From: couturie Date: Thu, 17 Aug 2017 17:19:40 +0000 (+0200) Subject: new X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/Cipher_code.git/commitdiff_plain/fda7e703f6e7ddec74c5c6eb2e44cdc393804bc3?ds=inline new --- diff --git a/Chaotic_code/Convert_Sbox_Bin.m b/Chaotic_code/Convert_Sbox_Bin.m deleted file mode 100644 index d473e2e..0000000 --- a/Chaotic_code/Convert_Sbox_Bin.m +++ /dev/null @@ -1,9 +0,0 @@ -function Bin_Sbox =Convert_Sbox_Bin(Sbox) -Bin_Sbox=zeros(256,8); -for it=1:256 - Bin_Sbox(it,:)=byte2bit(Sbox(it)); - %double(dec2bin(Sbox(it),8))-48; - %byte2bit -end - - diff --git a/Chaotic_code/Dynamickeygenerationnew.m b/Chaotic_code/Dynamickeygenerationnew.m deleted file mode 100644 index 32a3155..0000000 --- a/Chaotic_code/Dynamickeygenerationnew.m +++ /dev/null @@ -1,53 +0,0 @@ -function [RK,Sbox,Pbox]=Dynamickeygenerationnew(Secretkey,counter,strh,h) -x=java.security.MessageDigest.getInstance(strh); -x.update(bitxor(Secretkey,counter)); -DK=double(typecast(x.digest,'uint8')); -M=sqrt(h*8); -%%%%%%%%%%%% Creation of P-box (blocks permutation)%%%%%%%%%%%%%%%%%%%%%%%% -% construction of P-box - -%Pbox=PermutationCat(Keyp,M); - -Qp=8*h; -Ap=1:Qp; -Keyp=reshape((DK(1:1:16)),1,[]); -Keyp=mod(Keyp,Qp)+1; - -Pbox=supboxvector2(Ap,Qp,Keyp) - - - -% construction of S-box -Q=2^8; -A=1:Q; -KS=reshape(DK(17:32),1,[]); -Sbox=supboxvector2(A,Q,KS)-1; - -%%%%%%%%%%%%%%%% Construction of round keys%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -r=4; -X=reshape(DK(33:48),1,[]); -X=double(typecast(uint8(X),'uint32')) -P=reshape(DK(49:end),1,[]); -P=double(typecast(uint8(P),'uint32')) -N=2^32; -m=ceil(h/4) -RK= roundKeyiterations(X,P,N,r,Sbox,m); - - -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -% %%%%%%%%%%%%% creation of IV (block of h bits) can be employ for CBC, CFB, OFB, CTR mode %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -% s_rk=rc4key(DK(17:1:32)); -% IV=reshape(prga( s_rk,h^2),h,h); -% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -% %%%%%%%%%%%%%%%%%%%%creation of the diffusion matrix%%%%%%%%%%%%%%%%%%%%%%% -% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -% sc2=rc4key(DK(end-16:end)); -% outd=prga( sc2,(h^2)/4); -% A=reshape(outd,h/2,h/2); -% In=eye(h/2,h/2); -% if (kindd==0) -% G=[A A+In; A-In A ]; -% else -% A=mod(A,2); -% G=[A bitxor(A,In) ; bitxor(A,In) A]; -% end \ No newline at end of file diff --git a/Chaotic_code/bit2byte.m b/Chaotic_code/bit2byte.m deleted file mode 100644 index b1d9fed..0000000 --- a/Chaotic_code/bit2byte.m +++ /dev/null @@ -1,18 +0,0 @@ -function y = bit2byte(x) -% y = bit2byte(x) -% Transform a number of bits into a number of bytes. - -x = double(x); - -x_n = numel(x); -if rem(x_n,8) - x = [x zeros(1,8-rem(x_n,8))]; -end -y = zeros(1,ceil(x_n/8)); -y_index = 1; -v = 2.^(0:7); -for i=1:8:x_n - y(y_index) = sum(x(i+7:-1:i).*v); - y_index = y_index + 1; -end -y = uint8(y); diff --git a/Chaotic_code/byte2bit.m b/Chaotic_code/byte2bit.m deleted file mode 100644 index 2a79021..0000000 --- a/Chaotic_code/byte2bit.m +++ /dev/null @@ -1,15 +0,0 @@ -function y = byte2bit(x) -% y = byte2bit(x) -% Transform a number of bytes into a number of bits. - -x_n=numel(x); -y=zeros(1,x_n*8); -y_index=1; -for i=1:x_n - for j=8:-1:1 -% for j=1:8 - y(y_index+8-j) = bitget(x(i),j); - end - y_index = y_index + 8; -end -y = uint8(y); diff --git a/Chaotic_code/decryptionprocess2.m b/Chaotic_code/decryptionprocess2.m deleted file mode 100644 index 8b5024c..0000000 --- a/Chaotic_code/decryptionprocess2.m +++ /dev/null @@ -1,32 +0,0 @@ -function dimg =decryptionprocess(img,h,RK,Inv_SubBytes,Inv_Pbox,r) -%%%%%%%%%%%%%% convert image to a vector seq -%seq=double(reshape(img,1,[])); -seq_bin=double(byte2bit(uint8(img))) ; -decr_seq_binary=zeros(1,length(seq_bin)); -%%%%%%%%%%%%%%%%%%%% calculate the number of blocks%%%%%%%%%%%%%%%%%%%%%%%% -nb= floor(length(seq_bin)/(8*h)); -RK_bin=double(reshape(byte2bit(RK),r,[])); -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%% Convert S-box to binary representation to avoid repeat the -%%%%%%%%%%% byte2bit conversion -Bin_Sbox =double(Convert_Sbox_Bin(Inv_SubBytes)); -%%%%%%%%%%%%%%%%%%%% Applied the confusion process (r rounds) -for it=1:nb - temp=seq_bin((it-1)*8*h+1:it*h*8); - for itr=r:-1:1 - temp= temp(Inv_Pbox); - temp=reshape(Bin_Sbox (double(bit2byte(temp))+1,:)',1,[]); - % double(byte2bit(Inv_SubBytes(double(bit2byte(temp))+1))); - % -% size(temp) - %byte2bit(Inv_SubBytes(double(bit2byte(temp))+1)); - %temp= Inv_SubBytes(temp+1); - temp=bitxor(temp,RK_bin(itr,1:h*8)); - end - decr_seq_binary((it-1)*8*h+1:it*h*8)=temp; -end - -% Convert to Byte representation - -%valbin=reshape(valbin,Tb/8,8); -dimg=uint8(bit2byte(decr_seq_binary)); \ No newline at end of file diff --git a/Chaotic_code/decryptionprocess2_CBC.m b/Chaotic_code/decryptionprocess2_CBC.m deleted file mode 100644 index 176c956..0000000 --- a/Chaotic_code/decryptionprocess2_CBC.m +++ /dev/null @@ -1,42 +0,0 @@ -function dimg =decryptionprocess2_CBC(img,h,RK,Inv_SubBytes,Inv_Pbox,r,IV) -%%%%%%%%%%%%%% convert image to a vector seq -%seq=double(reshape(img,1,[])); -seq_bin=double(byte2bit(uint8(img))) ; -decr_seq_binary=zeros(1,length(seq_bin)); -%%%%%%%%%%%%%%%%%%%% calculate the number of blocks%%%%%%%%%%%%%%%%%%%%%%%% -nb= floor(length(seq_bin)/(8*h)); -RKB=byte2bit(RK); -RKB=RKB(1:r*h*8); -%RK_bin=double(reshape(byte2bit(RK),r,[])); -RK_bin=double(reshape(RKB,r,[])); -%RK_bin=double(reshape(byte2bit(RK),r,[])); -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%% Convert S-box to binary representation to avoid repeat the -%%%%%%%%%%% byte2bit conversion -Bin_Sbox =double(Convert_Sbox_Bin(Inv_SubBytes)); - -iv=[]; -for i=1:h - iv=[iv byte2bit(IV(i))]; -end -IV=double(iv); - - -%%%%%%%%%%%%%%%%%%%% Applied the confusion process (r rounds) -for it=1:nb - temp=seq_bin((it-1)*8*h+1:it*h*8); - temp_IV=temp; - for itr=r:-1:1 - temp= temp(Inv_Pbox); - temp=reshape(Bin_Sbox (double(bit2byte(temp))+1,:)',1,[]); - temp=bitxor(temp,RK_bin(itr,1:h*8)); - end - temp=bitxor(temp,IV); - decr_seq_binary((it-1)*8*h+1:it*h*8)=temp; - IV= temp_IV; -end - -% Convert to Byte representation - -%valbin=reshape(valbin,Tb/8,8); -dimg=uint8(bit2byte(decr_seq_binary)); \ No newline at end of file diff --git a/Chaotic_code/encryptionprocess2.m b/Chaotic_code/encryptionprocess2.m deleted file mode 100644 index 08a8966..0000000 --- a/Chaotic_code/encryptionprocess2.m +++ /dev/null @@ -1,25 +0,0 @@ -function eimg =encryptionprocess(img,h,RK,SubBytes,Pbox,r) -%%%%%%%%%%%%%% convert image to a vector seq -%seq=double(reshape(img,1,[])); -seq_bin=double(byte2bit(uint8(img))) ; -encr_seq_binary=zeros(1,length(seq_bin)); -%%%%%%%%%%%%%%%%%%%% calculate the number of blocks%%%%%%%%%%%%%%%%%%%%%%%% -nb= floor(length(seq_bin)/(8*h)); -RK_bin=double(reshape(byte2bit(RK),r,[])); -Bin_Sbox =double((Convert_Sbox_Bin(SubBytes))); -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%%%%%%%%%%% Applied the confusion process then the bits permutation for r rounds -for it=1:nb - temp=seq_bin((it-1)*8*h+1:it*8*h); - for itr=1:r - temp=bitxor(temp,RK_bin(itr,1:h*8)); - temp= (reshape(Bin_Sbox (double(bit2byte(temp))+1,:)',1,[])); - temp= temp(Pbox); - end - encr_seq_binary((it-1)*8*h+1:it*h*8)=temp; -end - -% Convert to Byte representation - -%valbin=reshape(valbin,Tb/8,8); -eimg=(bit2byte( encr_seq_binary)); \ No newline at end of file diff --git a/Chaotic_code/encryptionprocess2_CBC.m b/Chaotic_code/encryptionprocess2_CBC.m deleted file mode 100644 index c79b7ab..0000000 --- a/Chaotic_code/encryptionprocess2_CBC.m +++ /dev/null @@ -1,39 +0,0 @@ -function eimg =encryptionprocess2_CBC(img,h,RK,SubBytes,Pbox,r,IV) -%%%%%%%%%%%%%% convert image to a vector seq -%seq=double(reshape(img,1,[])); -seq_bin=double(byte2bit(uint8(img))) ; -encr_seq_binary=zeros(1,length(seq_bin)); -%%%%%%%%%%%%%%%%%%%% calculate the number of blocks%%%%%%%%%%%%%%%%%%%%%%%% -nb= floor(length(seq_bin)/(8*h)); -RKB=byte2bit(RK); -RKB=RKB(1:r*h*8); -%RK_bin=double(reshape(byte2bit(RK),r,[])); -RK_bin=double(reshape(RKB,r,[])); -Bin_Sbox =double((Convert_Sbox_Bin(SubBytes))); -%iv=zeros(1,8*h); -%iv(end-h+1:end)=IV; -%IV=iv; -iv=[]; -for i=1:h - iv=[iv byte2bit(IV(i))]; -end -IV=double(iv); - -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%%%%%%%%%%% Applied the confusion process then the bits permutation for r rounds -for it=1:nb - temp=seq_bin((it-1)*8*h+1:it*8*h); - temp=bitxor(temp,IV); - for itr=1:r - temp=bitxor(temp,RK_bin(itr,1:h*8)); - temp= (reshape(Bin_Sbox (double(bit2byte(temp))+1,:)',1,[])); - temp= temp(Pbox); - end - encr_seq_binary((it-1)*8*h+1:it*h*8)=temp; - IV=temp; -end - -% Convert to Byte representation - -%valbin=reshape(valbin,Tb/8,8); -eimg=(bit2byte( encr_seq_binary)); \ No newline at end of file diff --git a/Chaotic_code/inverse_tables.m b/Chaotic_code/inverse_tables.m deleted file mode 100644 index 9e0ee28..0000000 --- a/Chaotic_code/inverse_tables.m +++ /dev/null @@ -1,7 +0,0 @@ -function inv_perm_tabs= inverse_tables(tab) -le=length(tab); -inv_perm_tabs=zeros(1,le); -for ir = 1 :le - inv_perm_tabs(tab(ir)+1) = ir-1 ; -end - diff --git a/Chaotic_code/inverse_tables2.m b/Chaotic_code/inverse_tables2.m deleted file mode 100644 index 802d6ea..0000000 --- a/Chaotic_code/inverse_tables2.m +++ /dev/null @@ -1,8 +0,0 @@ -function inv_perm_tabs= inverse_tables2(tab) -tab2=reshape(tab,1,[]); -le=length(tab2); -inv_perm_tabs=zeros(1,le); -for ir = 1 :le - inv_perm_tabs(tab2(ir)) = ir ; -end -%inv_perm_tabs=reshape(inv_perm_tabs,size(tab,1),size(tab,2)); diff --git a/Chaotic_code/lena512.bmp b/Chaotic_code/lena512.bmp deleted file mode 100644 index 5641e75..0000000 Binary files a/Chaotic_code/lena512.bmp and /dev/null differ diff --git a/Chaotic_code/lenna.bmp b/Chaotic_code/lenna.bmp deleted file mode 100644 index d78becd..0000000 Binary files a/Chaotic_code/lenna.bmp and /dev/null differ diff --git a/Chaotic_code/lenna512.bmp b/Chaotic_code/lenna512.bmp deleted file mode 100644 index d78becd..0000000 Binary files a/Chaotic_code/lenna512.bmp and /dev/null differ diff --git a/Chaotic_code/main2.m b/Chaotic_code/main2.m deleted file mode 100644 index cc4f3ac..0000000 --- a/Chaotic_code/main2.m +++ /dev/null @@ -1,79 +0,0 @@ -%clear all -%close all -%clc - - - -%%%%%%%%%%%%%%%% Input data%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -[filename, pathname] = uigetfile( {'*.bmp';}, 'Pick a file'); -name=[ pathname filename]; -data=imread(name); -%data=imresize(data,[64 64]) - -h=2;% number of bytes in a block (Tb=h*8) -r=4;% number of rounds -sk=16 % number of byes in a block cipher -strh='SHA-512'; -% mode=0==> ECB, -% mode 1==> CBC - -mode=1 - - - -% calculate the length of data -SI=size(data); -%len=SI(1)*SI(2)*SI(3); -%lenBits=len*8; -%data_line=reshape(double(data),1,len); - -figure() -imshow(uint8(data)); - -%%%%%%%%%%%%%%%%% Key generation%%%%%%%%%%%%%%%%%%%%%%%% -Secretkey=floor(rand(1,sk)*256); -counter=floor(rand(1,sk)*256); -%%%%%%%%%%%%%%%%%%%%%%%%%Creation of cipher layer's%%%%%%%%%%%%%%%%%%%% -[RK,Sbox,Pbox]=Dynamickeygenerationnew(Secretkey,counter,strh,h); - %%%%%%%%%%%%%%%%%%%%%%%%%%%%% Change in data block%%%%%%%%%%%%%%%%%%%%%%%% - - - - -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Encryption Process%%%%%%%%%%%%%%%%%%%%% -tic -if mode==0 -eimg =encryptionprocess2(data,h,RK,Sbox,Pbox,r); -elseif mode==1 -IV=double(floor(rand(1,h)*256)); -eimg =encryptionprocess2_CBC(data,h,RK,Sbox,Pbox,r,IV); -end - -toc -eimg2=reshape(eimg,size(data)); - -figure() -imshow(uint8(eimg2)); - -%%%%%%%%%%%%%%%%%%%%% Decryption Side%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%%%%%%%%%%% calculate the inverse substitution and diffusion -%%%%%%%%%%%%%%%%%%%% layer%%%%%%%%%%%%%%%% - Inv_Sbox= inverse_tables(Sbox); - Inv_Pbox= inverse_tables2(Pbox); - - - if mode==0 - dimg =decryptionprocess2(eimg,h,RK,Inv_Sbox,Inv_Pbox,r); -elseif mode==1 - - dimg =decryptionprocess2_CBC(eimg,h,RK,Inv_Sbox,Inv_Pbox,r,IV); - end - -% tic -% dimg =decryptionprocess2(eimg,h,RK,Inv_Sbox,Inv_Pbox,r); -% toc - dimg=reshape(dimg,size(data)); - figure() - imshow(uint8(dimg)); - diff --git a/Chaotic_code/roundKeyiterations.m b/Chaotic_code/roundKeyiterations.m deleted file mode 100644 index 564078a..0000000 --- a/Chaotic_code/roundKeyiterations.m +++ /dev/null @@ -1,18 +0,0 @@ -function RK=roundKeyiterations (X,P, N,r,Sbox,m) -% DIfferent size of input block -%m=1; -RK=zeros(r,4*m); -for itr=1:r - for itm=1:m - y=skewtententierperturbed(X(itr),P(itr),N) - %Y(i)=double(typecast(y,'uint8')) - op=double(typecast(uint32(y),'uint8')) - opd(1)=bitxor(bitxor(op(1),op(2)),op(3)); - opd(2)=bitxor(bitxor(op(1),op(2)),op(4)); - opd(3)=bitxor(bitxor(op(1),op(4)),op(3)); - opd(4)=bitxor(bitxor(op(4),op(2)),op(3)); - opd=Sbox(opd+1); - RK(itr,(itm-1)*4+1:itm*4)=opd(:); - X(itr)=y; - end -end \ No newline at end of file diff --git a/Chaotic_code/skewtententierperturbed.m b/Chaotic_code/skewtententierperturbed.m deleted file mode 100644 index afacc73..0000000 --- a/Chaotic_code/skewtententierperturbed.m +++ /dev/null @@ -1,9 +0,0 @@ -function y=skewtententierperturbed(x,p,Q) -% x : initial condition -% p: control parameter -% N:precision -if x<=p - y=ceil(Q*(x/p)); - else - y=floor(Q*((Q-x)/(Q-p)))+1; -end diff --git a/Chaotic_code/supboxvector2.m b/Chaotic_code/supboxvector2.m deleted file mode 100644 index 34acd09..0000000 --- a/Chaotic_code/supboxvector2.m +++ /dev/null @@ -1,12 +0,0 @@ -function x=supboxvector2(x,Q,p) -% r=1 for each parameters -y=zeros(1,Q); -for i=1:length(p) -%for w=1:r -dinf=find (x<=p(1,i)); -dsup=find (x>p(1,i)); -y(dinf)=ceil((Q*x(dinf))./p(1,i)); -y(dsup)=floor((Q*(Q-x(dsup)))./(Q-p(1,i)))+1; -x=y; -%end -end