From 06620d4d7f4a8d05d181d8048494478d08b8340d Mon Sep 17 00:00:00 2001 From: GabrielTofvesson Date: Mon, 5 Mar 2018 06:27:26 +0100 Subject: [PATCH 1/2] Added AES implementation - Uses reference to Galois.h - Essentially a translated copy of my ServerProject (C#) implementation - There are almost no comments. Sorry. I'll add them later Added some support functions to Galois Added AES dependency to test project Changed includes to be independent from filesystem naming (changed from absolute paths to macros) --- AES/AES.cpp | 301 ++++++++++++++++++++++++++++++++++++++++ AES/AES.h | 85 ++++++++++++ AES/AES.vcxproj | 15 +- AES/AES.vcxproj.filters | 10 ++ Crypto/Crypto.vcxproj | 5 +- Crypto/Start.cpp | 1 + XMath/Galois.cpp | 14 ++ XMath/Galois.h | 4 + 8 files changed, 433 insertions(+), 2 deletions(-) create mode 100644 AES/AES.cpp create mode 100644 AES/AES.h diff --git a/AES/AES.cpp b/AES/AES.cpp new file mode 100644 index 0000000..3e21a26 --- /dev/null +++ b/AES/AES.cpp @@ -0,0 +1,301 @@ +#define AES_API +#include "AES.h" +#include "Galois.h" +#include + +namespace CryptoCPP { namespace Crypto { + AES_API AES::Digest::Digest(const char * message, const size_t size) : message(message), size(size) + { } + AES_API AES::Digest::Digest(const char * message) : message(message), size(strlen(message)) + { } + + AES_API AES::AES(const char * key, KeySize bitsize) : size(bitsize) + { + this->key = expand_key(key, bitsize); + } + + AES_API AES::AES(const AES & copy) : size(copy.size) + { + this->key = new char[size == AES128 ? 16 : size == AES192 ? 24 : 32]; + memcpy(key, copy.key, size == AES128 ? 16 : size == AES192 ? 24 : 32); + } + + AES_API AES::AES(char * key, KeySize size) : size(size) + { + this->key = key; + } + + AES_API AES::Digest * AES::encrypt(Digest d) + { + // Allocate states + size_t state_count = (d.size / 16) + (d.size % 16 == 0 ? 0 : 1); + char * states = new char[state_count * 16]; + + // Set up state properly + memset(states + d.size, 0, (state_count * 16) - d.size); + memcpy(states, d.message, d.size); + + // Encrypt states + for (size_t t = 0; t < state_count; ++t) encrypt(states + (t * 16)); + + return new Digest(states, state_count * 16); + } + + AES_API AES::Digest * AES::decrypt(Digest d) + { + // Allocate states + size_t state_count = d.size / 16; + char * states = new char[state_count * 16]; + + // Set up state properly + memcpy(states, d.message, d.size); + + // Encrypt states + for (size_t t = 0; t < state_count; ++t) decrypt(states + (t * 16)); + + return new Digest(states, d.size); + } + + AES_API AES::Serialized* AES::serialize() + { + AES::Serialized * s = new AES::Serialized(); + s->data_size = size == AES128 ? 16 : size == AES192 ? 24 : 32; + s->data = new char[1 + s->data_size]; + memcpy(s->data + 1, key, s->data_size); + s->data[0] = size == AES128 ? 0 : size == AES192 ? 1 : 2; + return s; + } + + AES_API AES * AES::deserialize(char* data) + { + KeySize size = data[0] == 0 ? AES128 : data[0] == 1 ? AES192 : AES256; + char * key = new char[size == AES128 ? 16 : size == AES192 ? 24 : 32]; + return new AES(key, size); + } + + AES_API AES * AES::deserialize(AES::Serialized* ser) + { + return deserialize(ser->data); + } + + + AES_API void AES::encrypt(char* state) + { + size_t last_round = size == AES128 ? 9 : size == AES192 ? 11 : 13; + + // Initial round. Just just xor the key for this round input the input + add_round_key(state, key); + + // Rounds 1 - last + for (size_t rounds = 1; rounds < 10; ++rounds) + { + sub_bytes(state); + shift_rows(state); + if (rounds != last_round) mix_columns(state); + add_round_key(state, key + (rounds * 16)); + } + } + + AES_API void AES::decrypt(char* state) + { + size_t last_round = size == AES128 ? 9 : size == AES192 ? 11 : 13; + + for (int rounds = last_round; rounds > 0; --rounds) + { + inv_add_round_key(state, key + (rounds * 16)); + if (rounds != last_round) inv_mix_columns(state); + inv_shift_rows(state); + inv_sub_bytes(state); + } + + inv_add_round_key(state, key); + } + + // Key expansion + AES_API unsigned int AES::key_schedule_core(unsigned int input, size_t rcon_iteration) + { + char * convert = (char*)&input; + for (size_t t = 0; t < 4; ++t) + convert[t] = sbox(convert[t]); + convert[3] ^= rcon(rcon_iteration); + return input; + } + + AES_API char* AES::expand_key(const char* key, KeySize size) + { + size_t n = size == AES128 ? 16 : size == AES192 ? 24 : 32; + size_t b = size == AES128 ? 176 : size == AES192 ? 208 : 240; + + char* output = new char[b]; + //memset(output + n, 0, b - n); + memcpy(output, key, n); + + size_t rcon_iter = 1; + + size_t accruedBytes = n; + while (accruedBytes < b) + { + // Generate 4 new bytes of extended key + unsigned int _t = key_schedule_core(*(unsigned int *)(output + accruedBytes - 4), rcon_iter); + char * t = (char*)&_t; + ++rcon_iter; + for (size_t i = 0; i < 4; ++i) t[i] ^= output[accruedBytes - n + i]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + + // Generate 12 new bytes of extended key + for (int i = 0; i < 3; ++i) + { + memcpy(t, output + accruedBytes - 4, 4); + for (size_t j = 0; j < 4; ++j) t[j] ^= output[accruedBytes - n + j]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + + // Special processing for 256-bit key schedule + if (size == AES256) + { + memcpy(t, output + accruedBytes - 4, 4); + for (size_t j = 0; j < 4; ++j) t[j] = (sbox(t[j]) ^ output[accruedBytes - n + j]); + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + // Special processing for 192-bit key schedule + if (size != AES128) + for (int i = size == AES192 ? 1 : 2; i >= 0; --i) + { + memcpy(t, output + accruedBytes - 4, 4); + for (int j = 0; j < 4; ++j) t[j] ^= output[accruedBytes - n + j]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + } + + return output; + } + + AES_API char AES::rcon(unsigned int iteration) + { + return iteration == 0 ? 0x8d : Math::Galois(2, 283, iteration).get_lowest() & 255; + } + + AES_API char AES::sbox(char c) + { + Math::Galois * inv = Math::Galois(2, 283, c).inv(); + c = affine(inv->get_lowest() & 255); + delete inv; + return c; + } + + // Encryption functions + AES_API void AES::add_round_key(char* state, char* roundKey) + { + for (size_t t = 0; t < 16; ++t) state[t] ^= roundKey[t]; + } + + AES_API void AES::mix_columns(char* state) + { + for (int i = 0; i < 4; ++i) + for (int j = 0; j < 4; ++j) + for (int k = 0; k < 4; ++k) + { + Math::Galois g = Math::Galois(2, 283, state[k + i * 4]); + Math::Galois mix = Math::Galois(2, 283, mix_matrix[(k + 4 - j) % 4]); + Math::Galois * result = g.mul(&mix); + state[j + i * 4] ^= result->get_lowest() & 255; + delete result; + } + } + + AES_API void AES::shift_rows(char* state) + { + for (size_t i = 1; i < 4; ++i) + { + unsigned int value = get_row(state, i); + for (size_t j = 0; j < i; ++j) value = rotate(value); + write_to_row(value, state, i); + } + } + + AES_API void AES::sub_bytes(char* state) + { + for (size_t t = 0; t < 16; ++t) + state[t] = sbox(state[t]); + } + + AES_API char AES::affine(char value) + { + return (value ^ rot(value, 1) ^ rot(value, 2) ^ rot(value, 3) ^ rot(value, 4) ^ 0b01100011); + } + + + // Inverse encryption functions + AES_API void AES::inv_add_round_key(char* state, char* roundKey) + { + add_round_key(state, roundKey); + } + + AES_API void AES::inv_mix_columns(char* state) + { + for (int i = 0; i < 4; ++i) + for (int j = 0; j < 4; ++j) + for (int k = 0; k < 4; ++k) + { + Math::Galois g = Math::Galois(2, 283, state[k + i * 4]); + Math::Galois mix = Math::Galois(2, 283, unmix_matrix[(k + 4 - j) % 4]); + Math::Galois * result = g.mul(&mix); + state[j + i * 4] ^= result->get_lowest() & 255; + delete result; + } + } + + AES_API void AES::inv_shift_rows(char* state) + { + for (size_t i = 1; i < 4; ++i) + { + unsigned int value = get_row(state, i); + for (size_t j = 3; j >= i; --j) value = rotate(value); + write_to_row(value, state, i); + } + } + + AES_API void AES::inv_sub_bytes(char* state) + { + for (size_t t = 0; t < 16; ++t) + { + Math::Galois * inv = Math::Galois(2, 283, inv_affine(state[t])).inv(); + state[t] = inv->get_lowest() & 255; + delete inv; + } + } + + AES_API char AES::inv_affine(char value) + { + return rot(value, 1) ^ rot(value, 3) ^ rot(value, 6) ^ 0b00000101; + } + + + // Helper functions + AES_API void AES::write_to_row(unsigned int value, char* to, size_t row) + { + to[row] = value & 255; + to[row + 4] = (value >> 8) & 255; + to[row + 8] = (value >> 16) & 255; + to[row + 12] = (value >> 24) & 255; + } + + AES_API unsigned int AES::rotate(unsigned int i) + { + return (i >> 24) | (i << 8); + } + + AES_API unsigned int AES::get_row(char* from, size_t row) + { + return (from[row] | (from[row + 4] << 8) | (from[row + 8] << 16) | (from[row + 12] << 24)); + } + + AES_API char AES::rot(char value, size_t by) + { + return (value << by) | (value >> (8 - by)); + } +}} \ No newline at end of file diff --git a/AES/AES.h b/AES/AES.h new file mode 100644 index 0000000..fa1d5bb --- /dev/null +++ b/AES/AES.h @@ -0,0 +1,85 @@ +#pragma once + +#if defined(__MINGW32__) || defined(_WIN32) + +#if defined(AES_API) +#undef AES_API +#define AES_API __declspec(dllexport) +#else +#define AES_API __declspec(dllimport) +#endif + +#endif + +#ifndef AES_API +#if __GNUC__ >= 4 +#define AES_API __attribute__ ((visibility ("default"))) +#else +#define AES_API +#endif +#endif + + +namespace CryptoCPP { namespace Crypto { + + // MixColumns matrix basis + static const char mix_matrix[4] = { 2, 3, 1, 1 }; + static const char unmix_matrix[4] = { 14, 11, 13, 9 }; + + class AES { + public: + struct Digest { + AES_API Digest(const char * message, const size_t size); + AES_API Digest(const char * message); + const char* message; + const size_t size; + }; + enum KeySize{ AES128, AES192, AES256 }; + + AES_API AES(const char * key, KeySize bitsize = AES128); + AES_API AES(const AES & copy); + + AES_API Digest * encrypt(Digest d); + AES_API Digest * decrypt(Digest d); + + // Serialization + struct Serialized { + char* data; + size_t data_size; + }; + AES_API Serialized* serialize(); + AES_API static AES * deserialize(char* data); + AES_API static AES * deserialize(Serialized* ser); + + protected: + char* key; + const KeySize size; + + AES_API AES(char * key, KeySize size); + + AES_API void encrypt(char* state); + AES_API void decrypt(char* state); + + AES_API static unsigned int key_schedule_core(unsigned int input, size_t rcon_iteration); + AES_API static char* expand_key(const char* key, KeySize size); + AES_API static char rcon(unsigned int iteration); + AES_API static char sbox(char c); + + AES_API static void add_round_key(char* state, char* roundKey); + AES_API static void mix_columns(char* state); + AES_API static void shift_rows(char* state); + AES_API static void sub_bytes(char* state); + AES_API static char affine(char value); + + AES_API static void inv_add_round_key(char* state, char* roundKey); + AES_API static void inv_mix_columns(char* state); + AES_API static void inv_shift_rows(char* state); + AES_API static void inv_sub_bytes(char* state); + AES_API static char inv_affine(char value); + + AES_API static void write_to_row(unsigned int value, char* to, size_t row); + AES_API static unsigned int rotate(unsigned int i); + AES_API static unsigned int get_row(char* from, size_t row); + AES_API static char rot(char value, size_t by); + }; +}} \ No newline at end of file diff --git a/AES/AES.vcxproj b/AES/AES.vcxproj index 3f9fe5e..58a6987 100644 --- a/AES/AES.vcxproj +++ b/AES/AES.vcxproj @@ -69,13 +69,17 @@ - + + $(SolutionDir)XMath;$(IncludePath) + $(SolutionDir)Debug;$(LibraryPath) + Level3 Disabled true true + $(SolutionDir)XMath;%(AdditionalIncludeDirectories) @@ -115,6 +119,15 @@ + + + + + {5f9ad03f-b1f0-4db3-b39a-49b66895774c} + + + + diff --git a/AES/AES.vcxproj.filters b/AES/AES.vcxproj.filters index 6a1782f..0571ee6 100644 --- a/AES/AES.vcxproj.filters +++ b/AES/AES.vcxproj.filters @@ -14,4 +14,14 @@ rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms + + + Header Files + + + + + Source Files + + \ No newline at end of file diff --git a/Crypto/Crypto.vcxproj b/Crypto/Crypto.vcxproj index 42e9a96..4d8661c 100644 --- a/Crypto/Crypto.vcxproj +++ b/Crypto/Crypto.vcxproj @@ -77,7 +77,7 @@ Disabled true true - C:\Users\Lenovo\source\repos\Crypto\XMath;%(AdditionalIncludeDirectories) + $(SolutionDir)AES;$(SolutionDir)XMath;%(AdditionalIncludeDirectories) @@ -120,6 +120,9 @@ + + {e1176bbf-344b-4041-ab24-a7109e969339} + {5f9ad03f-b1f0-4db3-b39a-49b66895774c} diff --git a/Crypto/Start.cpp b/Crypto/Start.cpp index c7a8376..4299028 100644 --- a/Crypto/Start.cpp +++ b/Crypto/Start.cpp @@ -2,6 +2,7 @@ #include "BigInteger.h" #include "Matrix.h" #include "Galois.h" +#include "AES.h" using namespace CryptoCPP::Math; diff --git a/XMath/Galois.cpp b/XMath/Galois.cpp index 880290a..ce8e191 100644 --- a/XMath/Galois.cpp +++ b/XMath/Galois.cpp @@ -248,6 +248,20 @@ namespace CryptoCPP{ return new Galois(characteristic, (BLOCK*)do_copy(irreducible, irreducible_size * sizeof(BLOCK)), irreducible_size, result, result_size); } + + GALOIS_API BLOCK * Galois::to_array(size_t * size) + { + BLOCK * b = new BLOCK[data_size]; + memcpy(b, data, data_size); + if(size!=0) *size = data_size; + return b; + } + + GALOIS_API BLOCK Galois::get_lowest() + { + return data_size == 0 ? 0 : data[0]; + } + // These internal functions assume that an adequate state size has been chose GALOIS_API void Galois::iadd(BLOCK * data, size_t data_size, size_t bin_size, BLOCK * state, size_t state_size, BLOCK characteristic) { diff --git a/XMath/Galois.h b/XMath/Galois.h index 6db5968..60cd94a 100644 --- a/XMath/Galois.h +++ b/XMath/Galois.h @@ -53,6 +53,10 @@ namespace CryptoCPP { // Inverse multiplication GALOIS_API Galois * inv() const; + // Get internal value + GALOIS_API BLOCK * to_array(size_t * size = 0); + GALOIS_API BLOCK get_lowest(); + protected: static const BLOCK high_bit = 1 << ((sizeof(BLOCK) * 8) - 1); // GF parameters & value From b7e8a1d439eb68bb24c98f8f08bccd473555311a Mon Sep 17 00:00:00 2001 From: GabrielTofvesson Date: Mon, 5 Mar 2018 07:59:53 +0100 Subject: [PATCH 2/2] Updated readme Added some convenient stuff to BigInteger Did a tiny rename (looks like not all of the SHA project was renamed but meh who cares for now) --- README.md | 59 +++++++++++++++++++++++++++++++- RSA/RSA.cpp | 6 ++++ RSA/RSA.h | 76 +++++++++++++++++++++++++++++++++-------- RSA/RSA.vcxproj | 9 +++++ RSA/RSA.vcxproj.filters | 5 +++ SHA1/SHA1.vcxproj | 1 + XMath/BigInteger.cpp | 44 ++++++++++++++++++++++++ XMath/BigInteger.h | 4 +++ 8 files changed, 189 insertions(+), 15 deletions(-) create mode 100644 RSA/RSA.cpp diff --git a/README.md b/README.md index 4885892..5390046 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,59 @@ # CryptoCPP -My attempt at a small crypto library \ No newline at end of file +My attempt at a small crypto library + +## Current projects +* AES +* RSA +* SHA +* XMath +* CryptoTests + + + +### AES +An implementation of AES designed to show how AES encrypts. It uses mathematical functions rather than lookup tables in order to clarify how the encryption actally works and why the operations are as they are. +Status: +* Implemented + +Dependencies: +* XMath + + +### RSA +Small RSA implementation with key generation delegated partially to XMath. The implementation supports message signing, seralization and deserialization. +Status: +* Headers: Implemented +* Code: Not implemented + +Dependencies: +* XMath + + +### SHA +Secure hashing algorithms. Implementations: SHA1. +Status: +* Not implemented + +Dependencies: +None + + +### XMath +A library with a lot of helper functions and classes for keeping other code clean. +Status: +* BigInteger: Implemented +* Galois Implemented +* Matrix Implemented +* Primes: Not implemented + +Dependencies: +None + + +### CryptoTests +A project for testing all the other projects and their implementations. +Status: +N/A + +Dependencies: +All \ No newline at end of file diff --git a/RSA/RSA.cpp b/RSA/RSA.cpp new file mode 100644 index 0000000..1ae58c7 --- /dev/null +++ b/RSA/RSA.cpp @@ -0,0 +1,6 @@ +#define RSA_API +#include "RSA.h" + +namespace CryptoCPP { namespace RSA { + +}} \ No newline at end of file diff --git a/RSA/RSA.h b/RSA/RSA.h index 55dd9fc..5e719a9 100644 --- a/RSA/RSA.h +++ b/RSA/RSA.h @@ -1,17 +1,65 @@ #pragma once +#include "Primes.h" +#include "BigInteger.h" -namespace CryptoCPP { - namespace RSA { - struct PublicKey - { - // Big integer modulus - // Big integer exponent - }; - class RSA - { - public: - //RSA(PublicKey* key, Math::BigInteger* privateKey); - }; - } -} \ No newline at end of file +#if defined(__MINGW32__) || defined(_WIN32) + +#if defined(RSA_API) +#undef RSA_API +#define RSA_API __declspec(dllexport) +#else +#define RSA_API __declspec(dllimport) +#endif + +#endif + +#ifndef RSA_API +#if __GNUC__ >= 4 +#define RSA_API __attribute__ ((visibility ("default"))) +#else +#define RSA_API +#endif +#endif + + +namespace CryptoCPP { namespace RSA { + struct PublicKey + { + Math::BigInteger * mod; + Math::BigInteger * exp; + }; + typedef Math::BigInteger PrivateKey; + struct KeyPair { + PublicKey * pub; + PrivateKey * priv; + }; + + class RSA + { + public: + RSA_API RSA(KeyPair* pair); + + RSA_API char* encrypt(char* message); // Encrypt with public key + RSA_API char* sign(char* message); // Encrypt with private key + + RSA_API char* decrypt(char* cipher); // Decrypt with private key + RSA_API char* check_sign(char* cipher); // Decrypt with public key + + RSA_API bool can_decrypt(); // Checks whether or not we have a private key + + RSA_API char* serialize_net(); // Serializes public key + RSA_API char* serialize_all(); // Complete serialization (public + private key). NOTE: Should NEVER be transmitted over an insecure channel. This should preferably be kept to the local file system + + RSA_API static RSA * deserialize(char* ser);// Deserializes a serialized RSA object. Autodetects whether or not a private key is available + + protected: + KeyPair * keypair; + + RSA_API static char* encrypt(char* message, Math::BigInteger * exp, Math::BigInteger * mod); // Internal encryption function. exp can be either public or private exponent + RSA_API static char* decrypt(char* message, Math::BigInteger * exp, Math::BigInteger * mod); // Internal decryption function. -||- + }; + + typedef char(*RandomProvider)(); + KeyPair* generate_key_pair(RandomProvider provider, size_t approximate_byte_count, size_t byte_margin); +}} \ No newline at end of file diff --git a/RSA/RSA.vcxproj b/RSA/RSA.vcxproj index 625a0fd..018665e 100644 --- a/RSA/RSA.vcxproj +++ b/RSA/RSA.vcxproj @@ -76,6 +76,7 @@ Disabled true true + $(SolutionDir)XMath;%(AdditionalIncludeDirectories) @@ -117,6 +118,14 @@ + + + {5f9ad03f-b1f0-4db3-b39a-49b66895774c} + + + + + diff --git a/RSA/RSA.vcxproj.filters b/RSA/RSA.vcxproj.filters index 401028b..168bc9a 100644 --- a/RSA/RSA.vcxproj.filters +++ b/RSA/RSA.vcxproj.filters @@ -19,4 +19,9 @@ Header Files + + + Source Files + + \ No newline at end of file diff --git a/SHA1/SHA1.vcxproj b/SHA1/SHA1.vcxproj index 71239a8..e7e53dc 100644 --- a/SHA1/SHA1.vcxproj +++ b/SHA1/SHA1.vcxproj @@ -23,6 +23,7 @@ {2CB4EC0F-FE3F-413F-A27D-0BB3C8CF84EB} SHA1 10.0.16299.0 + SHA diff --git a/XMath/BigInteger.cpp b/XMath/BigInteger.cpp index 854bd62..acf67e5 100644 --- a/XMath/BigInteger.cpp +++ b/XMath/BigInteger.cpp @@ -31,6 +31,15 @@ namespace CryptoCPP { sign = initialvalue.sign; } + BIGINT_API BigInteger::BigInteger(const char * value, size_t size) + { + sign = value[size - 1] & 128; + data = new std::vector(size); + for (size_t t = 0; t < size; ++t) (*data)[t] = value[t]; + clip_zeroes(); + } + + BIGINT_API BigInteger * BigInteger::operator+(const BigInteger & val) const { BigInteger* create = new BigInteger(*this); @@ -218,6 +227,41 @@ namespace CryptoCPP { return string; } + BIGINT_API BigInteger* BigInteger::mod_pow(BigInteger* base, BigInteger* exp, BigInteger* mod) + { + // Declare new versions that we can manipulate to our heart's content + BigInteger * b = new BigInteger(base); + BigInteger * e = new BigInteger(exp); + BigInteger * m = new BigInteger(mod); + + // Allocate a result + BigInteger * res = new BigInteger(1); + b->imod(*m, false); + + bool r, hb; + while (*exp > 0) // As long as e has bits + { + r = !exp->lowest_set_bit(&hb); // Check if the lowest bit is set + e->ishr(1); // Shift all the bits to the right by one step, effectively deleting the lowest bit + if (r) // Do some magic here + { + res->imul(*b, false); + res->imod(*m, false); + } + + // Magic here too + b->imul(*b, false); + b->imod(*m, false); + } + + // Remember to clean up after ourselves + delete m; + delete e; + delete b; + + return res; + } + BIGINT_API void BigInteger::iadd(const BigInteger & other, bool swaptarget) { diff --git a/XMath/BigInteger.h b/XMath/BigInteger.h index 36f2739..b41332f 100644 --- a/XMath/BigInteger.h +++ b/XMath/BigInteger.h @@ -30,6 +30,7 @@ namespace CryptoCPP { public: BIGINT_API BigInteger(long long initialValue); BIGINT_API BigInteger(const BigInteger& initialvalue); + BIGINT_API BigInteger(const char * value, size_t size); // These should just create a new bigint and call the internal functions on it BIGINT_API BigInteger* operator+(const BigInteger& val) const; @@ -64,6 +65,9 @@ namespace CryptoCPP { BIGINT_API char* toString(); + + BIGINT_API static BigInteger* mod_pow(BigInteger* base, BigInteger* exp, BigInteger* mod); + protected: std::vector* data; bool sign;