⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 bnprime.c

📁 著名的加密软件的应用于电子邮件中
💻 C
📖 第 1 页 / 共 2 页
字号:
/*
* bnprime.c - Prime generation using the bignum library and sieving.
*
* Copyright (C) 1995-1997 Pretty Good Privacy, Inc. All rights reserved.
*
* Written by Colin Plumb
*
* $Id: bnprime.c,v 1.2.2.1 1997/06/07 09:49:40 mhw Exp $
*/
#ifndef HAVE_CONFIG_H
#define HAVE_CONFIG_H 0
#endif
#if HAVE_CONFIG_H
#include "config.h"
#endif

#include <stdarg.h>	 /* We just can't live without this... */

#ifndef BNDEBUG
#define BNDEBUG 0
#endif
#if BNDEBUG
#include <stdio.h>
#endif

#include "bn.h"
#include "bnimem.h"
#include "bnprime.h"
#include "bnsieve.h"

#include "bnkludge.h"
#include "pgpDebug.h"

/* Size of the shuffle table */
#define SHUFFLE	256
/* Size of the sieve area */
#define SIEVE 32768u/16

/* Confirmation tests. The first one *must* be 2 */
static unsigned const confirm[] = {2, 3, 5, 7, 11, 13, 17};
#define CONFIRMTESTS (sizeof(confirm)/sizeof(*confirm))

/*
* Helper function that does the slow primality test.
* bn is the input bignum; a and e are temporary buffers that are
* allocated by the caller to save overhead.
*
* Returns 0 if prime, >0 if not prime, and -1 on error (out of memory).
* If not prime, returns the number of modular exponentiations performed.
* Calls the given progress function with a '*' for each primality test
* that is passed.
*
* The testing consists of strong pseudoprimality tests, to the bases given
* in the confirm[] array above. (Also called Miller-Rabin, although that's
* not technically correct if we're using fixed bases.) Some people worry
* that this might not be enough. Number theorists may wish to generate
* primality proofs, but for random inputs, this returns non-primes with
* a probability which is quite negligible, which is good enough.
*
* It has been proved (see Carl Pomerance, "On the Distribution of
* Pseudoprimes", Math. Comp. v.37 (1981) pp. 587-593) that the number of
* pseudoprimes (composite numbers that pass a Fermat test to the base 2)
* less than x is bounded by:
* exp(ln(x)^(5/14)) <= P_2(x)	### CHECK THIS FORMULA - it looks wrong! ###
* P_2(x) <= x * exp(-1/2 * ln(x) * ln(ln(ln(x))) / ln(ln(x))).
* Thus, the local density of Pseudoprimes near x is at most
* exp(-1/2 * ln(x) * ln(ln(ln(x))) / ln(ln(x))), and at least
* exp(ln(x)^(5/14) - ln(x)). Here are some values of this function
* for various k-bit numbers x = 2^k:
* Bits	Density <=		Bit equivalent	Density >=		Bit equivalent
*	128	3.577869e-07		21.414396		4.202213e-37		120.840190
*	192	4.175629e-10		31.157288		4.936250e-56		183.724558
*	256 5.804314e-13		40.647940		4.977813e-75		246.829095
*	384 1.578039e-18		59.136573		3.938861e-113		373.400096
*	512 5.858255e-24		77.175803		2.563353e-151		500.253110
*	768 1.489276e-34		112.370944		7.872825e-228		754.422724
*      1024 6.633188e-45		146.757062		1.882404e-304		1008.953565
*
* As you can see, there's quite a bit of slop between these estimates.
* In fact, the density of pseudoprimes is conjectured to be closer to the
* square of that upper bound. E.g. the density of pseudoprimes of size
* 256 is around 3 * 10^-27. The density of primes is very high, from
* 0.005636 at 256 bits to 0.001409 at 1024 bits, i.e. more than 10^-3.
*
* For those people used to cryptographic levels of security where the
* 56 bits of DES key space is too small because it's exhaustible with
* custom hardware searching engines, note that you are not generating
* 50,000,000 primes per second on each of 56,000 custom hardware chips
* for several hours. The chances that another Dinosaur Killer asteroid
* will land today is about 10^-11 or 2^-36, so it would be better to
* spend your time worrying about *that*. Well, okay, there should be
* some derating for the chance that astronomers haven't seen it yet,
* but I think you get the idea. For a good feel about the probability
* of various events, I have heard that a good book is by E'mile Borel,
* "Les Probabilite's et la vie". (The 's are accents, not apostrophes.)
*
* For more on the subject, try "Finding Four Million Large Random Primes",
* by Ronald Rivest, in Advancess in Cryptology: Proceedings of Crypto
* '90. He used a small-divisor test, then a Fermat test to the base 2,
* and then 8 iterations of a Miller-Rabin test. About 718 million random
* 256-bit integers were generated, 43,741,404 passed the small divisor
* test, 4,058,000 passed the Fermat test, and all 4,058,000 passed all
* 8 iterations of the Miller-Rabin test, proving their primality beyond
* most reasonable doubts.
*
* If the probability of getting a pseudoprime is some small p, then the
* probability of not getting it in t trials is (1-p)^t. Remember that,
* for small p, (1-p)^(1/p) ~ 1/e, the base of natural logarithms.
* (This is more commonly expressed as e = lim_{x\to\infty} (1+1/x)^x.)
* Thus, (1-p)^t ~ e^(-p*t) = exp(-p*t). So the odds of being able to
* do this many tests without seeing a pseudoprime if you assume that
* p = 10^-6 (one in a million) is one in 57.86. If you assume that
* p = 2*10^-6, it's one in 3347.6. So it's implausible that the density
* of pseudoprimes is much more than one millionth the density of primes.
*
* He also gives a theoretical argument that the chance of finding a
* 256-bit non-prime which satisfies one Fermat test to the base 2 is
* less than 10^-22. The small divisor test improves this number, and
* if the numbers are 512 bits (as needed for a 1024-bit key) the odds
* of failure shrink to about 10^-44. Thus, he concludes, for practical
* purposes *one* Fermat test to the base 2 is sufficient.
*/
static int
primeTest(struct BigNum const *bn, struct BigNum *e, struct BigNum *a,
			int (*f)(void *arg, int c), void *arg)
	{
			unsigned i, j;
			unsigned k, l;
			int err;

#if BNDEBUG	 /* Debugging */
		/*
		* This is debugging code to test the sieving stage.
		* If the sieving is wrong, it will let past numbers with
		* small divisors. The prime test here will still work, and
		* weed them out, but you'll be doing a lot more slow tests,
		* and presumably excluding from consideration some other numbers
		* which might be prime. This check just verifies that none
		* of the candidates have any small divisors. If this
		* code is enabled and never triggers, you can feel quite
		* confident that the sieving is doing its job.
		*/
		i = bnLSWord(bn);
		if (!(i % 2)) printf("bn div by 2!");
		i = bnModQ(bn, 51051);	/* 51051 = 3 * 7 * 11 * 13 * 17 */
		if (!(i % 3)) printf("bn div by 3!");
		if (!(i % 7)) printf("bn div by 7!");
		if (!(i % 11)) printf("bn div by 11!");
		if (!(i % 13)) printf("bn div by 13!");
		if (!(i % 17)) printf("bn div by 17!");
		i = bnModQ(bn, 63365);	/* 63365 = 5 * 19 * 23 * 29 */
		if (!(i % 5)) printf("bn div by 5!");
		if (!(i % 19)) printf("bn div by 19!");
		if (!(i % 23)) printf("bn div by 23!");
		if (!(i % 29)) printf("bn div by 29!");
		i = bnModQ(bn, 47027);	/* 47027 = 31 * 37 * 41 */
		if (!(i % 31)) printf("bn div by 31!");
		if (!(i % 37)) printf("bn div by 37!");
		if (!(i % 41)) printf("bn div by 41!");
#endif

		/*
		* Now, check that bn is prime. If it passes to the base 2,
		* it's prime beyond all reasonable doubt, and everything else
		* is just gravy, but it gives people warm fuzzies to do it.
		*
		* This starts with verifying Euler's criterion for a base of 2.
		* This is the fastest pseudoprimality test that I know of,
		* saving a modular squaring over a Fermat test, as well as
		* being stronger. 7/8 of the time, it's as strong as a strong
		* pseudoprimality test, too. (The exception being when bn ==
		* 1 mod 8 and 2 is a quartic residue, i.e. bn is of the form
		* a^2 + (8*b)^2.) The precise series of tricks used here is
		* not documented anywhere, so here's an explanation.
		* Euler's criterion states that if p is prime then a^((p-1)/2)
		* is congruent to Jacobi(a,p), modulo p. Jacobi(a,p) is
		* a function which is +1 if a is a square modulo p, and -1 if
		* it is not. For a = 2, this is particularly simple. It's
		* +1 if p == +/-1 (mod 8), and -1 if m == +/-3 (mod 8).
		* If p == 3 mod 4, then all a strong test does is compute
		* 2^((p-1)/2). and see if it's +1 or -1. (Euler's criterion
		* says *which* it should be.) If p == 5 (mod 8), then
		* 2^((p-1)/2) is -1, so the initial step in a strong test,
		* looking at 2^((p-1)/4), is wasted - you're not going to
		* find a +/-1 before then if it *is* prime, and it shouldn't
		* have either of those values if it isn't. So don't bother.
		*
		* The remaining case is p == 1 (mod 8). In this case, we
		* expect 2^((p-1)/2) == 1 (mod p), so we expect that the
		* square root of this, 2^((p-1)/4), will be +/-1 (mod p).
		* Evaluating this saves us a modular squaring 1/4 of the time.
		* If it's -1, a strong pseudoprimality test would call p
		* prime as well. Only if the result is +1, indicating that
		* 2 is not only a quadratic residue, but a quartic one as well,
		* does a strong pseudoprimality test verify more things than
		* this test does. Good enough.
		*
		* We could back that down another step, looking at 2^((p-1)/8)
		* if there was a cheap way to determine if 2 were expected to
		* be a quartic residue or not. Dirichlet proved that 2 is
		* a quartic residue iff p is of the form a^2 + (8*b^2).
		* All primes == 1 (mod 4) can be expressed as a^2 + (2*b)^2,
		* but I see no cheap way to evaluate this condition.
		*/
		if (bnCopy(e, bn) < 0)
			return -1;
		(void)bnSubQ(e, 1);
		l = bnLSWord(e);

	j = 1;	 /* Where to start in prime array for strong prime tests */

	if (l & 7) {
	bnRShift(e, 1);
	if (bnTwoExpMod(a, e, bn) < 0)
		return -1;
	if ((l & 7) == 6) {
		/* bn == 7 mod 8, expect +1 */
		if (bnBits(a) != 1)
			 return 1;	/* Not prime */
		k = 1;
	} else {
	/* bn == 3 or 5 mod 8, expect -1 == bn-1 */
	if (bnAddQ(a, 1) < 0)
		return -1;
	if (bnCmp(a, bn) != 0)
		return 1;		/* Not prime */
	k = 1;
	if (l & 4) {
	/* bn == 5 mod 8, make odd for strong tests */
	bnRShift(e, 1);
	k = 2;
}
				 }
			} else {
					/* bn == 1 mod 8, expect 2^((bn-1)/4) == +/-1 mod bn */
					bnRShift(e, 2);
					if (bnTwoExpMod(a, e, bn) < 0)
						return -1;
					if (bnBits(a) == 1) {
						j = 0; /* Re-do strong prime test to base 2 */
					} else {
							if (bnAddQ(a, 1) < 0)
								 return -1;
							if (bnCmp(a, bn) != 0)
								 return 1;		/* Not prime */
					}
					k = 2 + bnMakeOdd(e);
			}
			/* It's prime! Now go on to confirmation tests */

			/*
			* Now, e = (bn-1)/2^k is odd. k >= 1, and has a given value
			* with probability 2^-k, so its expected value is 2.
			* j = 1 in the usual case when the previous test was as good as
			* a strong prime test, but 1/8 of the time, j = 0 because
			* the strong prime test to the base 2 needs to be re-done.
			*/
			for (i = j; i < CONFIRMTESTS; i++) {
					if (f && (err = f(arg, '*')) < 0)
						return err;
					(void)bnSetQ(a, confirm[i]);
					if (bnExpMod(a, a, e, bn) < 0)
						return -1;
					if (bnBits(a) == 1)
						continue;		/* Passed this test */

					l = k;
					for (;;) {
							if (bnAddQ(a, 1) < 0)
								 return -1;
							if (bnCmp(a, bn) == 0)	/* Was result bn-1? */
								 break;	 /* Prime */
							if (!--l)	/* Reached end, not -1? luck? */
								 return i+2-j;	/* Failed, not prime */
						/* This portion is executed, on average, once. */
						(void)bnSubQ(a, 1);	/* Put a back where it was. */
							if (bnSquare(a, a) < 0 || bnMod(a, a, bn) < 0)
								 return -1;
							if (bnBits(a) == 1)
								 return i+2-j;	/* Failed, not prime */
					}
					/* It worked (to the base confirm[i]) */
			}
		
			/* Yes, we've decided that it's prime. */
			if (f && (err = f(arg, '*')) < 0)
				 return err;
			return 0;	/* Prime! */
	}

/*
* Add x*y to bn, which is usually (but not always) < 65536.
* Do it in a simple linear manner.
*/
static int
bnAddMult(struct BigNum *bn, unsigned x, unsigned y)
{
		unsigned long z = (unsigned long)x * y;

		while (z > 65535) {
			if (bnAddQ(bn, 65535) < 0)
				return -1;
			z -= 65535;
		}
		return bnAddQ(bn, (unsigned)z);
}

static int
bnSubMult(struct BigNum *bn, unsigned x, unsigned y)
{
		unsigned long z = (unsigned long)x * y;

		while (z > 65535) {
			if (bnSubQ(bn, 65535) < 0)
				return -1;
			z -= 65535;
		}
		return bnSubQ(bn, (unsigned)z);
}

/*
* Modifies the bignum to return a nearby (slightly larger) number which
* is a probable prime. Returns >=0 on success or -1 on failure (out of
* memory). The return value is the number of unsuccessful modular
* exponentiations performed. This never gives up searching.
*
* All other arguments are optional. They may be NULL. They are:
*
* unsigned (*rand)(unsigned limit)
* For better distributed numbers, supply a non-null pointer to a
* function which returns a random x, 0 <= x < limit. (It may make it
* simpler to know that 0 < limit <= SHUFFLE, so you need at most a byte.)
* The program generates a large window of sieve data and then does
* pseudoprimality tests on the data. If a rand function is supplied,
* the candidates which survive sieving are shuffled with a window of
* size SHUFFLE before testing to increase the uniformity of the prime

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -