Skip to content
Snippets Groups Projects
nettle.texinfo 79.4 KiB
Newer Older
  • Learn to ignore specific revisions
  • \input texinfo          @c -*-texinfo-*-
    
    @c %**start of header
    @setfilename nettle.info
    @settitle The Nettle low-level cryptographic library.
    @c %**end of header
    
    
    @footnotestyle end
    
    @syncodeindex fn cp
    
    @dircategory GNU Libraries
    @direntry
    * Nettle: (nettle).           A low-level cryptographics library.
    @end direntry
    
    
    @set UPDATED-FOR 1.5
    
    @c Latin-1 doesn't work with TeX output.
    
    @c Also lookout for é characters.
    
    @set AUTHOR Niels Möller
    @ifinfo
    Draft manual for the Nettle library. This manual corresponds to version
    @value{UPDATED-FOR}.
    
    Copyright 2001 @value{AUTHOR}
    
    Permission is granted to make and distribute verbatim
    copies of this manual provided the copyright notice and
    this permission notice are preserved on all copies.
    
    @ignore
    Permission is granted to process this file through TeX
    and print the results, provided the printed document
    carries a copying permission notice identical to this
    one except for the removal of this paragraph (this
    paragraph not being relevant to the printed manual).
    
    @end ignore
    Permission is granted to copy and distribute modified
    versions of this manual under the conditions for
    verbatim copying, provided also that the sections
    entitled ``Copying'' and ``GNU General Public License''
    are included exactly as in the original, and provided
    that the entire resulting derived work is distributed
    under the terms of a permission notice identical to this
    one.
    
    Permission is granted to copy and distribute
    translations of this manual into another language,
    under the above conditions for modified versions,
    except that this permission notice may be stated in a
    translation approved by the Free Software Foundation.
    
    @end ifinfo
    
    @titlepage
    @sp 10
    @c @center @titlefont{Nettle Manual}
    
    @title Nettle Manual
    @subtitle For the Nettle Library version @value{UPDATED-FOR}
    
    @author @value{AUTHOR}
    
    @c The following two commands start the copyright page.
    @page
    @vskip 0pt plus 1filll
    Copyright @copyright{} 2001 @value{AUTHOR}
    
    Permission is granted to make and distribute verbatim
    copies of this manual provided the copyright notice and
    this permission notice are preserved on all copies.
    
    Permission is granted to copy and distribute modified
    versions of this manual under the conditions for
    verbatim copying, provided also that the sections
    entitled ``Copying'' and ``GNU General Public License''
    are included exactly as in the original, and provided
    that the entire resulting derived work is distributed
    under the terms of a permission notice identical to this
    one.
    
    Permission is granted to copy and distribute
    translations of this manual into another language,
    under the above conditions for modified versions,
    except that this permission notice may be stated in a
    translation approved by the Free Software Foundation.
    
    @end titlepage
    
    
    @ifnottex
    @node     Top, Introduction, (dir), (dir)
    @comment  node-name,  next,  previous,  up
    
    
    This document describes the nettle low-level cryptographic library. You
    
    Niels Möller's avatar
    Niels Möller committed
    can use the library directly from your C programs, or (recommended)
    
    write or use an object-oriented wrapper for your favorite language or
    
    application.
    
    
    This manual corresponds to version @value{UPDATED-FOR} of the library.
    
    * Introduction::                What is Nettle?
    * Copyright::                   Your rights.
    
    * Conventions::                 
    * Example::                     
    
    * Reference::                   All Nettle functions and features.
    * Nettle soup::                 For the serious nettle hacker.
    * Installation::                How to install Nettle.
    
    * Index::                       
    @end menu
    
    @end ifnottex
    
    @node Introduction, Copyright, Top, Top
    @comment  node-name,  next,  previous,  up
    @chapter Introduction
    
    Nettle is a cryptographic library that is designed to fit easily in more
    or less any context: In crypto toolkits for object-oriented languages
    (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in
    kernel space. In most contexts, you need more than the basic
    cryptographic algorithms, you also need some way to keep track of available
    algorithms, their properties and variants. You often have some algorithm
    selection process, often dictated by a protocol you want to implement.
    
    
    And as the requirements of applications differ in subtle and not so
    
    subtle ways, an API that fits one application well can be a pain to use
    in a different context. And that is why there are so many different
    cryptographic libraries around.
    
    Nettle tries to avoid this problem by doing one thing, the low-level
    crypto stuff, and providing a @emph{simple} but general interface to it.
    In particular, Nettle doesn't do algorithm selection. It doesn't do
    memory allocation. It doesn't do any I/O.
    
    The idea is that one can build several application and context specific
    
    Niels Möller's avatar
    Niels Möller committed
    interfaces on top of Nettle, and share the code, test cases, benchmarks,
    
    documentation, etc. For this first version, the only application using
    Nettle is LSH, and it uses an object-oriented abstraction on top of the
    library. 
    
    
    This manual explains how to use the Nettle library. It also tries to
    provide some background on the cryptography, and advice on how to best
    put it to use.
    
    
    @node Copyright, Conventions, Introduction, Top
    @comment  node-name,  next,  previous,  up
    @chapter Copyright
    
    
    Nettle is distributed under the GNU General Public License (GPL) (see
    the file COPYING for details). However, most of the individual files
    are dual licensed under less restrictive licenses like the GNU Lesser
    General Public License (LGPL), or are in the public domain. This means
    that if you don't use the parts of nettle that are GPL-only, you have
    the option to use the Nettle library just as if it were licensed under
    the LGPL. To find the current status of particular files, you have to
    read the copyright notices at the top of the files.
    
    
    A list of the supported algorithms, their origins and licenses:
    
    @table @emph
    @item AES
    The implementation of the AES cipher (also known as rijndael) is written
    by Rafael Sevilla. Released under the LGPL.
    
    @item ARCFOUR
    The implementation of the ARCFOUR (also known as RC4) cipher is written
    by Niels Möller. Released under the LGPL.
    
    @item BLOWFISH
    The implementation of the BLOWFISH cipher is written by Werner Koch,
    copyright owned by the Free Software Foundation. Also hacked by Ray
    Dassen and Niels Möller. Released under the GPL.
    
    @item CAST128
    The implementation of the CAST128 cipher is written by Steve Reid.
    Released into the public domain.
    
    @item DES
    The implementation of the DES cipher is written by Dana L. How, and
    released under the LGPL.
    
    @item MD5
    The implementation of the MD5 message digest is written by Colin Plumb.
    It has been hacked some more by Andrew Kuchling and Niels Möller.
    Released into the public domain.
    
    @item SERPENT
    The implementation of the SERPENT cipher is written by Ross Anderson,
    Eli Biham, and Lars Knudsen, adapted to LSH by Rafael Sevilla, and to
    
    Nettle by Niels Möller. Released under the GPL.
    
    
    @item SHA1
    The implementation of the SHA1 message digest is written by Peter
    Gutmann, and hacked some more by Andrew Kuchling and Niels Möller.
    Released into the public domain.
    
    @item TWOFISH
    The implementation of the TWOFISH cipher is written by Ruud de Rooij.
    Released under the LGPL.
    @end table
    
    @node Conventions, Example, Copyright, Top
    @comment  node-name,  next,  previous,  up
    @chapter Conventions
    
    For each supported algorithm, there is an include file that defines a
    @emph{context struct}, a few constants, and declares functions for
    
    operating on the context. The context struct encapsulates all information
    
    needed by the algorithm, and it can be copied or moved in memory with no
    unexpected effects.
    
    
    For consistency, functions for different algorithms are very similar,
    but there are some differences, for instance reflecting if the key setup
    or encryption function differ for encryption and encryption, and whether
    or not key setup can fail. There are also differences between algorithms
    that don't show in function prototypes, but which the application must
    nevertheless be aware of. There is no big difference between the
    functions for stream ciphers and for block ciphers, although they should
    be used quite differently by the application.
    
    
    If your application uses more than one algorithm, you should probably
    create an interface that is tailor-made for your needs, and then write a
    few lines of glue code on top of Nettle.
    
    By convention, for an algorithm named @code{foo}, the struct tag for the
    context struct is @code{foo_ctx}, constants and functions uses prefixes
    like @code{FOO_BLOCK_SIZE} (a constant) and @code{foo_set_key} (a
    function).
    
    In all functions, strings are represented with an explicit length, of
    
    type @code{unsigned}, and a pointer of type @code{uint8_t *} or
    
    @code{const uint8_t *}. For functions that transform one string to
    another, the argument order is length, destination pointer and source
    pointer. Source and destination areas are of the same length. Source and
    destination may be the same, so that you can process strings in place,
    
    but they @emph{must not} overlap in any other way.
    
    
    @node Example, Reference, Conventions, Top
    @comment  node-name,  next,  previous,  up
    @chapter Example
    
    A simple example program that reads a file from standard in and writes
    
    its SHA1 checksum on standard output should give the flavor of Nettle.
    
    
    @example
    /* FIXME: This code is untested. */
    #include <stdio.h>
    #include <stdlib.h>
    
    
    #include <nettle/sha.h>
    
    
    #define BUF_SIZE 1000
    
    static void
    display_hex(unsigned length, uint8_t *data)
    @{
      static const char digits[16] = "0123456789abcdef";
      unsigned i;
    
      for (i = 0; i<length; i++)
      @{
        uint8_t byte = data[i];
        printf("%c%c ", digits[(byte / 16) & 0xf], digits[byte & 0xf]);
      @}
    @}
    
    int
    main(int argc, char **argv)
    @{
      struct sha1_ctx ctx;
      uint8_t buffer[BUF_SIZE];
      uint8_t digest[SHA1_DIGEST_SIZE];
      
      sha1_init(&ctx);
      for (;;)
      @{
        int done = fread(buffer, 1, sizeof(buffer), stdin);
        if (done <= 0)
          break;
        sha1_update(&ctx, done, buf);
      @}
      if (ferror(stdin))
        return EXIT_FAILURE;
    
      sha1_digest(&ctx, SHA1_DIGEST_SIZE, digest);
    
      display_hex(SHA1_DIGEST_SIZE, digest);
      return EXIT_SUCCESS;  
    @}
    @end example
    
    
    @node Reference, Nettle soup, Example, Top
    
    @comment  node-name,  next,  previous,  up
    @chapter Reference
    
    This chapter describes all the Nettle functions, grouped by family.
    
    @menu
    * Hash functions::              
    * Cipher functions::            
    
    * Keyed hash functions::        
    
    * Public-key algorithms::       
    * Randomness::                  
    
    * Miscellaneous functions::     
    
    * Compatibility functions::     
    
    @end menu
    
    @node Hash functions, Cipher functions, Reference, Reference
    @comment  node-name,  next,  previous,  up
    @section Hash functions
    
    A cryptographic @dfn{hash function} is a function that takes variable
    size strings, and maps them to strings of fixed, short, length. There
    are naturally lots of collisions, as there are more possible 1MB files
    than 20 byte strings. But the function is constructed such that is hard
    to find the collisions. More precisely, a cryptographic hash function
    @code{H} should have the following properties:
    
    @table @emph
    
    @item One-way
    Given a hash value @code{H(x)} it is hard to find a string @code{x}
    that hashes to that value.
    
    @item Collision-resistant
    It is hard to find two different strings, @code{x} and @code{y}, such
    that @code{H(x)} = @code{H(y)}.
    
    @end table
    
    Hash functions are useful as building blocks for digital signatures,
    
    message authentication codes, pseudo random generators, association of
    
    unique id:s to documents, and many other things.
    
    @subsection @acronym{MD5}
    
    MD5 is a message digest function constructed by Ronald Rivest, and
    described in @cite{RFC 1321}. It outputs message digests of 128 bits, or
    16 octets. Nettle defines MD5 in @file{<nettle/md5.h>}.
    
    @deftp {Context struct} {struct md5_ctx}
    @end deftp
    
    @defvr Constant MD5_DIGEST_SIZE
    The size of an MD5 digest, i.e. 16.
    @end defvr
    
    @defvr Constant MD5_DATA_SIZE
    The internal block size of MD5. Useful for some special constructions,
    in particular HMAC-MD5.
    @end defvr
    
    @deftypefun void md5_init (struct md5_ctx *@var{ctx})
    Initialize the MD5 state.
    @end deftypefun
    
    @deftypefun void md5_update (struct md5_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{data})
    Hash some more data.
    @end deftypefun
    
    @deftypefun void md5_digest (struct md5_ctx *@var{ctx}, unsigned @var{length}, uint8_t *@var{digest})
    
    Performs final processing and extracts the message digest, writing it
    to @var{digest}. @var{length} may be smaller than
    @code{MD5_DIGEST_SIZE}, in which case only the first @var{length}
    octets of the digest are written.
    
    This function also resets the context in the same way as
    @code{md5_init}.
    
    @end deftypefun
    
    The normal way to use MD5 is to call the functions in order: First
    
    @code{md5_init}, then @code{md5_update} zero or more times, and finally
    @code{md5_digest}. After @code{md5_digest}, the context is reset to
    its initial state, so you can start over calling @code{md5_update} to
    hash new data.
    
    
    To start over, you can call @code{md5_init} at any time.
    
    @subsection @acronym{SHA1}
    
    SHA1 is a hash function specified by @dfn{NIST} (The U.S. National Institute
    
    for Standards and Technology). It outputs hash values of 160 bits, or 20
    octets. Nettle defines SHA1 in @file{<nettle/sha.h>}.
    
    
    The functions are analogous to the MD5 ones.
    
    @deftp {Context struct} {struct sha1_ctx}
    @end deftp
    
    @defvr Constant SHA1_DIGEST_SIZE
    The size of an SHA1 digest, i.e. 20.
    @end defvr
    
    @defvr Constant SHA1_DATA_SIZE
    The internal block size of SHA1. Useful for some special constructions,
    in particular HMAC-SHA1.
    @end defvr
    
    @deftypefun void sha1_init (struct sha1_ctx *@var{ctx})
    Initialize the SHA1 state.
    @end deftypefun
    
    @deftypefun void sha1_update (struct sha1_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{data})
    Hash some more data.
    @end deftypefun
    
    
    @deftypefun void sha1_digest (struct sha1_ctx *@var{ctx}, unsigned @var{length}, uint8_t *@var{digest})
    Performs final processing and extracts the message digest, writing it
    to @var{digest}. @var{length} may be smaller than
    @code{SHA1_DIGEST_SIZE}, in which case only the first @var{length}
    octets of the digest are written.
    
    This function also resets the context in the same way as
    @code{sha1_init}.
    
    @end deftypefun
    
    
    @subsection @acronym{SHA256}
    
    SHA256 is another hash function specified by @dfn{NIST}, intended as a
    replacement for @acronym{SHA1}, generating larger digests. It outputs
    hash values of 256 bits, or 32 octets. Nettle defines SHA256 in
    @file{<nettle/sha.h>}.
    
    The functions are analogous to the MD5 ones.
    
    @deftp {Context struct} {struct sha256_ctx}
    @end deftp
    
    @defvr Constant SHA256_DIGEST_SIZE
    The size of an SHA256 digest, i.e. 20.
    @end defvr
    
    @defvr Constant SHA256_DATA_SIZE
    The internal block size of SHA256. Useful for some special constructions,
    in particular HMAC-SHA256.
    @end defvr
    
    @deftypefun void sha256_init (struct sha256_ctx *@var{ctx})
    Initialize the SHA256 state.
    @end deftypefun
    
    @deftypefun void sha256_update (struct sha256_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{data})
    Hash some more data.
    @end deftypefun
    
    @deftypefun void sha256_digest (struct sha256_ctx *@var{ctx}, unsigned @var{length}, uint8_t *@var{digest})
    Performs final processing and extracts the message digest, writing it
    to @var{digest}. @var{length} may be smaller than
    @code{SHA256_DIGEST_SIZE}, in which case only the first @var{length}
    octets of the digest are written.
    
    This function also resets the context in the same way as
    @code{sha256_init}.
    
    @end deftypefun
    
    
    @subsection @code{struct nettle_hash}
    
    Nettle includes a struct including information about the supported hash
    functions. It is defined in @file{<nettle/nettle-meta.h>}, and is used
    by Nettle's implementation of @acronym{HMAC} @pxref{Keyed hash
    functions}.
    
    @deftp {Meta struct} @code{struct nettle_hash} name context_size digest_size block_size init update digest
    The last three attributes are function pointers, of types
    @code{nettle_hash_init_func}, @code{nettle_hash_update_func}, and
    @code{nettle_hash_digest_func}. The first argument to these functions is
    @code{void *} pointer so a context struct, which is of size
    @code{context_size}. 
    @end deftp
    
    @deftypevr {Constant Struct} {struct nettle_cipher} nettle_md5
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_sha1
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_sha256
    
    These are all the hash functions that Nettle implements.
    @end deftypevr
    
    
    @node Cipher functions, Cipher Block Chaining, Hash functions, Reference
    
    @comment  node-name,  next,  previous,  up
    @section Cipher functions
    
    A @dfn{cipher} is a function that takes a message or @dfn{plaintext}
    and a secret @dfn{key} and transforms it to a @dfn{ciphertext}. Given
    only the ciphertext, but not the key, it should be hard to find the
    
    Niels Möller's avatar
    Niels Möller committed
    plaintext. Given matching pairs of plaintext and ciphertext, it should
    
    be hard to find the key.
    
    There are two main classes of ciphers: Block ciphers and stream ciphers.
    
    A block cipher can process data only in fixed size chunks, called
    @dfn{blocks}. Typical block sizes are 8 or 16 octets. To encrypt
    arbitrary messages, you usually have to pad it to an integral number of
    blocks, split it into blocks, and then process each block. The simplest
    way is to process one block at a time, independent of each other. That
    mode of operation is called @dfn{ECB}, Electronic Code Book mode.
    However, using ECB is usually a bad idea. For a start, plaintext blocks
    that are equal are transformed to ciphertext blocks that are equal; that
    leaks information about the plaintext. Usually you should apply the
    cipher is some feedback mode, @dfn{CBC} (Cipher Block Chaining) being one
    
    of the most popular. @xref{Cipher Block Chaining}, for information on
    
    how to apply @acronym{CBC} with Nettle.
    
    
    A stream cipher can be used for messages of arbitrary length; a typical
    
    stream cipher is a keyed pseudo-random generator. To encrypt a plaintext
    
    message of @var{n} octets, you key the generator, generate @var{n}
    
    octets of pseudo-random data, and XOR it with the plaintext. To decrypt,
    
    regenerate the same stream using the key, XOR it to the ciphertext, and
    the plaintext is recovered.
    
    @strong{Caution:} The first rule for this kind of cipher is the
    same as for a One Time Pad: @emph{never} ever use the same key twice.
    
    A common misconception is that encryption, by itself, implies
    authentication. Say that you and a friend share a secret key, and you
    
    Niels Möller's avatar
    Niels Möller committed
    receive an encrypted message. You apply the key, and get a plaintext
    
    message that makes sense to you. Can you then be sure that it really was
    
    your friend that wrote the message you're reading? The answer is no. For
    
    example, if you were using a block cipher in ECB mode, an attacker may
    pick up the message on its way, and reorder, delete or repeat some of
    the blocks. Even if the attacker can't decrypt the message, he can
    change it so that you are not reading the same message as your friend
    
    wrote. If you are using a block cipher in @acronym{CBC} mode rather than
    ECB, or are using a stream cipher, the possibilities for this sort of
    attack are different, but the attacker can still make predictable
    changes to the message.
    
    
    It is recommended to @emph{always} use an authentication mechanism in
    addition to encrypting the messages. Popular choices are Message
    
    Authentication Codes like @acronym{HMAC-SHA1} @pxref{Keyed hash
    
    functions}, or digital signatures like @acronym{RSA}.
    
    
    Some ciphers have so called "weak keys", keys that results in
    undesirable structure after the key setup processing, and should be
    avoided. In Nettle, the presence of weak keys for a cipher mean that the
    key setup function can fail, so you have to check its return value. In
    addition, the context struct has a field @code{status}, that is set to a
    non-zero value if key setup fails. When possible, avoid algorithm that
    have weak keys. There are several good ciphers that don't have any weak
    keys.
    
    
    To encrypt a message, you first initialize a cipher context for
    encryption or decryption with a particular key. You then use the context
    to process plaintext or ciphertext messages. The initialization is known
    as called @dfn{key setup}. With Nettle, it is recommended to use each
    context struct for only one direction, even if some of the ciphers use a
    single key setup function that can be used for both encryption and
    decryption.
    
    
    @subsection AES
    AES is a quite new block cipher, specified by NIST as a replacement for
    
    the older DES standard. The standard is the result of a competition
    
    between cipher designers. The winning design, also known as RIJNDAEL,
    was constructed by Joan Daemen and Vincent Rijnmen.
    
    
    Like all the AES candidates, the winning design uses a block size of 128
    
    bits, or 16 octets, and variable key-size, 128, 192 and 256 bits (16, 24
    
    and 32 octets) being the allowed key sizes. It does not have any weak
    keys. Nettle defines AES in @file{<nettle/aes.h>}.
     
    @deftp {Context struct} {struct aes_ctx}
    @end deftp
    
    @defvr Constant AES_BLOCK_SIZE
    
    The AES block-size, 16
    
    @end defvr
    
    @defvr Constant AES_MIN_KEY_SIZE
    @end defvr
    
    @defvr Constant AES_MAX_KEY_SIZE
    @end defvr
    
    @defvr Constant AES_KEY_SIZE
    Default AES key size, 32
    @end defvr
    
    @deftypefun void aes_set_key (struct aes_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. 
    @end deftypefun
    
    @deftypefun void aes_encrypt (struct aes_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void aes_decrypt (struct aes_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{aes_encrypt}
    @end deftypefun
    
    @subsection ARCFOUR
    ARCFOUR is a stream cipher, also known under the trade marked name RC4,
    and it is one of the fastest ciphers around. A problem is that the key
    setup of ARCFOUR is quite weak, you should never use keys with
    structure, keys that are ordinary passwords, or sequences of keys like
    "secret:1", "secret:2", @enddots{}. If you have keys that don't look
    like random bit strings, and you want to use ARCFOUR, always hash the
    key before feeding it to ARCFOUR. For example
    
    @example
    /* A more robust key setup function for ARCFOUR */
    void
    
    arcfour_set_key_hashed(struct arcfour_ctx *ctx,
                           unsigned length, const uint8_t *key)
    
    @{
      struct sha1_ctx hash;
      uint8_t digest[SHA1_DIGEST_SIZE];
    
      sha1_init(&hash);
      sha1_update(&hash, length, key);
      sha1_digest(&hash, SHA1_DIGEST_SIZE, digest);
    
      arcfour_set_key(ctx, SHA1_DIGEST_SIZE, digest);
    @}
    @end example
    
    Nettle defines ARCFOUR in @file{<nettle/arcfour.h>}.
    
    @deftp {Context struct} {struct arcfour_ctx}
    @end deftp
    
    @defvr Constant ARCFOUR_MIN_KEY_SIZE
    Minimum key size, 1
    @end defvr
    
    @defvr Constant ARCFOUR_MAX_KEY_SIZE
    Maximum key size, 256
    @end defvr
    
    @defvr Constant ARCFOUR_KEY_SIZE
    Default ARCFOUR key size, 16
    @end defvr
    
    @deftypefun void arcfour_set_key (struct arcfour_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. 
    @end deftypefun
    
    @deftypefun void arcfour_crypt (struct arcfour_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Encrypt some data. The same function is used for both encryption and
    decryption. Unlike the block ciphers, this function modifies the
    context, so you can split the data into arbitrary chunks and encrypt
    them one after another. The result is the same as if you had called
    @code{arcfour_crypt} only once with all the data.
    @end deftypefun
    
    @subsection CAST128
    
    
    CAST-128 is a block cipher, specified in @cite{RFC 2144}. It uses a 64
    bit (8 octets) block size, and a variable key size of up to 128 bits.
    Nettle defines cast128 in @file{<nettle/cast128.h>}.
    
    @deftp {Context struct} {struct cast128_ctx}
    @end deftp
    
    @defvr Constant CAST128_BLOCK_SIZE
    
    The CAST128 block-size, 8
    
    @end defvr
    
    @defvr Constant CAST128_MIN_KEY_SIZE
    
    Minimum CAST128 key size, 5
    
    @end defvr
    
    @defvr Constant CAST128_MAX_KEY_SIZE
    Maximum CAST128 key size, 16
    @end defvr
    
    @defvr Constant CAST128_KEY_SIZE
    Default CAST128 key size, 16
    @end defvr
    
    @deftypefun void cast128_set_key (struct cast128_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. 
    @end deftypefun
    
    @deftypefun void cast128_encrypt (struct cast128_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void cast128_decrypt (struct cast128_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{cast128_encrypt}
    @end deftypefun
    
    
    @subsection BLOWFISH
    
    
    BLOWFISH is a block cipher designed by Bruce Schneier. It uses a block
    size of 64 bits (8 octets), and a variable key size, up to 448 bits. It
    has some weak keys. Nettle defines BLOWFISH in @file{<nettle/blowfish.h>}.
    
    @deftp {Context struct} {struct blowfish_ctx}
    @end deftp
    
    @defvr Constant BLOWFISH_BLOCK_SIZE
    
    The BLOWFISH block-size, 8
    
    @end defvr
    
    @defvr Constant BLOWFISH_MIN_KEY_SIZE
    Minimum BLOWFISH key size, 8
    @end defvr
    
    @defvr Constant BLOWFISH_MAX_KEY_SIZE
    Maximum BLOWFISH key size, 56
    @end defvr
    
    @defvr Constant BLOWFISH_KEY_SIZE
    Default BLOWFISH key size, 16
    @end defvr
    
    @deftypefun int blowfish_set_key (struct blowfish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. Returns 1 on success, and 0 if the key was weak. Calling
    @code{blowfish_encrypt} or @code{blowfish_decrypt} with a weak key will
    crash with an assert violation.
    @end deftypefun
    
    @deftypefun void blowfish_encrypt (struct blowfish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void blowfish_decrypt (struct blowfish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{blowfish_encrypt}
    @end deftypefun
    
    
    @subsection DES
    
    DES is the old Data Encryption Standard, specified by NIST. It uses a
    block size of 64 bits (8 octets), and a key size of 56 bits. However,
    the key bits are distributed over 8 octets, where the least significant
    bit of each octet is used for parity. A common way to use DES is to
    generate 8 random octets in some way, then set the least significant bit
    of each octet to get odd parity, and initialize DES with the resulting
    key.
    
    The key size of DES is so small that keys can be found by brute force,
    using specialized hardware or lots of ordinary work stations in
    
    parallel. One shouldn't be using plain DES at all today, if one uses
    
    DES at all one should be using DES3 or "triple DES", see below.
    
    
    DES also has some weak keys. Nettle defines DES in @file{<nettle/des.h>}.
    
    @deftp {Context struct} {struct des_ctx}
    @end deftp
    
    @defvr Constant DES_BLOCK_SIZE
    
    The DES block-size, 8
    
    @end defvr
    
    @defvr Constant DES_KEY_SIZE
    DES key size, 8
    @end defvr
    
    
    @deftypefun int des_set_key (struct des_ctx *@var{ctx}, const uint8_t *@var{key})
    
    Initialize the cipher. The same function is used for both encryption and
    decryption. Returns 1 on success, and 0 if the key was weak or had bad
    parity. Calling @code{des_encrypt} or @code{des_decrypt} with a bad key
    will crash with an assert violation.
    @end deftypefun
    
    @deftypefun void des_encrypt (struct des_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void des_decrypt (struct des_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{des_encrypt}
    @end deftypefun
    
    @deftypefun void des_fix_parity (unsigned @var{length}, uint8_t *@var{dst}, const uint8_t *@var{src})
    Adjusts the parity bits to match DES's requirements. You need this
    function if you have created a random-looking string by a key agreement
    protocol, and want to use it as a DES key. @var{dst} and @var{src} may
    be equal.
    @end deftypefun
    
    @subsection DES3
    The inadequate key size of DES has already been mentioned. One way to
    increase the key size is to pipe together several DES boxes with
    independent keys. It turns out that using two DES ciphers is not as
    secure as one might think, even if the key size of the combination is a
    respectable 112 bits.
    
    The standard way to increase DES's key size is to use three DES boxes.
    The mode of operation is a little peculiar: the middle DES box is wired
    in the reverse direction. To encrypt a block with DES3, you encrypt it
    using the first 56 bits of the key, then @emph{decrypt} it using the
    middle 56 bits of the key, and finally encrypt it again using the last
    56 bits of the key. This is known as "ede" triple-DES, for
    "encrypt-decrypt-encrypt".
    
    The "ede" construction provides some backward compatibility, as you get
    plain single DES simply by feeding the same key to all three boxes. That
    should help keeping down the gate count, and the price, of hardware
    circuits implementing both plain DES and DES3.
    
    DES3 has a key size of 168 bits, but just like plain DES, useless parity
    bits are inserted, so that keys are represented as 24 octets (192 bits).
    As a 112 bit key is large enough to make brute force attacks
    impractical, some applications uses a "two-key" variant of triple-DES.
    In this mode, the same key bits are used for the first and the last DES
    box in the pipe, while the middle box is keyed independently. The
    two-key variant is believed to be secure, i.e. there are no known
    attacks significantly better than brute force.
    
    Naturally, it's simple to implement triple-DES on top of Nettle's DES
    
    functions. Nettle includes an implementation of three-key "ede"
    
    triple-DES, it is defined in the same place as plain DES,
    @file{<nettle/des.h>}.
    
    @deftp {Context struct} {struct des3_ctx}
    @end deftp
    
    @defvr Constant DES3_BLOCK_SIZE
    
    The DES3 block-size is the same as DES_BLOCK_SIZE, 8
    
    @end defvr
    
    @defvr Constant DES3_KEY_SIZE
    DES key size, 24
    @end defvr
    
    @deftypefun int des3_set_key (struct des3_ctx *@var{ctx}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. Returns 1 on success, and 0 if the key was weak or had bad
    parity. Calling @code{des_encrypt} or @code{des_decrypt} with a bad key
    will crash with an assert violation.
    @end deftypefun
    
    For random-looking strings, you can use @code{des_fix_parity} to adjust
    the parity bits before calling @code{des3_set_key}.
    
    @deftypefun void des3_encrypt (struct des3_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void des3_decrypt (struct des3_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{des_encrypt}
    @end deftypefun
    
    
    @subsection SERPENT
    
    SERPENT is one of the AES finalists, designed by Ross Anderson, Eli
    Biham and Lars Knudsen. Thus, the interface and properties are similar
    
    to AES'. One peculiarity is that it is quite pointless to use it with
    
    anything but the maximum key size, smaller keys are just padded to
    larger ones. Nettle defines SERPENT in @file{<nettle/serpent.h>}.
    
    @deftp {Context struct} {struct serpent_ctx}
    @end deftp
    
    @defvr Constant SERPENT_BLOCK_SIZE
    
    The SERPENT block-size, 16
    
    @end defvr
    
    @defvr Constant SERPENT_MIN_KEY_SIZE
    
    Minimum SERPENT key size, 16
    
    @end defvr
    
    @defvr Constant SERPENT_MAX_KEY_SIZE
    Maximum SERPENT key size, 32
    @end defvr
    
    @defvr Constant SERPENT_KEY_SIZE
    Default SERPENT key size, 32
    @end defvr
    
    @deftypefun void serpent_set_key (struct serpent_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. 
    @end deftypefun
    
    @deftypefun void serpent_encrypt (struct serpent_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void serpent_decrypt (struct serpent_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{serpent_encrypt}
    @end deftypefun
    
    
    
    @subsection TWOFISH
    
    Another AES finalist, this one designed by Bruce Schneier and others.
    Nettle defines it in @file{<nettle/twofish.h>}.
    
    @deftp {Context struct} {struct twofish_ctx}
    @end deftp
    
    @defvr Constant TWOFISH_BLOCK_SIZE
    
    The TWOFISH block-size, 16
    
    @end defvr
    
    @defvr Constant TWOFISH_MIN_KEY_SIZE
    
    Minimum TWOFISH key size, 16
    
    @end defvr
    
    @defvr Constant TWOFISH_MAX_KEY_SIZE
    Maximum TWOFISH key size, 32
    @end defvr
    
    @defvr Constant TWOFISH_KEY_SIZE
    Default TWOFISH key size, 32
    @end defvr
    
    @deftypefun void twofish_set_key (struct twofish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{key})
    Initialize the cipher. The same function is used for both encryption and
    decryption. 
    @end deftypefun
    
    @deftypefun void twofish_encrypt (struct twofish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Encryption function. @var{length} must be an integral multiple of the
    block size. If it is more than one block, the data is processed in ECB
    mode. @code{src} and @code{dst} may be equal, but they must not overlap
    in any other way.
    @end deftypefun
    
    @deftypefun void twofish_decrypt (struct twofish_ctx *@var{ctx}, unsigned @var{length}, const uint8_t *@var{dst}, uint8_t *@var{src})
    Analogous to @code{twofish_encrypt}
    @end deftypefun
    
    
    @c @node nettle_cipher, Cipher Block Chaining, Cipher functions, Reference
    @c @comment  node-name,  next,  previous,  up
    @subsection @code{struct nettle_cipher}
    
    Nettle includes a struct including information about some of the more
    regular cipher functions. It should be considered a little experimental,
    but can be useful for applications that need a simple way to handle
    various algorithms. Nettle defines these structs in
    @file{<nettle/nettle-meta.h>}. 
    
    @deftp {Meta struct} @code{struct nettle_cipher} name context_size block_size key_size set_encrypt_key set_decrypt_key encrypt decrypt
    The last four attributes are function pointers, of types
    @code{nettle_set_key_func} and @code{nettle_crypt_func}. The first
    argument to these functions is a @code{void *} pointer to a context
    struct, which is of size @code{context_size}.
    @end deftp
    
    @deftypevr {Constant Struct} {struct nettle_cipher} nettle_aes128
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_aes192
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_aes256
    
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_arcfour128
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_cast128
    
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_serpent128
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_serpent192
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_serpent256
    
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_twofish128
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_twofish192
    @deftypevrx {Constant Struct} {struct nettle_cipher} nettle_twofish256
    
    Nettle includes such structs for all the @emph{regular} ciphers, i.e.
    
    ones without weak keys or other oddity.
    
    @end deftypevr
    
    @node Cipher Block Chaining, Keyed hash functions, Cipher functions, Reference
    
    @comment  node-name,  next,  previous,  up
    @section Cipher Block Chaining
    
    
    Niels Möller's avatar
    Niels Möller committed
    When using @acronym{CBC} mode, plaintext blocks are not encrypted
    
    independently of each other, like in Electronic Cook Book mode. Instead,
    when encrypting a block in @acronym{CBC} mode, the previous ciphertext
    
    Niels Möller's avatar
    Niels Möller committed
    block is XOR:ed with the plaintext before it is fed to the block cipher.
    
    When encrypting the first block, a random block called an @dfn{IV}, or
    Initialization Vector, is used as the ``previous ciphertext block''. The
    IV should be chosen randomly, but it need not be kept secret, and can
    even be transmitted in the clear together with the encrypted data.
    
    Niels Möller's avatar
    Niels Möller committed
    In symbols, if @code{E_k} is the encryption function of a block cipher,
    and @code{IV} is the initialization vector, then @code{n} plaintext blocks
    
    @code{M_1},@dots{} @code{M_n} are transformed into @code{n} ciphertext blocks
    @code{C_1},@dots{} @code{C_n} as follows:
    
    @example
    C_1 = E_k(IV  XOR M_1)
    C_2 = E_k(C_1 XOR M_2)
    
    @dots{}
    
    C_n = E_k(C_(n-1) XOR M_n)