From f0ff8340bac4f666d487b8ed4807f2942fbfd185 Mon Sep 17 00:00:00 2001 From: Moudy Date: Thu, 7 Aug 2025 11:00:20 +0200 Subject: [PATCH] removed --- .DS_Store | Bin 8196 -> 10244 bytes encryption-demo-methods/Cargo.toml | 16 --- encryption-demo-methods/build.rs | 4 - .../guest/chacha20/Cargo.toml | 18 --- .../guest/chacha20/src/main.rs | 27 ----- encryption-demo-methods/src/lib.rs | 2 - encryption-demo/.DS_Store | Bin 0 -> 6148 bytes encryption-demo/Cargo.toml | 17 --- encryption-demo/encryption-demo/.DS_Store | Bin 0 -> 6148 bytes encryption-demo/encryption-demo/src/main.rs | 14 --- encryption-demo/src/lib.rs | 114 ------------------ encryption-demo/src/main.rs | 1 - 12 files changed, 213 deletions(-) delete mode 100644 encryption-demo-methods/Cargo.toml delete mode 100644 encryption-demo-methods/build.rs delete mode 100644 encryption-demo-methods/guest/chacha20/Cargo.toml delete mode 100644 encryption-demo-methods/guest/chacha20/src/main.rs delete mode 100644 encryption-demo-methods/src/lib.rs create mode 100644 encryption-demo/.DS_Store delete mode 100644 encryption-demo/Cargo.toml create mode 100644 encryption-demo/encryption-demo/.DS_Store delete mode 100644 encryption-demo/encryption-demo/src/main.rs delete mode 100644 encryption-demo/src/lib.rs delete mode 100644 encryption-demo/src/main.rs diff --git a/.DS_Store b/.DS_Store index 1472fea03afefdd29f856e433147c816ce7bcb5d..15851dd5933914217659d919a767db875ab3046b 100644 GIT binary patch literal 10244 zcmeHM&u<$=6n>l7&W5xi2dYR#NGp&KLTT!h{tCUgsROD6NUae)(8{&FR$^uCv1}&> zqDWQ`NWcY^e}Fq6xF9%kD+eUt09QC5&XgOc^1Ydf{brLbB1klc8EN+I&b;^Ld*8en zXC_1xtZv22L=h2%s4VA?;c-CWey;nGfGvFEU40r}S z14o4c{AP0r=Zy4E&wyvZGcaa=_lF3TWy#8sk$UUELmvSkb7S1gJ z1PPuE+Ps>mh8>5OGLNzJKo>Si*$iOQrX*$adCKN-YElQjd-OJSX@E!-zE4q%_BJWk zI(X{eS=WdCuEqORy_>Z9gJSXLU}`#-FU*89;aqsDvZ02RL2a zwfY;a=CC^d#1+*U)LNZpPaCx2CRA?TXmw&WTvc10xUX$1rX!pUXRGrIJ3D93zpxlx zIJ>(T?W~+BE=DUWXLfgI!xPV(zI461nY26VJ?0HNqTM;^xcMGG-^bfOP_$j?brRKC zXE&$|4<{7VwxKbg4GE!-Y zBzGPu+M+&EwV2Z6l+Ms}V|(@!9oyKCjP35%A~vBhiS1wwH@1&406jTDirMaCMiSJ9 zUR>LFJB5YDBWz=VH?ZvZ8_U~`N-s4T)giq~241`~diwDABwO(E{ffziL*iwohmXW`PzKfoas!2E{ZLYwK_3V4-CZXI387}2r&X{~82y{|}Y z1)bFivOA`ltII1ocwVe%N7spl!r%3{yh5xm8Phd2j>+*MBg@ip;se=woOfswJ5URs zsr{I+x1=x&T^IAU@6x^`=JLA&v+yA?XX!YY%^&RrVjn~B)2Ft}Gw&P+V79t0=Hp+C zG24ELIr=t*d8{*8yIDF8X8H!h_~IGx40r}S1D=7S&%m^S81eo8TK50{kA5H?p=ZD| zaA*dCT)9$Sh56nMQQ8yVwMVG8QMs_*$VhF12di+qzK+KSU&lXZ+lnl?puc40$VhFD vc5M#%fBiEc<9s zzWKZe8{=d~v8Kr@#j+>oh)`0h_@s1e)-s!)#4F$x_@5Lo z=YxbB3>hnj_UJ%ip8&u*x~-vZeisZ!GKP$mLquT0QGt#s_=zDL9sQE?LdMFWqm$sr zhv1n7zfgpo9pg)zP9k*ZORs=eU|E5hYqre&e{%i%f0^W4UIDMbjZ#3=kE7!rmc)1K y%HqsjE8*|q#!O!2&{9zFb!;o;T2e`0>1!|!L;uH literal 0 HcmV?d00001 diff --git a/encryption-demo/Cargo.toml b/encryption-demo/Cargo.toml deleted file mode 100644 index 3461c8f..0000000 --- a/encryption-demo/Cargo.toml +++ /dev/null @@ -1,17 +0,0 @@ -[package] -name = "encryption-demo" -version = "0.1.0" -edition = "2021" -publish = false - -[dependencies] -risc0-zkvm = "2.2" -rand = { version = "0.8", features = ["std"]} -hex = "0.4" - -encryption-demo-methods = { path = "../encryption-demo-methods" } -risc0-build = "2.2" - -[[bin]] -name = "encrypt-demo" -path = "src/main.rs" diff --git a/encryption-demo/encryption-demo/.DS_Store b/encryption-demo/encryption-demo/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..20772dc2d294cfe04ce68d4c2e3f7800ea1ebebd GIT binary patch literal 6148 zcmeHKK}!Nb6rNGb6$v~PcwFczq*z&WSKQKUhmlcT^itcH&uzwBAoPB7~h1jTIk__xFzXgLROh(n}yUb*BYwLL@?-ZR| z|3OXsQD-zxnw{Y_JzXdj1#`O-T!#HgyR><%;!!7z`$L@&_WB69xeDW+nl#lo?j<_c zHxo|5DYQ%F>9pS1ueb+$vx+;dRd;K!>xZ*h!P(m0IXZ7YMo+PNF~m!JlUg<`&fyh? zt>)Pu#*vEe;h9IzqZpY1W`G%3T?Xul=M-1BM6Qe(Ue z;X--_d1MBdfkg(W_k)z^{y+J-|JOl0FaylMYBC^mEx*-7ZT4(n7kURJp}5rG kR|*V$6(g3e;xbeV{4N<{9 literal 0 HcmV?d00001 diff --git a/encryption-demo/encryption-demo/src/main.rs b/encryption-demo/encryption-demo/src/main.rs deleted file mode 100644 index 85f20af..0000000 --- a/encryption-demo/encryption-demo/src/main.rs +++ /dev/null @@ -1,14 +0,0 @@ -use encryption_demo::*; -use rand::Rng; - -fn main() -> anyhow::Result<()> { - let msg = b"zk-encrypted hello world!"; - let mut rng = rand::thread_rng(); - let key: [u8; 32] = rng.gen(); - let nonce: [u8; 12] = rng.gen(); - - let (ciphertext, _proof) = encrypt_chacha20(&key, &nonce, msg)?; - println!("ciphertext = {}", hex::encode(ciphertext)); - println!("proof OK"); - Ok(()) -} diff --git a/encryption-demo/src/lib.rs b/encryption-demo/src/lib.rs deleted file mode 100644 index feaab80..0000000 --- a/encryption-demo/src/lib.rs +++ /dev/null @@ -1,114 +0,0 @@ -//! Host-side helpers: prove encryption inside RISC Zero and verify receipts. - -use risc0_zkvm::{ - default_prover, ExecutorEnv, Receipt, -}; -use encryption_demo_methods::{ - CHACHA20_ELF, CHACHA20_ID, XCHACHA20_ELF, XCHACHA20_ID, -}; - -/// Encrypt `plaintext` with ChaCha20 inside the zkVM. -/// Returns `(ciphertext, receipt)`. -pub fn encrypt_chacha20( - key: &[u8; 32], - nonce: &[u8; 12], - plaintext: &[u8], -) -> anyhow::Result<(Vec, Receipt)> { - let env = ExecutorEnv::builder() - .write(key)? - .write(nonce)? - .write(&(plaintext.len() as u32))? - .write_slice(plaintext)? - .build()?; - - let prover = default_prover(); - let receipt = prover.prove(env, CHACHA20_ELF)?; - receipt.verify(CHACHA20_ID)?; - - let ciphertext: Vec = receipt.journal.decode()?; - Ok((ciphertext, receipt)) -} - -/// Same API for XChaCha20 (24-byte nonce) -pub fn encrypt_xchacha20( - key: &[u8; 32], - nonce: &[u8; 24], - plaintext: &[u8], -) -> anyhow::Result<(Vec, Receipt)> { - let env = ExecutorEnv::builder() - .write(key)? - .write(nonce)? - .write(&(plaintext.len() as u32))? - .write_slice(plaintext)? - .build()?; - - let prover = default_prover(); - let receipt = prover.prove(env, XCHACHA20_ELF)?; - receipt.verify(XCHACHA20_ID)?; - - let ciphertext: Vec = receipt.journal.decode()?; - Ok((ciphertext, receipt)) -} - - -// Test for chacha20 -#[cfg(test)] -mod tests { - use super::*; - use chacha20::cipher::{KeyIvInit, StreamCipher}; - use chacha20::ChaCha20; - - // RFC 8439 test vector - const KEY: [u8; 32] = [ - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 - ]; - const NONCE: [u8; 12] = [0; 12]; - const PLAINTEXT: [u8; 16] = *b"example message!"; - - #[test] - fn chacha20_vector_matches() { - let (ciphertext, _) = encrypt_chacha20(&KEY, &NONCE, &PLAINTEXT).unwrap(); - - // host decryption - let mut buf = ciphertext.clone(); - let mut cipher = ChaCha20::new(&KEY.into(), &NONCE.into()); - cipher.apply_keystream(&mut buf); - - assert_eq!(&buf, &PLAINTEXT); - } -} - - -// Tests for Xchacha20 -#[cfg(test)] -mod tests { - use super::*; - use xchacha20::cipher::{KeyIvInit, StreamCipher}; - use xchacha20::xChaCha20; - - // RFC 8439 test vector - const KEY: [u8; 32] = [ - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, - 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 - ]; - const NONCE: [u8; 12] = [0; 12]; - const PLAINTEXT: [u8; 16] = *b"example message!"; - - #[test] - fn xchacha20_vector_matches() { - let (ciphertext, _) = encrypt_xchacha20(&KEY, &NONCE, &PLAINTEXT).unwrap(); - - // host decryption - let mut buf = ciphertext.clone(); - let mut cipher = xChaCha20::new(&KEY.into(), &NONCE.into()); - cipher.apply_keystream(&mut buf); - - assert_eq!(&buf, &PLAINTEXT); - } -} - diff --git a/encryption-demo/src/main.rs b/encryption-demo/src/main.rs deleted file mode 100644 index 1a4baf5..0000000 --- a/encryption-demo/src/main.rs +++ /dev/null @@ -1 +0,0 @@ -