/* present.c */ /* This file is part of the ARM-Crypto-Lib. Copyright (C) 2006-2010 Daniel Otte (daniel.otte@rub.de) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ /** * present.c * a implementation of the PRESENT block-cipher * author: Daniel Otte * email: daniel.otte@rub.de * license: GPLv3 * * */ #include #include #include "present.h" static uint8_t sbox(uint8_t b){ const uint8_t sb[]={ 0xC, 0x5, 0x6, 0xB, 0x9, 0x0, 0xA, 0xD, 0x3, 0xE, 0xF, 0x8, 0x4, 0x7, 0x1, 0x2 }; return (((sb[b>>4])<<4)|(sb[b&0xf])); } static uint8_t sbox_inv(uint8_t b){ const uint8_t sb[]={ 0x5, 0xE, 0xF, 0x8, 0xC, 0x1, 0x2, 0xD, 0xB, 0x4, 0x6, 0x3, 0x0, 0x7, 0x9, 0xA }; return (((sb[b>>4])<<4)|(sb[b&0xf])); } #define SHR_O(a) c=(a)&1; (a)>>=1; #define SHR_I(a) (a)=(c?0x8000:0x0000) | ((a)>>1); static void p(uint16_t* o, uint8_t* i){ uint8_t c; uint8_t m,n; for(m=0; m<8; ++m){ for(n=0; n<2; ++n){ SHR_O(i[m]); SHR_I(o[0]); SHR_O(i[m]); SHR_I(o[1]); SHR_O(i[m]); SHR_I(o[2]); SHR_O(i[m]); SHR_I(o[3]); } } } static void p_inv(uint8_t* o, uint8_t* i){ uint8_t tmp[8]; p((uint16_t*)tmp, i); p((uint16_t*)o, tmp); } void present_init(const uint8_t* key, uint8_t keysize_b, present_ctx_t* ctx){ uint8_t tmp[2]; union __attribute__((packed)) { uint8_t v8[10]; uint64_t v64; uint16_t v16[5]; struct __attribute__((packed)) { uint8_t v8[1]; uint16_t v16[4]; } off1; } b; uint8_t i; memcpy(b.v8, key, 10); memcpy(&(ctx->k[0]), b.v8+2, 8); for(i=1; i<32; ++i){ /* rotate buffer 19 right */ memcpy(tmp, b.v8, 2); memmove(b.v8, b.v8+2, 8); memcpy(b.v8+8, tmp, 2); /* three shifts to do*/ tmp[1]=b.v8[0]; b.v64 >>= 3; b.v16[4] >>= 3; b.v8[9] |= tmp[1]<<5; b.v8[7] |= tmp[0]<<5; /* rotating done now substitution */ b.v8[9] = (sbox(b.v8[9])&0xF0) | ((b.v8[9])&0x0F); /* xor with round counter */ b.off1.v16[0] ^= (uint16_t)i<<7; memcpy(&(ctx->k[i]), b.v8+2, 8); } } void present_enc(void* buffer, present_ctx_t* ctx){ uint8_t i,j,tmp[8]; for(i=0; i<31; ++i){ *((uint64_t*)buffer) ^= ctx->k[i]; for(j=0; j<8; ++j){ tmp[j] = sbox(((uint8_t*)buffer)[j]); } p((uint16_t*)buffer, tmp); } *((uint64_t*)buffer) ^= ctx->k[31]; } void present_dec(void* buffer, present_ctx_t* ctx){ uint8_t j,tmp[8]; int8_t i; *((uint64_t*)buffer) ^= ctx->k[31]; for(i=30; i>=0; --i){ p_inv(tmp, (uint8_t*)buffer); for(j=0; j<8; ++j){ ((uint8_t*)buffer)[j] = sbox_inv(tmp[j]); } *((uint64_t*)buffer) ^= ctx->k[i]; } }