Crates.io | dilithium-raw |
lib.rs | dilithium-raw |
version | 0.1.0 |
source | src |
created_at | 2022-07-23 09:38:03.836226 |
updated_at | 2022-07-23 09:38:03.836226 |
description | Low level library for dilithium signatures |
homepage | |
repository | https://github.com/niluxv/dilithium-raw |
max_upload_size | |
id | 631349 |
size | 1,614,988 |
Low level library for post-quantum signature scheme dilithium.
Uses a slightly modified version of the C code of pqclean
as the actual implementation, which is compiled by a build script. The API is modified to put the user in control of required randomness.
The library has a minimal set of dependencies: in the default configuration (without serde
support) only cty
.
Warning: This crate is intended as a lower level crate implementing a primitive and exposing “not hard to misuse” APIs to provide the user with maximum control. Only use if you know what you are doing! Always read security sections in the documentation. Otherwise use a higher level wrapper.
Warning: This crate has not been audited for correctness. The C code is copied from the well-regarded pqclean
project, but since then modifications have been made.
USE AT YOUR OWN RISK!
The API is located in the dilithiumX
module, for X in {2, 3, 5}. To generate a keypair, use generate_keypair
. Note: it requires a buffer filled with cryptographically secure random bytes. The random buffer is not modified, so zeroization is left to the user. Example:
use dilithium_raw::dilithium5::generate_keypair;
use rand::rngs::OsRng;
use rand::Rng;
use zeroize::Zeroize;
// fill buffer of 128 bytes with secure random data
let mut random = [0; 128];
OsRng.fill(&mut random[..]);
// generate keypair
let (pubkey, seckey) = generate_keypair(&mut random);
// zeroize the buffer with random data
random.zeroize();
To sign a message using the secret key, use sign
and to verify it using the public key, use verify
. verify
returns Ok
for a valid signature and Err
for an invalid signature. Example:
use dilithium_raw::dilithium5::{sign, verify};
// snip, get a `pubkey` and `seckey` with the public and secret key respectively
let msg = "hello world";
let sig = sign(msg, &seckey);
assert!(verify(msg, &sig, &pubkey).is_ok());