Skip to content

Commit 4db24a7

Browse files
authored
Merge pull request #692 from MarekKnapek/turboshake
Add TurboSHAKE XOF functions.
2 parents 34b6ad9 + 2c487a2 commit 4db24a7

File tree

8 files changed

+264
-16
lines changed

8 files changed

+264
-16
lines changed

doc/crypt.tex

Lines changed: 34 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3075,10 +3075,27 @@ \subsection{Hash Registration}
30753075
}
30763076
\end{verbatim}
30773077

3078-
\mysection{SHA3 SHAKE}
3078+
\mysection{Extendable Output Functions (XOF)}
3079+
Some algorithms provide a special XOF (Extendable Output Functions) mode which allow to generate message digests of an arbitrary length.
3080+
3081+
The library supports the following XOFs.
3082+
3083+
\subsection{SHA3 SHAKE}
30793084
The SHA3 class of algorithms provides a special XOF (Extendable Output Functions) mode, called SHAKE.
30803085
SHAKE operates in 2 security configurations, 128bit or 256bit, and allows to generate message digests of an arbitrary length.
30813086

3087+
The API functions are as follows.
3088+
3089+
\begin{small}
3090+
\begin{verbatim}
3091+
int sha3_shake_init(hash_state *md, int num);
3092+
int sha3_shake_process(hash_state * md, const unsigned char *in, unsigned long inlen);
3093+
int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen);
3094+
\end{verbatim}
3095+
\end{small}
3096+
3097+
The process function \code{sha3\_shake\_process()} is implemented as a macro which calls \code{sha3\_process()}.
3098+
30823099
For further information see \url{https://en.wikipedia.org/wiki/SHA-3}
30833100

30843101
Example of using SHAKE256 with an arbitrary length output.
@@ -3110,6 +3127,22 @@ \subsection{Hash Registration}
31103127
\end{verbatim}
31113128
\end{small}
31123129

3130+
\subsection{TurboSHAKE}
3131+
Another variation of SHA3 SHAKE is TurboSHAKE, which has been specified in \href{https://datatracker.ietf.org/doc/rfc9861/}{\texttt{RFC 9861}}.
3132+
3133+
The API works equivalent to the one of SHA3 SHAKE, where the APIs only have a different name.
3134+
3135+
\begin{small}
3136+
\begin{verbatim}
3137+
int turbo_shake_init(hash_state *md, int num);
3138+
int turbo_shake_process(hash_state *md, const unsigned char *in, unsigned long inlen);
3139+
int turbo_shake_done(hash_state *md, unsigned char *out, unsigned long outlen);
3140+
\end{verbatim}
3141+
\end{small}
3142+
3143+
The init function \code{turbo\_shake\_init()} is implemented as a macro which calls \code{sha3\_shake\_init()}.
3144+
3145+
31133146
\mysection{Extended Tiger API}
31143147

31153148
The Tiger and Tiger2 hash algorithms \url{http://www.cs.technion.ac.il/~biham/Reports/Tiger/} specify the possibility to run the algorithm with

src/hashes/sha3.c

Lines changed: 50 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,9 @@ const struct ltc_hash_descriptor keccak_512_desc =
130130

131131
#define SHA3_KECCAK_SPONGE_WORDS 25 /* 1600 bits > 200 bytes > 25 x ulong64 */
132132
#define SHA3_KECCAK_ROUNDS 24
133+
#define SHA3_KECCAK_RC_OFFSET 0
134+
#define SHA3_KECCAK_TURBO_ROUNDS 12
135+
#define SHA3_KECCAK_TURBO_RC_OFFSET 12
133136

134137
static const ulong64 s_keccakf_rndc[24] = {
135138
CONST64(0x0000000000000001), CONST64(0x0000000000008082),
@@ -154,12 +157,12 @@ static const unsigned s_keccakf_piln[24] = {
154157
10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4, 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1
155158
};
156159

157-
static void s_keccakf(ulong64 s[25])
160+
static LTC_INLINE void s_keccak_f(ulong64 s[25], int max_rounds, int rc_offset)
158161
{
159162
int i, j, round;
160163
ulong64 t, bc[5];
161164

162-
for(round = 0; round < SHA3_KECCAK_ROUNDS; round++) {
165+
for(round = 0; round < max_rounds; round++) {
163166
/* Theta */
164167
for(i = 0; i < 5; i++) {
165168
bc[i] = s[i] ^ s[i + 5] ^ s[i + 10] ^ s[i + 15] ^ s[i + 20];
@@ -188,10 +191,23 @@ static void s_keccakf(ulong64 s[25])
188191
}
189192
}
190193
/* Iota */
191-
s[0] ^= s_keccakf_rndc[round];
194+
s[0] ^= s_keccakf_rndc[rc_offset + round];
192195
}
193196
}
194197

198+
static void s_keccakf(ulong64 s[25])
199+
{
200+
s_keccak_f(s, SHA3_KECCAK_ROUNDS, SHA3_KECCAK_RC_OFFSET);
201+
}
202+
203+
#if defined LTC_TURBO_SHAKE
204+
static void s_keccak_turbo_f(ulong64 s[25])
205+
{
206+
s_keccak_f(s, SHA3_KECCAK_TURBO_ROUNDS, SHA3_KECCAK_TURBO_RC_OFFSET);
207+
}
208+
#endif
209+
210+
195211
static LTC_INLINE int ss_done(hash_state *md, unsigned char *hash, ulong64 pad)
196212
{
197213
unsigned i;
@@ -257,7 +273,8 @@ int sha3_shake_init(hash_state *md, int num)
257273
}
258274
#endif
259275

260-
int sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen)
276+
typedef void (*process_fn)(ulong64 s[25]);
277+
static LTC_INLINE int s_sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen, process_fn proc_f)
261278
{
262279
/* 0...7 -- how much is needed to have a word */
263280
unsigned old_tail = (8 - md->sha3.byte_index) & 7;
@@ -283,7 +300,7 @@ int sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen)
283300
md->sha3.byte_index = 0;
284301
md->sha3.saved = 0;
285302
if(++md->sha3.word_index == (SHA3_KECCAK_SPONGE_WORDS - md->sha3.capacity_words)) {
286-
s_keccakf(md->sha3.s);
303+
proc_f(md->sha3.s);
287304
md->sha3.word_index = 0;
288305
}
289306
}
@@ -297,7 +314,7 @@ int sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen)
297314
LOAD64L(t, in);
298315
md->sha3.s[md->sha3.word_index] ^= t;
299316
if(++md->sha3.word_index == (SHA3_KECCAK_SPONGE_WORDS - md->sha3.capacity_words)) {
300-
s_keccakf(md->sha3.s);
317+
proc_f(md->sha3.s);
301318
md->sha3.word_index = 0;
302319
}
303320
}
@@ -309,6 +326,18 @@ int sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen)
309326
return CRYPT_OK;
310327
}
311328

329+
int sha3_process(hash_state *md, const unsigned char *in, unsigned long inlen)
330+
{
331+
return s_sha3_process(md, in, inlen, s_keccakf);
332+
}
333+
334+
#if defined LTC_TURBO_SHAKE
335+
int turbo_shake_process(hash_state *md, const unsigned char *in, unsigned long inlen)
336+
{
337+
return s_sha3_process(md, in, inlen, s_keccak_turbo_f);
338+
}
339+
#endif
340+
312341
#ifdef LTC_SHA3
313342
int sha3_done(hash_state *md, unsigned char *out)
314343
{
@@ -324,7 +353,7 @@ int keccak_done(hash_state *md, unsigned char *out)
324353
#endif
325354

326355
#ifdef LTC_SHA3
327-
int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
356+
static LTC_INLINE int s_sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen, process_fn proc_f)
328357
{
329358
/* IMPORTANT NOTE: sha3_shake_done can be called many times */
330359
unsigned long idx;
@@ -338,7 +367,7 @@ int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
338367
/* shake_xof operation must be done only once */
339368
md->sha3.s[md->sha3.word_index] ^= (md->sha3.saved ^ (CONST64(0x1F) << (md->sha3.byte_index * 8)));
340369
md->sha3.s[SHA3_KECCAK_SPONGE_WORDS - md->sha3.capacity_words - 1] ^= CONST64(0x8000000000000000);
341-
s_keccakf(md->sha3.s);
370+
proc_f(md->sha3.s);
342371
/* store sha3.s[] as little-endian bytes into sha3.sb */
343372
for(i = 0; i < SHA3_KECCAK_SPONGE_WORDS; i++) {
344373
STORE64L(md->sha3.s[i], md->sha3.sb + i * 8);
@@ -349,7 +378,7 @@ int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
349378

350379
for (idx = 0; idx < outlen; idx++) {
351380
if(md->sha3.byte_index >= (SHA3_KECCAK_SPONGE_WORDS - md->sha3.capacity_words) * 8) {
352-
s_keccakf(md->sha3.s);
381+
proc_f(md->sha3.s);
353382
/* store sha3.s[] as little-endian bytes into sha3.sb */
354383
for(i = 0; i < SHA3_KECCAK_SPONGE_WORDS; i++) {
355384
STORE64L(md->sha3.s[i], md->sha3.sb + i * 8);
@@ -361,6 +390,18 @@ int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
361390
return CRYPT_OK;
362391
}
363392

393+
int sha3_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
394+
{
395+
return s_sha3_shake_done(md, out, outlen, s_keccakf);
396+
}
397+
398+
#if defined LTC_TURBO_SHAKE
399+
int turbo_shake_done(hash_state *md, unsigned char *out, unsigned long outlen)
400+
{
401+
return s_sha3_shake_done(md, out, outlen, s_keccak_turbo_f);
402+
}
403+
#endif
404+
364405
int sha3_shake_memory(int num, const unsigned char *in, unsigned long inlen, unsigned char *out, const unsigned long *outlen)
365406
{
366407
hash_state md;

src/hashes/sha3_test.c

Lines changed: 160 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -388,6 +388,166 @@ int sha3_shake_test(void)
388388
#endif
389389
}
390390

391+
#ifdef LTC_TURBO_SHAKE
392+
int turbo_shake_test(void)
393+
{
394+
#ifndef LTC_TEST
395+
return CRYPT_NOP;
396+
#else
397+
int counter;
398+
unsigned char hash[64];
399+
hash_state c;
400+
int i;
401+
402+
/* https://datatracker.ietf.org/doc/html/rfc9861#name-test-vectors */
403+
/* https://www.rfc-editor.org/rfc/rfc9861.txt */
404+
const unsigned char turbo_shake_input_single_zero[] = {
405+
0x00,
406+
};
407+
const unsigned char turbo_shake_input_ptn_17_pow_1[] = {
408+
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
409+
0x10,
410+
};
411+
const unsigned char turbo_shake_input_ptn_17_pow_2[] = {
412+
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
413+
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
414+
0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f,
415+
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f,
416+
0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f,
417+
0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f,
418+
0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f,
419+
0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f,
420+
0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f,
421+
0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f,
422+
0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf,
423+
0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
424+
0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
425+
0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf,
426+
0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
427+
0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa,
428+
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
429+
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
430+
0x20, 0x21, 0x22, 0x23, 0x24, 0x25,
431+
};
432+
433+
const unsigned char turbo_shake_128_empty[64] = {
434+
0x1e, 0x41, 0x5f, 0x1c, 0x59, 0x83, 0xaf, 0xf2, 0x16, 0x92, 0x17, 0x27, 0x7d, 0x17, 0xbb, 0x53,
435+
0x8c, 0xd9, 0x45, 0xa3, 0x97, 0xdd, 0xec, 0x54, 0x1f, 0x1c, 0xe4, 0x1a, 0xf2, 0xc1, 0xb7, 0x4c,
436+
0x3e, 0x8c, 0xca, 0xe2, 0xa4, 0xda, 0xe5, 0x6c, 0x84, 0xa0, 0x4c, 0x23, 0x85, 0xc0, 0x3c, 0x15,
437+
0xe8, 0x19, 0x3b, 0xdf, 0x58, 0x73, 0x73, 0x63, 0x32, 0x16, 0x91, 0xc0, 0x54, 0x62, 0xc8, 0xdf,
438+
};
439+
const unsigned char turbo_shake_128_empty_10032[32] = {
440+
0xa3, 0xb9, 0xb0, 0x38, 0x59, 0x00, 0xce, 0x76, 0x1f, 0x22, 0xae, 0xd5, 0x48, 0xe7, 0x54, 0xda,
441+
0x10, 0xa5, 0x24, 0x2d, 0x62, 0xe8, 0xc6, 0x58, 0xe3, 0xf3, 0xa9, 0x23, 0xa7, 0x55, 0x56, 0x07,
442+
};
443+
const unsigned char turbo_shake_128_single_zero_byte[32] = {
444+
0x55, 0xce, 0xdd, 0x6f, 0x60, 0xaf, 0x7b, 0xb2, 0x9a, 0x40, 0x42, 0xae, 0x83, 0x2e, 0xf3, 0xf5,
445+
0x8d, 0xb7, 0x29, 0x9f, 0x89, 0x3e, 0xbb, 0x92, 0x47, 0x24, 0x7d, 0x85, 0x69, 0x58, 0xda, 0xa9,
446+
};
447+
const unsigned char turbo_shake_128_ptn_pow_1[32] = {
448+
0x9c, 0x97, 0xd0, 0x36, 0xa3, 0xba, 0xc8, 0x19, 0xdb, 0x70, 0xed, 0xe0, 0xca, 0x55, 0x4e, 0xc6,
449+
0xe4, 0xc2, 0xa1, 0xa4, 0xff, 0xbf, 0xd9, 0xec, 0x26, 0x9c, 0xa6, 0xa1, 0x11, 0x16, 0x12, 0x33,
450+
};
451+
const unsigned char turbo_shake_128_ptn_pow_2[32] = {
452+
0x96, 0xc7, 0x7c, 0x27, 0x9e, 0x01, 0x26, 0xf7, 0xfc, 0x07, 0xc9, 0xb0, 0x7f, 0x5c, 0xda, 0xe1,
453+
0xe0, 0xbe, 0x60, 0xbd, 0xbe, 0x10, 0x62, 0x00, 0x40, 0xe7, 0x5d, 0x72, 0x23, 0xa6, 0x24, 0xd2,
454+
};
455+
456+
const unsigned char turbo_shake_256_empty[64] = {
457+
0x36, 0x7a, 0x32, 0x9d, 0xaf, 0xea, 0x87, 0x1c, 0x78, 0x02, 0xec, 0x67, 0xf9, 0x05, 0xae, 0x13,
458+
0xc5, 0x76, 0x95, 0xdc, 0x2c, 0x66, 0x63, 0xc6, 0x10, 0x35, 0xf5, 0x9a, 0x18, 0xf8, 0xe7, 0xdb,
459+
0x11, 0xed, 0xc0, 0xe1, 0x2e, 0x91, 0xea, 0x60, 0xeb, 0x6b, 0x32, 0xdf, 0x06, 0xdd, 0x7f, 0x00,
460+
0x2f, 0xba, 0xfa, 0xbb, 0x6e, 0x13, 0xec, 0x1c, 0xc2, 0x0d, 0x99, 0x55, 0x47, 0x60, 0x0d, 0xb0,
461+
};
462+
const unsigned char turbo_shake_256_empty_10032[32] = {
463+
0xab, 0xef, 0xa1, 0x16, 0x30, 0xc6, 0x61, 0x26, 0x92, 0x49, 0x74, 0x26, 0x85, 0xec, 0x08, 0x2f,
464+
0x20, 0x72, 0x65, 0xdc, 0xcf, 0x2f, 0x43, 0x53, 0x4e, 0x9c, 0x61, 0xba, 0x0c, 0x9d, 0x1d, 0x75,
465+
};
466+
const unsigned char turbo_shake_256_single_zero_byte[64] = {
467+
0x3e, 0x17, 0x12, 0xf9, 0x28, 0xf8, 0xea, 0xf1, 0x05, 0x46, 0x32, 0xb2, 0xaa, 0x0a, 0x24, 0x6e,
468+
0xd8, 0xb0, 0xc3, 0x78, 0x72, 0x8f, 0x60, 0xbc, 0x97, 0x04, 0x10, 0x15, 0x5c, 0x28, 0x82, 0x0e,
469+
0x90, 0xcc, 0x90, 0xd8, 0xa3, 0x00, 0x6a, 0xa2, 0x37, 0x2c, 0x5c, 0x5e, 0xa1, 0x76, 0xb0, 0x68,
470+
0x2b, 0xf2, 0x2b, 0xae, 0x74, 0x67, 0xac, 0x94, 0xf7, 0x4d, 0x43, 0xd3, 0x9b, 0x04, 0x82, 0xe2,
471+
};
472+
const unsigned char turbo_shake_256_ptn_pow_1[64] = {
473+
0xb3, 0xba, 0xb0, 0x30, 0x0e, 0x6a, 0x19, 0x1f, 0xbe, 0x61, 0x37, 0x93, 0x98, 0x35, 0x92, 0x35,
474+
0x78, 0x79, 0x4e, 0xa5, 0x48, 0x43, 0xf5, 0x01, 0x10, 0x90, 0xfa, 0x2f, 0x37, 0x80, 0xa9, 0xe5,
475+
0xcb, 0x22, 0xc5, 0x9d, 0x78, 0xb4, 0x0a, 0x0f, 0xbf, 0xf9, 0xe6, 0x72, 0xc0, 0xfb, 0xe0, 0x97,
476+
0x0b, 0xd2, 0xc8, 0x45, 0x09, 0x1c, 0x60, 0x44, 0xd6, 0x87, 0x05, 0x4d, 0xa5, 0xd8, 0xe9, 0xc7,
477+
};
478+
const unsigned char turbo_shake_256_ptn_pow_2[64] = {
479+
0x66, 0xb8, 0x10, 0xdb, 0x8e, 0x90, 0x78, 0x04, 0x24, 0xc0, 0x84, 0x73, 0x72, 0xfd, 0xc9, 0x57,
480+
0x10, 0x88, 0x2f, 0xde, 0x31, 0xc6, 0xdf, 0x75, 0xbe, 0xb9, 0xd4, 0xcd, 0x93, 0x05, 0xcf, 0xca,
481+
0xe3, 0x5e, 0x7b, 0x83, 0xe8, 0xb7, 0xe6, 0xeb, 0x4b, 0x78, 0x60, 0x58, 0x80, 0x11, 0x63, 0x16,
482+
0xfe, 0x2c, 0x07, 0x8a, 0x09, 0xb9, 0x4a, 0xd7, 0xb8, 0x21, 0x3c, 0x0a, 0x73, 0x8b, 0x65, 0xc0,
483+
};
484+
485+
counter = 0;
486+
487+
/* TurboSHAKE128 on an empty buffer */
488+
turbo_shake_init(&c, 128);
489+
turbo_shake_done(&c, hash, 64);
490+
LTC_COMPARE_TESTVECTOR(hash, 64, turbo_shake_128_empty, sizeof(turbo_shake_128_empty), "TurboSHAKE128", counter++);
491+
492+
/* TurboSHAKE128 on an empty buffer, digest length 10032 bytes, test last 32 bytes */
493+
turbo_shake_init(&c, 128);
494+
for(i = 0; i != 10000 / 10; ++i){ turbo_shake_done(&c, hash, 10); }
495+
turbo_shake_done(&c, hash, 32);
496+
LTC_COMPARE_TESTVECTOR(hash, 32, turbo_shake_128_empty_10032, sizeof(turbo_shake_128_empty_10032), "TurboSHAKE128", counter++);
497+
498+
/* TurboSHAKE128 on single zero byte */
499+
turbo_shake_init(&c, 128);
500+
turbo_shake_process(&c, turbo_shake_input_single_zero, sizeof(turbo_shake_input_single_zero));
501+
turbo_shake_done(&c, hash, 32);
502+
LTC_COMPARE_TESTVECTOR(hash, 32, turbo_shake_128_single_zero_byte, sizeof(turbo_shake_128_single_zero_byte), "TurboSHAKE128", counter++);
503+
504+
/* TurboSHAKE128 on ptn(17**1) */
505+
turbo_shake_init(&c, 128);
506+
turbo_shake_process(&c, turbo_shake_input_ptn_17_pow_1, sizeof(turbo_shake_input_ptn_17_pow_1));
507+
turbo_shake_done(&c, hash, 32);
508+
LTC_COMPARE_TESTVECTOR(hash, 32, turbo_shake_128_ptn_pow_1, sizeof(turbo_shake_128_ptn_pow_1), "TurboSHAKE128", counter++);
509+
510+
/* TurboSHAKE128 on ptn(17**2) */
511+
turbo_shake_init(&c, 128);
512+
turbo_shake_process(&c, turbo_shake_input_ptn_17_pow_2, sizeof(turbo_shake_input_ptn_17_pow_2));
513+
turbo_shake_done(&c, hash, 32);
514+
LTC_COMPARE_TESTVECTOR(hash, 32, turbo_shake_128_ptn_pow_2, sizeof(turbo_shake_128_ptn_pow_2), "TurboSHAKE128", counter++);
515+
516+
517+
/* TurboSHAKE256 on an empty buffer */
518+
turbo_shake_init(&c, 256);
519+
turbo_shake_done(&c, hash, 64);
520+
LTC_COMPARE_TESTVECTOR(hash, 64, turbo_shake_256_empty, sizeof(turbo_shake_256_empty), "TurboSHAKE256", counter++);
521+
522+
/* TurboSHAKE256 on an empty buffer, digest length 10032 bytes, test last 32 bytes */
523+
turbo_shake_init(&c, 256);
524+
for(i = 0; i != 10000 / 10; ++i){ turbo_shake_done(&c, hash, 10); }
525+
turbo_shake_done(&c, hash, 32);
526+
LTC_COMPARE_TESTVECTOR(hash, 32, turbo_shake_256_empty_10032, sizeof(turbo_shake_256_empty_10032), "TurboSHAKE256", counter++);
527+
528+
/* TurboSHAKE256 on single zero byte */
529+
turbo_shake_init(&c, 256);
530+
turbo_shake_process(&c, turbo_shake_input_single_zero, sizeof(turbo_shake_input_single_zero));
531+
turbo_shake_done(&c, hash, 64);
532+
LTC_COMPARE_TESTVECTOR(hash, 64, turbo_shake_256_single_zero_byte, sizeof(turbo_shake_256_single_zero_byte), "TurboSHAKE256", counter++);
533+
534+
/* TurboSHAKE256 on ptn(17**1) */
535+
turbo_shake_init(&c, 256);
536+
turbo_shake_process(&c, turbo_shake_input_ptn_17_pow_1, sizeof(turbo_shake_input_ptn_17_pow_1));
537+
turbo_shake_done(&c, hash, 64);
538+
LTC_COMPARE_TESTVECTOR(hash, 64, turbo_shake_256_ptn_pow_1, sizeof(turbo_shake_256_ptn_pow_1), "TurboSHAKE256", counter++);
539+
540+
/* TurboSHAKE256 on ptn(17**2) */
541+
turbo_shake_init(&c, 256);
542+
turbo_shake_process(&c, turbo_shake_input_ptn_17_pow_2, sizeof(turbo_shake_input_ptn_17_pow_2));
543+
turbo_shake_done(&c, hash, 64);
544+
LTC_COMPARE_TESTVECTOR(hash, 64, turbo_shake_256_ptn_pow_2, sizeof(turbo_shake_256_ptn_pow_2), "TurboSHAKE256", counter++);
545+
546+
return CRYPT_OK;
547+
#endif
548+
}
549+
#endif
550+
391551
#endif
392552

393553
#ifdef LTC_KECCAK

src/headers/tomcrypt_custom.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -258,6 +258,7 @@
258258
#define LTC_WHIRLPOOL
259259
#define LTC_SHA3
260260
#define LTC_KECCAK
261+
#define LTC_TURBO_SHAKE
261262
#define LTC_SHA512
262263
#define LTC_SHA512_256
263264
#define LTC_SHA512_224

src/headers/tomcrypt_hash.h

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,13 @@ int keccak_224_test(void);
302302
int keccak_done(hash_state *md, unsigned char *out);
303303
#endif
304304

305+
#ifdef LTC_TURBO_SHAKE
306+
#define turbo_shake_init(a, b) sha3_shake_init(a, b)
307+
int turbo_shake_process(hash_state *md, const unsigned char *in, unsigned long inlen);
308+
int turbo_shake_done(hash_state *md, unsigned char *out, unsigned long outlen);
309+
int turbo_shake_test(void);
310+
#endif
311+
305312
#ifdef LTC_SHA512
306313
int sha512_init(hash_state * md);
307314
int sha512_process(hash_state * md, const unsigned char *in, unsigned long inlen);

0 commit comments

Comments
 (0)