick_pow(uint64_t *d_binary, unsigned __int128 a, unsigned __int128 n, uint64_t length) {
|
||||||
uint64_t *powed = calloc(100, sizeof(uint64_t));
|
unsigned __int128 *powed = calloc(100, sizeof(unsigned __int128));
|
||||||
|
|
||||||
powed[0] = a;
|
powed[0] = a;
|
||||||
for (int i = 1; i <= length; i++) {
|
for (int i = 1; i <= length; i++) {
|
||||||
@@ -73,7 +73,7 @@ bool prime_test(uint64_t n, int a) {
|
|||||||
// 1: a^d =k 1 mod n
|
// 1: a^d =k 1 mod n
|
||||||
uint64_t length = 0;
|
uint64_t length = 0;
|
||||||
uint64_t *d_binary = dec_to_bin(d, &length);
|
uint64_t *d_binary = dec_to_bin(d, &length);
|
||||||
uint64_t first_qp_res = quick_pow(d_binary, a, n, length);
|
unsigned __int128 first_qp_res = quick_pow(d_binary, a, n, length);
|
||||||
|
|
||||||
if (first_qp_res == 1) {
|
if (first_qp_res == 1) {
|
||||||
free(d_binary);
|
free(d_binary);
|
||||||
@@ -87,9 +87,6 @@ bool prime_test(uint64_t n, int a) {
|
|||||||
free(d_binary);
|
free(d_binary);
|
||||||
// printf("true\n");
|
// printf("true\n");
|
||||||
return true;
|
return true;
|
||||||
} else if (first_qp_res < n - 2) {
|
|
||||||
// printf("first_qp_res became smaller then n!!\n");
|
|
||||||
break;
|
|
||||||
} else {
|
} else {
|
||||||
first_qp_res = (uint64_t)(((unsigned __int128)first_qp_res * first_qp_res) % n);
|
first_qp_res = (uint64_t)(((unsigned __int128)first_qp_res * first_qp_res) % n);
|
||||||
}
|
}
|
||||||
@@ -138,11 +135,11 @@ euklidian_result_t euklidian_algorigthm_extended(unsigned __int128 a, unsigned _
|
|||||||
prev_r = r;
|
prev_r = r;
|
||||||
r = next_r;
|
r = next_r;
|
||||||
|
|
||||||
xk = xk * prev_q + prev_prev_xk;
|
xk = prev_xk * prev_q + prev_prev_xk;
|
||||||
prev_prev_xk = prev_xk;
|
prev_prev_xk = prev_xk;
|
||||||
prev_xk = xk;
|
prev_xk = xk;
|
||||||
|
|
||||||
yk = yk * prev_q + prev_prev_yk;
|
yk = prev_yk * prev_q + prev_prev_yk;
|
||||||
prev_prev_yk = prev_yk;
|
prev_prev_yk = prev_yk;
|
||||||
prev_yk = yk;
|
prev_yk = yk;
|
||||||
}
|
}
|
||||||
@@ -157,7 +154,7 @@ euklidian_result_t euklidian_algorigthm_extended(unsigned __int128 a, unsigned _
|
|||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
unsigned __int128 kinai_maradek_tetel(uint64_t *m, uint64_t d, prime_test_t *p, prime_test_t *q) {
|
unsigned __int128 kinai_maradek_tetel(uint64_t *m, unsigned __int128 d, prime_test_t *p, prime_test_t *q) {
|
||||||
// sum(i: 1,2): Ci * Yi * Mi mod M
|
// sum(i: 1,2): Ci * Yi * Mi mod M
|
||||||
// M: P*Q, Mp: M/P, Mq: M/Q
|
// M: P*Q, Mp: M/P, Mq: M/Q
|
||||||
unsigned __int128 M = p->prime * q->prime;
|
unsigned __int128 M = p->prime * q->prime;
|
||||||
@@ -168,35 +165,38 @@ unsigned __int128 kinai_maradek_tetel(uint64_t *m, uint64_t d, prime_test_t *p,
|
|||||||
uint64_t temp_exponent = d % (p->prime - 1);
|
uint64_t temp_exponent = d % (p->prime - 1);
|
||||||
uint64_t exponent_bin_length = 0;
|
uint64_t exponent_bin_length = 0;
|
||||||
uint64_t *exponent_as_binary = dec_to_bin(temp_exponent, &exponent_bin_length);
|
uint64_t *exponent_as_binary = dec_to_bin(temp_exponent, &exponent_bin_length);
|
||||||
uint64_t c1 = quick_pow(exponent_as_binary, *m, p->prime, exponent_bin_length);
|
unsigned __int128 c1 = quick_pow(exponent_as_binary, *m, p->prime, exponent_bin_length);
|
||||||
free(exponent_as_binary);
|
free(exponent_as_binary);
|
||||||
|
|
||||||
// C2: c^(d mod Q-1) mod Q
|
// C2: c^(d mod Q-1) mod Q
|
||||||
temp_exponent = d % (q->prime - 1);
|
temp_exponent = d % (q->prime - 1);
|
||||||
exponent_as_binary = dec_to_bin(temp_exponent, &exponent_bin_length);
|
exponent_as_binary = dec_to_bin(temp_exponent, &exponent_bin_length);
|
||||||
uint64_t c2 = quick_pow(exponent_as_binary, *m, q->prime, exponent_bin_length);
|
unsigned __int128 c2 = quick_pow(exponent_as_binary, *m, q->prime, exponent_bin_length);
|
||||||
free(exponent_as_binary);
|
free(exponent_as_binary);
|
||||||
|
|
||||||
euklidian_result_t y = euklidian_algorigthm_extended(Mp, Mq); // in the struct the x will mean the y1 and y will mean the y2
|
euklidian_result_t y = euklidian_algorigthm_extended(Mp, Mq); // in the struct the x will mean the y1 and y will mean the y2
|
||||||
|
|
||||||
// if either of them is less a negative number shift them into postive range with with hte modulo
|
// if either of them is less a negative number shift them into postive range with with hte modulo
|
||||||
y.x %= p->prime;
|
y.x %= p->prime;
|
||||||
y.x += p->prime;
|
if (y.x < 0)
|
||||||
|
y.x += p->prime;
|
||||||
|
|
||||||
y.y %= q->prime;
|
y.y %= q->prime;
|
||||||
y.y += q->prime;
|
if (y.y < 0)
|
||||||
|
y.y += q->prime;
|
||||||
|
|
||||||
unsigned __int128 s1 = (c1 * y.x * Mp) % M;
|
unsigned __int128 s1 = (c1 * y.x * Mp) % M;
|
||||||
unsigned __int128 s2 = (c2 * y.y * Mq) % M;
|
unsigned __int128 s2 = (c2 * y.y * Mq) % M;
|
||||||
return (s1 + s2) % M;
|
return (s1 + s2) % M;
|
||||||
}
|
}
|
||||||
|
|
||||||
unsigned __int128 rsa_encrypt(uint64_t *m, prime_test_t *p, prime_test_t *q) {
|
unsigned __int128 rsa_encrypt(uint64_t *m, prime_test_t *p, prime_test_t *q, uint64_t *out_e, unsigned __int128 *out_d) {
|
||||||
unsigned __int128 n = p->prime * q->prime;
|
unsigned __int128 n = (unsigned __int128)p->prime * q->prime;
|
||||||
printf("n: ");
|
printf("n: ");
|
||||||
print_uint128(n);
|
print_uint128(n);
|
||||||
printf("\n");
|
printf("\n");
|
||||||
|
|
||||||
unsigned __int128 fi_n = (p->prime - 1) * (q->prime - 1);
|
unsigned __int128 fi_n = (unsigned __int128)(p->prime - 1) * (q->prime - 1);
|
||||||
printf("fi_n: ");
|
printf("fi_n: ");
|
||||||
print_uint128(fi_n);
|
print_uint128(fi_n);
|
||||||
printf("\n");
|
printf("\n");
|
||||||
@@ -204,16 +204,23 @@ unsigned __int128 rsa_encrypt(uint64_t *m, prime_test_t *p, prime_test_t *q) {
|
|||||||
// 2. kulcsgeneralas
|
// 2. kulcsgeneralas
|
||||||
uint64_t e = 0;
|
uint64_t e = 0;
|
||||||
do {
|
do {
|
||||||
e = rand64();
|
e = rand64() % fi_n;
|
||||||
} while (e <= 1 && e >= fi_n && prime_test(e, p->base)); // the p and q base is used everywhere anyways, i wont pass in another arg
|
} while (e <= 1 && prime_test(e, p->base)); // the p and q base is used everywhere anyways, i wont pass in another arg
|
||||||
|
|
||||||
euklidian_result_t calc_d = euklidian_algorigthm_extended(fi_n, e);
|
euklidian_result_t calc_d = euklidian_algorigthm_extended(fi_n, e);
|
||||||
|
|
||||||
// if either of them is less a negative number shift them into postive range with with hte modulo
|
// if either of them is less a negative number shift them into postive range with with hte modulo
|
||||||
calc_d.x %= fi_n;
|
calc_d.x %= fi_n;
|
||||||
|
if (calc_d.x < 0)
|
||||||
|
calc_d.x += fi_n;
|
||||||
|
|
||||||
calc_d.y %= fi_n;
|
calc_d.y %= fi_n;
|
||||||
|
if (calc_d.y < 0)
|
||||||
|
calc_d.y += fi_n;
|
||||||
|
|
||||||
unsigned __int128 d = calc_d.y;
|
unsigned __int128 d = calc_d.y;
|
||||||
|
*out_e = e;
|
||||||
|
*out_d = d;
|
||||||
|
|
||||||
uint64_t length = 0;
|
uint64_t length = 0;
|
||||||
uint64_t *nyenye = dec_to_bin(e, &length);
|
uint64_t *nyenye = dec_to_bin(e, &length);
|
||||||
@@ -226,6 +233,11 @@ unsigned __int128 rsa_encrypt(uint64_t *m, prime_test_t *p, prime_test_t *q) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
|
int isSignature = 0;
|
||||||
|
printf("Please input 0 for Rsa encryption or 1 for Rsa signature: ");
|
||||||
|
scanf("%d", &isSignature);
|
||||||
|
printf("\n");
|
||||||
|
|
||||||
uint64_t m = 0;
|
uint64_t m = 0;
|
||||||
printf("give input for m: \n");
|
printf("give input for m: \n");
|
||||||
scanf("%ju", &m);
|
scanf("%ju", &m);
|
||||||
@@ -244,13 +256,47 @@ int main() {
|
|||||||
pthread_join(thread_q, NULL);
|
pthread_join(thread_q, NULL);
|
||||||
printf("\n");
|
printf("\n");
|
||||||
|
|
||||||
rsa_encrypt(&m, &p, &q);
|
uint64_t e = 0;
|
||||||
|
unsigned __int128 d = 0;
|
||||||
|
|
||||||
printf("\nkinai maradek tetel:\n");
|
if (!isSignature) {
|
||||||
unsigned __int128 S = kinai_maradek_tetel(&m, 2263, &p, &q);
|
// rsa encryption
|
||||||
printf("S: ");
|
rsa_encrypt(&m, &p, &q, &e, &d);
|
||||||
print_uint128(S);
|
printf("\nkinai maradek tetel:\n");
|
||||||
printf("\n");
|
unsigned __int128 S = kinai_maradek_tetel(&m, d, &p, &q);
|
||||||
|
printf("S: ");
|
||||||
|
print_uint128(S);
|
||||||
|
printf("\n");
|
||||||
|
} else if (isSignature == 1) {
|
||||||
|
// rsa signature
|
||||||
|
|
||||||
|
// generate keys
|
||||||
|
uint64_t dummy = 2;
|
||||||
|
rsa_encrypt(&dummy, &p, &q, &e, &d);
|
||||||
|
printf("\n");
|
||||||
|
|
||||||
|
unsigned __int128 signature = kinai_maradek_tetel(&m, (uint64_t)d, &p, &q);
|
||||||
|
printf("Alairas (Signature): ");
|
||||||
|
print_uint128(signature);
|
||||||
|
|
||||||
|
// key verifacation
|
||||||
|
uint64_t e_length = 0;
|
||||||
|
uint64_t *e_binary = dec_to_bin(e, &e_length);
|
||||||
|
unsigned __int128 n = p.prime * q.prime;
|
||||||
|
|
||||||
|
unsigned __int128 verified_message = quick_pow(e_binary, (uint64_t)signature, n, e_length);
|
||||||
|
free(e_binary);
|
||||||
|
|
||||||
|
printf("Verified Message: ");
|
||||||
|
print_uint128(verified_message);
|
||||||
|
|
||||||
|
// 4. THE RESULT
|
||||||
|
if (verified_message == m) {
|
||||||
|
printf("\nSignature correct\n");
|
||||||
|
} else {
|
||||||
|
printf("\nSignature not correct\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user