classic-mceliece-rust

This is a pure-rust safe-rust implementation of the Classic McEliece post-quantum scheme.

The 10 variants have the following designated identifiers:

Who should use it?

Anyone, how wants to use Classic McEliece to negotiate a key between two parties.

How does one use it storing keys on the heap (default feature alloc)?

Add this to your Cargo.toml: toml [dependencies] classic-mceliece-rust = "3.0"

To use a specific Classic McEliece variant, you need to import it with the corresponding feature flag:

toml [dependencies] classic-mceliece-rust = { version = "3.0", features = ["mceliece6960119"] }

Assuming this dependency, the simplest and most ergonomic way of using the library is with heap allocated keys and the *_boxed KEM step functions. First, we import them:

```rust

[cfg(feature = "alloc")]

use classicmceliecerust::{keypairboxed, encapsulateboxed, decapsulate_boxed}; ```

Followingly, we run the KEM and provide generated keys accordingly. Here, we consider an example where we run it in a separate thread (be aware that the example also depends on the rand crate):

```rust

[cfg(feature = "alloc")] {

use classicmceliecerust::{keypairboxed, encapsulateboxed, decapsulate_boxed};

fn runkem() { let mut rng = rand::threadrng();

// Alice computes the keypair
let (public_key, secret_key) = keypair_boxed(&mut rng);

// Send `secret_key` over to Bob.
// Bob computes the shared secret and a ciphertext
let (ciphertext, shared_secret_bob) = encapsulate_boxed(&public_key, &mut rng);

// Send `ciphertext` back to Alice.
// Alice decapsulates the ciphertext...
let shared_secret_alice = decapsulate_boxed(&ciphertext, &secret_key);

// ... and ends up with the same key material as Bob.
assert_eq!(shared_secret_bob.as_array(), shared_secret_alice.as_array());

}

fn main() { std::thread::Builder::new() // This library needs quite a lot of stack space to work .stacksize(2 * 1024 * 1024) .spawn(runkem) .unwrap() .join() .unwrap(); } } ```

Pay attention that public keys in Classic McEliece are huge (between 255 KB and 1.3 MB). As a result, running the algorithm requires a lot of memory. You need to consider where you store it. In case of this API, the advantages are …

How does one use it storing keys on the stack (disabled feature alloc)?

The other option is that you exclude the heap-allocation API and use the provided stack-allocation API. Its advantages are:

Thus, in this section we want to show you how to use this API without the heap. For this, you need to disable feature alloc which is enabled per default (this line retains default feature zeroize but removes default feature alloc):

toml classic-mceliece-rust = { version = "3.0", default-features = false, features = ["zeroize"] }

How does one use the API then (be aware that the example also depends on the rand crate)?

```rust,norun use classicmceliecerust::{keypair, encapsulate, decapsulate}; use classicmceliecerust::{CRYPTOBYTES, CRYPTOPUBLICKEYBYTES, CRYPTOSECRETKEYBYTES};

fn main() { let mut rng = rand::thread_rng();

// Please mind that public_key_buf is very large. let mut publickeybuf = [0u8; CRYPTOPUBLICKEYBYTES]; let mut secretkeybuf = [0u8; CRYPTOSECRETKEYBYTES]; let (publickey, secretkey) = keypair(&mut publickeybuf, &mut secretkeybuf, &mut rng);

let mut sharedsecretbobbuf = [0u8; CRYPTOBYTES]; let (ciphertext, sharedsecretbob) = encapsulate(&publickey, &mut sharedsecretbobbuf, &mut rng);

let mut sharedsecretalicebuf = [0u8; CRYPTOBYTES]; let sharedsecretalice = decapsulate(&ciphertext, &secretkey, &mut sharedsecretalicebuf);

asserteq!(sharedsecretbob.asarray(), sharedsecretalice.as_array()); } ```

Here, you can see how the keys are allocated explicitly.

A remark on Windows

If you want your program to be portable with stack allocation and not unexpectedly crash, you should probably run the entire key exchange in a dedicated thread with a large enough stack size. This code snippet shows the idea:

rust,no_run std::thread::Builder::new() .stack_size(4 * 1024 * 1024) .spawn(|| {/* Run the KEM here */}) .unwrap();

Feature kem: RustCrypto APIs

If the kem feature is enabled, key encapsulation and decapsulation can also be done via the standard traits in the kem crate.

Feature zeroize: Clear out secrets from memory

If the zeroize feature is enabled (it is by default), all key types that contain anything secret implements Zeroize and ZeroizeOnDrop. This makes them clear their memory when they go out of scope, and lowers the risk of secret key material leaking in one way or another.

Please mind that this of course makes any buffers you pass into the library useless for reading out the key from. Instead of trying to fetch the key material from the buffers you pass in, get it from the as_array method.

```rust

[cfg(not(windows))] {

use classic_mceliece_rust::keypair;
use classic_mceliece_rust::{CRYPTO_PUBLICKEYBYTES, CRYPTO_SECRETKEYBYTES};

let mut rng = rand::thread_rng();

let mut pk_buf = [0u8; CRYPTO_PUBLICKEYBYTES];
// Initialize to non-zero to show that it has been set to zero by the drop later
let mut sk_buf = [255u8; CRYPTO_SECRETKEYBYTES];

// This is the WRONG way of accessing your keys. The buffer will
// be cleared once the `PrivateKey` returned from `keypair` goes out of scope.
// You should not rely on that array for anything except providing a temporary storage
// location to this library.
#[cfg(feature = "zeroize")]
{
    let (_, secret_key) = keypair(&mut pk_buf, &mut sk_buf, &mut rng);
    drop(secret_key);
    // Ouch! The array only has zeroes now.
    assert_eq!(sk_buf, [0; CRYPTO_SECRETKEYBYTES]);
}

// Correct way of getting the secret key bytes if you do need them. However,
// if you want the secrets to stay secret, you should try to not read them out of their
// storage at all
{
    let (_, secret_key) = keypair(&mut pk_buf, &mut sk_buf, &mut rng);
    assert_ne!(secret_key.as_array(), &[0; CRYPTO_SECRETKEYBYTES]);
}

} ```

How does one run it?

This library comes with two examples:

bash $ cargo run --example basic

The output annotates messages with Alice/Bob to illustrate which data is processed by which party. The katkem example implements the classic request/response file structure which is part of the NIST PQC framework.

bash $ cargo run --example katkem PQCkemKAT_935.req PQCkemKAT_935.rsp $ cargo run --example katkem PQCkemKAT_935.rsp

The different variants can be enabled through feature flags:

bash $ cargo run --example katkem --features mceliece6960119 -- PQCkemKAT_1450.req PQCkemKAT_1450.rsp

mceliece348864 is the default variant. You cannot enable two variants simultaneously.

How fast is it?

All data uses clock cycles as unit (the smaller the better). The rust implementation v2.0.0 yielded the following runtime results:

complete KEMkeypairencdec
mceliece348864460,062,191439,682,143222,42442,046,357
mceliece348864f244,943,900203,564,820215,97141,648,773
mceliece4608961,326,425,7841,434,864,061487,522111,547,716
mceliece460896f789,636,856652,117,200553,301106,521,703
mceliece66881283,188,205,2662,596,052,574785,763202,774,928
mceliece6688128f1,236,809,0201,059,087,715826,899203,907,226
mceliece69601192,639,852,5732,532,146,1263,864,285203,959,009
mceliece6960119f1,165,079,187965,134,5463,416,795197,089,546
mceliece81921283,129,183,2622,754,933,130965,822247,083,745
mceliece8192128f1,342,438,4511,150,297,5951,068,317242,545,160

The C reference implementation yielded the following runtime results:

complete KEMkeypairencdec
mceliece348864434,103,000437,187,000187,55773,801,300
mceliece348864f252,423,000180,235,000189,52273,668,000
mceliece460896760,993,000894,497,000298,041154,507,000
mceliece460896f606,225,00044,906,000297,743154,013,000
mceliece66881281,568,900,0001,780,660,000425,50429,575,000
mceliece6688128f109,471,000760,298,000414,358298,173,000
mceliece69601193,405,730,0001,694,410,000840,598287,154,000
mceliece6960119f1,311,130,000942,987,000984,660303,543,000
mceliece81921281,635,550,000760,619,000428,112361,999,000
mceliece8192128f1,772,530,0001,222,720,000534,503392,729,000

The tests were done on a Lenovo Thinkpad x260 (Intel Core i5-6200U CPU @ 2.30GHz). In the case of rust, criterion 0.3.5 has been used as given in benches/ and in case of C, Google's benchmark with PFM support and disabled CPU frequency scaling. You can run the benchmark suite yourself with the bench subcommand and optionally some variant feature flag:

bash $ cargo bench --features mceliece348864

For optimal benchmark results you can run the rust benchmarks with CPU optimization using RUSTFLAGS="-C target-cpu=native", setting the cargo bench optimization profile to opt-level = 3 and set link time optimizations to lto = "fat". For further insight into the cargo bench settings refer to the official cargo bench profile documentation.

Is it correct?

Yes, besides passing unittests (derived from the C implementation), the generated KAT KEM test files have equivalent MD5 hashes. Namely …

variantexpected MD5 hash
mceliece34886411fd67ba1e2b93cceaec6f5e6fe4ddd1
mceliece348864f7a6f5262fa013fe7eedda0765a625789
mceliece460896c9acefa82aa705cd324f12df532744c2
mceliece460896fcb08e0e3f2122c62692111d684f1cbe7
mceliece66881287e300cc0990b05f5edca3219ac769023
mceliece6688128f6d959c2bf54f7d3576a8e49475a74df5
mceliece6960119b4960a35e249d55fd48371f793608aa5
mceliece6960119f2f5d759cb579c6f85c1ee1306082ffdf
mceliece819212826a47e6d01eec28e91abfdbdf19c3067
mceliece8192128fa4cd676dc2c774d644f18de05762c51c

Where is the source code?

On github.

What is the content's license?

MIT License

Changelog

Please see the changelog

Where can I ask you to fix a bug?

On github.