Add PQCrystals Dilithium3 to AWS-LC #610
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description of changes:
This PR introduces a new signature algorithm Crystals Dilithium that has been selected for standardization by NIST as part of the PQC project. We import the Dilithium source code from this commit of the official Dilithium repository pq-crystals/dilithium@3e9b9f1.
Dilithium has been added into the EVP_PKEY APIs utilizing key generation, sign and verify. This introduction follows a similar pattern as the import of Crystals Kyber in #343.
Call-outs:
Addition to EVP interface
In addition to simply importing the Dilithium source code and providing an interface to the sign/verify methods, this PR also makes Dilithium3 keys available to the EVP PKEY interface including a subset of methods for key management. As the Dilithium signing procedure is a single-shot signing algorithm that does not use a pre-hash, we follow much of the same structure as the EVP interface for Ed25519. For example, to sign and verify we use the EVP operations
EVP_DigestSign
andEVP_DigestVerify
with hash|type|
set to NULL.Dilithium3-Ref
The source code imported is for the Reference implementation of Dilithium3. This was selected for initial import due to it being platform agnostic. The optimized implementation is for AVX2 instruction sets and so priority was given to the implementation which will work on all architectures. Importing optimized versions (and higher security levels) can be done as a follow-on effort.
There are two pairs of sign/verify APIs provided by Dilithium,
pqcrystals_dilithium3_ref_signature
andpqcrystals_dilithium3_ref_verify
which sign and verify (resp.) a Dilithium3 signature generated for some message m, andpqcrystals_dilithium3_ref
andpqcrystals_dilithium3_ref_open
, which sign and verify (resp.) a Dilithium3 signed message (which is the composition of a Dilithium3 and the message m that was signed) for some message m. We have chosen to select the two APIspqcrystals_dilithium3_ref_signature
andpqcrystals_dilithium3_ref_verify
to be consistent with existing EVP signature functionality. This is also consistent with other implementations, such as within LibOQS.SHA-3/SHAKE
Dilithium requires SHA-3 and SHAKE methods which are in the process of being added to AWS-LC. For this PR, the needed SHA-3/SHAKE dependencies are included within the Dilithium3 source tree directly. We are currently working on separating out a separate SHA-3/SHAKE interface in AWS-LC and utilizing this across both Kyber and Dilithium.
DRBG
To support KAT testing, a deterministic random number generator was needed. This PR introduces the same DRBG (AES-CTR) used by the Dilithium source code and uses the same randombytes interface to seed and get random bytes from it. The DRBG only gets built when the testing flag is enabled. Otherwise, the existing RNG is used.
Testing:
Unit tests were added which exercise the use of Dilithium3 in the EVP interface. KAT tests from the Dilithium submission to NIST's Round 3 Post-Quantum Cryptography selection process are also included. To support running the KAT tests, an additional random number generator was added which is deterministic and only built-in test mode.
The KAT tests are built by the Dilithium team using the
pqcrystals_dilithium3_ref
andpqcrystals_dilithium3_ref_open
APIs (which include the message within the signature). Since we are using the APIs that do not include the message within the signature we truncate the full signature in the KAT to only the signature part to exclude the copy of the message.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.