— layout: post title: "Cryptography: Schnorr" date: 2019-06-19 tags: ["cryptography", "schnorr", "discrete-logarithm", "math", "sagemath"] —

# Overview

`"If you can't explain it simply, you don't understand it well enough" - Einstein`

Schnorr is another digital signature scheme known for its simplicity, no division, no inversion, just plain old multiplication. Here is my simple 16 lines implementation in Python.

```
import random, hashlib
p = 103
q = 17
r = 6
h = random.choice([h for h in range(1, p) if h**r % p != 1 ])
g = h**r % p
k = random_prime(q)
y = g**k % q
m = 6
t = random_prime(q)
r = g**t % q
e = int(hashlib.sha1(str(r) + str(m)).hexdigest(), 16) % q
s = (t - k*e)
rv = (g**s * y**e) % q
ev = int(hashlib.sha1(str(rv) + str(m)).hexdigest(), 16) % q
print "YOU ARE A CRYPTOSTAR!" if ev == e else "YOU SUCK!"
```

2 YOU ARE A CRYPTOSTAR!

# Discrete logarithm trapdoor

To generate a Schnorr group that stands at the base of our Schnorr signature scheme we need to generate `p`, `q` and `r` numbers that satisfy the equation: `p = q*r + 1` where `p` and `q` are primes. You can use any algorithm (even brute-force) to generate the numbers, here are mine:

```
p = 103
q = 17
r = 6
```

Next we need to find a generator `g` that generates our sub-group of order `q`. Basically we brute-force and select all numbers less than `p` that satisfy the equation `h**r % p != 1`, choose a random one then the remainder is our generator `g`. The math is a bit involved, please see Schnorr group for more info:

```
h = random.choice([h for h in range(1, p) if h**r % p != 1 ])
g = h**r % p
```

Once we have the generator `g` we need to pick a random prime number as private key `k` and generate the public key `y`.

```
k = random_prime(q)
y = g**k % q
```

And finally `g`, `y` are public parameters while `k` is kept secret:

` (g, y)`

# Signature

For signing we first generate a temporary random nonce `t` and the corresponding member of the group `r`. Then group member `r` gets concatenated with the message `m` that we need to sign, hash everything together and create pre-image `e`. And finally the challenge signature number `s`.

```
m = 6
t = random_prime(q)
r = g**t % q
e = int(hashlib.sha1(str(r) + str(m)).hexdigest(), 16) % q
s = (t - k*e)
```

The signature that is made public to third-party for verification is the pair `e, s`:

` (e, s)`

(-93, 14)

# Verification

Given the public parameters and the signature above we can easily calculate random group member `rv` that is used to hash the final pre-image for verification:

```
rv = (g**s * y**e) % q
ev = int(hashlib.sha1(str(rv) + str(m)).hexdigest(), 16) % q
print "YOU ARE A CRYPTOSTAR!" if ev == e else "YOU SUCK!"
```

YOU ARE A CRYPTOSTAR!

# Intuition

Starting with the verification equation and replacing `s` and `y` with corresponding formulas we end up with `rv == r`.

```
rv = g**s * y**e
rv = g**(t - k*e) * y**e
rv = g**(t - k*e) * g**(k*e)
rv = g**t
```

Because `rv` and `r` are equal the two pre-image hashes must be equal as well. MAGIC!

```
p = 199
q = 109
q
r = [r for r in range(1, 1000) if p == q*r + 1 ]
r
# q = [i for i in prime_range(103) if p == q*r+ 1]
# q
```

109 []