crypt 1.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/crypt/blowfish-tables.rb +190 -0
- data/crypt/blowfish.rb +110 -0
- data/crypt/cbc.rb +123 -0
- data/crypt/gost.rb +140 -0
- data/crypt/idea.rb +193 -0
- data/crypt/noise.rb +94 -0
- data/crypt/rijndael-tables.rb +117 -0
- data/crypt/rijndael.rb +269 -0
- data/crypt/stringxor.rb +27 -0
- metadata +48 -0
|
@@ -0,0 +1,190 @@
|
|
|
1
|
+
# blowfish-tables.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
module Crypt
|
|
4
|
+
module BlowfishTables
|
|
5
|
+
|
|
6
|
+
INITIALPARRAY = [
|
|
7
|
+
0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822, 0x299f31d0,
|
|
8
|
+
0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
|
|
9
|
+
0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917, 0x9216d5d9, 0x8979fb1b
|
|
10
|
+
]
|
|
11
|
+
|
|
12
|
+
INITIALSBOXES = [[
|
|
13
|
+
0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7, 0xb8e1afed, 0x6a267e96,
|
|
14
|
+
0xba7c9045, 0xf12c7f99, 0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
|
|
15
|
+
0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e, 0x0d95748f, 0x728eb658,
|
|
16
|
+
0x718bcd58, 0x82154aee, 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
|
|
17
|
+
0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef, 0x8e79dcb0, 0x603a180e,
|
|
18
|
+
0x6c9e0e8b, 0xb01e8a3e, 0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
|
|
19
|
+
0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440, 0x55ca396a, 0x2aab10b6,
|
|
20
|
+
0xb4cc5c34, 0x1141e8ce, 0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
|
|
21
|
+
0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e, 0xafd6ba33, 0x6c24cf5c,
|
|
22
|
+
0x7a325381, 0x28958677, 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
|
|
23
|
+
0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032, 0xef845d5d, 0xe98575b1,
|
|
24
|
+
0xdc262302, 0xeb651b88, 0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
|
|
25
|
+
0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e, 0x21c66842, 0xf6e96c9a,
|
|
26
|
+
0x670c9c61, 0xabd388f0, 0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
|
|
27
|
+
0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98, 0xa1f1651d, 0x39af0176,
|
|
28
|
+
0x66ca593e, 0x82430e88, 0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
|
|
29
|
+
0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6, 0x4ed3aa62, 0x363f7706,
|
|
30
|
+
0x1bfedf72, 0x429b023d, 0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
|
|
31
|
+
0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7, 0xe3fe501a, 0xb6794c3b,
|
|
32
|
+
0x976ce0bd, 0x04c006ba, 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
|
|
33
|
+
0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f, 0x6dfc511f, 0x9b30952c,
|
|
34
|
+
0xcc814544, 0xaf5ebd09, 0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
|
|
35
|
+
0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb, 0x5579c0bd, 0x1a60320a,
|
|
36
|
+
0xd6a100c6, 0x402c7279, 0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
|
|
37
|
+
0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab, 0x323db5fa, 0xfd238760,
|
|
38
|
+
0x53317b48, 0x3e00df82, 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
|
|
39
|
+
0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573, 0x695b27b0, 0xbbca58c8,
|
|
40
|
+
0xe1ffa35d, 0xb8f011a0, 0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
|
|
41
|
+
0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790, 0xe1ddf2da, 0xa4cb7e33,
|
|
42
|
+
0x62fb1341, 0xcee4c6e8, 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
|
|
43
|
+
0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0, 0xd08ed1d0, 0xafc725e0,
|
|
44
|
+
0x8e3c5b2f, 0x8e7594b7, 0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
|
|
45
|
+
0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad, 0x2f2f2218, 0xbe0e1777,
|
|
46
|
+
0xea752dfe, 0x8b021fa1, 0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
|
|
47
|
+
0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9, 0x165fa266, 0x80957705,
|
|
48
|
+
0x93cc7314, 0x211a1477, 0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
|
|
49
|
+
0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49, 0x00250e2d, 0x2071b35e,
|
|
50
|
+
0x226800bb, 0x57b8e0af, 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
|
|
51
|
+
0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5, 0x83260376, 0x6295cfa9,
|
|
52
|
+
0x11c81968, 0x4e734a41, 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
|
|
53
|
+
0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400, 0x08ba6fb5, 0x571be91f,
|
|
54
|
+
0xf296ec6b, 0x2a0dd915, 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
|
|
55
|
+
0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a], [
|
|
56
|
+
0x4b7a70e9, 0xb5b32944,
|
|
57
|
+
0xdb75092e, 0xc4192623, 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
|
|
58
|
+
0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1, 0x193602a5, 0x75094c29,
|
|
59
|
+
0xa0591340, 0xe4183a3e, 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
|
|
60
|
+
0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1, 0x4cdd2086, 0x8470eb26,
|
|
61
|
+
0x6382e9c6, 0x021ecc5e, 0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,
|
|
62
|
+
0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737, 0x3e07841c, 0x7fdeae5c,
|
|
63
|
+
0x8e7d44ec, 0x5716f2b8, 0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,
|
|
64
|
+
0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd, 0xd19113f9, 0x7ca92ff6,
|
|
65
|
+
0x94324773, 0x22f54701, 0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,
|
|
66
|
+
0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41, 0xe238cd99, 0x3bea0e2f,
|
|
67
|
+
0x3280bba1, 0x183eb331, 0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,
|
|
68
|
+
0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af, 0xde9a771f, 0xd9930810,
|
|
69
|
+
0xb38bae12, 0xdccf3f2e, 0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
|
|
70
|
+
0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c, 0xec7aec3a, 0xdb851dfa,
|
|
71
|
+
0x63094366, 0xc464c3d2, 0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,
|
|
72
|
+
0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd, 0x71dff89e, 0x10314e55,
|
|
73
|
+
0x81ac77d6, 0x5f11199b, 0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,
|
|
74
|
+
0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e, 0x86e34570, 0xeae96fb1,
|
|
75
|
+
0x860e5e0a, 0x5a3e2ab3, 0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,
|
|
76
|
+
0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a, 0xc6150eba, 0x94e2ea78,
|
|
77
|
+
0xa5fc3c53, 0x1e0a2df4, 0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,
|
|
78
|
+
0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66, 0xe3bc4595, 0xa67bc883,
|
|
79
|
+
0xb17f37d1, 0x018cff28, 0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
|
|
80
|
+
0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84, 0x1521b628, 0x29076170,
|
|
81
|
+
0xecdd4775, 0x619f1510, 0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,
|
|
82
|
+
0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14, 0xeecc86bc, 0x60622ca7,
|
|
83
|
+
0x9cab5cab, 0xb2f3846e, 0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,
|
|
84
|
+
0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7, 0x9b540b19, 0x875fa099,
|
|
85
|
+
0x95f7997e, 0x623d7da8, 0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,
|
|
86
|
+
0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99, 0x57f584a5, 0x1b227263,
|
|
87
|
+
0x9b83c3ff, 0x1ac24696, 0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,
|
|
88
|
+
0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73, 0x5d4a14d9, 0xe864b7e3,
|
|
89
|
+
0x42105d14, 0x203e13e0, 0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
|
|
90
|
+
0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105, 0xd81e799e, 0x86854dc7,
|
|
91
|
+
0xe44b476a, 0x3d816250, 0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,
|
|
92
|
+
0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285, 0x095bbf00, 0xad19489d,
|
|
93
|
+
0x1462b174, 0x23820e00, 0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
|
|
94
|
+
0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb, 0x7cde3759, 0xcbee7460,
|
|
95
|
+
0x4085f2a7, 0xce77326e, 0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
|
|
96
|
+
0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc, 0x9e447a2e, 0xc3453484,
|
|
97
|
+
0xfdd56705, 0x0e1e9ec9, 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
|
|
98
|
+
0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20, 0x153e21e7, 0x8fb03d4a,
|
|
99
|
+
0xe6e39f2b, 0xdb83adf7], [
|
|
100
|
+
0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
|
|
101
|
+
0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068, 0xd4082471, 0x3320f46a,
|
|
102
|
+
0x43b7d4b7, 0x500061af, 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
|
|
103
|
+
0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45, 0xbfbc09ec, 0x03bd9785,
|
|
104
|
+
0x7fac6dd0, 0x31cb8504, 0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,
|
|
105
|
+
0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb, 0x68dc1462, 0xd7486900,
|
|
106
|
+
0x680ec0a4, 0x27a18dee, 0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
|
|
107
|
+
0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42, 0x20fe9e35, 0xd9f385b9,
|
|
108
|
+
0xee39d7ab, 0x3b124e8b, 0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,
|
|
109
|
+
0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb, 0xfb0af54e, 0xd8feb397,
|
|
110
|
+
0x454056ac, 0xba489527, 0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,
|
|
111
|
+
0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33, 0xa62a4a56, 0x3f3125f9,
|
|
112
|
+
0x5ef47e1c, 0x9029317c, 0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,
|
|
113
|
+
0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc, 0x07f9c9ee, 0x41041f0f,
|
|
114
|
+
0x404779a4, 0x5d886e17, 0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,
|
|
115
|
+
0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b, 0x0e12b4c2, 0x02e1329e,
|
|
116
|
+
0xaf664fd1, 0xcad18115, 0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
|
|
117
|
+
0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728, 0xd0127845, 0x95b794fd,
|
|
118
|
+
0x647d0862, 0xe7ccf5f0, 0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,
|
|
119
|
+
0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37, 0xa812dc60, 0xa1ebddf8,
|
|
120
|
+
0x991be14c, 0xdb6e6b0d, 0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,
|
|
121
|
+
0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b, 0x667b9ffb, 0xcedb7d9c,
|
|
122
|
+
0xa091cf0b, 0xd9155ea3, 0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,
|
|
123
|
+
0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d, 0x6842ada7, 0xc66a2b3b,
|
|
124
|
+
0x12754ccc, 0x782ef11c, 0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,
|
|
125
|
+
0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9, 0x44421659, 0x0a121386,
|
|
126
|
+
0xd90cec6e, 0xd5abea2a, 0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
|
|
127
|
+
0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d, 0xd1fd8346, 0xf6381fb0,
|
|
128
|
+
0x7745ae04, 0xd736fccc, 0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,
|
|
129
|
+
0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61, 0x4e58f48f, 0xf2ddfda2,
|
|
130
|
+
0xf474ef38, 0x8789bdc2, 0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,
|
|
131
|
+
0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2, 0x466e598e, 0x20b45770,
|
|
132
|
+
0x8cd55591, 0xc902de4c, 0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,
|
|
133
|
+
0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633, 0xe85a1f02, 0x09f0be8c,
|
|
134
|
+
0x4a99a025, 0x1d6efe10, 0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,
|
|
135
|
+
0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52, 0x50115e01, 0xa70683fa,
|
|
136
|
+
0xa002b5c4, 0x0de6d027, 0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
|
|
137
|
+
0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62, 0x11e69ed7, 0x2338ea63,
|
|
138
|
+
0x53c2dd94, 0xc2c21634, 0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
|
|
139
|
+
0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24, 0x86e3725f, 0x724d9db9,
|
|
140
|
+
0x1ac15bb4, 0xd39eb8fc, 0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
|
|
141
|
+
0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c, 0x6fd5c7e7, 0x56e14ec4,
|
|
142
|
+
0x362abfce, 0xddc6c837, 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0], [
|
|
143
|
+
0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b, 0x5cb0679e, 0x4fa33742,
|
|
144
|
+
0xd3822740, 0x99bc9bbe, 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
|
|
145
|
+
0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4, 0x5748ab2f, 0xbc946e79,
|
|
146
|
+
0xc6a376d2, 0x6549c2c8, 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
|
|
147
|
+
0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304, 0xa1fad5f0, 0x6a2d519a,
|
|
148
|
+
0x63ef8ce2, 0x9a86ee22, 0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
|
|
149
|
+
0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6, 0x2826a2f9, 0xa73a3ae1,
|
|
150
|
+
0x4ba99586, 0xef5562e9, 0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
|
|
151
|
+
0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593, 0xe990fd5a, 0x9e34d797,
|
|
152
|
+
0x2cf0b7d9, 0x022b8b51, 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
|
|
153
|
+
0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c, 0xe029ac71, 0xe019a5e6,
|
|
154
|
+
0x47b0acfd, 0xed93fa9b, 0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
|
|
155
|
+
0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c, 0x15056dd4, 0x88f46dba,
|
|
156
|
+
0x03a16125, 0x0564f0bd, 0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
|
|
157
|
+
0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319, 0x7533d928, 0xb155fdf5,
|
|
158
|
+
0x03563482, 0x8aba3cbb, 0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
|
|
159
|
+
0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991, 0xea7a90c2, 0xfb3e7bce,
|
|
160
|
+
0x5121ce64, 0x774fbe32, 0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
|
|
161
|
+
0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166, 0xb39a460a, 0x6445c0dd,
|
|
162
|
+
0x586cdecf, 0x1c20c8ae, 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
|
|
163
|
+
0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5, 0x72eacea8, 0xfa6484bb,
|
|
164
|
+
0x8d6612ae, 0xbf3c6f47, 0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
|
|
165
|
+
0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d, 0x4040cb08, 0x4eb4e2cc,
|
|
166
|
+
0x34d2466a, 0x0115af84, 0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
|
|
167
|
+
0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8, 0x611560b1, 0xe7933fdc,
|
|
168
|
+
0xbb3a792b, 0x344525bd, 0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
|
|
169
|
+
0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7, 0x1a908749, 0xd44fbd9a,
|
|
170
|
+
0xd0dadecb, 0xd50ada38, 0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
|
|
171
|
+
0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c, 0xbf97222c, 0x15e6fc2a,
|
|
172
|
+
0x0f91fc71, 0x9b941525, 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
|
|
173
|
+
0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442, 0xe0ec6e0e, 0x1698db3b,
|
|
174
|
+
0x4c98a0be, 0x3278e964, 0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
|
|
175
|
+
0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8, 0xdf359f8d, 0x9b992f2e,
|
|
176
|
+
0xe60b6f47, 0x0fe3f11d, 0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
|
|
177
|
+
0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299, 0xf523f357, 0xa6327623,
|
|
178
|
+
0x93a83531, 0x56cccd02, 0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
|
|
179
|
+
0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614, 0xe6c6c7bd, 0x327a140a,
|
|
180
|
+
0x45e1d006, 0xc3f27b9a, 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
|
|
181
|
+
0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b, 0x53113ec0, 0x1640e3d3,
|
|
182
|
+
0x38abbd60, 0x2547adf0, 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
|
|
183
|
+
0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e, 0x1948c25c, 0x02fb8a8c,
|
|
184
|
+
0x01c36ae4, 0xd6ebe1f9, 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
|
|
185
|
+
0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6]
|
|
186
|
+
]
|
|
187
|
+
|
|
188
|
+
|
|
189
|
+
end
|
|
190
|
+
end
|
data/crypt/blowfish.rb
ADDED
|
@@ -0,0 +1,110 @@
|
|
|
1
|
+
# blowfish.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
#
|
|
3
|
+
# Blowfish algorithm by Bruce Schneider
|
|
4
|
+
# Ported by Richard Kernahan from the reference C code
|
|
5
|
+
|
|
6
|
+
module Crypt
|
|
7
|
+
class Blowfish
|
|
8
|
+
|
|
9
|
+
require 'crypt/cbc'
|
|
10
|
+
include Crypt::CBC
|
|
11
|
+
|
|
12
|
+
require 'crypt/blowfish-tables'
|
|
13
|
+
include Crypt::BlowfishTables
|
|
14
|
+
|
|
15
|
+
ULONG = 0x100000000
|
|
16
|
+
|
|
17
|
+
def block_size
|
|
18
|
+
return(8)
|
|
19
|
+
end
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
def initialize(key)
|
|
23
|
+
@key = key
|
|
24
|
+
raise "Bad key length: the key must be 1-56 bytes." unless (key.length.between?(1,56))
|
|
25
|
+
@pArray = []
|
|
26
|
+
@sBoxes = []
|
|
27
|
+
setup_blowfish()
|
|
28
|
+
end
|
|
29
|
+
|
|
30
|
+
|
|
31
|
+
def f(x)
|
|
32
|
+
a, b, c, d = [x].pack('N').unpack('CCCC')
|
|
33
|
+
y = (@sBoxes[0][a] + @sBoxes[1][b]) % ULONG
|
|
34
|
+
y = (y ^ @sBoxes[2][c]) % ULONG
|
|
35
|
+
y = (y + @sBoxes[3][d]) % ULONG
|
|
36
|
+
return(y)
|
|
37
|
+
end
|
|
38
|
+
|
|
39
|
+
|
|
40
|
+
def setup_blowfish()
|
|
41
|
+
@sBoxes = Array.new(4) { |i| INITIALSBOXES[i].clone }
|
|
42
|
+
@pArray = INITIALPARRAY.clone
|
|
43
|
+
keypos = 0
|
|
44
|
+
0.upto(17) { |i|
|
|
45
|
+
data = 0
|
|
46
|
+
4.times {
|
|
47
|
+
data = ((data << 8) | @key[keypos]) % ULONG
|
|
48
|
+
keypos = (keypos.next) % @key.length
|
|
49
|
+
}
|
|
50
|
+
@pArray[i] = (@pArray[i] ^ data) % ULONG
|
|
51
|
+
}
|
|
52
|
+
l = 0
|
|
53
|
+
r = 0
|
|
54
|
+
0.step(17, 2) { |i|
|
|
55
|
+
l, r = encrypt_pair(l, r)
|
|
56
|
+
@pArray[i] = l
|
|
57
|
+
@pArray[i+1] = r
|
|
58
|
+
}
|
|
59
|
+
0.upto(3) { |i|
|
|
60
|
+
0.step(255, 2) { |j|
|
|
61
|
+
l, r = encrypt_pair(l, r)
|
|
62
|
+
@sBoxes[i][j] = l
|
|
63
|
+
@sBoxes[i][j+1] = r
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
end
|
|
67
|
+
|
|
68
|
+
def encrypt_pair(xl, xr)
|
|
69
|
+
0.upto(15) { |i|
|
|
70
|
+
xl = (xl ^ @pArray[i]) % ULONG
|
|
71
|
+
xr = (xr ^ f(xl)) % ULONG
|
|
72
|
+
xl, xr = [xl, xr].reverse
|
|
73
|
+
}
|
|
74
|
+
xl, xr = [xl, xr].reverse
|
|
75
|
+
xr = (xr ^ @pArray[16]) % ULONG
|
|
76
|
+
xl = (xl ^ @pArray[17]) % ULONG
|
|
77
|
+
return([xl, xr])
|
|
78
|
+
end
|
|
79
|
+
|
|
80
|
+
|
|
81
|
+
def decrypt_pair(xl, xr)
|
|
82
|
+
17.downto(2) { |i|
|
|
83
|
+
xl = (xl ^ @pArray[i]) % ULONG
|
|
84
|
+
xr = (xr ^ f(xl)) % ULONG
|
|
85
|
+
xl, xr = [xl, xr].reverse
|
|
86
|
+
}
|
|
87
|
+
xl, xr = [xl, xr].reverse
|
|
88
|
+
xr = (xr ^ @pArray[1]) % ULONG
|
|
89
|
+
xl = (xl ^ @pArray[0]) % ULONG
|
|
90
|
+
return([xl, xr])
|
|
91
|
+
end
|
|
92
|
+
|
|
93
|
+
|
|
94
|
+
def encrypt_block(block)
|
|
95
|
+
xl, xr = block.unpack('NN')
|
|
96
|
+
xl, xr = encrypt_pair(xl, xr)
|
|
97
|
+
encrypted = [xl, xr].pack('NN')
|
|
98
|
+
return(encrypted)
|
|
99
|
+
end
|
|
100
|
+
|
|
101
|
+
|
|
102
|
+
def decrypt_block(block)
|
|
103
|
+
xl, xr = block.unpack('NN')
|
|
104
|
+
xl, xr = decrypt_pair(xl, xr)
|
|
105
|
+
decrypted = [xl, xr].pack('NN')
|
|
106
|
+
return(decrypted)
|
|
107
|
+
end
|
|
108
|
+
|
|
109
|
+
end
|
|
110
|
+
end
|
data/crypt/cbc.rb
ADDED
|
@@ -0,0 +1,123 @@
|
|
|
1
|
+
# cbc.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
module Crypt
|
|
4
|
+
module CBC
|
|
5
|
+
|
|
6
|
+
require 'stringio'
|
|
7
|
+
require 'crypt/stringxor'
|
|
8
|
+
|
|
9
|
+
ULONG = 0x100000000
|
|
10
|
+
|
|
11
|
+
# When this module is mixed in with an encryption class, the class
|
|
12
|
+
# must provide three methods: encrypt_block(block) and decrypt_block(block)
|
|
13
|
+
# and block_size()
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
def generate_initialization_vector(words)
|
|
17
|
+
srand(Time.now.to_i)
|
|
18
|
+
vector = ""
|
|
19
|
+
words.times {
|
|
20
|
+
vector << [rand(ULONG)].pack('N')
|
|
21
|
+
}
|
|
22
|
+
return(vector)
|
|
23
|
+
end
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
def encrypt_stream(plainStream, cryptStream)
|
|
27
|
+
# Cypher-block-chain mode
|
|
28
|
+
|
|
29
|
+
initVector = generate_initialization_vector(block_size() / 4)
|
|
30
|
+
chain = encrypt_block(initVector)
|
|
31
|
+
cryptStream.write(chain)
|
|
32
|
+
|
|
33
|
+
while ((block = plainStream.read(block_size())) && (block.length == block_size()))
|
|
34
|
+
block = block ^ chain
|
|
35
|
+
encrypted = encrypt_block(block)
|
|
36
|
+
cryptStream.write(encrypted)
|
|
37
|
+
chain = encrypted
|
|
38
|
+
end
|
|
39
|
+
|
|
40
|
+
# write the final block
|
|
41
|
+
# At most block_size()-1 bytes can be part of the message.
|
|
42
|
+
# That means the final byte can be used to store the number of meaningful
|
|
43
|
+
# bytes in the final block
|
|
44
|
+
block = '' if block.nil?
|
|
45
|
+
buffer = block.split('')
|
|
46
|
+
remainingMessageBytes = buffer.length
|
|
47
|
+
remainingMessageBytes.upto(block_size()-2) { buffer << rand(128).chr }
|
|
48
|
+
buffer << remainingMessageBytes.chr
|
|
49
|
+
block = buffer.join('')
|
|
50
|
+
block = block ^ chain
|
|
51
|
+
encrypted = encrypt_block(block)
|
|
52
|
+
cryptStream.write(encrypted)
|
|
53
|
+
chain = encrypted
|
|
54
|
+
end
|
|
55
|
+
|
|
56
|
+
|
|
57
|
+
def decrypt_stream(cryptStream, plainStream)
|
|
58
|
+
# Cypher-block-chain mode
|
|
59
|
+
chain = cryptStream.read(block_size())
|
|
60
|
+
|
|
61
|
+
while (block = cryptStream.read(block_size()))
|
|
62
|
+
decrypted = decrypt_block(block)
|
|
63
|
+
plainText = decrypted ^ chain
|
|
64
|
+
plainStream.write(plainText) unless cryptStream.eof?
|
|
65
|
+
chain = block
|
|
66
|
+
end
|
|
67
|
+
|
|
68
|
+
# write the final block, omitting the padding
|
|
69
|
+
buffer = plainText.split('')
|
|
70
|
+
remainingMessageBytes = buffer.last.unpack('C').first
|
|
71
|
+
remainingMessageBytes.times { plainStream.write(buffer.shift) }
|
|
72
|
+
end
|
|
73
|
+
|
|
74
|
+
|
|
75
|
+
def carefully_open_file(filename, mode)
|
|
76
|
+
begin
|
|
77
|
+
aFile = File.new(filename, mode)
|
|
78
|
+
rescue
|
|
79
|
+
puts "Sorry. There was a problem opening the file <#{filename}>."
|
|
80
|
+
aFile.close unless aFile.closed?
|
|
81
|
+
raise
|
|
82
|
+
end
|
|
83
|
+
return(aFile)
|
|
84
|
+
end
|
|
85
|
+
|
|
86
|
+
|
|
87
|
+
def encrypt_file(plainFilename, cryptFilename)
|
|
88
|
+
plainFile = carefully_open_file(plainFilename, 'br')
|
|
89
|
+
cryptFile = carefully_open_file(cryptFilename, 'bw+')
|
|
90
|
+
encrypt_stream(plainFile, cryptFile)
|
|
91
|
+
plainFile.close unless plainFile.closed?
|
|
92
|
+
cryptFile.close unless cryptFile.closed?
|
|
93
|
+
end
|
|
94
|
+
|
|
95
|
+
|
|
96
|
+
def decrypt_file(cryptFilename, plainFilename)
|
|
97
|
+
cryptFile = carefully_open_file(cryptFilename, 'br')
|
|
98
|
+
plainFile = carefully_open_file(plainFilename, 'bw+')
|
|
99
|
+
decrypt_stream(cryptFile, plainFile)
|
|
100
|
+
cryptFile.close unless cryptFile.closed?
|
|
101
|
+
plainFile.close unless plainFile.closed?
|
|
102
|
+
end
|
|
103
|
+
|
|
104
|
+
|
|
105
|
+
def encrypt_string(plainText)
|
|
106
|
+
plainStream = StringIO.new(plainText)
|
|
107
|
+
cryptStream = StringIO.new('')
|
|
108
|
+
encrypt_stream(plainStream, cryptStream)
|
|
109
|
+
cryptText = cryptStream.string
|
|
110
|
+
return(cryptText)
|
|
111
|
+
end
|
|
112
|
+
|
|
113
|
+
|
|
114
|
+
def decrypt_string(cryptText)
|
|
115
|
+
cryptStream = StringIO.new(cryptText)
|
|
116
|
+
plainStream = StringIO.new('')
|
|
117
|
+
decrypt_stream(cryptStream, plainStream)
|
|
118
|
+
plainText = plainStream.string
|
|
119
|
+
return(plainText)
|
|
120
|
+
end
|
|
121
|
+
|
|
122
|
+
end
|
|
123
|
+
end
|
data/crypt/gost.rb
ADDED
|
@@ -0,0 +1,140 @@
|
|
|
1
|
+
# gost.rb
|
|
2
|
+
# Adapted by Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
3
|
+
# from C++ code written by Wei Dai
|
|
4
|
+
# of the Crypto++ project http://www.eskimo.com/~weidai/cryptlib.html
|
|
5
|
+
|
|
6
|
+
module Crypt
|
|
7
|
+
class Gost
|
|
8
|
+
|
|
9
|
+
require 'crypt/cbc'
|
|
10
|
+
include CBC
|
|
11
|
+
|
|
12
|
+
ULONG = 0x100000000
|
|
13
|
+
|
|
14
|
+
def block_size
|
|
15
|
+
return(8)
|
|
16
|
+
end
|
|
17
|
+
|
|
18
|
+
|
|
19
|
+
def initialize(userKey)
|
|
20
|
+
|
|
21
|
+
# These are the S-boxes given in Applied Cryptography 2nd Ed., p. 333
|
|
22
|
+
@sBox = [
|
|
23
|
+
[4, 10, 9, 2, 13, 8, 0, 14, 6, 11, 1, 12, 7, 15, 5, 3],
|
|
24
|
+
[14, 11, 4, 12, 6, 13, 15, 10, 2, 3, 8, 1, 0, 7, 5, 9],
|
|
25
|
+
[5, 8, 1, 13, 10, 3, 4, 2, 14, 15, 12, 7, 6, 0, 9, 11],
|
|
26
|
+
[7, 13, 10, 1, 0, 8, 9, 15, 14, 4, 6, 12, 11, 2, 5, 3],
|
|
27
|
+
[6, 12, 7, 1, 5, 15, 13, 8, 4, 10, 9, 14, 0, 3, 11, 2],
|
|
28
|
+
[4, 11, 10, 0, 7, 2, 1, 13, 3, 6, 8, 5, 9, 12, 15, 14],
|
|
29
|
+
[13, 11, 4, 1, 3, 15, 5, 9, 0, 10, 14, 7, 6, 8, 2, 12],
|
|
30
|
+
[1, 15, 13, 0, 5, 7, 10, 4, 9, 2, 3, 14, 6, 11, 8, 12]
|
|
31
|
+
]
|
|
32
|
+
|
|
33
|
+
# These are the S-boxes given in the GOST source code listing in Applied
|
|
34
|
+
# Cryptography 2nd Ed., p. 644. They appear to be from the DES S-boxes
|
|
35
|
+
# [13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7 ],
|
|
36
|
+
# [ 4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1 ],
|
|
37
|
+
# [12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11 ],
|
|
38
|
+
# [ 2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9 ],
|
|
39
|
+
# [ 7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15 ],
|
|
40
|
+
# [10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8 ],
|
|
41
|
+
# [15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10 ],
|
|
42
|
+
# [14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7 ]
|
|
43
|
+
|
|
44
|
+
# precalculate the S table
|
|
45
|
+
@sTable = precalculate_S_table()
|
|
46
|
+
|
|
47
|
+
# derive the 32-byte key from the user-supplied key
|
|
48
|
+
userKeyLength = userKey.length
|
|
49
|
+
@key = userKey[0..31].unpack('C'*32)
|
|
50
|
+
if (userKeyLength < 32)
|
|
51
|
+
userKeyLength.upto(31) { @key << 0 }
|
|
52
|
+
end
|
|
53
|
+
end
|
|
54
|
+
|
|
55
|
+
|
|
56
|
+
def precalculate_S_table()
|
|
57
|
+
sTable = [[], [], [], []]
|
|
58
|
+
0.upto(3) { |i|
|
|
59
|
+
0.upto(255) { |j|
|
|
60
|
+
t = @sBox[2*i][j % 16] | (@sBox[2*i+1][j/16] << 4)
|
|
61
|
+
u = (8*i + 11) % 32
|
|
62
|
+
v = (t << u) | (t >> (32-u))
|
|
63
|
+
sTable[i][j] = (v % ULONG)
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
return(sTable)
|
|
67
|
+
end
|
|
68
|
+
|
|
69
|
+
|
|
70
|
+
def f(longWord)
|
|
71
|
+
longWord = longWord % ULONG
|
|
72
|
+
a, b, c, d = [longWord].pack('L').unpack('CCCC')
|
|
73
|
+
return(@sTable[3][d] ^ @sTable[2][c] ^ @sTable[1][b] ^ @sTable[0][a])
|
|
74
|
+
end
|
|
75
|
+
|
|
76
|
+
|
|
77
|
+
def encrypt_pair(xl, xr)
|
|
78
|
+
3.times {
|
|
79
|
+
xr ^= f(xl+@key[0])
|
|
80
|
+
xl ^= f(xr+@key[1])
|
|
81
|
+
xr ^= f(xl+@key[2])
|
|
82
|
+
xl ^= f(xr+@key[3])
|
|
83
|
+
xr ^= f(xl+@key[4])
|
|
84
|
+
xl ^= f(xr+@key[5])
|
|
85
|
+
xr ^= f(xl+@key[6])
|
|
86
|
+
xl ^= f(xr+@key[7])
|
|
87
|
+
}
|
|
88
|
+
xr ^= f(xl+@key[7])
|
|
89
|
+
xl ^= f(xr+@key[6])
|
|
90
|
+
xr ^= f(xl+@key[5])
|
|
91
|
+
xl ^= f(xr+@key[4])
|
|
92
|
+
xr ^= f(xl+@key[3])
|
|
93
|
+
xl ^= f(xr+@key[2])
|
|
94
|
+
xr ^= f(xl+@key[1])
|
|
95
|
+
xl ^= f(xr+@key[0])
|
|
96
|
+
return([xr, xl])
|
|
97
|
+
end
|
|
98
|
+
|
|
99
|
+
|
|
100
|
+
def decrypt_pair(xl, xr)
|
|
101
|
+
xr ^= f(xl+@key[0])
|
|
102
|
+
xl ^= f(xr+@key[1])
|
|
103
|
+
xr ^= f(xl+@key[2])
|
|
104
|
+
xl ^= f(xr+@key[3])
|
|
105
|
+
xr ^= f(xl+@key[4])
|
|
106
|
+
xl ^= f(xr+@key[5])
|
|
107
|
+
xr ^= f(xl+@key[6])
|
|
108
|
+
xl ^= f(xr+@key[7])
|
|
109
|
+
3.times {
|
|
110
|
+
xr ^= f(xl+@key[7])
|
|
111
|
+
xl ^= f(xr+@key[6])
|
|
112
|
+
xr ^= f(xl+@key[5])
|
|
113
|
+
xl ^= f(xr+@key[4])
|
|
114
|
+
xr ^= f(xl+@key[3])
|
|
115
|
+
xl ^= f(xr+@key[2])
|
|
116
|
+
xr ^= f(xl+@key[1])
|
|
117
|
+
xl ^= f(xr+@key[0])
|
|
118
|
+
}
|
|
119
|
+
return([xr, xl])
|
|
120
|
+
end
|
|
121
|
+
|
|
122
|
+
|
|
123
|
+
def encrypt_block(block)
|
|
124
|
+
xl, xr = block.unpack('NN')
|
|
125
|
+
xl, xr = encrypt_pair(xl, xr)
|
|
126
|
+
encrypted = [xl, xr].pack('NN')
|
|
127
|
+
return(encrypted)
|
|
128
|
+
end
|
|
129
|
+
|
|
130
|
+
|
|
131
|
+
def decrypt_block(block)
|
|
132
|
+
xl, xr = block.unpack('NN')
|
|
133
|
+
xl, xr = decrypt_pair(xl, xr)
|
|
134
|
+
decrypted = [xl, xr].pack('NN')
|
|
135
|
+
return(decrypted)
|
|
136
|
+
end
|
|
137
|
+
|
|
138
|
+
|
|
139
|
+
end
|
|
140
|
+
end
|
data/crypt/idea.rb
ADDED
|
@@ -0,0 +1,193 @@
|
|
|
1
|
+
# idea.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
# IDEA (International Data Encryption Algorithm) by
|
|
4
|
+
# Xuejia Lai and James Massey (1992). Refer to license info at end.
|
|
5
|
+
# Ported by Richard Kernahan 2005
|
|
6
|
+
|
|
7
|
+
module Crypt
|
|
8
|
+
class IDEA
|
|
9
|
+
|
|
10
|
+
require 'crypt/cbc'
|
|
11
|
+
include Crypt::CBC
|
|
12
|
+
|
|
13
|
+
require 'digest/md5'
|
|
14
|
+
|
|
15
|
+
ULONG = 0x100000000
|
|
16
|
+
USHORT = 0x10000
|
|
17
|
+
|
|
18
|
+
ENCRYPT = 0
|
|
19
|
+
DECRYPT = 1
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
def block_size
|
|
23
|
+
return(8)
|
|
24
|
+
end
|
|
25
|
+
|
|
26
|
+
|
|
27
|
+
def initialize(key128, mode)
|
|
28
|
+
# IDEA is subject to attack unless the key is sufficiently random, so we
|
|
29
|
+
# take an MD5 digest of a variable-length passphrase to ensure a solid key
|
|
30
|
+
if (key128.class == String)
|
|
31
|
+
digest = Digest::MD5.new(key128).digest
|
|
32
|
+
key128 = digest.unpack('n'*8)
|
|
33
|
+
end
|
|
34
|
+
raise "Key must be 128 bits (8 words)" unless (key128.class == Array) && (key128.length == 8)
|
|
35
|
+
raise "Mode must be IDEA::ENCRYPT or IDEA::DECRYPT" unless ((mode == ENCRYPT) | (mode == DECRYPT))
|
|
36
|
+
if (mode == ENCRYPT)
|
|
37
|
+
@subkeys = generate_encryption_subkeys(key128)
|
|
38
|
+
else (mode == DECRYPT)
|
|
39
|
+
@subkeys = generate_decryption_subkeys(key128)
|
|
40
|
+
end
|
|
41
|
+
end
|
|
42
|
+
|
|
43
|
+
|
|
44
|
+
def mul(a, b)
|
|
45
|
+
modulus = 0x10001
|
|
46
|
+
return((1 - b) % USHORT) if (a == 0)
|
|
47
|
+
return((1 - a) % USHORT) if (b == 0)
|
|
48
|
+
return((a * b) % modulus)
|
|
49
|
+
end
|
|
50
|
+
|
|
51
|
+
|
|
52
|
+
def mulInv(x)
|
|
53
|
+
modulus = 0x10001
|
|
54
|
+
x = x.to_i % USHORT
|
|
55
|
+
return(x) if (x <= 1)
|
|
56
|
+
t1 = 0x10000 / x
|
|
57
|
+
y = modulus % x
|
|
58
|
+
if (y == 1)
|
|
59
|
+
inv = (1 - t1) & 0xFFFF
|
|
60
|
+
return(inv)
|
|
61
|
+
end
|
|
62
|
+
t0 = 1
|
|
63
|
+
while (y != 1)
|
|
64
|
+
q = x / y
|
|
65
|
+
x = x % y
|
|
66
|
+
t0 = t0 + (q * t1)
|
|
67
|
+
return(t0) if (x == 1)
|
|
68
|
+
q = y / x
|
|
69
|
+
y = y % x
|
|
70
|
+
t1 = t1 + (q * t0)
|
|
71
|
+
end
|
|
72
|
+
inv = (1 - t1) & 0xFFFF
|
|
73
|
+
return(inv)
|
|
74
|
+
end
|
|
75
|
+
|
|
76
|
+
|
|
77
|
+
def generate_encryption_subkeys(key)
|
|
78
|
+
encrypt_keys = []
|
|
79
|
+
encrypt_keys[0..7] = key
|
|
80
|
+
8.upto(51) { |i|
|
|
81
|
+
a = ((i + 1) % 8 > 0) ? (i-7) : (i-15)
|
|
82
|
+
b = ((i + 2) % 8 < 2) ? (i-14) : (i-6)
|
|
83
|
+
encrypt_keys[i] = ((encrypt_keys[a] << 9) | (encrypt_keys[b] >> 7)) % USHORT
|
|
84
|
+
}
|
|
85
|
+
return(encrypt_keys)
|
|
86
|
+
end
|
|
87
|
+
|
|
88
|
+
|
|
89
|
+
def generate_decryption_subkeys(key)
|
|
90
|
+
encrypt_keys = generate_encryption_subkeys(key)
|
|
91
|
+
decrypt_keys = []
|
|
92
|
+
decrypt_keys[48] = mulInv(encrypt_keys.shift)
|
|
93
|
+
decrypt_keys[49] = (-encrypt_keys.shift) % USHORT
|
|
94
|
+
decrypt_keys[50] = (-encrypt_keys.shift) % USHORT
|
|
95
|
+
decrypt_keys[51] = mulInv(encrypt_keys.shift)
|
|
96
|
+
42.step(0, -6) { |i|
|
|
97
|
+
decrypt_keys[i+4] = encrypt_keys.shift % USHORT
|
|
98
|
+
decrypt_keys[i+5] = encrypt_keys.shift % USHORT
|
|
99
|
+
decrypt_keys[i] = mulInv(encrypt_keys.shift)
|
|
100
|
+
if (i ==0)
|
|
101
|
+
decrypt_keys[1] = (-encrypt_keys.shift) % USHORT
|
|
102
|
+
decrypt_keys[2] = (-encrypt_keys.shift) % USHORT
|
|
103
|
+
else
|
|
104
|
+
decrypt_keys[i+2] = (-encrypt_keys.shift) % USHORT
|
|
105
|
+
decrypt_keys[i+1] = (-encrypt_keys.shift) % USHORT
|
|
106
|
+
end
|
|
107
|
+
decrypt_keys[i+3] = mulInv(encrypt_keys.shift)
|
|
108
|
+
}
|
|
109
|
+
return(decrypt_keys)
|
|
110
|
+
end
|
|
111
|
+
|
|
112
|
+
|
|
113
|
+
def crypt_pair(l, r)
|
|
114
|
+
word = [l, r].pack('NN').unpack('nnnn')
|
|
115
|
+
k = @subkeys[0..51]
|
|
116
|
+
8.downto(1) { |i|
|
|
117
|
+
word[0] = mul(word[0], k.shift)
|
|
118
|
+
word[1] = (word[1] + k.shift) % USHORT
|
|
119
|
+
word[2] = (word[2] + k.shift) % USHORT
|
|
120
|
+
word[3] = mul(word[3], k.shift)
|
|
121
|
+
t2 = word[0] ^ word[2]
|
|
122
|
+
t2 = mul(t2, k.shift)
|
|
123
|
+
t1 = (t2 + (word[1] ^ word[3])) % USHORT
|
|
124
|
+
t1 = mul(t1, k.shift)
|
|
125
|
+
t2 = (t1 + t2) % USHORT
|
|
126
|
+
word[0] ^= t1
|
|
127
|
+
word[3] ^= t2
|
|
128
|
+
t2 ^= word[1]
|
|
129
|
+
word[1] = word[2] ^ t1
|
|
130
|
+
word[2] = t2
|
|
131
|
+
}
|
|
132
|
+
result = []
|
|
133
|
+
result << mul(word[0], k.shift)
|
|
134
|
+
result << (word[2] + k.shift) % USHORT
|
|
135
|
+
result << (word[1] + k.shift) % USHORT
|
|
136
|
+
result << mul(word[3], k.shift)
|
|
137
|
+
twoLongs = result.pack('nnnn').unpack('NN')
|
|
138
|
+
return(twoLongs)
|
|
139
|
+
end
|
|
140
|
+
|
|
141
|
+
def encrypt_block(block)
|
|
142
|
+
xl, xr = block.unpack('NN')
|
|
143
|
+
xl, xr = crypt_pair(xl, xr)
|
|
144
|
+
encrypted = [xl, xr].pack('NN')
|
|
145
|
+
return(encrypted)
|
|
146
|
+
end
|
|
147
|
+
|
|
148
|
+
|
|
149
|
+
def decrypt_block(block)
|
|
150
|
+
xl, xr = block.unpack('NN')
|
|
151
|
+
xl, xr = crypt_pair(xl, xr)
|
|
152
|
+
decrypted = [xl, xr].pack('NN')
|
|
153
|
+
return(decrypted)
|
|
154
|
+
end
|
|
155
|
+
|
|
156
|
+
|
|
157
|
+
end
|
|
158
|
+
end
|
|
159
|
+
|
|
160
|
+
# LICENSE INFORMATION
|
|
161
|
+
#
|
|
162
|
+
# This software product contains the IDEA algorithm as described and claimed in
|
|
163
|
+
# US patent 5,214,703, EPO patent 0482154 (covering Austria, France, Germany,
|
|
164
|
+
# Italy, the Netherlands, Spain, Sweden, Switzerland, and the UK), and Japanese
|
|
165
|
+
# patent application 508119/1991, "Device for the conversion of a digital block
|
|
166
|
+
# and use of same" (hereinafter referred to as "the algorithm"). Any use of
|
|
167
|
+
# the algorithm for commercial purposes is thus subject to a license from Ascom
|
|
168
|
+
# Systec Ltd. of CH-5506 Maegenwil (Switzerland), being the patentee and sole
|
|
169
|
+
# owner of all rights, including the trademark IDEA.
|
|
170
|
+
#
|
|
171
|
+
# Commercial purposes shall mean any revenue generating purpose including but
|
|
172
|
+
# not limited to:
|
|
173
|
+
#
|
|
174
|
+
# i) Using the algorithm for company internal purposes (subject to a site
|
|
175
|
+
# license).
|
|
176
|
+
#
|
|
177
|
+
# ii) Incorporating the algorithm into any software and distributing such
|
|
178
|
+
# software and/or providing services relating thereto to others (subject to
|
|
179
|
+
# a product license).
|
|
180
|
+
#
|
|
181
|
+
# iii) Using a product containing the algorithm not covered by an IDEA license
|
|
182
|
+
# (subject to an end user license).
|
|
183
|
+
#
|
|
184
|
+
# All such end user license agreements are available exclusively from Ascom
|
|
185
|
+
# Systec Ltd and may be requested via the WWW at http://www.ascom.ch/systec or
|
|
186
|
+
# by email to idea@ascom.ch.
|
|
187
|
+
#
|
|
188
|
+
# Use other than for commercial purposes is strictly limited to non-revenue
|
|
189
|
+
# generating data transfer between private individuals. The use by government
|
|
190
|
+
# agencies, non-profit organizations, etc is considered as use for commercial
|
|
191
|
+
# purposes but may be subject to special conditions. Any misuse will be
|
|
192
|
+
# prosecuted.
|
|
193
|
+
|
data/crypt/noise.rb
ADDED
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
# crypt/rattle.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
# add_noise - take a message and intersperse noise to make a new noisy message of given byte-length
|
|
4
|
+
# remove_noise - take a noisy message and extract the message
|
|
5
|
+
|
|
6
|
+
module Crypt
|
|
7
|
+
module Noise
|
|
8
|
+
|
|
9
|
+
def add_noise(newLength)
|
|
10
|
+
message = self
|
|
11
|
+
usableNoisyMessageLength = newLength / 9 * 8
|
|
12
|
+
bitmapSize = newLength / 9
|
|
13
|
+
remainingBytes = newLength - usableNoisyMessageLength - bitmapSize
|
|
14
|
+
if (message.length > usableNoisyMessageLength)
|
|
15
|
+
minimumNewLength = (message.length / 8.0).ceil * 9
|
|
16
|
+
puts "For a clear text of #{message.length} bytes, the minimum obscured length"
|
|
17
|
+
puts "is #{minimumNewLength} bytes which allows for no noise in the message."
|
|
18
|
+
puts "You should choose an obscured length of at least double the clear text"
|
|
19
|
+
puts "length, such as #{message.length / 8 * 32} bytes"
|
|
20
|
+
raise "Insufficient length for noisy message"
|
|
21
|
+
end
|
|
22
|
+
bitmap = []
|
|
23
|
+
usableNoisyMessageLength.times { bitmap << false }
|
|
24
|
+
srand(Time.now.to_i)
|
|
25
|
+
positionsSelected = 0
|
|
26
|
+
while (positionsSelected < message.length)
|
|
27
|
+
positionTaken = rand(usableNoisyMessageLength)
|
|
28
|
+
if bitmap[positionTaken]
|
|
29
|
+
next
|
|
30
|
+
else
|
|
31
|
+
bitmap[positionTaken] = true
|
|
32
|
+
positionsSelected = positionsSelected.next
|
|
33
|
+
end
|
|
34
|
+
end
|
|
35
|
+
|
|
36
|
+
noisyMessage = ""
|
|
37
|
+
0.upto(bitmapSize-1) { |byte|
|
|
38
|
+
c = 0
|
|
39
|
+
0.upto(7) { |bit|
|
|
40
|
+
c = c + (1<<bit) if bitmap[byte * 8 + bit]
|
|
41
|
+
}
|
|
42
|
+
noisyMessage << c.chr
|
|
43
|
+
}
|
|
44
|
+
posInMessage = 0
|
|
45
|
+
0.upto(usableNoisyMessageLength-1) { |pos|
|
|
46
|
+
if bitmap[pos]
|
|
47
|
+
meaningfulByte = message[posInMessage]
|
|
48
|
+
noisyMessage << meaningfulByte
|
|
49
|
+
posInMessage = posInMessage.next
|
|
50
|
+
else
|
|
51
|
+
noiseByte = rand(256).chr
|
|
52
|
+
noisyMessage << noiseByte
|
|
53
|
+
end
|
|
54
|
+
}
|
|
55
|
+
remainingBytes.times {
|
|
56
|
+
noiseByte = rand(256).chr
|
|
57
|
+
noisyMessage << noiseByte
|
|
58
|
+
}
|
|
59
|
+
return(noisyMessage)
|
|
60
|
+
end
|
|
61
|
+
|
|
62
|
+
|
|
63
|
+
def remove_noise
|
|
64
|
+
noisyMessage = self
|
|
65
|
+
bitmapSize = noisyMessage.length / 9
|
|
66
|
+
actualMessageLength = bitmapSize * 8
|
|
67
|
+
|
|
68
|
+
actualMessageStart = bitmapSize
|
|
69
|
+
actualMessageFinish = bitmapSize + actualMessageLength - 1
|
|
70
|
+
actualMessage = noisyMessage[actualMessageStart..actualMessageFinish]
|
|
71
|
+
|
|
72
|
+
bitmap = []
|
|
73
|
+
0.upto(bitmapSize - 1) { |byte|
|
|
74
|
+
c = noisyMessage[byte]
|
|
75
|
+
0.upto(7) { |bit|
|
|
76
|
+
bitmap[byte * 8 + bit] = (c[bit] == 1)
|
|
77
|
+
}
|
|
78
|
+
}
|
|
79
|
+
clearMessage = ""
|
|
80
|
+
0.upto(actualMessageLength) { |pos|
|
|
81
|
+
meaningful = bitmap[pos]
|
|
82
|
+
if meaningful
|
|
83
|
+
clearMessage << actualMessage[pos]
|
|
84
|
+
end
|
|
85
|
+
}
|
|
86
|
+
return(clearMessage)
|
|
87
|
+
end
|
|
88
|
+
|
|
89
|
+
end
|
|
90
|
+
end
|
|
91
|
+
|
|
92
|
+
class String
|
|
93
|
+
include Crypt::Noise
|
|
94
|
+
end
|
|
@@ -0,0 +1,117 @@
|
|
|
1
|
+
# rijndael-tables.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
module Crypt
|
|
4
|
+
module RijndaelTables
|
|
5
|
+
|
|
6
|
+
LogTable = [
|
|
7
|
+
0, 0, 25, 1, 50, 2, 26, 198, 75, 199, 27, 104, 51, 238, 223, 3,
|
|
8
|
+
100, 4, 224, 14, 52, 141, 129, 239, 76, 113, 8, 200, 248, 105, 28, 193,
|
|
9
|
+
125, 194, 29, 181, 249, 185, 39, 106, 77, 228, 166, 114, 154, 201, 9, 120,
|
|
10
|
+
101, 47, 138, 5, 33, 15, 225, 36, 18, 240, 130, 69, 53, 147, 218, 142,
|
|
11
|
+
150, 143, 219, 189, 54, 208, 206, 148, 19, 92, 210, 241, 64, 70, 131, 56,
|
|
12
|
+
102, 221, 253, 48, 191, 6, 139, 98, 179, 37, 226, 152, 34, 136, 145, 16,
|
|
13
|
+
126, 110, 72, 195, 163, 182, 30, 66, 58, 107, 40, 84, 250, 133, 61, 186,
|
|
14
|
+
43, 121, 10, 21, 155, 159, 94, 202, 78, 212, 172, 229, 243, 115, 167, 87,
|
|
15
|
+
175, 88, 168, 80, 244, 234, 214, 116, 79, 174, 233, 213, 231, 230, 173, 232,
|
|
16
|
+
44, 215, 117, 122, 235, 22, 11, 245, 89, 203, 95, 176, 156, 169, 81, 160,
|
|
17
|
+
127, 12, 246, 111, 23, 196, 73, 236, 216, 67, 31, 45, 164, 118, 123, 183,
|
|
18
|
+
204, 187, 62, 90, 251, 96, 177, 134, 59, 82, 161, 108, 170, 85, 41, 157,
|
|
19
|
+
151, 178, 135, 144, 97, 190, 220, 252, 188, 149, 207, 205, 55, 63, 91, 209,
|
|
20
|
+
83, 57, 132, 60, 65, 162, 109, 71, 20, 42, 158, 93, 86, 242, 211, 171,
|
|
21
|
+
68, 17, 146, 217, 35, 32, 46, 137, 180, 124, 184, 38, 119, 153, 227, 165,
|
|
22
|
+
103, 74, 237, 222, 197, 49, 254, 24, 13, 99, 140, 128, 192, 247, 112, 7
|
|
23
|
+
]
|
|
24
|
+
|
|
25
|
+
AlogTable = [
|
|
26
|
+
1, 3, 5, 15, 17, 51, 85, 255, 26, 46, 114, 150, 161, 248, 19, 53,
|
|
27
|
+
95, 225, 56, 72, 216, 115, 149, 164, 247, 2, 6, 10, 30, 34, 102, 170,
|
|
28
|
+
229, 52, 92, 228, 55, 89, 235, 38, 106, 190, 217, 112, 144, 171, 230, 49,
|
|
29
|
+
83, 245, 4, 12, 20, 60, 68, 204, 79, 209, 104, 184, 211, 110, 178, 205,
|
|
30
|
+
76, 212, 103, 169, 224, 59, 77, 215, 98, 166, 241, 8, 24, 40, 120, 136,
|
|
31
|
+
131, 158, 185, 208, 107, 189, 220, 127, 129, 152, 179, 206, 73, 219, 118, 154,
|
|
32
|
+
181, 196, 87, 249, 16, 48, 80, 240, 11, 29, 39, 105, 187, 214, 97, 163,
|
|
33
|
+
254, 25, 43, 125, 135, 146, 173, 236, 47, 113, 147, 174, 233, 32, 96, 160,
|
|
34
|
+
251, 22, 58, 78, 210, 109, 183, 194, 93, 231, 50, 86, 250, 21, 63, 65,
|
|
35
|
+
195, 94, 226, 61, 71, 201, 64, 192, 91, 237, 44, 116, 156, 191, 218, 117,
|
|
36
|
+
159, 186, 213, 100, 172, 239, 42, 126, 130, 157, 188, 223, 122, 142, 137, 128,
|
|
37
|
+
155, 182, 193, 88, 232, 35, 101, 175, 234, 37, 111, 177, 200, 67, 197, 84,
|
|
38
|
+
252, 31, 33, 99, 165, 244, 7, 9, 27, 45, 119, 153, 176, 203, 70, 202,
|
|
39
|
+
69, 207, 74, 222, 121, 139, 134, 145, 168, 227, 62, 66, 198, 81, 243, 14,
|
|
40
|
+
18, 54, 90, 238, 41, 123, 141, 140, 143, 138, 133, 148, 167, 242, 13, 23,
|
|
41
|
+
57, 75, 221, 124, 132, 151, 162, 253, 28, 36, 108, 180, 199, 82, 246, 1
|
|
42
|
+
]
|
|
43
|
+
|
|
44
|
+
S = [
|
|
45
|
+
99, 124, 119, 123, 242, 107, 111, 197, 48, 1, 103, 43, 254, 215, 171, 118,
|
|
46
|
+
202, 130, 201, 125, 250, 89, 71, 240, 173, 212, 162, 175, 156, 164, 114, 192,
|
|
47
|
+
183, 253, 147, 38, 54, 63, 247, 204, 52, 165, 229, 241, 113, 216, 49, 21,
|
|
48
|
+
4, 199, 35, 195, 24, 150, 5, 154, 7, 18, 128, 226, 235, 39, 178, 117,
|
|
49
|
+
9, 131, 44, 26, 27, 110, 90, 160, 82, 59, 214, 179, 41, 227, 47, 132,
|
|
50
|
+
83, 209, 0, 237, 32, 252, 177, 91, 106, 203, 190, 57, 74, 76, 88, 207,
|
|
51
|
+
208, 239, 170, 251, 67, 77, 51, 133, 69, 249, 2, 127, 80, 60, 159, 168,
|
|
52
|
+
81, 163, 64, 143, 146, 157, 56, 245, 188, 182, 218, 33, 16, 255, 243, 210,
|
|
53
|
+
205, 12, 19, 236, 95, 151, 68, 23, 196, 167, 126, 61, 100, 93, 25, 115,
|
|
54
|
+
96, 129, 79, 220, 34, 42, 144, 136, 70, 238, 184, 20, 222, 94, 11, 219,
|
|
55
|
+
224, 50, 58, 10, 73, 6, 36, 92, 194, 211, 172, 98, 145, 149, 228, 121,
|
|
56
|
+
231, 200, 55, 109, 141, 213, 78, 169, 108, 86, 244, 234, 101, 122, 174, 8,
|
|
57
|
+
186, 120, 37, 46, 28, 166, 180, 198, 232, 221, 116, 31, 75, 189, 139, 138,
|
|
58
|
+
112, 62, 181, 102, 72, 3, 246, 14, 97, 53, 87, 185, 134, 193, 29, 158,
|
|
59
|
+
225, 248, 152, 17, 105, 217, 142, 148, 155, 30, 135, 233, 206, 85, 40, 223,
|
|
60
|
+
140, 161, 137, 13, 191, 230, 66, 104, 65, 153, 45, 15, 176, 84, 187, 22
|
|
61
|
+
]
|
|
62
|
+
|
|
63
|
+
Si = [
|
|
64
|
+
82, 9, 106, 213, 48, 54, 165, 56, 191, 64, 163, 158, 129, 243, 215, 251,
|
|
65
|
+
124, 227, 57, 130, 155, 47, 255, 135, 52, 142, 67, 68, 196, 222, 233, 203,
|
|
66
|
+
84, 123, 148, 50, 166, 194, 35, 61, 238, 76, 149, 11, 66, 250, 195, 78,
|
|
67
|
+
8, 46, 161, 102, 40, 217, 36, 178, 118, 91, 162, 73, 109, 139, 209, 37,
|
|
68
|
+
114, 248, 246, 100, 134, 104, 152, 22, 212, 164, 92, 204, 93, 101, 182, 146,
|
|
69
|
+
108, 112, 72, 80, 253, 237, 185, 218, 94, 21, 70, 87, 167, 141, 157, 132,
|
|
70
|
+
144, 216, 171, 0, 140, 188, 211, 10, 247, 228, 88, 5, 184, 179, 69, 6,
|
|
71
|
+
208, 44, 30, 143, 202, 63, 15, 2, 193, 175, 189, 3, 1, 19, 138, 107,
|
|
72
|
+
58, 145, 17, 65, 79, 103, 220, 234, 151, 242, 207, 206, 240, 180, 230, 115,
|
|
73
|
+
150, 172, 116, 34, 231, 173, 53, 133, 226, 249, 55, 232, 28, 117, 223, 110,
|
|
74
|
+
71, 241, 26, 113, 29, 41, 197, 137, 111, 183, 98, 14, 170, 24, 190, 27,
|
|
75
|
+
252, 86, 62, 75, 198, 210, 121, 32, 154, 219, 192, 254, 120, 205, 90, 244,
|
|
76
|
+
31, 221, 168, 51, 136, 7, 199, 49, 177, 18, 16, 89, 39, 128, 236, 95,
|
|
77
|
+
96, 81, 127, 169, 25, 181, 74, 13, 45, 229, 122, 159, 147, 201, 156, 239,
|
|
78
|
+
160, 224, 59, 77, 174, 42, 245, 176, 200, 235, 187, 60, 131, 83, 153, 97,
|
|
79
|
+
23, 43, 4, 126, 186, 119, 214, 38, 225, 105, 20, 99, 85, 33, 12, 125,
|
|
80
|
+
]
|
|
81
|
+
|
|
82
|
+
IG = [
|
|
83
|
+
[0x0e, 0x09, 0x0d, 0x0b],
|
|
84
|
+
[0x0b, 0x0e, 0x09, 0x0d],
|
|
85
|
+
[0x0d, 0x0b, 0x0e, 0x09],
|
|
86
|
+
[0x09, 0x0d, 0x0b, 0x0e]
|
|
87
|
+
]
|
|
88
|
+
|
|
89
|
+
Rcon = [
|
|
90
|
+
0x01, 0x02, 0x04, 0x08, 0x10, 0x20,
|
|
91
|
+
0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8,
|
|
92
|
+
0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc,
|
|
93
|
+
0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4,
|
|
94
|
+
0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91
|
|
95
|
+
]
|
|
96
|
+
|
|
97
|
+
Shifts = [
|
|
98
|
+
[
|
|
99
|
+
[0, 0],
|
|
100
|
+
[1, 3],
|
|
101
|
+
[2, 2],
|
|
102
|
+
[3, 1]
|
|
103
|
+
], [
|
|
104
|
+
[0, 0],
|
|
105
|
+
[1, 5],
|
|
106
|
+
[2, 4],
|
|
107
|
+
[3, 3]
|
|
108
|
+
], [
|
|
109
|
+
[0, 0],
|
|
110
|
+
[1, 7],
|
|
111
|
+
[3, 5],
|
|
112
|
+
[4, 4]
|
|
113
|
+
]
|
|
114
|
+
]
|
|
115
|
+
|
|
116
|
+
end
|
|
117
|
+
end
|
data/crypt/rijndael.rb
ADDED
|
@@ -0,0 +1,269 @@
|
|
|
1
|
+
# rijndael.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
# Adapted from the reference C implementation:
|
|
4
|
+
# rijndael-alg-ref.c v2.2 March 2002
|
|
5
|
+
# Reference ANSI C code
|
|
6
|
+
# authors: Paulo Barreto and Vincent Rijmen
|
|
7
|
+
# This code is placed in the public domain.
|
|
8
|
+
|
|
9
|
+
module Crypt
|
|
10
|
+
class Rijndael
|
|
11
|
+
|
|
12
|
+
require 'crypt/cbc'
|
|
13
|
+
include Crypt::CBC
|
|
14
|
+
|
|
15
|
+
require 'crypt/rijndael-tables'
|
|
16
|
+
include Crypt::RijndaelTables
|
|
17
|
+
|
|
18
|
+
|
|
19
|
+
def initialize(userKey, keyBits = 256, blockBits = 128)
|
|
20
|
+
case keyBits
|
|
21
|
+
when 128
|
|
22
|
+
@keyWords = 4
|
|
23
|
+
when 192
|
|
24
|
+
@keyWords = 6
|
|
25
|
+
when 256
|
|
26
|
+
@keyWords = 8
|
|
27
|
+
else raise "The key must be 128, 192, or 256 bits long."
|
|
28
|
+
end
|
|
29
|
+
|
|
30
|
+
case (keyBits >= blockBits) ? keyBits : blockBits
|
|
31
|
+
when 128
|
|
32
|
+
@rounds = 10
|
|
33
|
+
when 192
|
|
34
|
+
@rounds = 12
|
|
35
|
+
when 256
|
|
36
|
+
@rounds = 14
|
|
37
|
+
else raise "The key and block sizes must be 128, 192, or 256 bits long."
|
|
38
|
+
end
|
|
39
|
+
|
|
40
|
+
case blockBits
|
|
41
|
+
when 128
|
|
42
|
+
@blockSize = 16
|
|
43
|
+
@blockWords = 4
|
|
44
|
+
@shiftIndex = 0
|
|
45
|
+
when 192
|
|
46
|
+
@blockSize = 24
|
|
47
|
+
@blockWords = 6
|
|
48
|
+
@shiftIndex = 1
|
|
49
|
+
when 256
|
|
50
|
+
@blockSize = 32
|
|
51
|
+
@blockWords = 8
|
|
52
|
+
@shiftIndex = 2
|
|
53
|
+
else raise "The block size must be 128, 192, or 256 bits long."
|
|
54
|
+
end
|
|
55
|
+
|
|
56
|
+
uk = userKey.unpack('C'*userKey.length)
|
|
57
|
+
maxUsefulSizeOfUserKey = (keyBits/8)
|
|
58
|
+
uk = uk[0..maxUsefulSizeOfUserKey-1] # truncate
|
|
59
|
+
padding = 0
|
|
60
|
+
if (userKey.length < keyBits/8)
|
|
61
|
+
shortfallInUserKey = (keyBits/8 - userKey.length)
|
|
62
|
+
shortfallInUserKey.times { uk << padding }
|
|
63
|
+
end
|
|
64
|
+
@key = [[], [], [], []]
|
|
65
|
+
0.upto(uk.length-1) { |pos|
|
|
66
|
+
@key[pos % 4][pos / 4] = uk[pos]
|
|
67
|
+
}
|
|
68
|
+
@roundKeys = generate_key_schedule(@key, keyBits, blockBits)
|
|
69
|
+
end
|
|
70
|
+
|
|
71
|
+
|
|
72
|
+
def block_size
|
|
73
|
+
return(@blockSize) # needed for CBC
|
|
74
|
+
end
|
|
75
|
+
|
|
76
|
+
|
|
77
|
+
def mul(a, b)
|
|
78
|
+
if ((a ==0) | (b == 0))
|
|
79
|
+
result = 0
|
|
80
|
+
else
|
|
81
|
+
result = AlogTable[(LogTable[a] + LogTable[b]) % 255]
|
|
82
|
+
end
|
|
83
|
+
return(result)
|
|
84
|
+
end
|
|
85
|
+
|
|
86
|
+
|
|
87
|
+
def add_round_key(blockArray, roundKey)
|
|
88
|
+
0.upto(3) { |i|
|
|
89
|
+
0.upto(@blockWords) { |j|
|
|
90
|
+
blockArray[i][j] ^= roundKey[i][j]
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
return(blockArray)
|
|
94
|
+
end
|
|
95
|
+
|
|
96
|
+
|
|
97
|
+
def shift_rows(blockArray, direction)
|
|
98
|
+
tmp = []
|
|
99
|
+
1.upto(3) { |i| # row zero remains unchanged
|
|
100
|
+
0.upto(@blockWords-1) { |j|
|
|
101
|
+
tmp[j] = blockArray[i][(j + Shifts[@shiftIndex][i][direction]) % @blockWords]
|
|
102
|
+
}
|
|
103
|
+
0.upto(@blockWords-1) { |j|
|
|
104
|
+
blockArray[i][j] = tmp[j]
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
return(blockArray)
|
|
108
|
+
end
|
|
109
|
+
|
|
110
|
+
|
|
111
|
+
def substitution(blockArray, sBox)
|
|
112
|
+
# replace every byte of the input with the byte at that position in the S-box
|
|
113
|
+
0.upto(3) { |i|
|
|
114
|
+
0.upto(@blockWords-1) { |j|
|
|
115
|
+
blockArray[i][j] = sBox[blockArray[i][j]]
|
|
116
|
+
}
|
|
117
|
+
}
|
|
118
|
+
return(blockArray)
|
|
119
|
+
end
|
|
120
|
+
|
|
121
|
+
|
|
122
|
+
def mix_columns(blockArray)
|
|
123
|
+
mixed = [[], [], [], []]
|
|
124
|
+
0.upto(@blockWords-1) { |j|
|
|
125
|
+
0.upto(3) { |i|
|
|
126
|
+
mixed[i][j] = mul(2,blockArray[i][j]) ^
|
|
127
|
+
mul(3,blockArray[(i + 1) % 4][j]) ^
|
|
128
|
+
blockArray[(i + 2) % 4][j] ^
|
|
129
|
+
blockArray[(i + 3) % 4][j]
|
|
130
|
+
}
|
|
131
|
+
}
|
|
132
|
+
return(mixed)
|
|
133
|
+
end
|
|
134
|
+
|
|
135
|
+
|
|
136
|
+
def inverse_mix_columns(blockArray)
|
|
137
|
+
unmixed = [[], [], [], []]
|
|
138
|
+
0.upto(@blockWords-1) { |j|
|
|
139
|
+
0.upto(3) { |i|
|
|
140
|
+
unmixed[i][j] = mul(0xe, blockArray[i][j]) ^
|
|
141
|
+
mul(0xb, blockArray[(i + 1) % 4][j]) ^
|
|
142
|
+
mul(0xd, blockArray[(i + 2) % 4][j]) ^
|
|
143
|
+
mul(0x9, blockArray[(i + 3) % 4][j])
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
return(unmixed)
|
|
147
|
+
end
|
|
148
|
+
|
|
149
|
+
|
|
150
|
+
def generate_key_schedule(k, keyBits, blockBits)
|
|
151
|
+
tk = k[0..3][0..@keyWords-1] # using slice to get a copy instead of a reference
|
|
152
|
+
keySched = []
|
|
153
|
+
(@rounds + 1).times { keySched << [[], [], [], []] }
|
|
154
|
+
t = 0
|
|
155
|
+
j = 0
|
|
156
|
+
while ((j < @keyWords) && (t < (@rounds+1)*@blockWords))
|
|
157
|
+
0.upto(3) { |i|
|
|
158
|
+
keySched[t / @blockWords][i][t % @blockWords] = tk[i][j]
|
|
159
|
+
}
|
|
160
|
+
j += 1
|
|
161
|
+
t += 1
|
|
162
|
+
end
|
|
163
|
+
# while not enough round key material collected, calculate new values
|
|
164
|
+
rconIndex = 0
|
|
165
|
+
while (t < (@rounds+1)*@blockWords)
|
|
166
|
+
0.upto(3) { |i|
|
|
167
|
+
tk[i][0] ^= S[tk[(i + 1) % 4][@keyWords - 1]]
|
|
168
|
+
}
|
|
169
|
+
tk[0][0] ^= Rcon[rconIndex]
|
|
170
|
+
rconIndex = rconIndex.next
|
|
171
|
+
if (@keyWords != 8)
|
|
172
|
+
1.upto(@keyWords - 1) { |j|
|
|
173
|
+
0.upto(3) { |i|
|
|
174
|
+
tk[i][j] ^= tk[i][j-1];
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
else
|
|
178
|
+
1.upto(@keyWords/2 - 1) { |j|
|
|
179
|
+
0.upto(3) { |i|
|
|
180
|
+
tk[i][j] ^= tk[i][j-1]
|
|
181
|
+
}
|
|
182
|
+
}
|
|
183
|
+
0.upto(3) { |i|
|
|
184
|
+
tk[i][@keyWords/2] ^= S[tk[i][@keyWords/2 - 1]]
|
|
185
|
+
}
|
|
186
|
+
(@keyWords/2 + 1).upto(@keyWords - 1) { |j|
|
|
187
|
+
0.upto(3) { |i|
|
|
188
|
+
tk[i][j] ^= tk[i][j-1]
|
|
189
|
+
}
|
|
190
|
+
}
|
|
191
|
+
end
|
|
192
|
+
j = 0
|
|
193
|
+
while ((j < @keyWords) && (t < (@rounds+1) * @blockWords))
|
|
194
|
+
0.upto(3) { |i|
|
|
195
|
+
keySched[t / @blockWords][i][t % @blockWords] = tk[i][j]
|
|
196
|
+
}
|
|
197
|
+
j += 1
|
|
198
|
+
t += 1
|
|
199
|
+
end
|
|
200
|
+
end
|
|
201
|
+
return(keySched)
|
|
202
|
+
end
|
|
203
|
+
|
|
204
|
+
|
|
205
|
+
def encrypt_byte_array(blockArray)
|
|
206
|
+
blockArray = add_round_key(blockArray, @roundKeys[0])
|
|
207
|
+
1.upto(@rounds - 1) { |round|
|
|
208
|
+
blockArray = substitution(blockArray, S)
|
|
209
|
+
blockArray = shift_rows(blockArray, 0)
|
|
210
|
+
blockArray = mix_columns(blockArray)
|
|
211
|
+
blockArray = add_round_key(blockArray, @roundKeys[round])
|
|
212
|
+
}
|
|
213
|
+
# special round without mix_columns
|
|
214
|
+
blockArray = substitution(blockArray,S)
|
|
215
|
+
blockArray = shift_rows(blockArray,0)
|
|
216
|
+
blockArray = add_round_key(blockArray, @roundKeys[@rounds])
|
|
217
|
+
return(blockArray)
|
|
218
|
+
end
|
|
219
|
+
|
|
220
|
+
|
|
221
|
+
def encrypt_block(block)
|
|
222
|
+
raise "block must be #{@blockSize} bytes long" if (block.length() != @blockSize)
|
|
223
|
+
blockArray = [[], [], [], []]
|
|
224
|
+
0.upto(@blockSize - 1) { |pos|
|
|
225
|
+
blockArray[pos % 4][pos / 4] = block[pos]
|
|
226
|
+
}
|
|
227
|
+
encryptedBlock = encrypt_byte_array(blockArray)
|
|
228
|
+
encrypted = ""
|
|
229
|
+
0.upto(@blockSize - 1) { |pos|
|
|
230
|
+
encrypted << encryptedBlock[pos % 4][pos / 4]
|
|
231
|
+
}
|
|
232
|
+
return(encrypted)
|
|
233
|
+
end
|
|
234
|
+
|
|
235
|
+
|
|
236
|
+
def decrypt_byte_array(blockArray)
|
|
237
|
+
# first special round without inverse_mix_columns
|
|
238
|
+
# add_round_key is an involution - applying it a second time returns the original result
|
|
239
|
+
blockArray = add_round_key(blockArray, @roundKeys[@rounds])
|
|
240
|
+
blockArray = substitution(blockArray,Si) # using inverse S-box
|
|
241
|
+
blockArray = shift_rows(blockArray,1)
|
|
242
|
+
(@rounds-1).downto(1) { |round|
|
|
243
|
+
blockArray = add_round_key(blockArray, @roundKeys[round])
|
|
244
|
+
blockArray = inverse_mix_columns(blockArray)
|
|
245
|
+
blockArray = substitution(blockArray, Si)
|
|
246
|
+
blockArray = shift_rows(blockArray, 1)
|
|
247
|
+
}
|
|
248
|
+
blockArray = add_round_key(blockArray, @roundKeys[0])
|
|
249
|
+
return(blockArray)
|
|
250
|
+
end
|
|
251
|
+
|
|
252
|
+
|
|
253
|
+
def decrypt_block(block)
|
|
254
|
+
raise "block must be #{@blockSize} bytes long" if (block.length() != @blockSize)
|
|
255
|
+
blockArray = [[], [], [], []]
|
|
256
|
+
0.upto(@blockSize - 1) { |pos|
|
|
257
|
+
blockArray[pos % 4][pos / 4] = block[pos]
|
|
258
|
+
}
|
|
259
|
+
decryptedBlock = decrypt_byte_array(blockArray)
|
|
260
|
+
decrypted = ""
|
|
261
|
+
0.upto(@blockSize - 1) { |pos|
|
|
262
|
+
decrypted << decryptedBlock[pos % 4][pos / 4]
|
|
263
|
+
}
|
|
264
|
+
return(decrypted)
|
|
265
|
+
end
|
|
266
|
+
|
|
267
|
+
|
|
268
|
+
end
|
|
269
|
+
end
|
data/crypt/stringxor.rb
ADDED
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
# stringxor.rb Richard Kernahan <kernighan_rich@rubyforge.org>
|
|
2
|
+
|
|
3
|
+
module Crypt
|
|
4
|
+
module StringXor
|
|
5
|
+
|
|
6
|
+
|
|
7
|
+
def ^(aString)
|
|
8
|
+
a = self.unpack('C'*(self.length))
|
|
9
|
+
b = aString.unpack('C'*(aString.length))
|
|
10
|
+
if (b.length < a.length)
|
|
11
|
+
(a.length - b.length).times { b << 0 }
|
|
12
|
+
end
|
|
13
|
+
xor = ""
|
|
14
|
+
0.upto(a.length-1) { |pos|
|
|
15
|
+
x = a[pos] ^ b[pos]
|
|
16
|
+
xor << x.chr()
|
|
17
|
+
}
|
|
18
|
+
return(xor)
|
|
19
|
+
end
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
end
|
|
23
|
+
end
|
|
24
|
+
|
|
25
|
+
class String
|
|
26
|
+
include Crypt::StringXor
|
|
27
|
+
end
|
metadata
ADDED
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
|
2
|
+
rubygems_version: 0.8.10
|
|
3
|
+
specification_version: 1
|
|
4
|
+
name: crypt
|
|
5
|
+
version: !ruby/object:Gem::Version
|
|
6
|
+
version: 1.1.3
|
|
7
|
+
date: 2006-08-05
|
|
8
|
+
summary: "The Crypt library is a pure-ruby implementation of a number of popular
|
|
9
|
+
encryption algorithms. Block cyphers currently include Blowfish, GOST, IDEA, and
|
|
10
|
+
Rijndael (AES). Cypher Block Chaining (CBC) has been implemented. Twofish,
|
|
11
|
+
Serpent, and CAST256 are planned for release soon."
|
|
12
|
+
require_paths:
|
|
13
|
+
- "."
|
|
14
|
+
email: kernighan_rich@rubyforge.org
|
|
15
|
+
homepage: http://crypt.rubyforge.org/
|
|
16
|
+
rubyforge_project: crypt
|
|
17
|
+
description:
|
|
18
|
+
autorequire:
|
|
19
|
+
default_executable:
|
|
20
|
+
bindir: bin
|
|
21
|
+
has_rdoc: false
|
|
22
|
+
required_ruby_version: !ruby/object:Gem::Version::Requirement
|
|
23
|
+
requirements:
|
|
24
|
+
-
|
|
25
|
+
- ">"
|
|
26
|
+
- !ruby/object:Gem::Version
|
|
27
|
+
version: 0.0.0
|
|
28
|
+
version:
|
|
29
|
+
platform: ruby
|
|
30
|
+
authors:
|
|
31
|
+
- Richard Kernahan
|
|
32
|
+
files:
|
|
33
|
+
- crypt/blowfish-tables.rb
|
|
34
|
+
- crypt/blowfish.rb
|
|
35
|
+
- crypt/cbc.rb
|
|
36
|
+
- crypt/gost.rb
|
|
37
|
+
- crypt/idea.rb
|
|
38
|
+
- crypt/noise.rb
|
|
39
|
+
- crypt/rijndael-tables.rb
|
|
40
|
+
- crypt/rijndael.rb
|
|
41
|
+
- crypt/stringxor.rb
|
|
42
|
+
test_files: []
|
|
43
|
+
rdoc_options: []
|
|
44
|
+
extra_rdoc_files: []
|
|
45
|
+
executables: []
|
|
46
|
+
extensions: []
|
|
47
|
+
requirements: []
|
|
48
|
+
dependencies: []
|