arm-crypto-lib/skein/threefish1024_enc.c

128 lines
3.5 KiB
C
Raw Permalink Normal View History

2010-05-08 01:17:34 +00:00
/* threefish1024_enc.c */
/*
This file is part of the ARM-Crypto-Lib.
Copyright (C) 2006-2010 Daniel Otte (daniel.otte@rub.de)
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
/*
* \author Daniel Otte
* \email daniel.otte@rub.de
* \date 2009-03-12
* \license GPLv3 or later
*
*
*
*/
#include <stdint.h>
#include <string.h>
#include "threefish.h"
#define X(a) (((uint64_t*)data)[(a)])
static
void permute_16(void* data){
uint64_t t;
t = X(1);
X(1) = X(9);
X(9) = X(7);
X(7) = X(15);
X(15) = t;
t = X(3);
X(3) = X(13);
X(13) = X(5);
X(5) = X(11);
X(11) = t;
t = X(4);
X(4) = X(6);
X(6) = t;
t = X(8);
X(8) = X(10);
X(10) = X(12);
X(12) = X(14);
X(14) = t;
}
2011-02-01 00:12:24 +00:00
//#define THREEFISH_KEY_CONST 0x5555555555555555LL /* 2**64/3 */
#define THREEFISH_KEY_CONST 0x1BD11BDAA9FC1A22LL
2010-05-08 01:17:34 +00:00
#define K(s) (((uint64_t*)key)[(s)])
#define T(s) (((uint64_t*)tweak)[(s)])
void threefish1024_init(const void* key, const void* tweak, threefish1024_ctx_t* ctx){
memcpy(ctx->k, key, 16*8);
if(tweak){
memcpy(ctx->t, tweak, 2*8);
ctx->t[2] = T(0) ^ T(1);
}else{
memset(ctx, 0, 3*8);
}
uint8_t i;
ctx->k[16] = THREEFISH_KEY_CONST;
for(i=0; i<16; ++i){
ctx->k[16] ^= K(i);
}
}
static
void add_key_16(void* data, const threefish1024_ctx_t* ctx, uint8_t s){
uint8_t i;
for(i=0; i<13; ++i){
X(i) += ctx->k[(s+i)%17];
}
X(13) += ctx->k[(s+13)%17] + ctx->t[s%3];
X(14) += ctx->k[(s+14)%17] + ctx->t[(s+1)%3];
X(15) += ctx->k[(s+15)%17] + s;
}
void threefish1024_enc(void* data, const threefish1024_ctx_t* ctx){
uint8_t i=0,s=0;
/* old constans, changed at round 2 of the SHA-3 contest
uint8_t r0[8] = {55, 25, 33, 34, 28, 17, 58, 47};
uint8_t r1[8] = {43, 25, 8, 43, 7, 6, 7, 49};
uint8_t r2[8] = {37, 46, 18, 25, 47, 18, 32, 27};
uint8_t r3[8] = {40, 13, 57, 60, 48, 25, 45, 58};
uint8_t r4[8] = {16, 14, 21, 44, 51, 43, 19, 37};
uint8_t r5[8] = {22, 13, 12, 9, 9, 42, 18, 48};
uint8_t r6[8] = {38, 52, 32, 59, 35, 40, 2, 53};
uint8_t r7[8] = {12, 57, 54, 34, 41, 15, 56, 56};
*/
uint8_t r0[8] = {24, 38, 33, 5, 41, 16, 31, 9};
uint8_t r1[8] = {13, 19, 4, 20, 9, 34, 44, 48};
uint8_t r2[8] = { 8, 10, 51, 48, 37, 56, 47, 35};
uint8_t r3[8] = {47, 55, 13, 41, 31, 51, 46, 52};
uint8_t r4[8] = { 8, 49, 34, 47, 12, 4, 19, 23};
uint8_t r5[8] = {17, 18, 41, 28, 47, 53, 42, 31};
uint8_t r6[8] = {22, 23, 59, 16, 44, 42, 44, 37};
uint8_t r7[8] = {37, 52, 17, 25, 30, 41, 25, 20};
do{
if(i%4==0){
add_key_16(data, ctx, s);
++s;
}
threefish_mix((uint8_t*)data + 0, r0[i%8]);
threefish_mix((uint8_t*)data + 16, r1[i%8]);
threefish_mix((uint8_t*)data + 32, r2[i%8]);
threefish_mix((uint8_t*)data + 48, r3[i%8]);
threefish_mix((uint8_t*)data + 64, r4[i%8]);
threefish_mix((uint8_t*)data + 80, r5[i%8]);
threefish_mix((uint8_t*)data + 96, r6[i%8]);
threefish_mix((uint8_t*)data +112, r7[i%8]);
permute_16(data);
++i;
}while(i!=80);
add_key_16(data, ctx, s);
}