+Serpent
This commit is contained in:
parent
fd53c14f50
commit
1bb58b2db7
6
Makefile
6
Makefile
|
@ -1,6 +1,8 @@
|
|||
PRG = tdes-test
|
||||
PRG = serpent-test
|
||||
#PRG = tdes-test
|
||||
# camellia
|
||||
# cryptotest
|
||||
SERPENT_OBJ = main-serpent-test.o debug.o uart.o serial-tools.o serpent.o
|
||||
CAMELLIA_OBJ = main-camellia-test.o debug.o uart.o serial-tools.o camellia.o camellia-asm.o
|
||||
SKIPJACK_OBJ = main-skipjack-test.o debug.o uart.o serial-tools.o skipjack.o
|
||||
SHA1_OBJ = main-sha1-test.o debug.o uart.o serial-tools.o sha1-asm.o
|
||||
|
@ -13,7 +15,7 @@ TDES_OBJ = main-tdes-test.o debug.o uart.o serial-tools.o des.o
|
|||
SEED_OBJ = main-seed-test.o debug.o uart.o serial-tools.o seed.o seed-asm.o
|
||||
SHABEA_OBJ = main-shabea-test.o debug.o uart.o serial-tools.o shabea.o sha256-asm.o
|
||||
|
||||
OBJ = $(TDES_OBJ)
|
||||
OBJ = $(SERPENT_OBJ)
|
||||
MCU_TARGET = atmega32
|
||||
OPTIMIZE = -Os
|
||||
|
||||
|
|
|
@ -0,0 +1,144 @@
|
|||
/*
|
||||
* serpent test-suit
|
||||
*
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
#include "serial-tools.h"
|
||||
#include "uart.h"
|
||||
#include "debug.h"
|
||||
|
||||
#include "serpent.h"
|
||||
|
||||
#include <stdint.h>
|
||||
#include <string.h>
|
||||
|
||||
|
||||
/*****************************************************************************
|
||||
* additional validation-functions *
|
||||
*****************************************************************************/
|
||||
|
||||
/*****************************************************************************
|
||||
* self tests *
|
||||
*****************************************************************************/
|
||||
|
||||
void dumpctx(serpent_ctx_t * ctx){
|
||||
uint8_t i;
|
||||
uart_putstr("\r\n --ctx dump--\r\n");
|
||||
for(i=0; i<33; ++i){
|
||||
uart_putstr(" K["); uart_putc('0'+i/10); uart_putc('0'+i%10); uart_putstr("] = ");
|
||||
uart_hexdump(ctx->k[i],16);
|
||||
uart_putstr("\r\n");
|
||||
}
|
||||
}
|
||||
|
||||
void testencrypt(uint8_t* block, uint8_t* key){
|
||||
serpent_ctx_t ctx;
|
||||
uart_putstr("\r\n==testy-encrypt==\r\n key: ");
|
||||
uart_hexdump(key,32);
|
||||
serpent_genctx(key, &ctx);
|
||||
// dumpctx(&ctx);
|
||||
uart_putstr("\r\n plain: ");
|
||||
uart_hexdump(block,16);
|
||||
serpent_enc(block, &ctx);
|
||||
uart_putstr("\r\n crypt: ");
|
||||
uart_hexdump(block,16);
|
||||
}
|
||||
|
||||
void testdecrypt(uint8_t* block, uint8_t* key){
|
||||
serpent_ctx_t ctx;
|
||||
uart_putstr("\r\n==testy-decrypt==\r\n key: ");
|
||||
uart_hexdump(key,32);
|
||||
serpent_genctx(key, &ctx);
|
||||
// dumpctx(&ctx);
|
||||
uart_putstr("\r\n crypt: ");
|
||||
uart_hexdump(block,16);
|
||||
serpent_dec(block, &ctx);
|
||||
uart_putstr("\r\n plain: ");
|
||||
uart_hexdump(block,16);
|
||||
}
|
||||
|
||||
/**
|
||||
Test vectors -- set 4
|
||||
=====================
|
||||
|
||||
Set 4, vector# 0:
|
||||
key=000102030405060708090A0B0C0D0E0F
|
||||
101112131415161718191A1B1C1D1E1F
|
||||
plain=00112233445566778899AABBCCDDEEFF
|
||||
cipher=2868B7A2D28ECD5E4FDEFAC3C4330074
|
||||
decrypted=00112233445566778899AABBCCDDEEFF
|
||||
Iterated 100 times=8BF56992354F3F1A0F4E49DCBA82CBC0
|
||||
Iterated 1000 times=9B1D8B34845DF9BFD36AAAD0CDA1C8FE
|
||||
|
||||
Set 4, vector# 1:
|
||||
key=2BD6459F82C5B300952C49104881FF48
|
||||
2BD6459F82C5B300952C49104881FF48
|
||||
plain=EA024714AD5C4D84EA024714AD5C4D84
|
||||
cipher=3E507730776B93FDEA661235E1DD99F0
|
||||
decrypted=EA024714AD5C4D84EA024714AD5C4D84
|
||||
Iterated 100 times=3B5462E5D87A40C4BE745E3994D5E373
|
||||
Iterated 1000 times=99D5D067EF7C787E6A764EB47DAC59AD
|
||||
|
||||
|
||||
Set 1, vector# 0:
|
||||
key=80000000000000000000000000000000
|
||||
00000000000000000000000000000000
|
||||
plain=00000000000000000000000000000000
|
||||
cipher=A223AA1288463C0E2BE38EBD825616C0
|
||||
decrypted=00000000000000000000000000000000
|
||||
Iterated 100 times=739E0148971FD975B585EAFDBD659E2C
|
||||
Iterated 1000 times=BEFD00E0D6E27E56951DC6614440D286
|
||||
|
||||
*/
|
||||
|
||||
void testrun_serpent(void){
|
||||
|
||||
uint8_t key[]={ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||||
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
|
||||
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
||||
0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F };
|
||||
|
||||
uint8_t data[]={ 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
|
||||
0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF};
|
||||
/* * /
|
||||
uint8_t key[]={ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
||||
|
||||
uint8_t data[]={ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
||||
*/
|
||||
testencrypt(data,key);
|
||||
testdecrypt(data,key);
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*****************************************************************************
|
||||
* main *
|
||||
*****************************************************************************/
|
||||
|
||||
int main (void){
|
||||
char str[20];
|
||||
|
||||
DEBUG_INIT();
|
||||
uart_putstr("\r\n");
|
||||
|
||||
uart_putstr("\r\n\r\nCrypto-VS (serpent)\r\nloaded and running\r\n");
|
||||
|
||||
restart:
|
||||
while(1){
|
||||
if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;}
|
||||
if (strcmp(str, "test")) {DEBUG_S("DBG: 1b\r\n"); goto error;}
|
||||
testrun_serpent();
|
||||
goto restart;
|
||||
continue;
|
||||
error:
|
||||
uart_putstr("ERROR\r\n");
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
|
@ -0,0 +1,343 @@
|
|||
/* serpent.c
|
||||
* a bitsliced implementation of the serpent cipher for avr microcontrollers
|
||||
* author: Daniel Otte
|
||||
* license: GPLv3
|
||||
*/
|
||||
|
||||
#include <stdint.h>
|
||||
#include <string.h> /* memset() */
|
||||
#include <avr/pgmspace.h>
|
||||
|
||||
#include "uart.h"
|
||||
#include "debug.h"
|
||||
|
||||
|
||||
/*
|
||||
S0: 3 8 15 1 10 6 5 11 14 13 4 2 7 0 9 12
|
||||
S1: 15 12 2 7 9 0 5 10 1 11 14 8 6 13 3 4
|
||||
S2: 8 6 7 9 3 12 10 15 13 1 14 4 0 11 5 2
|
||||
S3: 0 15 11 8 12 9 6 3 13 1 2 4 10 7 5 14
|
||||
S4: 1 15 8 3 12 0 11 6 2 5 4 10 9 14 7 13
|
||||
S5: 15 5 2 11 4 10 9 12 0 3 14 8 13 6 7 1
|
||||
S6: 7 2 12 5 8 4 6 11 14 9 1 15 13 3 10 0
|
||||
S7: 1 13 15 0 14 8 2 11 7 4 12 10 9 3 5 6
|
||||
*/
|
||||
|
||||
uint8_t sbox[] PROGMEM = {
|
||||
0x38, 0xF1, 0xA6, 0x5B, 0xED, 0x42, 0x70, 0x9C,
|
||||
0xFC, 0x27, 0x90, 0x5A, 0x1B, 0xE8, 0x6D, 0x34,
|
||||
0x86, 0x79, 0x3C, 0xAF, 0xD1, 0xE4, 0x0B, 0x52,
|
||||
0x0F, 0xB8, 0xC9, 0x63, 0xD1, 0x24, 0xA7, 0x5E,
|
||||
0x1F, 0x83, 0xC0, 0xB6, 0x25, 0x4A, 0x9E, 0x7D,
|
||||
0xF5, 0x2B, 0x4A, 0x9C, 0x03, 0xE8, 0xD6, 0x71,
|
||||
0x72, 0xC5, 0x84, 0x6B, 0xE9, 0x1F, 0xD3, 0xA0,
|
||||
0x1D, 0xF0, 0xE8, 0x2B, 0x74, 0xCA, 0x93, 0x56,
|
||||
/* now the inverted sboxes */
|
||||
0xD3, 0xB0, 0xA6, 0x5C, 0x1E, 0x47, 0xF9, 0x82,
|
||||
0x58, 0x2E, 0xF6, 0xC3, 0xB4, 0x79, 0x1D, 0xA0,
|
||||
0xC9, 0xF4, 0xBE, 0x12, 0x03, 0x6D, 0x58, 0xA7,
|
||||
0x09, 0xA7, 0xBE, 0x6D, 0x35, 0xC2, 0x48, 0xF1,
|
||||
0x50, 0x83, 0xA9, 0x7E, 0x2C, 0xB6, 0x4F, 0xD1,
|
||||
0x8F, 0x29, 0x41, 0xDE, 0xB6, 0x53, 0x7C, 0xA0,
|
||||
0xFA, 0x1D, 0x53, 0x60, 0x49, 0xE7, 0x2C, 0x8B,
|
||||
0x30, 0x6D, 0x9E, 0xF8, 0x5C, 0xB7, 0xA1, 0x42
|
||||
};
|
||||
|
||||
/*
|
||||
InvS0: 13 3 11 0 10 6 5 12 1 14 4 7 15 9 8 2
|
||||
InvS1: 5 8 2 14 15 6 12 3 11 4 7 9 1 13 10 0
|
||||
InvS2: 12 9 15 4 11 14 1 2 0 3 6 13 5 8 10 7
|
||||
InvS3: 0 9 10 7 11 14 6 13 3 5 12 2 4 8 15 1
|
||||
InvS4: 5 0 8 3 10 9 7 14 2 12 11 6 4 15 13 1
|
||||
InvS5: 8 15 2 9 4 1 13 14 11 6 5 3 7 12 10 0
|
||||
InvS6: 15 10 1 13 5 3 6 0 4 9 14 7 2 12 8 11
|
||||
InvS7: 3 0 6 13 9 14 15 8 5 12 11 7 10 1 4 2
|
||||
*/
|
||||
/*
|
||||
uint8_t invsbox[] PROGMEM = {
|
||||
0xD3, 0xB0, 0xA6, 0x5C, 0x1E, 0x47, 0xF9, 0x82,
|
||||
0x58, 0x2E, 0xF6, 0xC3, 0xB4, 0x79, 0x1D, 0xA0,
|
||||
0xC9, 0xF4, 0xBE, 0x12, 0x03, 0x6D, 0x58, 0xA7,
|
||||
0x09, 0xA7, 0xBE, 0x6D, 0x35, 0xC2, 0x48, 0xF1,
|
||||
0x50, 0x83, 0xA9, 0x7E, 0x2C, 0xB6, 0x4F, 0xD1,
|
||||
0x8F, 0x29, 0x41, 0xDE, 0xB6, 0x53, 0x7C, 0xA0,
|
||||
0xFA, 0x1D, 0x53, 0x60, 0x49, 0xE7, 0x2C, 0x8B,
|
||||
0x30, 0x6D, 0x9E, 0xF8, 0x5C, 0xB7, 0xA1, 0x42
|
||||
}
|
||||
*/
|
||||
|
||||
static uint8_t byteflip(uint8_t v){
|
||||
uint8_t tab[] = { 0x0, 0x8, 0x4, 0xC,
|
||||
0x2, 0xA, 0x6, 0xE,
|
||||
0x1, 0x9, 0x5, 0xD,
|
||||
0x3, 0xB, 0x7, 0xF };
|
||||
uint8_t ret;
|
||||
ret = ((tab[v&0xf]) << 4) | tab[v>>4];
|
||||
return ret;
|
||||
}
|
||||
|
||||
static uint8_t getbit(void* b, uint8_t addr){
|
||||
uint8_t t;
|
||||
t = ((uint8_t*)b)[addr/8];
|
||||
t = (t&(1<<(addr&0x7)))?1:0;
|
||||
return t;
|
||||
}
|
||||
|
||||
static void setbit(void* b, uint8_t addr, uint8_t v){
|
||||
uint8_t t;
|
||||
t = ((uint8_t*)b)[addr/8];
|
||||
if(v){
|
||||
t |= 1<<(addr&0x7);
|
||||
} else {
|
||||
t &= ~(1<<(addr&0x7));
|
||||
}
|
||||
((uint8_t*)b)[addr/8] = t;
|
||||
}
|
||||
/*
|
||||
uint8_t ip_table[] PROGMEM = {
|
||||
0, 32, 64, 96, 1, 33, 65, 97, 2, 34, 66, 98, 3, 35, 67, 99,
|
||||
4, 36, 68, 100, 5, 37, 69, 101, 6, 38, 70, 102, 7, 39, 71, 103,
|
||||
8, 40, 72, 104, 9, 41, 73, 105, 10, 42, 74, 106, 11, 43, 75, 107,
|
||||
12, 44, 76, 108, 13, 45, 77, 109, 14, 46, 78, 110, 15, 47, 79, 111,
|
||||
16, 48, 80, 112, 17, 49, 81, 113, 18, 50, 82, 114, 19, 51, 83, 115,
|
||||
20, 52, 84, 116, 21, 53, 85, 117, 22, 54, 86, 118, 23, 55, 87, 119,
|
||||
24, 56, 88, 120, 25, 57, 89, 121, 26, 58, 90, 122, 27, 59, 91, 123,
|
||||
28, 60, 92, 124, 29, 61, 93, 125, 30, 62, 94, 126, 31, 63, 95, 127
|
||||
};
|
||||
* /
|
||||
uint8_t fp_table[] PROGMEM = {
|
||||
0, 4, 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 52, 56, 60,
|
||||
64, 68, 72, 76, 80, 84, 88, 92, 96, 100, 104, 108, 112, 116, 120, 124,
|
||||
1, 5, 9, 13, 17, 21, 25, 29, 33, 37, 41, 45, 49, 53, 57, 61,
|
||||
65, 69, 73, 77, 81, 85, 89, 93, 97, 101, 105, 109, 113, 117, 121, 125,
|
||||
2, 6, 10, 14, 18, 22, 26, 30, 34, 38, 42, 46, 50, 54, 58, 62,
|
||||
66, 70, 74, 78, 82, 86, 90, 94, 98, 102, 106, 110, 114, 118, 122, 126,
|
||||
3, 7, 11, 15, 19, 23, 27, 31, 35, 39, 43, 47, 51, 55, 59, 63,
|
||||
67, 71, 75, 79, 83, 87, 91, 95, 99, 103, 107, 111, 115, 119, 123, 127
|
||||
};
|
||||
*/
|
||||
/*
|
||||
static void ip_stupid(void* out, void* in){
|
||||
uint8_t i,x,t;
|
||||
for(i=0; i<128; ++i){
|
||||
t = pgm_read_byte(ip_table + i);
|
||||
x = getbit(in, t);
|
||||
setbit(out, i, x);
|
||||
}
|
||||
}
|
||||
*/
|
||||
/*
|
||||
static void fp_stupid(void* out, void* in){
|
||||
uint8_t i,x,t;
|
||||
for(i=0; i<128; ++i){
|
||||
t = pgm_read_byte(fp_table + i);
|
||||
x = getbit(in, t);
|
||||
setbit(out, i, x);
|
||||
}
|
||||
}
|
||||
*/
|
||||
/* this is a implementation of the needed propertys only! */
|
||||
#define SHR_O(a) c=(a)&1; ((a) = (a)>>1)
|
||||
#define SHR_I(a) ((a) = (c?0x80:0x00)| ((a)>>1))
|
||||
|
||||
static void ip(uint8_t *o, uint32_t *i){
|
||||
uint8_t c; // carry
|
||||
uint8_t n,m;
|
||||
memset(o, 0, 16);
|
||||
for(n=0; n<16; ++n){
|
||||
for(m=0; m<2; ++m){
|
||||
SHR_O(i[0]);
|
||||
SHR_I(o[n]);
|
||||
SHR_O(i[1]);
|
||||
SHR_I(o[n]);
|
||||
SHR_O(i[2]);
|
||||
SHR_I(o[n]);
|
||||
SHR_O(i[3]);
|
||||
SHR_I(o[n]);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#undef SHR_I
|
||||
#define SHR_I(a) ((a) = (c?0x80000000L:0x00L)| ((a)>>1)) /* we use 32-bit words here */
|
||||
|
||||
|
||||
static void fp(uint32_t *o, uint32_t *i){
|
||||
uint8_t c; // carry
|
||||
uint8_t n,m;
|
||||
memset(o, 0, 16);
|
||||
for(n=0; n<4; ++n){
|
||||
for(m=0; m<8; ++m){
|
||||
SHR_O(i[n]);
|
||||
SHR_I(o[0]);
|
||||
SHR_O(i[n]);
|
||||
SHR_I(o[1]);
|
||||
SHR_O(i[n]);
|
||||
SHR_I(o[2]);
|
||||
SHR_O(i[n]);
|
||||
SHR_I(o[3]);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
|
||||
static void sbox128x(uint8_t box, void* w){
|
||||
uint8_t sb[16];
|
||||
uint8_t i,t,x;
|
||||
box &= 0x0f;
|
||||
/* load sbox */
|
||||
for(i=0; i<8; ++i){
|
||||
t = pgm_read_byte(sbox + box*8 + i);
|
||||
sb[2*i+0]=t>>4;
|
||||
sb[2*i+1]=t&0xf;
|
||||
}
|
||||
uint8_t o[16];
|
||||
ip(o, w);
|
||||
|
||||
for(i=0; i<16; ++i){
|
||||
t = ((uint8_t*)o)[i];
|
||||
x = sb[t>>4];
|
||||
x <<= 4;
|
||||
x |= sb[t&0xf];
|
||||
((uint8_t*)o)[i] = x;
|
||||
}
|
||||
fp(w, o);
|
||||
}
|
||||
|
||||
static void sbox128(void * w, uint8_t box){
|
||||
sbox128x(box&0x7, w);
|
||||
}
|
||||
|
||||
static void inv_sbox128(void * w, uint8_t box){
|
||||
sbox128x(((box&0x7)|0x8), w);
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
|
||||
void memxor(void * dest, void * src, uint8_t size){
|
||||
while(size--){
|
||||
*((uint8_t*)dest) ^= *((uint8_t*)src);
|
||||
dest = (uint8_t*)dest +1;
|
||||
src = (uint8_t*)src +1;
|
||||
}
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
|
||||
uint32_t rotl32(uint32_t a, uint8_t n){
|
||||
return ((a<<n) | (a>>(32-n)));
|
||||
}
|
||||
|
||||
|
||||
uint32_t rotr32(uint32_t a, uint8_t n){
|
||||
return ((a>>n) | (a<<(32-n)));
|
||||
}
|
||||
|
||||
|
||||
#define X0 (((uint32_t*)b)[0])
|
||||
#define X1 (((uint32_t*)b)[1])
|
||||
#define X2 (((uint32_t*)b)[2])
|
||||
#define X3 (((uint32_t*)b)[3])
|
||||
|
||||
static void lt(uint8_t *b){
|
||||
X0 = rotl32(X0, 13);
|
||||
X2 = rotl32(X2, 3);
|
||||
X1 ^= X0 ^ X2;
|
||||
X3 ^= X2 ^ (X0 << 3);
|
||||
X1 = rotl32(X1, 1);
|
||||
X3 = rotl32(X3, 7);
|
||||
X0 ^= X1 ^ X3;
|
||||
X2 ^= X3 ^ (X1 << 7);
|
||||
X0 = rotl32(X0, 5);
|
||||
X2 = rotr32(X2, 10);
|
||||
}
|
||||
|
||||
static void inv_lt(uint8_t *b){
|
||||
X2 = rotl32(X2, 10);
|
||||
X0 = rotr32(X0, 5);
|
||||
X2 ^= X3 ^ (X1 << 7);
|
||||
X0 ^= X1 ^ X3;
|
||||
X3 = rotr32(X3, 7);
|
||||
X1 = rotr32(X1, 1);
|
||||
X3 ^= X2 ^ (X0 << 3);
|
||||
X1 ^= X0 ^ X2;
|
||||
X2 = rotr32(X2, 3);
|
||||
X0 = rotr32(X0, 13);
|
||||
}
|
||||
|
||||
typedef uint32_t serpent_subkey_t[4];
|
||||
|
||||
typedef struct serpent_ctx_st {
|
||||
serpent_subkey_t k[33];
|
||||
} serpent_ctx_t;
|
||||
|
||||
|
||||
#define GOLDEN_RATIO 0x9e3779b9l
|
||||
|
||||
static uint32_t gen_w(uint32_t * b, uint8_t i){
|
||||
uint32_t ret;
|
||||
ret = b[0] ^ b[3] ^ b[5] ^ b[7] ^ GOLDEN_RATIO ^ (uint32_t)i;
|
||||
ret = rotl32(ret, 11);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* key must be 256bit (32 byte) large! */
|
||||
void serpent_genctx(void * key, serpent_ctx_t * ctx){
|
||||
uint32_t buffer[8];
|
||||
uint8_t i,j;
|
||||
memcpy(buffer, key, 32);
|
||||
for(i=0; i<33; ++i){
|
||||
for(j=0; j<4; ++j){
|
||||
ctx->k[i][j] = gen_w(buffer, i*4+j);
|
||||
memmove(buffer, &(buffer[1]), 7*4); /* shift buffer one to the "left" */
|
||||
buffer[7] = ctx->k[i][j];
|
||||
/*
|
||||
uart_putstr("\r\n w[");
|
||||
uart_putc('0'+(4*i+j)/100);
|
||||
uart_putc('0'+((4*i+j)/10)%10);
|
||||
uart_putc('0'+(4*i+j)%10);
|
||||
uart_putstr("] = ");
|
||||
uart_hexdump(&(ctx->k[i][j]), 4);
|
||||
*/
|
||||
}
|
||||
}
|
||||
for(i=0; i<33; ++i){
|
||||
sbox128(ctx->k[i],3-i);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
void serpent_enc(void* buffer, serpent_ctx_t * ctx){
|
||||
uint8_t i;
|
||||
for(i=0; i<31; ++i){
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
sbox128(buffer, i);
|
||||
lt((uint8_t*)buffer);
|
||||
}
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
sbox128(buffer, i);
|
||||
++i;
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
}
|
||||
|
||||
void serpent_dec(void* buffer, serpent_ctx_t * ctx){
|
||||
int8_t i=32;
|
||||
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
--i;
|
||||
inv_sbox128(buffer, i);
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
--i;
|
||||
for(; i>=0; --i){
|
||||
inv_lt((uint8_t*)buffer);
|
||||
inv_sbox128(buffer, i);
|
||||
memxor((uint8_t*)buffer, ctx->k[i], 16);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
@ -0,0 +1,24 @@
|
|||
/* serpent.h
|
||||
* a bitsliced implementation of the serpent cipher for avr microcontrollers
|
||||
* author: Daniel Otte
|
||||
* license: GPLv3
|
||||
*/
|
||||
|
||||
#ifndef SERPENT_H_
|
||||
#define SERPENT_H_
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
typedef uint8_t serpent_subkey_t[16];
|
||||
|
||||
typedef struct serpent_ctx_st {
|
||||
serpent_subkey_t k[33];
|
||||
} serpent_ctx_t;
|
||||
|
||||
/* key must be 256bit (32 byte) large! */
|
||||
void serpent_genctx(void * key, serpent_ctx_t * ctx);
|
||||
void serpent_enc(void * buffer, serpent_ctx_t * ctx);
|
||||
void serpent_dec(void * buffer, serpent_ctx_t * ctx);
|
||||
|
||||
|
||||
#endif /*SERPENT_H_*/
|
Loading…
Reference in New Issue