#include<string.h>
#include <fstream>
#include <sys/time.h>
+#include <glib.h>
+
/*#include <cryptopp/hex.h>
#include <cryptopp/sha.h>
+uint xorshift32(const uint t)
+{
+ /* Algorithm "xor" from p. 4 of Marsaglia, "Xorshift RNGs" */
+ uint x = t;
+ x ^= x << 13;
+ x ^= x >> 17;
+ x ^= x << 5;
+ return x;
+}
+
void inverse_tables(uchar *tab, int size_tab,uchar *inv_perm_tabs) {
-template<int h2>
-void encrypt_ctr(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, int enc) {
+template<int h2>
+void encrypt_ctr(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, uint myrand,int enc) {
-// uchar *X=new uchar[h2];
-// uchar *fX=new uchar[h2];
+
uchar X[h2];
uchar fX[h2];
-
+
int ind1,ind2;
- for(int a=0;a<h2;a+=4) {
- X[a]=Sbox1[a&0xFF]; //Warning according to the size of h2, we can be outsize of Sbox1[a]
- X[a+1]=Sbox1[(a+1)&0xFF];
- X[a+2]=Sbox1[(a+2)&0xFF];
- X[a+3]=Sbox1[(a+3)&0xFF];
- }
-
-
+
+ for(int a=0;a<h2;a+=4) {
+ X[a]=Sbox1[a&0xFF]; //Warning according to the size of h2, we can be outsize of Sbox1[a]
+ X[a+1]=Sbox1[(a+1)&0xFF];
+ X[a+2]=Sbox1[(a+2)&0xFF];
+ X[a+3]=Sbox1[(a+3)&0xFF];
+ }
+
+
for(int it=0;it<len;it++) {
if(enc) {
ind1=it*h2;
ind2=it*h2;
ind1=Pbox[it]*h2;
}
-
+
for(int a=0;a<h2;a+=4) {
X[a]=Sbox1[X[a]];
X[a+2]=Sbox1[X[a+2]];
X[a+3]=Sbox1[X[a+3]];
}
-
-
-
-// *(int*)&fX[0]^=it;
-
-
-/* for(int a=0;a<h2;a+=16) {
- *(int*)&fX[a]^=it;
- *(int*)&fX[a+4]^=it;
- *(int*)&fX[a+8]^=it;
- *(int*)&fX[a+12]^=it;
- }
-*/
-
for(int a=0;a<h2;a+=4) {
fX[a]=X[a]^RM1[a];
fX[a+1]=X[a+1]^RM1[a+1];
fX[a+3]=X[a+3]^RM1[a+3];
}
-
- /* for(int a=0;a<h2;a+=4) {
- fX[a]=Sbox2[fX[a]];
- fX[a+1]=Sbox2[fX[a+1]];
- fX[a+2]=Sbox2[fX[a+2]];
- fX[a+3]=Sbox2[fX[a+3]];
- }*/
-
- for(int a=0;a<h2;a+=4) {
- fX[a]=fX[a]^seq_in[ind2+a];
- fX[a+1]=fX[a+1]^seq_in[ind2+a+1];
- fX[a+2]=fX[a+2]^seq_in[ind2+a+2];
- fX[a+3]=fX[a+3]^seq_in[ind2+a+3];
+ for(int a=0;a<h2;a+=4) {
+
+ myrand=xorshift32(myrand);
+ uint mm=myrand;
+
+ fX[a]=fX[a]^seq_in[ind2+a]^(mm&255);
+ mm>>=8;
+ fX[a+1]=fX[a+1]^seq_in[ind2+a+1]^(mm&255);
+ mm>>=8;
+ fX[a+2]=fX[a+2]^seq_in[ind2+a+2]^(mm&255);
+ mm>>=8;
+ fX[a+3]=fX[a+3]^seq_in[ind2+a+3]^(mm&255);
}
-
+
for(int a=0;a<h2;a+=4) {
seq_out[ind1+a]=fX[a];
seq_out[ind1+a+1]=fX[a+1];
seq_out[ind1+a+2]=fX[a+2];
seq_out[ind1+a+3]=fX[a+3];
}
-
+
for(int a=0;a<h2;a+=4) {
RM1[a]=RM1[PboxRM[a]];
RM1[a+1]=RM1[PboxRM[a+1]];
}
-
+
}
template<int h2>
-void encrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, int debug) {
-
+void encrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1, int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, uint myrand, int debug) {
-/* uchar *X=new uchar[h2];
- uchar *fX=new uchar[h2];
- unsigned int *lX=(unsigned int*)X;
- unsigned int *lseq_in=(unsigned int*)seq_in;
-*/
uchar X[h2];
uchar fX[h2];
-// unsigned int *lX=(unsigned int*)X;
-// unsigned int *lseq_in=(unsigned int*)seq_in;
-
+
for(int it=0;it<len;it++) {
int ind1=it*h2;
int ind2=Pbox[it]*h2;
for(int a=0;a<h2;a+=4) {
- X[a]=seq_in[ind2+a];
- X[a+1]=seq_in[ind2+a+1];
- X[a+2]=seq_in[ind2+a+2];
- X[a+3]=seq_in[ind2+a+3];
+ myrand=xorshift32(myrand);
+
+ uint mm=myrand;
+ X[a]=seq_in[ind2+a]^(mm&255);
+ mm>>=8;
+ X[a+1]=seq_in[ind2+a+1]^(mm&255);
+ mm>>=8;
+ X[a+2]=seq_in[ind2+a+2]^(mm&255);
+ mm>>=8;
+ X[a+3]=seq_in[ind2+a+3]^(mm&255);
}
for(int a=0;a<h2;a+=4){
}
+
+
}
+
+
+
+
+
+
template<int h2>
-void decrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Inv_Sbox1, uchar *Inv_Sbox2, int debug) {
+void decrypt(uchar* seq_in, uchar *seq_out, int len, uchar* RM1, int *Pbox, int *PboxRM, uchar *Inv_Sbox1, uchar *Inv_Sbox2, uint myrand, int debug) {
- /*uchar *fX=new uchar[h2];
- uchar *Inv_Sbox1=new uchar[256];
- uchar *Inv_Sbox2=new uchar[256];
- */
- uchar fX[h2];
+
+ uchar fX[h2];
fX[a+1]=seq_in[ind1+a+1];
fX[a+2]=seq_in[ind1+a+2];
fX[a+3]=seq_in[ind1+a+3];
-
+
}
for(int a=0;a<h2;a+=4) {
fX[a]=Inv_Sbox2[fX[a]];
RM1[a+2]=RM1[PboxRM[a+2]];
RM1[a+3]=RM1[PboxRM[a+3]];
}
-
+
for(int a=0;a<h2;a+=4) {
- seq_out[ind2+a]=Inv_Sbox1[fX[a]];
- seq_out[ind2+a+1]=Inv_Sbox1[fX[a+1]];
- seq_out[ind2+a+2]=Inv_Sbox1[fX[a+2]];
- seq_out[ind2+a+3]=Inv_Sbox1[fX[a+3]];
+ myrand=xorshift32(myrand);
+
+ uint mm=myrand;
+ seq_out[ind2+a]=Inv_Sbox1[fX[a]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+1]=Inv_Sbox1[fX[a+1]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+2]=Inv_Sbox1[fX[a+2]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+3]=Inv_Sbox1[fX[a+3]]^(mm&255);
}
-
+
}
+
}
uchar *data_R, *data_G, *data_B;
int imsize;
uchar *buffer;
+
+
+
+
if(lena==1) {
load_RGB_pixmap("lena.ppm", &width, &height, &data_R, &data_G, &data_B);
+// load_RGB_pixmap("8192.ppm", &width, &height, &data_R, &data_G, &data_B);
imsize=width*height*3;
// load_RGB_pixmap("No_ecb_mode_picture.ppm", &width, &height, &data_R, &data_G, &data_B);
}
for (int i = 0; i < 256 ; i++) {
mix[i]=Secretkey[i]^counter[i];
+
}
+ gchar *sha512;
+
+ sha512 = g_compute_checksum_for_string(G_CHECKSUM_SHA512, (const char*) mix, 256);
+// g_print("%s\n", sha512);
+
+
+
+
+
+
+
// cout<<"hash "<<endl;
for (int i = 0; i < 64 ; i++) {
// DK[i]=digest[i];
- DK[i]=mix[i];
+ DK[i]=sha512[i];
}
-
+ g_free(sha512);
int *Pbox=new int[len];
uchar Inv_Sbox2[256];
uchar sc[256];
uchar RM1[h2];
- uchar RM2[h2];
+ uchar RM1_copy[h2];
+ uchar RMtmp[h2];
+ uint myrand=0;
double time_encrypt=0;
+ myrand=0;
+ for(int i=0;i<32;i++) {
+ myrand|=DK[i]&1;
+ myrand<<=1;
+ }
+ uint myrand_copy=myrand;
-
-
-
+
for(int i=0;i<h2;i++){
- RM2[i]=RM1[i];
+ RM1_copy[i]=RM1[i];
}
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
for(i=0;i<nb_test;i++)
{
if(ctr)
- encrypt_ctr<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,1);
+ encrypt_ctr<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
else
- encrypt<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
}
break;
case 4:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<4*4>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<4*4>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<4*4>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<4*4>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
case 8:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<8*8>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<8*8>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<8*8>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<8*8>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
case 16:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<16*16>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<16*16>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<16*16>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<16*16>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
case 32:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<32*32>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<32*32>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<32*32>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<32*32>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
case 64:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<64*64>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<64*64>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<64*64>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<64*64>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
case 128:
for(i=0;i<nb_test;i++) {
if(ctr)
- encrypt_ctr<128*128>(seq2, seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
+ encrypt_ctr<128*128>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
else
- decrypt<128*128>(seq2,seq,len,RM2,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,0);
+ decrypt<128*128>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
}
break;
}