#include<math.h>
#include<stdlib.h>
#include<stdio.h>
+#include<string.h>
#include <fstream>
#include <sys/time.h>
+#include <glib.h>
+
/*#include <cryptopp/hex.h>
#include <cryptopp/sha.h>
int key_size=256;
+int nb_test=1;
+int ctr=0;
+
+
-const int h=16;
-const int h2=h*h;
+uint xorshift32(const uint t)
+{
+ /* Algorithm "xor" from p. 4 of Marsaglia, "Xorshift RNGs" */
+ uint x = t;
+ x ^= x << 13;
+ x ^= x >> 17;
+ x ^= x << 5;
+ return x;
+}
+
void inverse_tables(uchar *tab, int size_tab,uchar *inv_perm_tabs) {
}
+void inverse_tables_int(int *tab, int size_tab,int *inv_perm_tabs) {
+
+ for(int i=0;i<size_tab;i++) {
+ inv_perm_tabs[tab[i]] = i;
+ }
+
+}
+
void rc4key(uchar *key, uchar *sc, int size_DK) {
uchar j0=0;
for (int it=0; it<ldata; it++) {
- i0 = ((i0+1)%255);
+ i0 = ((i0+1)&0xFE); //%255);
j0 = (j0 + sc[i0])&0xFF;
uchar tmp = sc[i0];
sc[i0] = sc[j0];
+template<int h2>
+void encrypt_ctr(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, uint myrand,int enc) {
+
+ uchar X[h2];
+ uchar fX[h2];
-void encrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, int debug) {
-
+ int ind1,ind2;
- uchar *X=new uchar[h2];
- uchar *fX=new uchar[h2];
+
+ for(int a=0;a<h2;a+=4) {
+ X[a]=Sbox1[a&0xFF]; //Warning according to the size of h2, we can be outsize of Sbox1[a]
+ X[a+1]=Sbox1[(a+1)&0xFF];
+ X[a+2]=Sbox1[(a+2)&0xFF];
+ X[a+3]=Sbox1[(a+3)&0xFF];
+ }
+
+
+ for(int it=0;it<len;it++) {
+ if(enc) {
+ ind1=it*h2;
+ ind2=Pbox[it]*h2;
+ }
+ else {
+ ind2=it*h2;
+ ind1=Pbox[it]*h2;
+ }
+
+
+ for(int a=0;a<h2;a+=4) {
+
+ myrand=xorshift32(myrand);
+ uint mm=myrand;
+
+ X[a]=X[a]^(mm&255);
+ mm>>=8;
+ X[a+1]=X[a+1]^(mm&255);
+ mm>>=8;
+ X[a+2]=X[a+2]^(mm&255);
+ mm>>=8;
+ X[a+3]=X[a+3]^(mm&255);
+ }
+
+
+
+
+
+ for(int a=0;a<h2;a+=4) {
+ X[a]=Sbox1[X[a]];
+ X[a+1]=Sbox1[X[a+1]];
+ X[a+2]=Sbox1[X[a+2]];
+ X[a+3]=Sbox1[X[a+3]];
+ }
+
+ for(int a=0;a<h2;a+=4) {
+ X[a]=X[a]^RM1[a];
+ X[a+1]=X[a+1]^RM1[a+1];
+ X[a+2]=X[a+2]^RM1[a+2];
+ X[a+3]=X[a+3]^RM1[a+3];
+ }
+
+ for(int a=0;a<h2;a+=4) {
+ fX[a]=X[a]^seq_in[ind2+a];
+ fX[a+1]=X[a+1]^seq_in[ind2+a+1];
+ fX[a+2]=X[a+2]^seq_in[ind2+a+2];
+ fX[a+3]=X[a+3]^seq_in[ind2+a+3];
+
+ }
+
+
+ for(int a=0;a<h2;a+=4) {
+ seq_out[ind1+a]=fX[a];
+ seq_out[ind1+a+1]=fX[a+1];
+ seq_out[ind1+a+2]=fX[a+2];
+ seq_out[ind1+a+3]=fX[a+3];
+ }
+
+ for(int a=0;a<h2;a+=4) {
+ RM1[a]=RM1[PboxRM[a]];
+ RM1[a+1]=RM1[PboxRM[a+1]];
+ RM1[a+2]=RM1[PboxRM[a+2]];
+ RM1[a+3]=RM1[PboxRM[a+3]];
+ }
+
+
+
+ }
+
+
+}
+
+
+template<int h2>
+void encrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1, int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, uint myrand, int debug) {
+
+ uchar X[h2];
+ uchar fX[h2];
+
+
for(int it=0;it<len;it++) {
int ind1=it*h2;
int ind2=Pbox[it]*h2;
- for(int a=0;a<h2;a++) {
- X[a]=seq_in[ind2+a];
+ for(int a=0;a<h2;a+=4) {
+ myrand=xorshift32(myrand);
+
+ uint mm=myrand;
+ X[a]=seq_in[ind2+a]^(mm&255);
+ mm>>=8;
+ X[a+1]=seq_in[ind2+a+1]^(mm&255);
+ mm>>=8;
+ X[a+2]=seq_in[ind2+a+2]^(mm&255);
+ mm>>=8;
+ X[a+3]=seq_in[ind2+a+3]^(mm&255);
}
- for(int a=0;a<h2;a++){
+ for(int a=0;a<h2;a+=4){
fX[a]=Sbox1[X[a]];
+ fX[a+1]=Sbox1[X[a+1]];
+ fX[a+2]=Sbox1[X[a+2]];
+ fX[a+3]=Sbox1[X[a+3]];
}
-
- for(int a=0;a<h2;a++) {
+
+ for(int a=0;a<h2;a+=4) {
fX[a]=fX[a]^RM1[a];
+ fX[a+1]=fX[a+1]^RM1[a+1];
+ fX[a+2]=fX[a+2]^RM1[a+2];
+ fX[a+3]=fX[a+3]^RM1[a+3];
}
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
seq_out[ind1+a]=Sbox2[fX[a]];
+ seq_out[ind1+a+1]=Sbox2[fX[a+1]];
+ seq_out[ind1+a+2]=Sbox2[fX[a+2]];
+ seq_out[ind1+a+3]=Sbox2[fX[a+3]];
}
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
RM1[a]=RM1[PboxRM[a]];
+ RM1[a+1]=RM1[PboxRM[a+1]];
+ RM1[a+2]=RM1[PboxRM[a+2]];
+ RM1[a+3]=RM1[PboxRM[a+3]];
+
}
-
+
}
+
+
+
+
}
-void decrypt(uchar* seq_in, uchar *seq_out, int len,uchar* RM1,int *Pbox, int *PboxRM, uchar *Sbox1, uchar *Sbox2, int debug) {
- uchar *fX=new uchar[h2];
- uchar *Inv_Sbox1=new uchar[256];
- inverse_tables(Sbox1,256,Inv_Sbox1);
- uchar *Inv_Sbox2=new uchar[256];
- inverse_tables(Sbox2,256,Inv_Sbox2);
-
+template<int h2>
+void decrypt(uchar* seq_in, uchar *seq_out, int len, uchar* RM1, int *Pbox, int *PboxRM, uchar *Inv_Sbox1, uchar *Inv_Sbox2, uint myrand, int debug) {
+
+
+
+ uchar fX[h2];
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
fX[a]=seq_in[ind1+a];
+ fX[a+1]=seq_in[ind1+a+1];
+ fX[a+2]=seq_in[ind1+a+2];
+ fX[a+3]=seq_in[ind1+a+3];
+
}
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
fX[a]=Inv_Sbox2[fX[a]];
+ fX[a+1]=Inv_Sbox2[fX[a+1]];
+ fX[a+2]=Inv_Sbox2[fX[a+2]];
+ fX[a+3]=Inv_Sbox2[fX[a+3]];
}
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
fX[a]=fX[a]^RM1[a];
+ fX[a+1]=fX[a+1]^RM1[a+1];
+ fX[a+2]=fX[a+2]^RM1[a+2];
+ fX[a+3]=fX[a+3]^RM1[a+3];
}
- for(int a=0;a<h2;a++) {
+ for(int a=0;a<h2;a+=4) {
RM1[a]=RM1[PboxRM[a]];
+ RM1[a+1]=RM1[PboxRM[a+1]];
+ RM1[a+2]=RM1[PboxRM[a+2]];
+ RM1[a+3]=RM1[PboxRM[a+3]];
}
-
- for(int a=0;a<h2;a++) {
- seq_out[ind2+a]=Inv_Sbox1[fX[a]];
+
+ for(int a=0;a<h2;a+=4) {
+ myrand=xorshift32(myrand);
+
+ uint mm=myrand;
+ seq_out[ind2+a]=Inv_Sbox1[fX[a]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+1]=Inv_Sbox1[fX[a+1]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+2]=Inv_Sbox1[fX[a+2]]^(mm&255);
+ mm>>=8;
+ seq_out[ind2+a+3]=Inv_Sbox1[fX[a+3]]^(mm&255);
}
-
+
}
+
}
+int main(int argc, char** argv) {
+
+
+ int h=32;
+ int lena=0;
+ int size_buf=1;
+
+
+
+ for(int i=1; i<argc; i++){
+ if(strncmp(argv[i],"nb",2)==0) nb_test = atoi(&(argv[i][2])); //nb of test
+ if(strncmp(argv[i],"ctr",3)==0) ctr = atoi(&(argv[i][3])); //CTR ? 1 otherwise CBC like
+ if(strncmp(argv[i],"h",1)==0) h = atoi(&(argv[i][1])); //size of block
+ if(strncmp(argv[i],"sizebuf",7)==0) size_buf = atoi(&(argv[i][7])); //SIZE of the buffer
+ if(strncmp(argv[i],"lena",4)==0) lena = atoi(&(argv[i][4])); //Use Lena or buffer
+ }
+
+/* printf("nb times %d\n",nb_test);
+ printf("ctr %d\n",ctr);
+ printf("h %d\n",h);
+ printf("lena %d\n",lena);
+ printf("size_buf %d\n",size_buf);
+*/
+ int h2=h*h;
+
+
+
+ int seed=time(NULL);
+// cout<<seed<<endl;
+ srand48(seed);
+
+ uchar Secretkey[key_size];
+
+ uchar counter[key_size];
+
+ for(int i=0;i<key_size;i++) {
+ Secretkey[i]=lrand48()&0xFF;
+ counter[i]=lrand48()&0xFF;
+ }
-void Dynamickeygenerationnew(uchar *Secretkey, uchar *counter) {
+
int size = 64;
uchar DK[size];
int width;
int height;
+
uchar *data_R, *data_G, *data_B;
- load_RGB_pixmap("lena.ppm", &width, &height, &data_R, &data_G, &data_B);
+ int imsize;
+ uchar *buffer;
- int imsize=width*height*3;
+ if(lena==1) {
+ load_RGB_pixmap("lena.ppm", &width, &height, &data_R, &data_G, &data_B);
+// load_RGB_pixmap("8192.ppm", &width, &height, &data_R, &data_G, &data_B);
+ imsize=width*height*3;
+// load_RGB_pixmap("No_ecb_mode_picture.ppm", &width, &height, &data_R, &data_G, &data_B);
+ }
+ else {
+ width=height=size_buf;
+ imsize=width*height;
+ buffer=new uchar[imsize];
+ for(int i=0;i<imsize;i++) {
+ buffer[i]=lrand48();
+ }
+ }
+
+
+
+
+
uchar* seq= new uchar[imsize];
uchar* seq2= new uchar[imsize];
int oneD=width*height;
- for(int i=0;i<oneD;i++) {
- seq[i]=data_R[i];
- seq[oneD+i]=data_G[i];
- seq[2*oneD+i]=data_B[i];
+ if(lena) {
+ for(int i=0;i<oneD;i++) {
+ seq[i]=data_R[i];
+ seq[oneD+i]=data_G[i];
+ seq[2*oneD+i]=data_B[i];
+ }
+ }
+ else {
+ for(int i=0;i<oneD;i++) {
+ seq[i]=buffer[i];
+ }
}
for (int i = 0; i < 256 ; i++) {
-// mix[i]=(int)secret_key.BytePtr()[i]^(int)mycounter.BytePtr()[i];
mix[i]=Secretkey[i]^counter[i];
+
}
+ gchar *sha512;
-/* byte digest[64];
- SHA512().CalculateDigest(digest, mix, 256);
-*/
+ sha512 = g_compute_checksum_for_string(G_CHECKSUM_SHA512, (const char*) mix, 256);
+// g_print("%s\n", sha512);
+
-
- cout<<"hash "<<endl;
- for (int i = 0; i < 64 ; i++) {
-// DK[i]=digest[i];
- DK[i]=mix[i];
- }
-
- uchar Sbox1[256];
- rc4key(DK, Sbox1, 16);
- uchar Sbox2[256];
- rc4key(&DK[16], Sbox2, 16);
- uchar sc[256];
- rc4key(&DK[32], sc, 16);
-
- uchar outd[2*(h * h)];
- prga(sc, 2*(h * h), outd);
-
-
- uchar RM1[h*h];
- uchar RM2[h*h];
- for(int i=0;i<h2;i++){
- RM1[i]=outd[i];
- RM2[i]=outd[i+h2];
+// cout<<"hash "<<endl;
+ for (int i = 0; i < 64 ; i++) {
+// DK[i]=digest[i];
+ DK[i]=sha512[i];
}
-
-
+ g_free(sha512);
-
-
-
- uchar keyp[16];
- for (int i = 48; i < 64; i++)
- keyp[i-48] = DK[i];
- cout<<len<<endl;
int *Pbox=new int[len];
int *PboxRM=new int[h2];
+ uchar Sbox1[256];
+ uchar Sbox2[256];
+ uchar Inv_Sbox1[256];
+ uchar Inv_Sbox2[256];
+ uchar sc[256];
+ uchar RM1[h2];
+ uchar RM1_copy[h2];
+ uchar RMtmp[h2];
- rc4keyperm(keyp, len, rp, Pbox, 16);
- printf("len %d\n",len);
- for(int i=0;i<len;i++) {
- printf("%d \n",Pbox[i]);
- }
-
- rc4keyperm(RM2, h2, rp, PboxRM, h2);
+ uint myrand=0;
- for(int i=0;i<h2;i++){
- RM2[i]=RM1[i];
- }
-
-
- double time=0;
- double t=TimeStart();
- int i;
- for(i=0;i<100;i++)
- {
- encrypt(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,0);
- }
+ double time_encrypt=0;
+ double time_decrypt=0;
- time+=TimeStop(t);
- cout<<"Time encrypt "<<time<<endl;
-
- for(int i=0;i<oneD;i++) {
- data_R[i]=seq2[i];
- data_G[i]=seq2[oneD+i];
- data_B[i]=seq2[2*oneD+i];
- }
- store_RGB_pixmap("lena2.ppm", data_R, data_G, data_B, width, height);
+ double t=TimeStart();
+ rc4key(DK, Sbox1, 8);
+
+
+ rc4key(&DK[8], Sbox2, 8);
+
+ rc4key(&DK[16], sc, 16);
+
+
+ prga(sc, h2, RM1);
+
+
+ rc4keyperm(&DK[32], len, rp, Pbox, 16);
+
+ rc4keyperm(&DK[48], h2, rp, PboxRM, 16);
+
+ //time+=TimeStop(t);
+ //cout<<"Time initializaton "<<time<<endl;
- time=0;
- t=TimeStart();
- for(i=0;i<100;i++) {
- decrypt(seq2,seq,len,RM2,Pbox,PboxRM,Sbox1,Sbox2,0);
- }
- time+=TimeStop(t);
- cout<<"Time decrypt "<<time<<endl;
-
- for(int i=0;i<oneD;i++) {
- data_R[i]=seq[i];
- data_G[i]=seq[oneD+i];
- data_B[i]=seq[2*oneD+i];
+ myrand=0;
+ for(int i=0;i<32;i++) {
+ myrand|=DK[i]&1;
+ myrand<<=1;
}
- store_RGB_pixmap("lena3.ppm", data_R, data_G, data_B, width, height);
-
+ uint myrand_copy=myrand;
+
-}
+
+ for(int i=0;i<h2;i++){
+ RM1_copy[i]=RM1[i];
+ }
+
+
+ inverse_tables(Sbox1,256,Inv_Sbox1);
+ inverse_tables(Sbox2,256,Inv_Sbox2);
-int main() {
- cout << "Hello, World!" << endl;
+
+ time_encrypt=0;
+ t=TimeStart();
-
+ int i;
+ switch(h) {
+ case 4:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<4*4>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ case 8:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<8*8>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ case 16:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<16*16>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ case 32:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<32*32>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ case 64:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<64*64>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ case 128:
+ for(i=0;i<nb_test;i++)
+ {
+ if(ctr)
+ encrypt_ctr<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,1);
+ else
+ encrypt<128*128>(seq, seq2,len,RM1,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+
+ }
+ break;
+ }
+ time_encrypt+=TimeStop(t);
+ //cout<<"Time encrypt "<<
+ cout<<(double)imsize*nb_test/time_encrypt<<"\t";
- int seed=time(NULL);
- cout<<seed<<endl;
- srand48(seed);
+ if(lena) {
+ for(int i=0;i<oneD;i++) {
+ data_R[i]=seq2[i];
+ data_G[i]=seq2[oneD+i];
+ data_B[i]=seq2[2*oneD+i];
+ }
+ store_RGB_pixmap("lena2.ppm", data_R, data_G, data_B, width, height);
+ }
+
- uchar Secretkey[key_size];
+ time_decrypt=0;
+ t=TimeStart();
+ switch(h) {
+ case 4:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<4*4>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<4*4>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ case 8:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<8*8>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<8*8>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ case 16:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<16*16>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<16*16>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ case 32:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<32*32>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<32*32>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ case 64:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<64*64>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<64*64>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ case 128:
+ for(i=0;i<nb_test;i++) {
+ if(ctr)
+ encrypt_ctr<128*128>(seq2, seq,len,RM1_copy,Pbox,PboxRM,Sbox1,Sbox2,myrand,0);
+ else
+ decrypt<128*128>(seq2,seq,len,RM1_copy,Pbox,PboxRM,Inv_Sbox1,Inv_Sbox2,myrand,0);
+ }
+ break;
+ }
- uchar counter[key_size];
+ time_decrypt+=TimeStop(t);
+ //cout<<"Time decrypt "
+ cout<<(double)imsize*nb_test/time_decrypt<<"\t";
- for(int i=0;i<key_size;i++) {
- Secretkey[i]=lrand48()&0xFF;
- counter[i]=lrand48()&0xFF;
+ if(lena) {
+ for(int i=0;i<oneD;i++) {
+ data_R[i]=seq[i];
+ data_G[i]=seq[oneD+i];
+ data_B[i]=seq[2*oneD+i];
+ }
+ store_RGB_pixmap("lena3.ppm", data_R, data_G, data_B, width, height);
}
+ else {
+ bool equal=true;
+ for(int i=0;i<imsize;i++) {
+ //cout<<(int)buffer[i]<<endl;
+ if(buffer[i]!=seq[i]) {
+ equal=false;
+ }
+ }
+// cout<<"RESULT CORRECT: "<<equal<<endl;
+ }
+
- Dynamickeygenerationnew(Secretkey, counter);
return 0;
}