@@ -66,6 +66,26 @@ uint32_t PolyMod(const data& v)
66
66
// the above example, `c` initially corresponds to 1 mod g(x), and after processing 2 inputs of
67
67
// v, it corresponds to x^2 + v0*x + v1 mod g(x). As 1 mod g(x) = 1, that is the starting value
68
68
// for `c`.
69
+
70
+ // The following Sage code constructs the generator used:
71
+ //
72
+ // B = GF(2) # Binary field
73
+ // BP.<b> = B[] # Polynomials over the binary field
74
+ // F_mod = b**5 + b**3 + 1
75
+ // F.<f> = GF(32, modulus=F_mod, repr='int') # GF(32) definition
76
+ // FP.<x> = F[] # Polynomials over GF(32)
77
+ // E_mod = x**2 + F.fetch_int(9)*x + F.fetch_int(23)
78
+ // E.<e> = F.extension(E_mod) # GF(1024) extension field definition
79
+ // for p in divisors(E.order() - 1): # Verify e has order 1023.
80
+ // assert((e**p == 1) == (p % 1023 == 0))
81
+ // G = lcm([(e**i).minpoly() for i in range(997,1000)])
82
+ // print(G) # Print out the generator
83
+ //
84
+ // It demonstrates that g(x) is the least common multiple of the minimal polynomials
85
+ // of 3 consecutive powers (997,998,999) of a primitive element (e) of GF(1024).
86
+ // That guarantees it is, in fact, the generator of a primitive BCH code with cycle
87
+ // length 1023 and distance 4. See https://en.wikipedia.org/wiki/BCH_code for more details.
88
+
69
89
uint32_t c = 1 ;
70
90
for (const auto v_i : v) {
71
91
// We want to update `c` to correspond to a polynomial with one extra term. If the initial
@@ -88,12 +108,21 @@ uint32_t PolyMod(const data& v)
88
108
// Then compute c1*x^5 + c2*x^4 + c3*x^3 + c4*x^2 + c5*x + v_i:
89
109
c = ((c & 0x1ffffff ) << 5 ) ^ v_i;
90
110
91
- // Finally, for each set bit n in c0, conditionally add {2^n}k(x):
111
+ // Finally, for each set bit n in c0, conditionally add {2^n}k(x). These constants can be
112
+ // computed using the following Sage code (continuing the code above):
113
+ //
114
+ // for i in [1,2,4,8,16]: # Print out {1,2,4,8,16}*(g(x) mod x^6), packed in hex integers.
115
+ // v = 0
116
+ // for coef in reversed((F.fetch_int(i)*(G % x**6)).coefficients(sparse=True)):
117
+ // v = v*32 + coef.integer_representation()
118
+ // print("0x%x" % v)
119
+ //
92
120
if (c0 & 1 ) c ^= 0x3b6a57b2 ; // k(x) = {29}x^5 + {22}x^4 + {20}x^3 + {21}x^2 + {29}x + {18}
93
121
if (c0 & 2 ) c ^= 0x26508e6d ; // {2}k(x) = {19}x^5 + {5}x^4 + x^3 + {3}x^2 + {19}x + {13}
94
122
if (c0 & 4 ) c ^= 0x1ea119fa ; // {4}k(x) = {15}x^5 + {10}x^4 + {2}x^3 + {6}x^2 + {15}x + {26}
95
123
if (c0 & 8 ) c ^= 0x3d4233dd ; // {8}k(x) = {30}x^5 + {20}x^4 + {4}x^3 + {12}x^2 + {30}x + {29}
96
124
if (c0 & 16 ) c ^= 0x2a1462b3 ; // {16}k(x) = {21}x^5 + x^4 + {8}x^3 + {24}x^2 + {21}x + {19}
125
+
97
126
}
98
127
return c;
99
128
}
@@ -125,7 +154,8 @@ Encoding VerifyChecksum(const std::string& hrp, const data& values)
125
154
// PolyMod computes what value to xor into the final values to make the checksum 0. However,
126
155
// if we required that the checksum was 0, it would be the case that appending a 0 to a valid
127
156
// list of values would result in a new valid list. For that reason, Bech32 requires the
128
- // resulting checksum to be 1 instead. In Bech32m, this constant was amended.
157
+ // resulting checksum to be 1 instead. In Bech32m, this constant was amended. See
158
+ // https://gist.github.com/sipa/14c248c288c3880a3b191f978a34508e for details.
129
159
const uint32_t check = PolyMod (Cat (ExpandHRP (hrp), values));
130
160
if (check == EncodingConstant (Encoding::BECH32)) return Encoding::BECH32;
131
161
if (check == EncodingConstant (Encoding::BECH32M)) return Encoding::BECH32M;
0 commit comments