Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import std.stdio;
- import std.math;
- import std.random;
- import std.string;
- // S-Box
- immutable ubyte[16][16] sbox = cast(ubyte[][]) [
- [0x63,0x7C,0x77,0x7B,0xF2,0x6B,0x6F,0xC5,0x30,0x01,0x67,0x2B,0xFE,0xD7,0xAB,0x76],
- [0xCA,0x82,0xC9,0x7D,0xFA,0x59,0x47,0xF0,0xAD,0xD4,0xA2,0xAF,0x9C,0xA4,0x72,0xC0],
- [0xB7,0xFD,0x93,0x26,0x36,0x3F,0xF7,0xCC,0x34,0xA5,0xE5,0xF1,0x71,0xD8,0x31,0x15],
- [0x04,0xC7,0x23,0xC3,0x18,0x96,0x05,0x9A,0x07,0x12,0x80,0xE2,0xEB,0x27,0xB2,0x75],
- [0x09,0x83,0x2C,0x1A,0x1B,0x6E,0x5A,0xA0,0x52,0x3B,0xD6,0xB3,0x29,0xE3,0x2F,0x84],
- [0x53,0xD1,0x00,0xED,0x20,0xFC,0xB1,0x5B,0x6A,0xCB,0xBE,0x39,0x4A,0x4C,0x58,0xCF],
- [0xD0,0xEF,0xAA,0xFB,0x43,0x4D,0x33,0x85,0x45,0xF9,0x02,0x7F,0x50,0x3C,0x9F,0xA8],
- [0x51,0xA3,0x40,0x8F,0x92,0x9D,0x38,0xF5,0xBC,0xB6,0xDA,0x21,0x10,0xFF,0xF3,0xD2],
- [0xCD,0x0C,0x13,0xEC,0x5F,0x97,0x44,0x17,0xC4,0xA7,0x7E,0x3D,0x64,0x5D,0x19,0x73],
- [0x60,0x81,0x4F,0xDC,0x22,0x2A,0x90,0x88,0x46,0xEE,0xB8,0x14,0xDE,0x5E,0x0B,0xDB],
- [0xE0,0x32,0x3A,0x0A,0x49,0x06,0x24,0x5C,0xC2,0xD3,0xAC,0x62,0x91,0x95,0xE4,0x79],
- [0xE7,0xC8,0x37,0x6D,0x8D,0xD5,0x4E,0xA9,0x6C,0x56,0xF4,0xEA,0x65,0x7A,0xAE,0x08],
- [0xBA,0x78,0x25,0x2E,0x1C,0xA6,0xB4,0xC6,0xE8,0xDD,0x74,0x1F,0x4B,0xBD,0x8B,0x8A],
- [0x70,0x3E,0xB5,0x66,0x48,0x03,0xF6,0x0E,0x61,0x35,0x57,0xB9,0x86,0xC1,0x1D,0x9E],
- [0xE1,0xF8,0x98,0x11,0x69,0xD9,0x8E,0x94,0x9B,0x1E,0x87,0xE9,0xCE,0x55,0x28,0xDF],
- [0x8C,0xA1,0x89,0x0D,0xBF,0xE6,0x42,0x68,0x41,0x99,0x2D,0x0F,0xB0,0x54,0xBB,0x16]
- ];
- // Inverse der S-Box
- immutable ubyte[16][16] rbox = cast(ubyte[][]) [
- [0x52,0x09,0x6A,0xD5,0x30,0x36,0xA5,0x38,0xBF,0x40,0xA3,0x9E,0x81,0xF3,0xD7,0xFB],
- [0x7C,0xE3,0x39,0x82,0x9B,0x2F,0xFF,0x87,0x34,0x8E,0x43,0x44,0xC4,0xDE,0xE9,0xCB],
- [0x54,0x7B,0x94,0x32,0xA6,0xC2,0x23,0x3D,0xEE,0x4C,0x95,0x0B,0x42,0xFA,0xC3,0x4E],
- [0x08,0x2E,0xA1,0x66,0x28,0xD9,0x24,0xB2,0x76,0x5B,0xA2,0x49,0x6D,0x8B,0xD1,0x25],
- [0x72,0xF8,0xF6,0x64,0x86,0x68,0x98,0x16,0xD4,0xA4,0x5C,0xCC,0x5D,0x65,0xB6,0x92],
- [0x6C,0x70,0x48,0x50,0xFD,0xED,0xB9,0xDA,0x5E,0x15,0x46,0x57,0xA7,0x8D,0x9D,0x84],
- [0x90,0xD8,0xAB,0x00,0x8C,0xBC,0xD3,0x0A,0xF7,0xE4,0x58,0x05,0xB8,0xB3,0x45,0x06],
- [0xD0,0x2C,0x1E,0x8F,0xCA,0x3F,0x0F,0x02,0xC1,0xAF,0xBD,0x03,0x01,0x13,0x8A,0x6B],
- [0x3A,0x91,0x11,0x41,0x4F,0x67,0xDC,0xEA,0x97,0xF2,0xCF,0xCE,0xF0,0xB4,0xE6,0x73],
- [0x96,0xAC,0x74,0x22,0xE7,0xAD,0x35,0x85,0xE2,0xF9,0x37,0xE8,0x1C,0x75,0xDF,0x6E],
- [0x47,0xF1,0x1A,0x71,0x1D,0x29,0xC5,0x89,0x6F,0xB7,0x62,0x0E,0xAA,0x18,0xBE,0x1B],
- [0xFC,0x56,0x3E,0x4B,0xC6,0xD2,0x79,0x20,0x9A,0xDB,0xC0,0xFE,0x78,0xCD,0x5A,0xF4],
- [0x1F,0xDD,0xA8,0x33,0x88,0x07,0xC7,0x31,0xB1,0x12,0x10,0x59,0x27,0x80,0xEC,0x5F],
- [0x60,0x51,0x7F,0xA9,0x19,0xB5,0x4A,0x0D,0x2D,0xE5,0x7A,0x9F,0x93,0xC9,0x9C,0xEF],
- [0xA0,0xE0,0x3B,0x4D,0xAE,0x2A,0xF5,0xB0,0xC8,0xEB,0xBB,0x3C,0x83,0x53,0x99,0x61],
- [0x17,0x2B,0x04,0x7E,0xBA,0x77,0xD6,0x26,0xE1,0x69,0x14,0x63,0x55,0x21,0x0C,0x7D]
- ];
- // Rundenkonstanten für Key-Schedule
- immutable ubyte[4][10] rcon = [
- [0x01, 0, 0, 0], [0x02, 0, 0, 0], [0x04, 0, 0, 0], [0x08, 0, 0, 0], [0x10, 0, 0, 0],
- [0x20, 0, 0, 0], [0x40, 0, 0, 0], [0x80, 0, 0, 0], [0x1B, 0, 0, 0], [0x36, 0, 0, 0]
- ];
- immutable ubyte[4][4] gField = [ // Rijndael's Galois Field
- [ 2, 3, 1, 1],
- [ 1, 2, 3, 1],
- [ 1, 1, 2, 3],
- [ 3, 1, 1, 2]
- ];
- immutable ubyte[4][4] iField = [ // Inverse Rijndael's Galois Field
- [14, 11, 13, 9],
- [ 9, 14, 11, 13],
- [13, 9, 14, 11],
- [11, 13, 9, 14]
- ];
- uint symKey;
- char[16] msg = "Goeifm-Nagjdhcht";
- void main()
- {
- //assert(msg == msg.encrypt(symKey).decrypt(symKey));
- char[16] geheimtext;
- char[4][4] block = msg.toBlock();
- block.printBlock();
- block.subBytes(); block.printBlock();
- block.shiftRows(); block.printBlock();
- block.mixColumns(); block.printBlock();
- block.invMixColumns(); block.printBlock();
- block.invShiftRows(); block.printBlock();
- block.invSubBytes(); block.printBlock();
- /*writeln("Führe Diffie-Hellman durch...\n");
- diffie_hellman();
- writefln("\nVerschlüssele \"%s\" mit AES...\n", msg);
- geheimtext = encrypt(msg, symKey);
- writefln("\nVerschlüsselter Text: %s", geheimtext);
- writefln("\nEntschlüsselter Text: %s", decrypt(geheimtext, symKey));
- */
- }
- void diffie_hellman()
- {
- uint n = 4_294_967_291; // größte Primzahl unter dem 32 bit uint Maximalwert
- uint g = 3;
- uint private_a;
- uint private_b;
- uint public_a;
- uint public_b;
- writefln("n:%s\ng:%s", n, g);
- private_a = uniform!"[]"(1, n-1);
- private_b = uniform!"[]"(1, n-1);
- writefln("Private Key A: %X\nPrivate Key B: %X", private_a, private_b);
- public_a = powmod(g, private_a, n);
- public_b = powmod(g, private_b, n);
- writefln("Public Key A: %X\nPublic Key B: %X", public_a, public_b);
- symKey = powmod(public_a, private_b, n);
- writefln("Key: %X pub_a^priv_b mod n = %s | pub_b^priv_a mod n = %s",
- symKey, powmod(public_a, private_b, n), powmod(public_b, private_a, n));
- }
- char[4][4] toBlock(char[16] a)
- {
- char[4][4] block;
- foreach(i, c; a)
- block[i / 4][i % 4] = c;
- return block;
- }
- char[16] toArray(char[4][4] b)
- {
- char[16] array;
- foreach(c; 0..4)
- {
- foreach(r; 0..4)
- array[c * 4 + r] = b[c][r];
- }
- return array;
- }
- char[16] encrypt(char[16] text, uint key)
- {
- char[4][4][11] keys;
- char[4][4] block;
- block = toBlock(text); // Block wird mit dem String gefüllt
- writeln("Klarext:");
- block.printBlock(true);
- writeln("\nGeneriere Rundenschlüssel...");
- keySchedule(key, keys);
- /*foreach(i, e; keys)
- {
- if(i == 0)
- writeln("\nStartschlüssel (für Runde 0):");
- else
- writefln("\nRundenschlüssel für %s. Runde:", i);
- e.printBlock();
- }*/
- writeln();
- // Verschlüsselung
- writeln("Starte Verschlüsselung...");
- writeln("\nText:");
- block.printBlock(true);
- // Vorrunde
- block.addRoundKey(keys[0]);
- writeln("\nBlock nach Runde 0 (Vorrunde):");
- block.printBlock();
- // Runden
- for(auto i = 1; i < 11; i++)
- {
- block.subBytes();
- block.shiftRows();
- //if(i != 10) block.mixColumns();
- block.addRoundKey(keys[i]);
- writefln("\nBlock nach Runde %s:", i);
- block.printBlock();
- }
- return block.toArray();
- }
- char[16] decrypt(char[16] text, uint key)
- {
- char[4][4][11] keys;
- char[4][4] block;
- block = text.toBlock();
- writeln("Geheimtext:");
- block.printBlock(true);
- writeln("\nGeneriere Rundenschlüssel...");
- keySchedule(key, keys);
- /*foreach(i, e; keys)
- {
- if(i == 0)
- writeln("\nStartschlüssel (für Runde 0):");
- else
- writefln("\nRundenschlüssel für %s. Runde:", i);
- e.printBlock();
- }*/
- writeln();
- // Entschlüsselung
- writeln("Starte Entschlüsselung...");
- writeln("\nText:");
- block.printBlock(true);
- // Runden
- for(auto i = 10; i > 0; i--)
- {
- block.addRoundKey(keys[i]);
- //if(i != 10) block.invMixColumns();
- block.invShiftRows();
- block.invSubBytes();
- writefln("\nBlock nach Runde %s:", i);
- block.printBlock();
- }
- //Vorrunde
- block.addRoundKey(keys[0]);
- writeln("\nBlock nach Runde 0 (Vorrunde):");
- block.printBlock(true);
- return block.toArray();
- }
- void keySchedule(uint key, ref char[4][4][11] keys)
- {
- //char[4][4][11] keys; // 4x4 Schlüsselblöcke für 11 Runden (inklusive Vorrunde)
- foreach(c; 0..4) // c: Spalte
- {
- foreach(r; 0..4) // r: Zeile
- {
- /* Der 32 bit int wird in Bytes unterteilt und
- in alle 4 Spalten des ersten Schlüsselblocks
- geschrieben. Damit wird der 32 bit Schlüssel
- qusai zur nötigen 128 bit größe erweitert. */
- keys[0][c][r] = key >>> (32 - 8 * r) & 0xFF;
- }
- }
- foreach(i; 1..11) // i: Runde
- {
- /* Erste Spalte eines Rundenschlüssels:
- RotWord,SubBytes mit linker Spalte XOR Spalte des letzten Blocks XOR Rundenkonstante */
- char[4] prev = keys[i-1][3].dup; // kopie der links angrenzenden Spalte
- prev.rotWord();
- prev.keySubBytes();
- foreach(r, ref e; keys[i][0])
- e = keys[i - 1][0][r] ^ prev[r] ^ rcon[i - 1][r];
- /* Die anderen 3 Spalten:
- Spalte des letzten Blocks XOR linke Spalte */
- foreach(c; 1..4)
- {
- foreach(r; 0..4)
- keys[i][c][r] = keys[i - 1][c][r] ^ keys[i][c - 1][r];
- }
- }
- }
- void printBlock(char[4][4] b, bool asChar = false)
- {
- writeln();
- foreach(r; 0..4)
- writefln(asChar ? "%s %s %s %s" : "%02X %02X %02X %02X", b[0][r], b[1][r], b[2][r], b[3][r]);
- }
- void rotWord(char[] b, int places = 1)
- {
- auto copy = b.dup;
- for(auto i = 0; i < b.length; i++)
- b[i] = copy[(i + places) % $];
- }
- void keySubBytes(char[] b)
- {
- foreach(ref i; b)
- i = sbox[(i & 0xF0) >> 4][i & 0x0F];
- }
- void subBytes(ref char[4][4] b)
- {
- foreach(ref c; b)
- {
- foreach(ref r; c)
- r = sbox[(r & 0xF0) >> 4][r & 0x0F];
- }
- }
- void invSubBytes(ref char[4][4] b)
- {
- foreach(ref c; b)
- {
- foreach(ref r; c)
- r = rbox[(r & 0xF0) >> 4][r & 0x0F];
- }
- }
- void shiftRows(ref char[4][4] b)
- {
- foreach(i; 0..4)
- {
- auto r = [ b[0][i], b[1][i], b[2][i], b[3][i] ];
- r.rotWord(i);
- b[0][i] = r[0];
- b[1][i] = r[1];
- b[2][i] = r[2];
- b[3][i] = r[3];
- }
- }
- void invShiftRows(ref char[4][4] b)
- {
- foreach(i; 0..4)
- {
- auto r = [ b[0][i], b[1][i], b[2][i], b[3][i] ];
- r.rotWord(-i);
- b[0][i] = r[0];
- b[1][i] = r[1];
- b[2][i] = r[2];
- b[3][i] = r[3];
- }
- }
- ubyte galoisMult(ubyte a, ubyte b)
- {
- int res;
- foreach(i; 0..8)
- {
- if((a & 1 << i) != 0)
- res ^= b << i;
- }
- if((res & 0b1_0000_0000) != 0)
- res ^= 0b1_0001_1011; //x⁸+x⁴+x³+x+1
- return cast(ubyte) res;
- }
- void mixColumns(ref char[4][4] b)
- {
- foreach(c; 0..4)
- {
- auto tempC = b[c].dup;
- foreach(r; 0..4)
- {
- byte t;
- foreach(i; 0..4)
- t ^= galoisMult(gField[r][i], b[c][i]);
- tempC[r] = t;
- }
- b[c] = tempC.dup;
- }
- }
- void invMixColumns(ref char[4][4] b)
- {
- foreach(c; 0..4)
- {
- auto tempC = b[c].dup;
- foreach(r; 0..4)
- {
- byte t;
- foreach(i; 0..4)
- t ^= galoisMult(iField[r][i], b[c][i]);
- tempC[r] = t;
- }
- b[c] = tempC.dup;
- }
- }
- void addRoundKey(ref char[4][4] b, char[4][4] key)
- {
- foreach(c; 0..4)
- {
- foreach(r; 0..4)
- b[c][r] ^= key[c][r];
- }
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement