📄 mars.pas
字号:
{******************************************************************************}
{* DCPcrypt v2.0 written by David Barton (davebarton@bigfoot.com) *************}
{******************************************************************************}
{* A binary compatible implementation of Mars *********************************}
{******************************************************************************}
{* Copyright (c) 1999-2000 David Barton *}
{* Permission is hereby granted, free of charge, to any person obtaining a *}
{* copy of this software and associated documentation files (the "Software"), *}
{* to deal in the Software without restriction, including without limitation *}
{* the rights to use, copy, modify, merge, publish, distribute, sublicense, *}
{* and/or sell copies of the Software, and to permit persons to whom the *}
{* Software is furnished to do so, subject to the following conditions: *}
{* *}
{* The above copyright notice and this permission notice shall be included in *}
{* all copies or substantial portions of the Software. *}
{* *}
{* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR *}
{* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, *}
{* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL *}
{* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER *}
{* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING *}
{* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER *}
{* DEALINGS IN THE SOFTWARE. *}
{******************************************************************************}
unit Mars;
interface
uses
Classes, Sysutils, DCPcrypt, DCPconst;
type
TDCP_mars= class(TDCP_blockcipher)
protected
KeyData: array[0..39] of DWord;
public
class function GetID: longint; override;
class function GetAlgorithm: string; override;
class function GetMaxKeySize: longint; override;
class function GetBlockSize: longint; override;
class function SelfTest: boolean; override;
procedure Init(const Key; Size: longint; InitVector: pointer); override;
procedure Burn; override;
procedure EncryptECB(const InData; var OutData); override;
procedure DecryptECB(const InData; var OutData); override;
end;
{******************************************************************************}
{******************************************************************************}
implementation
{$R-}{$Q-}
{$I Mars.inc}
class function TDCP_mars.GetID: longint;
begin
Result:= DCP_mars;
end;
class function TDCP_mars.GetAlgorithm: string;
begin
Result:= 'Mars';
end;
class function TDCP_mars.GetMaxKeySize: longint;
begin
Result:= 1248;
end;
class function TDCP_mars.GetBlockSize: longint;
begin
Result:= 128;
end;
class function TDCP_mars.SelfTest: boolean;
const
Key1: array[0..3] of dword=
($deb35132,$83c296de,$39069e6b,$994c2438);
Key2: array[0..5] of dword=
($a5391779,$1a58048b,$a853a993,$1d41102c,$088658d1,$954d8738);
Key3: array[0..7] of dword=
($9867a1fb,$22ef7a3e,$8ce27c31,$a3e1aa02,$3ccce5e8,$2aa8beed,$9ac3db99,$27725ed6);
Plain1: array[0..3] of dword= ($deb35132,$83c296de,$39069e6b,$994c2438);
Plain2: array[0..3] of dword= ($2dc46167,$d242613e,$adbf4fa8,$8f1583b3);
Plain3: array[0..3] of dword= ($a4ab4413,$0847c4d3,$1621a7a8,$8493f4d4);
Cipher1: array[0..3] of dword= ($a91245f9,$4e032db4,$042279c4,$9ba608d7);
Cipher2: array[0..3] of dword= ($260334cb,$6d587f45,$e0d2bd54,$bd191c57);
Cipher3: array[0..3] of dword= ($67a1acdd,$be3163e3,$5f9f1c2c,$b8a48fe3);
var
Cipher: TDCP_mars;
Block: array[0..3] of dword;
begin
Cipher:= TDCP_mars.Create(nil);
Cipher.Init(Key1,Sizeof(Key1)*8,nil);
Cipher.EncryptECB(Plain1,Block);
Result:= CompareMemory(@Cipher1,@Block,Sizeof(Block));
Cipher.DecryptECB(Block,Block);
Result:= Result and CompareMemory(@Plain1,@Block,Sizeof(Block));
Cipher.Burn;
Cipher.Init(Key2,Sizeof(Key2)*8,nil);
Cipher.EncryptECB(Plain2,Block);
Result:= Result and CompareMemory(@Cipher2,@Block,Sizeof(Block));
Cipher.DecryptECB(Block,Block);
Result:= Result and CompareMemory(@Plain2,@Block,Sizeof(Block));
Cipher.Burn;
Cipher.Init(Key3,Sizeof(Key3)*8,nil);
Cipher.EncryptECB(Plain3,Block);
Result:= Result and CompareMemory(@Cipher3,@Block,Sizeof(Block));
Cipher.DecryptECB(Block,Block);
Result:= Result and CompareMemory(@Plain3,@Block,Sizeof(Block));
Cipher.Burn;
Cipher.Free;
end;
procedure gen_mask(var x, m: DWord);
var
u: DWord;
begin
u:= x and (x shr 1); u:= u and (u shr 2);
u:= u and (u shr 4); u:= u and (u shr 1) and (u shr 2);
m:= u;
u:= (x xor $FFFFFFFF) and ((x xor $FFFFFFFF) shr 1); u:= u and (u shr 2);
u:= u and (u shr 4); u:= u and (u shr 1) and (u shr 2);
u:= u or m;
m:= (u shl 1) or (u shl 2) or (u shl 3)
or (u shl 4) or (u shl 5) or (u shl 6)
or (u shl 7) or (u shl 8);
m:= (m or u or (u shl 9)) and ((x xor $FFFFFFFF) xor (x shl 1)) and ((x xor $FFFFFFFF) xor (x shr 1));
m:= m and $FFFFFFFC;
end;
procedure TDCP_mars.Init(const Key; Size: longint; InitVector: pointer);
var
i, j, m, u, w: DWord;
t: array[-7..39] of DWord;
KeyB: array[0..39] of DWord;
begin
inherited Init(Key,Size,InitVector);
Size:= Size div 8;
FillChar(KeyB,Sizeof(KeyB),0);
Move(Key,KeyB,Size);
Size:= Size div 4;
Move(vk,t,Sizeof(vk));
for i:= 0 to 38 do
begin
u:= t[i-7] xor t[i-2];
t[i]:= LRot32(u,3) xor KeyB[i mod DWord(Size)] xor i;
end;
t[39]:= Size;
for j:= 0 to 6 do
begin
for i:= 1 to 39 do
begin
u:= t[i] + s_box[t[i-1] and $1FF];
t[i]:= LRot32(u,9);
end;
u:= t[0] + s_box[t[39] and $1FF];
t[0]:= LRot32(u,9);
end;
for i:= 0 to 39 do
KeyData[(7*i) mod 40]:= t[i];
i:= 5;
repeat
u:= s_box[265+(KeyData[i] and $3)];
j:= KeyData[i+3] and $1f;
w:= KeyData[i] or $3;
gen_mask(w,m);
KeyData[i]:= w xor (LRot32(u,j) and m);
Inc(i,2);
until i>= 37;
{ Generate a "random" IV }
if InitVector= nil then
begin
FillChar(IV^,BS,0);
EncryptECB(IV^,IV^);
Reset;
end
else
begin
Move(InitVector^,IV^,BS);
Reset;
end;
end;
procedure TDCP_mars.Burn;
begin
FillChar(KeyData,Sizeof(KeyData),$FF);
inherited Burn;
end;
procedure TDCP_mars.EncryptECB(const InData; var OutData);
var
l, m, r, t: DWord;
blk: array[0..3] of DWord;
begin
if not fInitialized then
raise EDCP_blockcipher.Create('Cipher not initialized');
Blk[0]:= PDWord(@InData)^;
Blk[1]:= PDWord(longint(@InData)+4)^;
Blk[2]:= PDWord(longint(@InData)+8)^;
Blk[3]:= PDWord(longint(@InData)+12)^;
blk[0]:= blk[0] + KeyData[0]; blk[1]:= blk[1] + KeyData[1];
blk[2]:= blk[2] + KeyData[2]; blk[3]:= blk[3] + KeyData[3];
blk[1]:= blk[1] xor s_box[ blk[0] and $FF];
blk[1]:= blk[1] + s_box[((blk[0] shr 8) and $FF) + 256];
blk[2]:= blk[2] + s_box[ (blk[0] shr 16) and $FF];
blk[3]:= blk[3] xor s_box[((blk[0] shr 24) and $FF) + 256];
blk[0]:= RRot32(blk[0], 24); blk[0]:= blk[0] + blk[3];
blk[2]:= blk[2] xor s_box[ blk[1] and $FF];
blk[2]:= blk[2] + s_box[((blk[1] shr 8) and $FF) + 256];
blk[3]:= blk[3] + s_box[ (blk[1] shr 16) and $FF];
blk[0]:= blk[0] xor s_box[((blk[1] shr 24) and $FF) + 256];
blk[1]:= RRot32(blk[1], 24); blk[1]:= blk[1] + blk[2];
blk[3]:= blk[3] xor s_box[ blk[2] and $FF];
blk[3]:= blk[3] + s_box[((blk[2] shr 8) and $FF) + 256];
blk[0]:= blk[0] + s_box[ (blk[2] shr 16) and $FF];
blk[1]:= blk[1] xor s_box[((blk[2] shr 24) and $FF) + 256];
blk[2]:= RRot32(blk[2], 24);
blk[0]:= blk[0] xor s_box[ blk[3] and $FF];
blk[0]:= blk[0] + s_box[((blk[3] shr 8) and $FF) + 256];
blk[1]:= blk[1] + s_box[ (blk[3] shr 16) and $FF];
blk[2]:= blk[2] xor s_box[((blk[3] shr 24) and $FF) + 256];
blk[3]:= RRot32(blk[3], 24);
blk[1]:= blk[1] xor s_box[ blk[0] and $FF];
blk[1]:= blk[1] + s_box[((blk[0] shr 8) and $FF) + 256];
blk[2]:= blk[2] + s_box[ (blk[0] shr 16) and $FF];
blk[3]:= blk[3] xor s_box[((blk[0] shr 24) and $FF) + 256];
blk[0]:= RRot32(blk[0], 24); blk[0]:= blk[0] + blk[3];
blk[2]:= blk[2] xor s_box[ blk[1] and $FF];
blk[2]:= blk[2] + s_box[((blk[1] shr 8) and $FF) + 256];
blk[3]:= blk[3] + s_box[ (blk[1] shr 16) and $FF];
blk[0]:= blk[0] xor s_box[((blk[1] shr 24) and $FF) + 256];
blk[1]:= RRot32(blk[1], 24); blk[1]:= blk[1] + blk[2];
blk[3]:= blk[3] xor s_box[ blk[2] and $FF];
blk[3]:= blk[3] + s_box[((blk[2] shr 8) and $FF) + 256];
blk[0]:= blk[0] + s_box[ (blk[2] shr 16) and $FF];
blk[1]:= blk[1] xor s_box[((blk[2] shr 24) and $FF) + 256];
blk[2]:= RRot32(blk[2], 24);
blk[0]:= blk[0] xor s_box[ blk[3] and $FF];
blk[0]:= blk[0] + s_box[((blk[3] shr 8) and $FF) + 256];
blk[1]:= blk[1] + s_box[ (blk[3] shr 16) and $FF];
blk[2]:= blk[2] xor s_box[((blk[3] shr 24) and $FF) + 256];
blk[3]:= RRot32(blk[3], 24);
m:= blk[0] + KeyData[4];
r:= LRot32(blk[0],13) * KeyData[5];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[0]:= LRot32(blk[0],13);
blk[1]:= blk[1] + l;
blk[2]:= blk[2] + m;
blk[3]:= blk[3] xor r;
m:= blk[1] + KeyData[6];
r:= LRot32(blk[1],13) * KeyData[7];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[1]:= LRot32(blk[1],13);
blk[2]:= blk[2] + l;
blk[3]:= blk[3] + m;
blk[0]:= blk[0] xor r;
m:= blk[2] + KeyData[8];
r:= LRot32(blk[2],13) * KeyData[9];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[2]:= LRot32(blk[2],13);
blk[3]:= blk[3] + l;
blk[0]:= blk[0] + m;
blk[1]:= blk[1] xor r;
m:= blk[3] + KeyData[10];
r:= LRot32(blk[3],13) * KeyData[11];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[3]:= LRot32(blk[3],13);
blk[0]:= blk[0] + l;
blk[1]:= blk[1] + m;
blk[2]:= blk[2] xor r;
m:= blk[0] + KeyData[12];
r:= LRot32(blk[0],13) * KeyData[13];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[0]:= LRot32(blk[0],13);
blk[1]:= blk[1] + l;
blk[2]:= blk[2] + m;
blk[3]:= blk[3] xor r;
m:= blk[1] + KeyData[14];
r:= LRot32(blk[1],13) * KeyData[15];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[1]:= LRot32(blk[1],13);
blk[2]:= blk[2] + l;
blk[3]:= blk[3] + m;
blk[0]:= blk[0] xor r;
m:= blk[2] + KeyData[16];
r:= LRot32(blk[2],13) * KeyData[17];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[2]:= LRot32(blk[2],13);
blk[3]:= blk[3] + l;
blk[0]:= blk[0] + m;
blk[1]:= blk[1] xor r;
m:= blk[3] + KeyData[18];
r:= LRot32(blk[3],13) * KeyData[19];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[3]:= LRot32(blk[3],13);
blk[0]:= blk[0] + l;
blk[1]:= blk[1] + m;
blk[2]:= blk[2] xor r;
m:= blk[0] + KeyData[20];
r:= LRot32(blk[0],13) * KeyData[21];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[0]:= LRot32(blk[0],13);
blk[3]:= blk[3] + l;
blk[2]:= blk[2] + m;
blk[1]:= blk[1] xor r;
m:= blk[1] + KeyData[22];
r:= LRot32(blk[1],13) * KeyData[23];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[1]:= LRot32(blk[1],13);
blk[0]:= blk[0] + l;
blk[3]:= blk[3] + m;
blk[2]:= blk[2] xor r;
m:= blk[2] + KeyData[24];
r:= LRot32(blk[2],13) * KeyData[25];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[2]:= LRot32(blk[2],13);
blk[1]:= blk[1] + l;
blk[0]:= blk[0] + m;
blk[3]:= blk[3] xor r;
m:= blk[3] + KeyData[26];
r:= LRot32(blk[3],13) * KeyData[27];
l:= s_box[m and $1FF]; r:= LRot32(r,5);
t:= r and $1f; m:= LRot32(m,t);
l:= l xor r; r:= LRot32(r,5); l:= l xor r;
t:= r and $1f; l:= LRot32(l,t);
blk[3]:= LRot32(blk[3],13);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -