Mercurial > projects > dcrypt
annotate dcrypt/crypto/ciphers/RC4.d @ 24:6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
author | Thomas Dixon <reikon@reikon.us> |
---|---|
date | Thu, 19 Feb 2009 14:45:13 -0500 |
parents | 4589f8c5eb3c |
children | 176c933827a8 |
rev | line source |
---|---|
0 | 1 /** |
2 * This file is part of the dcrypt project. | |
3 * | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
4 * Copyright: Copyright (C) dcrypt contributors 2009. All rights reserved. |
0 | 5 * License: MIT |
6 * Authors: Thomas Dixon | |
7 */ | |
8 | |
9 module dcrypt.crypto.ciphers.RC4; | |
10 | |
11 import dcrypt.crypto.StreamCipher; | |
12 | |
13 version (UnitTest) { | |
23
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
14 import dcrypt.misc.ByteConverter; |
0 | 15 } |
16 | |
17 /** Implementation of RC4 designed by Ron Rivest of RSA Security. */ | |
18 class RC4 : StreamCipher { | |
1
483e4467b5f6
Added Blowfish with test vectors. Minor cleanup of other cipher classes (should probably clean more). Continued work on high-level cipher API (didn't get very far).
Thomas Dixon <reikon@reikon.us>
parents:
0
diff
changeset
|
19 private { |
483e4467b5f6
Added Blowfish with test vectors. Minor cleanup of other cipher classes (should probably clean more). Continued work on high-level cipher API (didn't get very far).
Thomas Dixon <reikon@reikon.us>
parents:
0
diff
changeset
|
20 ubyte[] state, |
483e4467b5f6
Added Blowfish with test vectors. Minor cleanup of other cipher classes (should probably clean more). Continued work on high-level cipher API (didn't get very far).
Thomas Dixon <reikon@reikon.us>
parents:
0
diff
changeset
|
21 workingKey; |
483e4467b5f6
Added Blowfish with test vectors. Minor cleanup of other cipher classes (should probably clean more). Continued work on high-level cipher API (didn't get very far).
Thomas Dixon <reikon@reikon.us>
parents:
0
diff
changeset
|
22 ubyte x, y; |
483e4467b5f6
Added Blowfish with test vectors. Minor cleanup of other cipher classes (should probably clean more). Continued work on high-level cipher API (didn't get very far).
Thomas Dixon <reikon@reikon.us>
parents:
0
diff
changeset
|
23 } |
0 | 24 |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
25 this() { |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
26 state = new ubyte[256]; |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
27 } |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
28 |
0 | 29 void init(bool encrypt, CipherParameters params) { |
30 SymmetricKey keyParams = cast(SymmetricKey)params; | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
31 |
0 | 32 if (!keyParams) |
33 throw new InvalidParameterError( | |
34 name()~": Invalid parameter passed to init"); | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
35 |
0 | 36 if (keyParams.key.length < 0 || keyParams.key.length > 256) |
37 throw new InvalidKeyError( | |
38 name()~": Invalid key length (requires 1-256 bytes)"); | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
39 |
0 | 40 workingKey = keyParams.key; |
41 setup(workingKey); | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
42 |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
43 _encrypt = _initialized = true; |
0 | 44 } |
45 | |
46 char[] name() { | |
47 return "RC4"; | |
48 } | |
49 | |
50 ubyte returnByte(ubyte input) { | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
51 if (!_initialized) |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
52 throw new NotInitializedError(name()~": Cipher not initialized"); |
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
53 |
0 | 54 y += state[++x]; |
55 ubyte t = state[x]; | |
56 state[x] = state[y]; | |
57 state[y] = t; | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
58 |
0 | 59 return (input^state[cast(ubyte)(state[x]+state[y])]); |
60 } | |
61 | |
12
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
62 uint update(void[] input_, void[] output_) { |
14
5ce3012f1def
Removed some redundancy in code. Added NotSupportedError, a base PRNG class and a class which creates a PRNG from a hash function. Changed the MAC class' finalization methods to digest and hexDigest instead of finish and hexFinish respectively. Also added a base Checksum class, crc32 and adler32 in dcrypt.misc as per request.
Thomas Dixon <reikon@reikon.us>
parents:
12
diff
changeset
|
63 if (!_initialized) |
0 | 64 throw new NotInitializedError(name()~": Cipher not initialized"); |
65 | |
8
23c62e28b3a4
Reworked symmetric cipher classes to have SymmetricCipher as their superclass, and follow the general interface of init(), process(), etc. Made sure everything still passed test vectors. Removed Cipher class. I'll worry about that shit when we support something other than symmetric ciphers.
Thomas Dixon <reikon@reikon.us>
parents:
6
diff
changeset
|
66 ubyte[] input = cast(ubyte[]) input_, |
12
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
67 output = cast(ubyte[]) output_; |
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
68 |
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
69 if (input.length > output.length) |
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
70 throw new ShortBufferError(name()~": Output buffer too short"); |
0 | 71 |
8
23c62e28b3a4
Reworked symmetric cipher classes to have SymmetricCipher as their superclass, and follow the general interface of init(), process(), etc. Made sure everything still passed test vectors. Removed Cipher class. I'll worry about that shit when we support something other than symmetric ciphers.
Thomas Dixon <reikon@reikon.us>
parents:
6
diff
changeset
|
72 for (int i = 0; i < input.length; i++) { |
0 | 73 y += state[++x]; |
74 ubyte t = state[x]; | |
75 state[x] = state[y]; | |
76 state[y] = t; | |
8
23c62e28b3a4
Reworked symmetric cipher classes to have SymmetricCipher as their superclass, and follow the general interface of init(), process(), etc. Made sure everything still passed test vectors. Removed Cipher class. I'll worry about that shit when we support something other than symmetric ciphers.
Thomas Dixon <reikon@reikon.us>
parents:
6
diff
changeset
|
77 output[i] = input[i] ^ state[cast(ubyte)(state[x]+state[y])]; |
0 | 78 } |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
79 |
12
8c7f8fecdd75
Added ManagedBlockCipher, changed Crypto to just import everything, made Hash.update() return itself (for chaining) and ditched BlockCipherWrapper.
Thomas Dixon <reikon@reikon.us>
parents:
8
diff
changeset
|
80 return input.length; |
0 | 81 } |
82 | |
83 void reset() { | |
84 setup(workingKey); | |
85 } | |
86 | |
87 // Do RC4's key setup in a separate method to ease resetting | |
88 private void setup(ubyte[] key) { | |
89 for (int i = 0; i < 256; i++) | |
90 state[i] = cast(ubyte)i; | |
91 | |
92 x = 0; | |
93 for (int i = 0; i < 256; i++) { | |
94 x += key[i % key.length] + state[i]; | |
95 ubyte t = state[i]; | |
96 state[i] = state[x]; | |
97 state[x] = t; | |
98 } | |
24
6428dfd7fede
Implemented Salsa20. Added some error checking to RC4's returnByte. Fixed copyright year in Bitwise.d and ByteConverter.d. Added Robert Smith to contributors file. Thanks buddy :)
Thomas Dixon <reikon@reikon.us>
parents:
23
diff
changeset
|
99 |
0 | 100 x = y = 0; |
101 } | |
102 | |
103 /** Some RC4 test vectors. */ | |
104 version (UnitTest) { | |
105 unittest { | |
106 static const char[][] test_keys = [ | |
107 "0123456789abcdef", | |
108 "0123456789abcdef", | |
109 "0000000000000000", | |
110 "ef012345", | |
111 "0123456789abcdef" | |
112 ]; | |
113 | |
114 static const char[][] test_plaintexts = [ | |
115 "0123456789abcdef", | |
116 "0000000000000000", | |
117 "0000000000000000", | |
118 "00000000000000000000", | |
119 "01010101010101010101010101010101"~ | |
120 "01010101010101010101010101010101"~ | |
121 "01010101010101010101010101010101"~ | |
122 "01010101010101010101010101010101"~ | |
123 "01010101010101010101010101010101"~ | |
124 "01010101010101010101010101010101"~ | |
125 "01010101010101010101010101010101"~ | |
126 "01010101010101010101010101010101"~ | |
127 "01010101010101010101010101010101"~ | |
128 "01010101010101010101010101010101"~ | |
129 "01010101010101010101010101010101"~ | |
130 "01010101010101010101010101010101"~ | |
131 "01010101010101010101010101010101"~ | |
132 "01010101010101010101010101010101"~ | |
133 "01010101010101010101010101010101"~ | |
134 "01010101010101010101010101010101"~ | |
135 "01010101010101010101010101010101"~ | |
136 "01010101010101010101010101010101"~ | |
137 "01010101010101010101010101010101"~ | |
138 "01010101010101010101010101010101"~ | |
139 "01010101010101010101010101010101"~ | |
140 "01010101010101010101010101010101"~ | |
141 "01010101010101010101010101010101"~ | |
142 "01010101010101010101010101010101"~ | |
143 "01010101010101010101010101010101"~ | |
144 "01010101010101010101010101010101"~ | |
145 "01010101010101010101010101010101"~ | |
146 "01010101010101010101010101010101"~ | |
147 "01010101010101010101010101010101"~ | |
148 "01010101010101010101010101010101"~ | |
149 "01010101010101010101010101010101"~ | |
150 "01010101010101010101010101010101" | |
151 ]; | |
152 | |
153 static const char[][] test_ciphertexts = [ | |
154 "75b7878099e0c596", | |
155 "7494c2e7104b0879", | |
156 "de188941a3375d3a", | |
157 "d6a141a7ec3c38dfbd61", | |
158 "7595c3e6114a09780c4ad452338e1ffd"~ | |
159 "9a1be9498f813d76533449b6778dcad8"~ | |
160 "c78a8d2ba9ac66085d0e53d59c26c2d1"~ | |
161 "c490c1ebbe0ce66d1b6b1b13b6b919b8"~ | |
162 "47c25a91447a95e75e4ef16779cde8bf"~ | |
163 "0a95850e32af9689444fd377108f98fd"~ | |
164 "cbd4e726567500990bcc7e0ca3c4aaa3"~ | |
165 "04a387d20f3b8fbbcd42a1bd311d7a43"~ | |
166 "03dda5ab078896ae80c18b0af66dff31"~ | |
167 "9616eb784e495ad2ce90d7f772a81747"~ | |
168 "b65f62093b1e0db9e5ba532fafec4750"~ | |
169 "8323e671327df9444432cb7367cec82f"~ | |
170 "5d44c0d00b67d650a075cd4b70dedd77"~ | |
171 "eb9b10231b6b5b741347396d62897421"~ | |
172 "d43df9b42e446e358e9c11a9b2184ecb"~ | |
173 "ef0cd8e7a877ef968f1390ec9b3d35a5"~ | |
174 "585cb009290e2fcde7b5ec66d9084be4"~ | |
175 "4055a619d9dd7fc3166f9487f7cb2729"~ | |
176 "12426445998514c15d53a18c864ce3a2"~ | |
177 "b7555793988126520eacf2e3066e230c"~ | |
178 "91bee4dd5304f5fd0405b35bd99c7313"~ | |
179 "5d3d9bc335ee049ef69b3867bf2d7bd1"~ | |
180 "eaa595d8bfc0066ff8d31509eb0c6caa"~ | |
181 "006c807a623ef84c3d33c195d23ee320"~ | |
182 "c40de0558157c822d4b8c569d849aed5"~ | |
183 "9d4e0fd7f379586b4b7ff684ed6a189f"~ | |
184 "7486d49b9c4bad9ba24b96abf924372c"~ | |
185 "8a8fffb10d55354900a77a3db5f205e1"~ | |
186 "b99fcd8660863a159ad4abe40fa48934"~ | |
187 "163ddde542a6585540fd683cbfd8c00f"~ | |
188 "12129a284deacc4cdefe58be7137541c"~ | |
189 "047126c8d49e2755ab181ab7e940b0c0" | |
190 ]; | |
191 | |
192 RC4 r = new RC4(); | |
193 foreach (uint i, char[] test_key; test_keys) { | |
194 ubyte[] buffer = new ubyte[test_plaintexts[i].length>>1]; | |
195 char[] result; | |
196 | |
23
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
197 r.init(true, new SymmetricKey(ByteConverter.hexDecode(test_key))); |
0 | 198 |
199 // Encryption | |
23
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
200 r.update(ByteConverter.hexDecode(test_plaintexts[i]), buffer); |
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
201 result = ByteConverter.hexEncode(buffer); |
0 | 202 assert(result == test_ciphertexts[i], |
2
71aae178f89a
Added copy() to hash functions. Modified some code style.
Thomas Dixon <reikon@reikon.us>
parents:
1
diff
changeset
|
203 r.name~": ("~result~") != ("~test_ciphertexts[i]~")"); |
0 | 204 |
205 r.reset(); | |
206 | |
207 // Decryption | |
23
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
208 r.update(ByteConverter.hexDecode(test_ciphertexts[i]), buffer); |
4589f8c5eb3c
Replaced dcrypt.crypto.Util with dcrypt.misc.Bitwise and dcrypt.misc.ByteConverter. Altered all dependent files to reflect changes.
Thomas Dixon <reikon@reikon.us>
parents:
14
diff
changeset
|
209 result = ByteConverter.hexEncode(buffer); |
0 | 210 assert(result == test_plaintexts[i], |
6
5cb17e09d685
Minor edits to the unittests of hash functions and ciphers. Added AES and test vectors.
Thomas Dixon <reikon@reikon.us>
parents:
2
diff
changeset
|
211 r.name~": ("~result~") != ("~test_plaintexts[i]~")"); |
0 | 212 } |
213 } | |
214 } | |
215 } |