Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
55 changes: 55 additions & 0 deletions crates/subspace-proof-of-time/src/aes.rs
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,25 @@ pub(crate) fn verify_sequential(
) -> bool {
assert_eq!(checkpoint_iterations % 2, 0);

#[cfg(target_arch = "x86_64")]
{
cpufeatures::new!(has_aes, "avx512f", "vaes");
if has_aes::get() {
return unsafe {
x86_64::verify_sequential_avx512f(&seed, &key, checkpoints, checkpoint_iterations)
};
}
}

verify_sequential_generic(seed, key, checkpoints, checkpoint_iterations)
}

fn verify_sequential_generic(
seed: PotSeed,
key: PotKey,
checkpoints: &PotCheckpoints,
checkpoint_iterations: u32,
) -> bool {
let key = Array::from(*key);
let cipher = Aes128::new(&key);

Expand Down Expand Up @@ -113,6 +132,12 @@ mod tests {
&checkpoints,
checkpoint_iterations,
));
assert!(verify_sequential_generic(
seed,
key,
&checkpoints,
checkpoint_iterations,
));

// Decryption of invalid cipher text fails.
let mut checkpoints_1 = checkpoints;
Expand All @@ -123,6 +148,12 @@ mod tests {
&checkpoints_1,
checkpoint_iterations,
));
assert!(!verify_sequential_generic(
seed,
key,
&checkpoints_1,
checkpoint_iterations,
));

// Decryption with wrong number of iterations fails.
assert!(!verify_sequential(
Expand All @@ -131,12 +162,24 @@ mod tests {
&checkpoints,
checkpoint_iterations + 2,
));
assert!(!verify_sequential_generic(
seed,
key,
&checkpoints,
checkpoint_iterations + 2,
));
assert!(!verify_sequential(
seed,
key,
&checkpoints,
checkpoint_iterations - 2,
));
assert!(!verify_sequential_generic(
seed,
key,
&checkpoints,
checkpoint_iterations - 2,
));

// Decryption with wrong seed fails.
assert!(!verify_sequential(
Expand All @@ -145,6 +188,12 @@ mod tests {
&checkpoints,
checkpoint_iterations,
));
assert!(!verify_sequential_generic(
PotSeed::from(SEED_1),
key,
&checkpoints,
checkpoint_iterations,
));

// Decryption with wrong key fails.
assert!(!verify_sequential(
Expand All @@ -153,5 +202,11 @@ mod tests {
&checkpoints,
checkpoint_iterations,
));
assert!(!verify_sequential_generic(
seed,
PotKey::from(KEY_1),
&checkpoints,
checkpoint_iterations,
));
}
}
133 changes: 106 additions & 27 deletions crates/subspace-proof-of-time/src/aes/x86_64.rs
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
use core::arch::x86_64::*;
use core::mem;
use subspace_core_primitives::pot::PotCheckpoints;
use core::{array, mem};
use subspace_core_primitives::pot::{PotCheckpoints, PotOutput};

const NUM_ROUND_KEYS: usize = 11;

/// Create PoT proof with checkpoints
#[target_feature(enable = "aes")]
Expand All @@ -12,40 +14,116 @@ pub(super) unsafe fn create(
) -> PotCheckpoints {
let mut checkpoints = PotCheckpoints::default();

let keys_reg = expand_key(key);
let xor_key = _mm_xor_si128(keys_reg[10], keys_reg[0]);
let mut seed_reg = _mm_loadu_si128(seed.as_ptr() as *const __m128i);
seed_reg = _mm_xor_si128(seed_reg, keys_reg[0]);
for checkpoint in checkpoints.iter_mut() {
for _ in 0..checkpoint_iterations {
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[1]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[2]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[3]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[4]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[5]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[6]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[7]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[8]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[9]);
seed_reg = _mm_aesenclast_si128(seed_reg, xor_key);
}
unsafe {
let keys_reg = expand_key(key);
let xor_key = _mm_xor_si128(keys_reg[10], keys_reg[0]);
let mut seed_reg = _mm_loadu_si128(seed.as_ptr() as *const __m128i);
seed_reg = _mm_xor_si128(seed_reg, keys_reg[0]);
for checkpoint in checkpoints.iter_mut() {
for _ in 0..checkpoint_iterations {
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[1]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[2]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[3]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[4]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[5]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[6]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[7]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[8]);
seed_reg = _mm_aesenc_si128(seed_reg, keys_reg[9]);
seed_reg = _mm_aesenclast_si128(seed_reg, xor_key);
}

let checkpoint_reg = _mm_xor_si128(seed_reg, keys_reg[0]);
_mm_storeu_si128(
checkpoint.as_mut().as_mut_ptr() as *mut __m128i,
checkpoint_reg,
);
let checkpoint_reg = _mm_xor_si128(seed_reg, keys_reg[0]);
_mm_storeu_si128(checkpoint.as_mut_ptr() as *mut __m128i, checkpoint_reg);
}
}

checkpoints
}

/// Verification mimics `create` function, but also has decryption half for better performance
#[target_feature(enable = "avx512f,vaes")]
#[inline]
pub(super) unsafe fn verify_sequential_avx512f(
seed: &[u8; 16],
key: &[u8; 16],
checkpoints: &PotCheckpoints,
checkpoint_iterations: u32,
) -> bool {
let checkpoints = PotOutput::repr_from_slice(checkpoints.as_slice());

unsafe {
let keys_reg = expand_key(key);
let xor_key = _mm_xor_si128(keys_reg[10], keys_reg[0]);
let xor_key_512 = _mm512_broadcast_i32x4(xor_key);

// Invert keys for decryption
let mut inv_keys = keys_reg;
for i in 1..10 {
inv_keys[i] = _mm_aesimc_si128(keys_reg[10 - i]);
}

let keys_512 = array::from_fn::<_, NUM_ROUND_KEYS, _>(|i| _mm512_broadcast_i32x4(keys_reg[i]));
let inv_keys_512 =
array::from_fn::<_, NUM_ROUND_KEYS, _>(|i| _mm512_broadcast_i32x4(inv_keys[i]));

let mut input_0 = [[0u8; 16]; 4];
input_0[0] = *seed;
input_0[1..].copy_from_slice(&checkpoints[..3]);
let mut input_0 = _mm512_loadu_si512(input_0.as_ptr() as *const __m512i);
let mut input_1 = _mm512_loadu_si512(checkpoints[3..7].as_ptr() as *const __m512i);

let mut output_0 = _mm512_loadu_si512(checkpoints[0..4].as_ptr() as *const __m512i);
let mut output_1 = _mm512_loadu_si512(checkpoints[4..8].as_ptr() as *const __m512i);

input_0 = _mm512_xor_si512(input_0, keys_512[0]);
input_1 = _mm512_xor_si512(input_1, keys_512[0]);

output_0 = _mm512_xor_si512(output_0, keys_512[10]);
output_1 = _mm512_xor_si512(output_1, keys_512[10]);

for _ in 0..checkpoint_iterations / 2 {
for i in 1..10 {
input_0 = _mm512_aesenc_epi128(input_0, keys_512[i]);
input_1 = _mm512_aesenc_epi128(input_1, keys_512[i]);

output_0 = _mm512_aesdec_epi128(output_0, inv_keys_512[i]);
output_1 = _mm512_aesdec_epi128(output_1, inv_keys_512[i]);
}

input_0 = _mm512_aesenclast_epi128(input_0, xor_key_512);
input_1 = _mm512_aesenclast_epi128(input_1, xor_key_512);

output_0 = _mm512_aesdeclast_epi128(output_0, xor_key_512);
output_1 = _mm512_aesdeclast_epi128(output_1, xor_key_512);
}

// Code below is a more efficient version of this:
// input_0 = _mm512_xor_si512(input_0, keys_512[0]);
// input_1 = _mm512_xor_si512(input_1, keys_512[0]);
// output_0 = _mm512_xor_si512(output_0, keys_512[10]);
// output_1 = _mm512_xor_si512(output_1, keys_512[10]);
//
// let mask0 = _mm512_cmpeq_epu64_mask(input_0, output_0);
// let mask1 = _mm512_cmpeq_epu64_mask(input_1, output_1);

let diff_0 = _mm512_xor_si512(input_0, output_0);
let diff_1 = _mm512_xor_si512(input_1, output_1);

let mask0 = _mm512_cmpeq_epu64_mask(diff_0, xor_key_512);
let mask1 = _mm512_cmpeq_epu64_mask(diff_1, xor_key_512);

// All inputs match outputs
(mask0 & mask1) == u8::MAX
}
}

// Below code copied with minor changes from following place under MIT/Apache-2.0 license by Artyom
// Pavlov:
// https://github.com/RustCrypto/block-ciphers/blob/9413fcadd28d53854954498c0589b747d8e4ade2/aes/src/ni/aes128.rs

/// AES-128 round keys
type RoundKeys = [__m128i; 11];
type RoundKeys = [__m128i; NUM_ROUND_KEYS];

macro_rules! expand_round {
($keys:expr, $pos:expr, $round:expr) => {
Expand All @@ -72,9 +150,10 @@ macro_rules! expand_round {
unsafe fn expand_key(key: &[u8; 16]) -> RoundKeys {
// SAFETY: `RoundKeys` is a `[__m128i; 11]` which can be initialized
// with all zeroes.
let mut keys: RoundKeys = mem::zeroed();
let mut keys: RoundKeys = unsafe { mem::zeroed() };

let k = _mm_loadu_si128(key.as_ptr() as *const __m128i);
// SAFETY: No alignment requirement in `_mm_loadu_si128`
let k = unsafe { _mm_loadu_si128(key.as_ptr() as *const __m128i) };
keys[0] = k;

expand_round!(keys, 1, 0x01);
Expand Down
1 change: 1 addition & 0 deletions crates/subspace-proof-of-time/src/lib.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
//! Proof of time implementation.

#![cfg_attr(target_arch = "x86_64", feature(stdarch_x86_avx512))]
#![no_std]

mod aes;
Expand Down
Loading