📄 twofish2.cpp
字号:
#include <string.h>
#include <io.h>
#include <winsock2.h>
typedef unsigned char BYTE;
typedef unsigned long DWORD; /* 32-bit unsigned quantity */
/* $Id: Twofish.java,v 1.4 2000/02/12 03:14:31 gelderen Exp $
*
* Copyright (C) 1997-2000 The Cryptix Foundation Limited.
* All rights reserved.
*
* Use, modification, copying and distribution of this software is subject
* the terms and conditions of the Cryptix General Licence. You should have
* received a copy of the Cryptix General Licence along with this library;
* if not, you can download a copy from http://www.cryptix.org/ .
*
*
* --- jojo@farm9.com, August 2000, converted from Java to C++, added CBC mode and
* ciphertext stealing technique, added AsciiTwofish class for easy encryption
* decryption of text strings
*/
/** Fixed 8x8 permutation S-boxes */
static unsigned char P[2][256] =
{
{ // p0
0xA9, 0x67, 0xB3, 0xE8,
0x04, 0xFD, 0xA3, 0x76,
0x9A, 0x92, 0x80, 0x78,
0xE4, 0xDD, 0xD1, 0x38,
0x0D, 0xC6, 0x35, 0x98,
0x18, 0xF7, 0xEC, 0x6C,
0x43, 0x75, 0x37, 0x26,
0xFA, 0x13, 0x94, 0x48,
0xF2, 0xD0, 0x8B, 0x30,
0x84, 0x54, 0xDF, 0x23,
0x19, 0x5B, 0x3D, 0x59,
0xF3, 0xAE, 0xA2, 0x82,
0x63, 0x01, 0x83, 0x2E,
0xD9, 0x51, 0x9B, 0x7C,
0xA6, 0xEB, 0xA5, 0xBE,
0x16, 0x0C, 0xE3, 0x61,
0xC0, 0x8C, 0x3A, 0xF5,
0x73, 0x2C, 0x25, 0x0B,
0xBB, 0x4E, 0x89, 0x6B,
0x53, 0x6A, 0xB4, 0xF1,
0xE1, 0xE6, 0xBD, 0x45,
0xE2, 0xF4, 0xB6, 0x66,
0xCC, 0x95, 0x03, 0x56,
0xD4, 0x1C, 0x1E, 0xD7,
0xFB, 0xC3, 0x8E, 0xB5,
0xE9, 0xCF, 0xBF, 0xBA,
0xEA, 0x77, 0x39, 0xAF,
0x33, 0xC9, 0x62, 0x71,
0x81, 0x79, 0x09, 0xAD,
0x24, 0xCD, 0xF9, 0xD8,
0xE5, 0xC5, 0xB9, 0x4D,
0x44, 0x08, 0x86, 0xE7,
0xA1, 0x1D, 0xAA, 0xED,
0x06, 0x70, 0xB2, 0xD2,
0x41, 0x7B, 0xA0, 0x11,
0x31, 0xC2, 0x27, 0x90,
0x20, 0xF6, 0x60, 0xFF,
0x96, 0x5C, 0xB1, 0xAB,
0x9E, 0x9C, 0x52, 0x1B,
0x5F, 0x93, 0x0A, 0xEF,
0x91, 0x85, 0x49, 0xEE,
0x2D, 0x4F, 0x8F, 0x3B,
0x47, 0x87, 0x6D, 0x46,
0xD6, 0x3E, 0x69, 0x64,
0x2A, 0xCE, 0xCB, 0x2F,
0xFC, 0x97, 0x05, 0x7A,
0xAC, 0x7F, 0xD5, 0x1A,
0x4B, 0x0E, 0xA7, 0x5A,
0x28, 0x14, 0x3F, 0x29,
0x88, 0x3C, 0x4C, 0x02,
0xB8, 0xDA, 0xB0, 0x17,
0x55, 0x1F, 0x8A, 0x7D,
0x57, 0xC7, 0x8D, 0x74,
0xB7, 0xC4, 0x9F, 0x72,
0x7E, 0x15, 0x22, 0x12,
0x58, 0x07, 0x99, 0x34,
0x6E, 0x50, 0xDE, 0x68,
0x65, 0xBC, 0xDB, 0xF8,
0xC8, 0xA8, 0x2B, 0x40,
0xDC, 0xFE, 0x32, 0xA4,
0xCA, 0x10, 0x21, 0xF0,
0xD3, 0x5D, 0x0F, 0x00,
0x6F, 0x9D, 0x36, 0x42,
0x4A, 0x5E, 0xC1, 0xE0
},
{ // p1
0x75, 0xF3, 0xC6, 0xF4,
0xDB, 0x7B, 0xFB, 0xC8,
0x4A, 0xD3, 0xE6, 0x6B,
0x45, 0x7D, 0xE8, 0x4B,
0xD6, 0x32, 0xD8, 0xFD,
0x37, 0x71, 0xF1, 0xE1,
0x30, 0x0F, 0xF8, 0x1B,
0x87, 0xFA, 0x06, 0x3F,
0x5E, 0xBA, 0xAE, 0x5B,
0x8A, 0x00, 0xBC, 0x9D,
0x6D, 0xC1, 0xB1, 0x0E,
0x80, 0x5D, 0xD2, 0xD5,
0xA0, 0x84, 0x07, 0x14,
0xB5, 0x90, 0x2C, 0xA3,
0xB2, 0x73, 0x4C, 0x54,
0x92, 0x74, 0x36, 0x51,
0x38, 0xB0, 0xBD, 0x5A,
0xFC, 0x60, 0x62, 0x96,
0x6C, 0x42, 0xF7, 0x10,
0x7C, 0x28, 0x27, 0x8C,
0x13, 0x95, 0x9C, 0xC7,
0x24, 0x46, 0x3B, 0x70,
0xCA, 0xE3, 0x85, 0xCB,
0x11, 0xD0, 0x93, 0xB8,
0xA6, 0x83, 0x20, 0xFF,
0x9F, 0x77, 0xC3, 0xCC,
0x03, 0x6F, 0x08, 0xBF,
0x40, 0xE7, 0x2B, 0xE2,
0x79, 0x0C, 0xAA, 0x82,
0x41, 0x3A, 0xEA, 0xB9,
0xE4, 0x9A, 0xA4, 0x97,
0x7E, 0xDA, 0x7A, 0x17,
0x66, 0x94, 0xA1, 0x1D,
0x3D, 0xF0, 0xDE, 0xB3,
0x0B, 0x72, 0xA7, 0x1C,
0xEF, 0xD1, 0x53, 0x3E,
0x8F, 0x33, 0x26, 0x5F,
0xEC, 0x76, 0x2A, 0x49,
0x81, 0x88, 0xEE, 0x21,
0xC4, 0x1A, 0xEB, 0xD9,
0xC5, 0x39, 0x99, 0xCD,
0xAD, 0x31, 0x8B, 0x01,
0x18, 0x23, 0xDD, 0x1F,
0x4E, 0x2D, 0xF9, 0x48,
0x4F, 0xF2, 0x65, 0x8E,
0x78, 0x5C, 0x58, 0x19,
0x8D, 0xE5, 0x98, 0x57,
0x67, 0x7F, 0x05, 0x64,
0xAF, 0x63, 0xB6, 0xFE,
0xF5, 0xB7, 0x3C, 0xA5,
0xCE, 0xE9, 0x68, 0x44,
0xE0, 0x4D, 0x43, 0x69,
0x29, 0x2E, 0xAC, 0x15,
0x59, 0xA8, 0x0A, 0x9E,
0x6E, 0x47, 0xDF, 0x34,
0x35, 0x6A, 0xCF, 0xDC,
0x22, 0xC9, 0xC0, 0x9B,
0x89, 0xD4, 0xED, 0xAB,
0x12, 0xA2, 0x0D, 0x52,
0xBB, 0x02, 0x2F, 0xA9,
0xD7, 0x61, 0x1E, 0xB4,
0x50, 0x04, 0xF6, 0xC2,
0x16, 0x25, 0x86, 0x56,
0x55, 0x09, 0xBE, 0x91
}
};
/** MDS matrix */
static int MDS[4][256]; // blank final
#include "twofish2.h"
////////////////////////////////////////////////////////////////////
////////////////////// DEFINES /////////////////////////////////////
////////////////////////////////////////////////////////////////////
#define LFSR1(x) ( ((x) >> 1) ^ (((x) & 0x01) ? MDS_GF_FDBK/2 : 0))
#define LFSR2(x) ( ((x) >> 2) ^ (((x) & 0x02) ? MDS_GF_FDBK/2 : 0) ^ (((x) & 0x01) ? MDS_GF_FDBK/4 : 0))
#define Mx_1(x) ((DWORD) (x)) /* force result to dword so << will work */
#define Mx_X(x) ((DWORD) ((x) ^ LFSR2(x))) /* 5B */
#define Mx_Y(x) ((DWORD) ((x) ^ LFSR1(x) ^ LFSR2(x))) /* EF */
#define RS_rem(x) { BYTE b = (BYTE) (x >> 24); DWORD g2 = ((b << 1) ^ ((b & 0x80) ? RS_GF_FDBK : 0 )) & 0xFF; DWORD g3 = ((b >> 1) & 0x7F) ^ ((b & 1) ? RS_GF_FDBK >> 1 : 0 ) ^ g2 ; x = (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b; }
//#define _b(x,N) (((BYTE *)&x)[((N) & 3) ^ ADDR_XOR]) /* pick bytes out of a dword */
#define _b(x,N) (((BYTE *)&x)[((N) & 3)]) /* pick bytes out of a dword */
#define b0(x) _b(x,0) /* extract LSB of DWORD */
#define b1(x) _b(x,1)
#define b2(x) _b(x,2)
#define b3(x) _b(x,3) /* extract MSB of DWORD */
////////////////////////////////////////////////////////////////////
////////////////////// METHODS /////////////////////////////////////
////////////////////////////////////////////////////////////////////
void TwoFish::precomputeMDSmatrix() {
// precompute the MDS matrix
int m1[2];
int mX[2];
int mY[2];
int i, j;
for (i = 0; i < 256; i++) {
j = P[0][i] & 0xFF; // compute all the matrix elements
m1[0] = j;
mX[0] = Mx_X( j ) & 0xFF;
mY[0] = Mx_Y( j ) & 0xFF;
j = P[1][i] & 0xFF;
m1[1] = j;
mX[1] = Mx_X( j ) & 0xFF;
mY[1] = Mx_Y( j ) & 0xFF;
MDS[0][i] = m1[P_00] << 0 | // fill matrix w/ above elements
mX[P_00] << 8 |
mY[P_00] << 16 |
mY[P_00] << 24;
MDS[1][i] = mY[P_10] << 0 |
mY[P_10] << 8 |
mX[P_10] << 16 |
m1[P_10] << 24;
MDS[2][i] = mX[P_20] << 0 |
mY[P_20] << 8 |
m1[P_20] << 16 |
mY[P_20] << 24;
MDS[3][i] = mX[P_30] << 0 |
m1[P_30] << 8 |
mY[P_30] << 16 |
mX[P_30] << 24;
}
}
// Constructor
//...........................................................................
TwoFish::TwoFish(char* userkey, bool _decrypt, FILE* _fpout, unsigned char* _outputBuffer ) {
decrypt = _decrypt;
fpout = _fpout;
if ( fpout == NULL ) {
outputIsFile = false;
} else {
outputIsFile = true;
}
outputBuffer = _outputBuffer;
if ( outputBuffer == NULL ) {
outputIsBuffer = false;
} else {
outputIsBuffer = true;
}
outputIsSocket = false;
precomputeMDSmatrix();
makeSubKeys(userkey);
qBlockDefined = false;
cryptIsDisabled = false;
}
// Private methods
//...........................................................................
/**
* Expand a user-supplied key material into a session key.
*
* @param key The 64/128/192/256-bit user-key to use.
* @return This cipher's round keys.
* @exception InvalidKeyException If the key is invalid.
*/
void TwoFish::makeSubKeys( char* k ) {
int length = 32;
int k64Cnt = length / 8;
int k32e[4]; // even 32-bit entities
int k32o[4]; // odd 32-bit entities
int sBoxKey[4];
// split user key material into even and odd 32-bit entities and
// compute S-box keys using (12, 8) Reed-Solomon code over GF(256)
int i, j, offset = 0;
for (i = 0, j = k64Cnt-1; i < 4 && offset < length; i++, j--) {
k32e[i] = (k[offset] & 0xFF) |
(k[offset+1] & 0xFF) << 8 |
(k[offset+2] & 0xFF) << 16 |
(k[offset+3] & 0xFF) << 24;
offset += 4;
k32o[i] = (k[offset] & 0xFF) |
(k[offset+1] & 0xFF) << 8 |
(k[offset+2] & 0xFF) << 16 |
(k[offset+3] & 0xFF) << 24;
offset += 4;
sBoxKey[j] = RS_MDS_Encode( k32e[i], k32o[i] ); // reverse order
}
// compute the round decryption subkeys for PHT. these same subkeys
// will be used in encryption but will be applied in reverse order.
unsigned int A, B, q=0;
i=0;
while(i < TOTAL_SUBKEYS) {
A = F32( k64Cnt, q, k32e ); // A uses even key entities
q += SK_BUMP;
B = F32( k64Cnt, q, k32o ); // B uses odd key entities
q += SK_BUMP;
B = B << 8 | B >> 24;
A += B;
subKeys[i++] = A; // combine with a PHT
A += B;
subKeys[i++] = A << SK_ROTL | A >> (32-SK_ROTL);
}
// fully expand the table for speed
int k0 = sBoxKey[0];
int k1 = sBoxKey[1];
int k2 = sBoxKey[2];
int k3 = sBoxKey[3];
int b0, b1, b2, b3;
for (i = 0; i < 256; i++) {
b0 = b1 = b2 = b3 = i;
switch (k64Cnt & 3) {
case 1:
sBox[ 2*i ] = MDS[0][(P[P_01][b0] & 0xFF) ^ b0(k0)];
sBox[ 2*i+1] = MDS[1][(P[P_11][b1] & 0xFF) ^ b1(k0)];
sBox[0x200+2*i ] = MDS[2][(P[P_21][b2] & 0xFF) ^ b2(k0)];
sBox[0x200+2*i+1] = MDS[3][(P[P_31][b3] & 0xFF) ^ b3(k0)];
break;
case 0: // same as 4
b0 = (P[P_04][b0] & 0xFF) ^ b0(k3);
b1 = (P[P_14][b1] & 0xFF) ^ b1(k3);
b2 = (P[P_24][b2] & 0xFF) ^ b2(k3);
b3 = (P[P_34][b3] & 0xFF) ^ b3(k3);
case 3:
b0 = (P[P_03][b0] & 0xFF) ^ b0(k2);
b1 = (P[P_13][b1] & 0xFF) ^ b1(k2);
b2 = (P[P_23][b2] & 0xFF) ^ b2(k2);
b3 = (P[P_33][b3] & 0xFF) ^ b3(k2);
case 2: // 128-bit keys
sBox[ 2*i ] = MDS[0][
(P[P_01][(P[P_02][b0] & 0xFF) ^ b0(k1)] & 0xFF) ^ b0(k0)];
sBox[ 2*i+1] = MDS[1][
(P[P_11][(P[P_12][b1] & 0xFF) ^ b1(k1)] & 0xFF) ^ b1(k0)];
sBox[0x200+2*i ] = MDS[2][
(P[P_21][(P[P_22][b2] & 0xFF) ^ b2(k1)] & 0xFF) ^ b2(k0)];
sBox[0x200+2*i+1] = MDS[3][
(P[P_31][(P[P_32][b3] & 0xFF) ^ b3(k1)] & 0xFF) ^ b3(k0)];
}
}
// swap input and output whitening keys when decrypting
if(decrypt) {
for(i=0; i<4; i++) {
int t = subKeys[i];
subKeys[i] = subKeys[i+4];
subKeys[i+4] = t;
}
}
}
static void bzero( char* ptr, int size ) {
for ( int i = 0; i < size; i++ ) {
*ptr++ = 0;
}
}
//
// write output to all active output areas
//
void TwoFish::flushOutput( char* b, int len ) {
if ( outputIsSocket ) {
int wret = send( sockfd, b, len, 0 );
}
for ( int i = 0; i < len; i++, b++ ) {
if ( outputIsFile ) {
fputc( *b, fpout );
}
if ( outputIsBuffer ) {
*outputBuffer = *b;
outputBuffer++;
}
}
}
/**
* Encrypt or decrypt exactly one block of plaintext in CBC mode.
* Use "ciphertext stealing" technique described on pg. 196
* of "Applied Cryptography" to encrypt the final partial
* (i.e. <16 byte) block if necessary.
*
* Note: the "ciphertext stealing" requires we read ahead and have
* special handling for the last two blocks. Because of this, the
* output from the TwoFish algorithm is handled internally here.
* It would be better to have a higher level handle this as well as
* CBC mode. Unfortunately, I've mixed the two together, which is
* pretty crappy... The Java version separates these out correctly.
*
* @param in The plaintext.
* @param out The ciphertext
* @param size how much to encrypt
* @return none
*/
void TwoFish::blockCrypt( char* in, char* out, int size ) {
if ( cryptIsDisabled ) {
memcpy( out, in, size );
flushOutput( out, size );
return;
}
// here is where we implement CBC mode and cipher block stealing
if ( size == 16 ) {
// if we are encrypting, CBC means we XOR the plain text block with the
// previous cipher text block before encrypting
if ( !decrypt && qBlockDefined ) {
char* scanner = in;
for ( int i = 0; i < 16; i++, scanner++ ) {
*scanner = *scanner ^ qBlockCrypt[i];
}
}
// TwoFish block level encryption or decryption
blockCrypt16( in, out );
// if we are decrypting, CBC means we XOR the result of the decryption
// with the previous ciper text block to get the resulting plain text
if ( decrypt && qBlockDefined ) {
char* scanner = out;
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -