⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 germain.c

📁 包含哈希,对称以及非对称的经典算法 包含经典事例
💻 C
字号:
/* * Sophie Germain prime generation using the bignum library and sieving. * * Copyright (c) 1995  Colin Plumb.  All rights reserved. * For licensing and other legal details, see the file legal.c. */#if HAVE_CONFIG_H#include "config.h"#endif#if !NO_ASSERT_H#include <assert.h>#else#define assert(x) (void)0#endif#if BNDEBUG#include <stdio.h>#endif#include "bn.h"#include "germain.h"#include "jacobi.h"#include "lbnmem.h"	/* For lbnMemWipe */#include "sieve.h"#include "kludge.h"/* Size of the sieve area (can be up to 65536/8 = 8192) */#define SIEVE 8192/* * Helper function that does the slow primality test. * bn is the input bignum; a and e are temporary buffers that are * allocated by the caller to save overhead.  bn2 is filled with * a copy of 2*bn+1 if bn is found to be prime. * * Returns 0 if both bn abd bn2 are prime, >0 if not prime, and -1 on * error (out of memory).  If not prime, the return value is the number * of modular exponentiations performed.   Prints a '+' or '-' on the * given FILE (if any) for each test that is passed by bn, and a '*' * for each test that is passed by bn2. * * The testing consists of strong pseudoprimality tests, to the bases 2, * 3, 5, 7, 11, 13 and 17.  (Also called Miller-Rabin, although that's not * technically correct if we're using fixed bases.)  Some people worry * that this might not be enough.  Number theorists may wish to generate * primality proofs, but for random inputs, this returns non-primes with a * probability which is quite negligible, which is good enough. * * It has been proved (see Carl Pomerance, "On the Distribution of * Pseudoprimes", Math. Comp. v.37 (1981) pp. 587-593) that the number * of pseudoprimes (composite numbers that pass a Fermat test to the * base 2) less than x is bounded by: * exp(ln(x)^(5/14)) <= P_2(x)	### CHECK THIS FORMULA - it looks wrong! ### * P_2(x) <= x * exp(-1/2 * ln(x) * ln(ln(ln(x))) / ln(ln(x))). * Thus, the local density of Pseudoprimes near x is at most * exp(-1/2 * ln(x) * ln(ln(ln(x))) / ln(ln(x))), and at least * exp(ln(x)^(5/14) - ln(x)).  Here are some values of this function * for various k-bit numbers x = 2^k: * Bits	Density <=	Bit equivalent	Density >=	Bit equivalent *  128	3.577869e-07	 21.414396	4.202213e-37	 120.840190 *  192	4.175629e-10	 31.157288	4.936250e-56	 183.724558 *  256 5.804314e-13	 40.647940	4.977813e-75	 246.829095 *  384 1.578039e-18	 59.136573	3.938861e-113	 373.400096 *  512 5.858255e-24	 77.175803	2.563353e-151	 500.253110 *  768 1.489276e-34	112.370944	7.872825e-228	 754.422724 * 1024 6.633188e-45	146.757062	1.882404e-304	1008.953565 * * As you can see, there's quite a bit of slop between these estimates. * In fact, the density of pseudoprimes is conjectured to be closer * to the square of that upper bound.  E.g. the density of pseudoprimes * of size 256 is around 3 * 10^-27.  The density of primes is very * high, from 0.005636 at 256 bits to 0.001409 at 1024 bits, i.e. * more than 10^-3. * * For those people used to cryptographic levels of security where the * 56 bits of DES key space is too small because it's exhaustible with * custom hardware searching engines, note that you are not generating * 50,000,000 primes per second on each of 56,000 custom hardware chips * for several hours.  The chances that another Dinosaur Killer asteroid * will land today is about 10^-11 or 2^-36, so it would be better to * spend your time worrying about *that*.  Well, okay, there should be * some derating for the chance that astronomers haven't seen it yet, but * I think you get the idea.  For a good feel about the probability of * various events, I have heard that a good book is by E'mile Borel, * "Les Probabilite's et la vie".  (The 's are accents, not apostrophes.) * * For more on the subject, try "Finding Four Million Large Random Primes", * by Ronald Rivest, in Advancess in Cryptology: Proceedings of Crypto '90. * He used a small-divisor test, then a Fermat test to the base 2, and then * 8 iterations of a Miller-Rabin test.  About 718 million random 256-bit * integers were generated, 43,741,404 passed the small divisor test, * 4,058,000 passed the Fermat test, and all 4,058,000 passed all 8 * iterations of the Miller-Rabin test, proving their primality beyond most * reasonable doubts. * * If the probability of getting a pseudoprime is some small p, then * the probability of not getting it in t trials is (1-p)^t.  Remember * that, for small p, (1-p)^(1/p) ~ 1/e, the base of natural logarithms. * (This is more commonly expressed as e = lim_{x\to\infty} (1+1/x)^x.) * Thus, (1-p)^t ~ e^(-p*t) = exp(-p*t).  So the odds of being able to * do this many tests without seeing a pseudoprime if you assume that * p = 10^-6 (one in a million) is one in 57.86.  If you assume that * p = 2*10^-6, it's one in 3347.6.  So it's implausible that the * density of pseudoprimes is much more than one millionth the density * of primes. * * He also gives a theoretical argument that the chance of finding a * 256-bit non-prime which satisfies one Fermat test to the base 2 is less * than 10^-22.  The small divisor test improves this number, and if the * numbers are 512 bits (as needed for a 1024-bit key) the odds of failure * shrink to about 10^-44.  Thus, he concludes, for practical purposes * *one* Fermat test to the base 2 is sufficient. */static intgermainPrimeTest(struct BigNum const *bn, struct BigNum *bn2, struct BigNum *e,	struct BigNum *a, int (*f)(void *arg, int c), void *arg){	int err;	unsigned i;	int j;	unsigned k, l;	static unsigned const primes[] = {2, 3, 5, 7, 11, 13, 17};#if BNDEBUG	/* Debugging */	/*	 * This is debugging code to test the sieving stage.	 * If the sieving is wrong, it will let past numbers with	 * small divisors.  The prime test here will still work, and	 * weed them out, but you'll be doing a lot more slow tests,	 * and presumably excluding from consideration some other numbers	 * which might be prime.  This check just verifies that none	 * of the candidates have any small divisors.  If this	 * code is enabled and never triggers, you can feel quite	 * confident that the sieving is doing its job.	 */	i = bnModQ(bn, 15015);	/* 15015 = 3 * 5 * 7 * 11 * 13 */	if (!(i % 3)) printf("bn div by 3!");	if ((i % 3) == 1) printf("bn2 div by 3!");	if (!(i % 5)) printf("bn div by 5!");	if ((i % 5) == 2) printf("bn2 div by 5!");	if (!(i % 7)) printf("bn div by 7!");	if ((i % 7) == 3) printf("bn2 div by 7!");	if (!(i % 11)) printf("bn div by 11!");	if ((i % 11) == 5) printf("bn2 div by 11!");	if (!(i % 13)) printf("bn div by 13!");	if ((i % 13) == 6) printf("bn2 div by 13!");	i = bnModQ(bn, 7429);	/* 7429 = 17 * 19 * 23 */	if (!(i % 17)) printf("bn div by 17!");	if ((i % 17) == 8) printf("bn2 div by 17!");	if (!(i % 19)) printf("bn div by 19!");	if ((i % 19) == 9) printf("bn2 div by 19!");	if (!(i % 23)) printf("bn div by 23!");	if ((i % 23) == 11) printf("bn2 div by 23!");	i = bnModQ(bn, 33263);	/* 33263 = 29 * 31 * 37 */	if (!(i % 29)) printf("bn div by 29!");	if ((i % 29) == 14) printf("bn2 div by 29!");	if (!(i % 31)) printf("bn div by 31!");	if ((i % 31) == 15) printf("bn2 div by 31!");	if (!(i % 37)) printf("bn div by 37!");	if ((i % 37) == 18) printf("bn2 div by 37!");#endif	/*	 * First, check whether bn is prime.  This uses a fast primality	 * test which usually obviates the need to do one of the	 * confirmation tests later.  See prime.c for a full explanation.	 * We check bn first because it's one bit smaller, saving one	 * modular squaring, and because we might be able to save another	 * when testing it.  (1/4 of the time.)  A small speed hack,	 * but finding big Sophie Germain primes is *slow*.	 */	if (bnCopy(e, bn) < 0)		return -1;	(void)bnSubQ(e, 1);	l = bnLSWord(e);	j = 1;	/* Where to start in prime array for strong prime tests */	if (l & 7) {		bnRShift(e, 1);		if (bnTwoExpMod(a, e, bn) < 0)			return -1;		if ((l & 7) == 6) {			/* bn == 7 mod 8, expect +1 */			if (bnBits(a) != 1)				return 1;	/* Not prime */			k = 1;		} else {			/* bn == 3 or 5 mod 8, expect -1 == bn-1 */			if (bnAddQ(a, 1) < 0)				return -1;			if (bnCmp(a, bn) != 0)				return 1;	/* Not prime */			k = 1;			if (l & 4) {				/* bn == 5 mod 8, make odd for strong tests */				bnRShift(e, 1);				k = 2;			}		}	} else {		/* bn == 1 mod 8, expect 2^((bn-1)/4) == +/-1 mod bn */		bnRShift(e, 2);		if (bnTwoExpMod(a, e, bn) < 0)			return -1;		if (bnBits(a) == 1) {			j = 0;	/* Re-do strong prime test to base 2 */		} else {			if (bnAddQ(a, 1) < 0)				return -1;			if (bnCmp(a, bn) != 0)				return 1;	/* Not prime */		}		k = 2 + bnMakeOdd(e);	}	/*	 * It's prime!  Print a success indicator and check bn2.	 * The success indicator we print is the sign of Jacobi(2,bn2),	 * which is available to us in l.  bn2 = 2*bn + 1.  Since bn is	 * odd, bn2 must be == 3 mod 4, so the options modulo 8 are 3 and 7.	 * 3 if bn == 1 mod 4, 7 if bn == 3 mod 4.  The signs of the	 * Jacobi symbol are - and + in thse two cases.  Set l to be	 * a flag, 1 if the symbol is positive.	 */	l = (l >> 1) & 1;	if (f && (err = f(arg, "-+"[l])) < 0)		return err;	/*	 * Now check bn2.  Since bn2 == 3 mod 4, a strong pseudoprimality	 * test boils down to looking at a^((bn2-1)/2) mod bn and seeing	 * if it's +/-1.  Of course, that exponent is just bn...	 */	if (bnCopy(bn2, bn) < 0 || bnAdd(bn2, bn) < 0)		return -1;	(void)bnAddQ(bn2, 1);	/* Can't overflow */	if (bnTwoExpMod(a, bn, bn2) < 0)		return -1;	if (l) {	/* Expect + */		if (bnBits(a) != 1)			return 2;	/* Not prime */	} else {		if (bnAddQ(a, 1) < 0)			return -1;		if (bnCmp(a, bn2) != 0)			return 2;	/* Not prime */	}	/*	 * Success!  We have found a key!  Now go on to confirmation	 * tests...  k is the amount by which e has already been shifted	 * down.  j = 1 unless the test to the base 2 could stand to	 * be re-done, in which case it's 0.	 */	k += bnMakeOdd(e);	for (i = j; i < sizeof(primes)/sizeof(*primes); i++) {		if (f && (err = f(arg, '*')) < 0)			return err;		/* Check that bn is a strong pseudoprime */		(void)bnSetQ(a, primes[i]);		if (bnExpMod(a, a, e, bn) < 0)			return -1;		if (bnBits(a) != 1) {			l = k;			for (;;) {				if (bnAddQ(a, 1) < 0)					return -1;				if (bnCmp(a, bn) == 0)	/* Was result bn-1? */					break;	/* Prime */				if (!--l)					return 2*i+1;	/* Failed, not prime */				/* This part is executed once, on average. */				(void)bnSubQ(a, 1);	/* Restore a */				if (bnSquare(a, a) < 0 || bnMod(a, a, bn) < 0)					return -1;				if (bnBits(a) == 1)					return 2*i+1;	/* Failed, not prime */			}		}		/* Okay, that was prime - print success indicator */		j = bnJacobiQ(primes[i], bn2);		if (f && (err = f(arg, j < 0 ? '-' : '+')) < 0)			return err;		/* If we're re-doing the base 2, we're done. */		if (!i)			continue;	/* Already done next part */		/* Check that p^bn == Jacobi(p,bn2) (mod bn2) */		(void)bnSetQ(a, primes[i]);		if (bnExpMod(a, a, bn, bn2) < 0)			return -1;		/*		 * FIXME:  Actually, we don't need to compute the Jacobi		 * sumbol externally... it never happens that a = +/-1		 * but it's the wrong one.  So we can just look at a and		 * use its sign.  Find a proof somewhere.		 */		if (j < 0) {			/* Not a quadratic residue, should have a =  bn2-1 */			if (bnAddQ(a, 1) < 0)				return -1;			if (bnCmp(a, bn2) != 0)	/* Was result bn2-1? */				return 2*i+2;	/* Mismatch -> failed */		} else {			/* Quadratic residue, should have a = 1 */			if (bnBits(a) != 1)				return 2*i+2;	/* Mismatch -> failed */		}		/* It worked (to the base primes[i]) */	}	/* Print final success indicator */	if (f && (err = f(arg, '*')) < 0)		return err;	return 0;	/* Prime! */}/* * Modifies the bignum to return the next Sohpie Germain prime >= the * input value.  Sohpie Germain primes are number such that p is * prime and (p-1)/2 is also prime. * * Returns >=0 on success or -1 on failure (out of memory).  On success, * the return value is the number of modular exponentiations performed * (excluding the final confirmations).  This never gives up searching. * * The FILE *f argument, if non-NULL, has progress indicators written * to it.  A dot (.) is written every time a primeality test is failed, * a plus (+) or minus (-) when the smaller prime of the pair passes a * test, and a star (*) when the larger one does.  Finally, a slash (/) * is printed when the sieve was emptied without finding a prime and is * being refilled. * * Apologies to structured programmers for all the GOTOs. */intgermainPrimeGen(struct BigNum *bn2, int (*f)(void *arg, int c), void *arg){	int retval;	unsigned p, prev;	struct BigNum a, e, bn;	int modexps = 0;#ifdef MSDOS	unsigned char *sieve;#else	unsigned char sieve[SIEVE];#endif#ifdef MSDOS	sieve = lbnMemAlloc(SIEVE);	if (!sieve)		return -1;#endif	bnBegin(&a);	bnBegin(&e);	bnBegin(&bn);	/*	 * Obviously, the prime we find must be odd.  Further, (p-1)/2	 * must be odd, so p == 3 (mod 3).  Finally, p != 0 (mod 3),	 * and (p-1)/2 != 0 (mod 3), meaning that p != 1 (mod 3).  Thus,	 * p == 11 (mod 12).  Increase bn2 to have this property, and	 * search is steps of 12.  (Actually, we work with the smaller	 * bn, and increase it to 5 mod 6, then search in steps of 6.)	 */	if (bnCopy(&bn, bn2) < 0)		goto failed;	bnRShift(&bn, 1);	p = bnModQ(&bn, 6);	if (bnAddQ(&bn, 5-p) < 0)		goto failed;	for (;;) {		if (sieveBuild(sieve, SIEVE, &bn, 6, 1) < 0)			goto failed;		p = prev = 0;		if (sieve[0] & 1 || (p = sieveSearch(sieve, SIEVE, p)) != 0) {			do {				/*				 * Adjust bn to have the right value,				 * incrementing in steps of < 65536.				 * 10922 = 65536/6.				 */				assert(p >= prev);				prev = p-prev;	/* Delta - add 6*prev to bn */#if SIEVE*8*6 >= 65536				while (prev > 10922) {					if (bnAddQ(&bn, 6*10922) < 0)						goto failed;					prev -= 10922;				}#endif				if (bnAddQ(&bn, 6*prev) < 0)					goto failed;				prev = p;				/* Okay, do the strong tests. */				retval = germainPrimeTest(&bn, bn2, &e, &a,				                          f, arg);				if (retval <= 0)					goto done;				modexps += retval;				if (f && (retval = f(arg, '.')) < 0)					goto done;				/* And try again */				p = sieveSearch(sieve, SIEVE, p);			} while (p);		}		/* Ran out of sieve space - increase bn and keep trying. */#if SIEVE*8*6 >= 65536		p = ((SIEVE-1)*8+7) - prev;	/* Number of steps (of 6) */		while (p >= 10922) {			if (bnAddQ(&bn, 6*10922) < 0)				goto failed;			p -= 10922;		}		if (bnAddQ(&bn, 6*(p+1)) < 0)			goto failed;#else		if (bnAddQ(&bn, SIEVE*8*6 - prev) < 0)			goto failed;#endif		/*		 * Make sure bn2 is up to date for checkpoint/restart		 * operation triggered by calling f with '/'.		 */		if (bnCopy(bn2, &bn) < 0 || bnAdd(bn2, &bn) < 0)			goto failed;		(void)bnAddQ(bn2, 1);	/* Can't overflow */		if (f && (retval = f(arg, '/')) < 0)			goto done;	} /* for (;;) */failed:	retval = -1;done:	bnEnd(&bn);	bnEnd(&e);	bnEnd(&a);#ifdef MSDOS	lbnMemFree(sieve, SIEVE);#else	lbnMemWipe(sieve, sizeof(sieve));#endif	return retval < 0 ? retval : modexps;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -