package Crypt::Perl::ECDSA::Math;
#Math that’s really only useful for us in the context of ECDSA.
use strict;
use warnings;
use Crypt::Perl::BigInt ();
#A port of libtomcrypt’s mp_sqrtmod_prime().
#The return value will be a Crypt::Perl::BigInt reference.
#
#See also implementations at:
# https://rosettacode.org/wiki/Tonelli-Shanks_algorithm
#
#See “Handbook of Applied Cryptography”, algorithms 3.34 and 3.36,
#for reference.
sub tonelli_shanks {
my ($n, $p) = @_;
_make_bigints($n, $p);
return 0 if $n->is_zero();
die "prime must be odd" if $p->beq(2);
if (jacobi($n, $p) == -1) {
die sprintf( "jacobi(%s, %s) must not be -1", $n->as_hex(), $p->as_hex());
}
#HAC 3.36
if ( $p->copy()->bmod(4)->beq(3) ) {
return $n->copy()->bmodpow( $p->copy()->binc()->brsft(2), $p );
}
my $Si = 0;
my $Q = $p->copy()->bdec();
while ( $Q->is_even() ) {
$Q->brsft(1);
$Si++;
}
my $Z = Crypt::Perl::BigInt->new(2);
while (1) {
last if jacobi($Z, $p) == -1;
$Z->binc();
}
my $C = $Z->copy()->bmodpow($Q, $p);
my $t1 = $Q->copy()->binc()->brsft(1);
my $R = $n->copy()->bmodpow($t1, $p);
my $T = $n->copy()->bmodpow($Q, $p);
my $Mi = $Si;
while (1) {
my $i = 0;
$t1 = $T->copy();
while (1) {
last if $t1->is_one();
$t1->bmodpow(2, $p);
$i++;
}
return $R if $i == 0;
$t1 = _bi2()->bmodpow($Mi - $i - 1, $p);
$t1 = $C->bmodpow($t1, $p);
$C = $t1->copy()->bmodpow(2, $p);
$R->bmul($t1)->bmod($p);
$T->bmul($C)->bmod($p);
$Mi = $i;
}
}
my $BI2;
sub _bi2 {
return( ($BI2 ||= Crypt::Perl::BigInt->new(2))->copy() );
}
#cf. mp_jacobi()
#
#The return value is a plain scalar (-1, 0, or 1).
#
sub jacobi {
my ($a, $n) = @_;
_make_bigints($a, $n);
my $ret = 1;
#This loop avoids deep recursion.
while (1) {
my ($ret2, $help) = _jacobi_backend($a, $n);
$ret *= $ret2;
last if !$help;
($a, $n) = @$help;
}
return $ret;
}
sub _make_bigints {
ref || ($_ = _bi($_)) for @_;
}
sub _jacobi_backend {
my ($a, $n) = @_;
die "“a” can’t be negative!" if $a < 0;
die "“n” must be positive!" if $n <= 0;
#step 1
if ($a->is_zero()) {
return $n->is_one() ? 1 : 0;
}
#step 2
return 1 if $a->is_one();
#default
my $si = 0;
my $a1 = $a->copy();
#Determine $a1’s greatest factor that is a power of 2,
#which is the number of lest-significant 0 bits.
my $ki = _count_lsb($a1);
$a1->brsft($ki);
#step 4
if (($ki & 1) == 0) {
$si = 1;
}
else {
my $residue = $n->copy()->band(7)->numify();
if ( $residue == 1 || $residue == 7 ) {
$si = 1;
}
elsif ( $residue == 3 || $residue == 5 ) {
$si = -1;
}
}
#step 5
if ( $n->copy()->band(3)->beq(3) && $a1->copy()->band(3)->beq(3) ) {
$si = 0 - $si;
}
return $si if $a1->is_one();
my $p1 = $n->copy()->bmod($a1);
return( $si, [$p1, $a1] );
}
#cf. mp_cnt_lsb()
sub _count_lsb {
my ($num) = @_;
#sprintf('%b',$num) =~ m<(0*)\z>;
$num->as_bin() =~ m<(0*)\z>;
return length $1;
}
sub _bi { return Crypt::Perl::BigInt->new(@_) }
1;