From 1bb58b2db7b71d44e4da7fd3f977a388c20e3b39 Mon Sep 17 00:00:00 2001 From: bg Date: Wed, 2 Apr 2008 13:35:03 +0000 Subject: [PATCH] +Serpent --- Makefile | 6 +- main-serpent-test.c | 144 +++++++++++++++++++ serpent.c | 343 ++++++++++++++++++++++++++++++++++++++++++++ serpent.h | 24 ++++ 4 files changed, 515 insertions(+), 2 deletions(-) create mode 100644 main-serpent-test.c create mode 100644 serpent.c create mode 100644 serpent.h diff --git a/Makefile b/Makefile index 7ff77d8..42a79bd 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,8 @@ -PRG = tdes-test +PRG = serpent-test +#PRG = tdes-test # camellia # cryptotest +SERPENT_OBJ = main-serpent-test.o debug.o uart.o serial-tools.o serpent.o CAMELLIA_OBJ = main-camellia-test.o debug.o uart.o serial-tools.o camellia.o camellia-asm.o SKIPJACK_OBJ = main-skipjack-test.o debug.o uart.o serial-tools.o skipjack.o SHA1_OBJ = main-sha1-test.o debug.o uart.o serial-tools.o sha1-asm.o @@ -13,7 +15,7 @@ TDES_OBJ = main-tdes-test.o debug.o uart.o serial-tools.o des.o SEED_OBJ = main-seed-test.o debug.o uart.o serial-tools.o seed.o seed-asm.o SHABEA_OBJ = main-shabea-test.o debug.o uart.o serial-tools.o shabea.o sha256-asm.o -OBJ = $(TDES_OBJ) +OBJ = $(SERPENT_OBJ) MCU_TARGET = atmega32 OPTIMIZE = -Os diff --git a/main-serpent-test.c b/main-serpent-test.c new file mode 100644 index 0000000..120d402 --- /dev/null +++ b/main-serpent-test.c @@ -0,0 +1,144 @@ +/* + * serpent test-suit + * +*/ + +#include "config.h" +#include "serial-tools.h" +#include "uart.h" +#include "debug.h" + +#include "serpent.h" + +#include +#include + + +/***************************************************************************** + * additional validation-functions * + *****************************************************************************/ + +/***************************************************************************** + * self tests * + *****************************************************************************/ + +void dumpctx(serpent_ctx_t * ctx){ + uint8_t i; + uart_putstr("\r\n --ctx dump--\r\n"); + for(i=0; i<33; ++i){ + uart_putstr(" K["); uart_putc('0'+i/10); uart_putc('0'+i%10); uart_putstr("] = "); + uart_hexdump(ctx->k[i],16); + uart_putstr("\r\n"); + } +} + +void testencrypt(uint8_t* block, uint8_t* key){ + serpent_ctx_t ctx; + uart_putstr("\r\n==testy-encrypt==\r\n key: "); + uart_hexdump(key,32); + serpent_genctx(key, &ctx); +// dumpctx(&ctx); + uart_putstr("\r\n plain: "); + uart_hexdump(block,16); + serpent_enc(block, &ctx); + uart_putstr("\r\n crypt: "); + uart_hexdump(block,16); +} + +void testdecrypt(uint8_t* block, uint8_t* key){ + serpent_ctx_t ctx; + uart_putstr("\r\n==testy-decrypt==\r\n key: "); + uart_hexdump(key,32); + serpent_genctx(key, &ctx); +// dumpctx(&ctx); + uart_putstr("\r\n crypt: "); + uart_hexdump(block,16); + serpent_dec(block, &ctx); + uart_putstr("\r\n plain: "); + uart_hexdump(block,16); +} + +/** + Test vectors -- set 4 +===================== + +Set 4, vector# 0: + key=000102030405060708090A0B0C0D0E0F + 101112131415161718191A1B1C1D1E1F + plain=00112233445566778899AABBCCDDEEFF + cipher=2868B7A2D28ECD5E4FDEFAC3C4330074 + decrypted=00112233445566778899AABBCCDDEEFF + Iterated 100 times=8BF56992354F3F1A0F4E49DCBA82CBC0 + Iterated 1000 times=9B1D8B34845DF9BFD36AAAD0CDA1C8FE + +Set 4, vector# 1: + key=2BD6459F82C5B300952C49104881FF48 + 2BD6459F82C5B300952C49104881FF48 + plain=EA024714AD5C4D84EA024714AD5C4D84 + cipher=3E507730776B93FDEA661235E1DD99F0 + decrypted=EA024714AD5C4D84EA024714AD5C4D84 + Iterated 100 times=3B5462E5D87A40C4BE745E3994D5E373 + Iterated 1000 times=99D5D067EF7C787E6A764EB47DAC59AD + + +Set 1, vector# 0: + key=80000000000000000000000000000000 + 00000000000000000000000000000000 + plain=00000000000000000000000000000000 + cipher=A223AA1288463C0E2BE38EBD825616C0 + decrypted=00000000000000000000000000000000 + Iterated 100 times=739E0148971FD975B585EAFDBD659E2C + Iterated 1000 times=BEFD00E0D6E27E56951DC6614440D286 + +*/ + +void testrun_serpent(void){ + + uint8_t key[]={ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, + 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, + 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F }; + + uint8_t data[]={ 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, + 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF}; +/* * / + uint8_t key[]={ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; + + uint8_t data[]={ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; +*/ + testencrypt(data,key); + testdecrypt(data,key); +} + + + +/***************************************************************************** + * main * + *****************************************************************************/ + +int main (void){ + char str[20]; + + DEBUG_INIT(); + uart_putstr("\r\n"); + + uart_putstr("\r\n\r\nCrypto-VS (serpent)\r\nloaded and running\r\n"); + +restart: + while(1){ + if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;} + if (strcmp(str, "test")) {DEBUG_S("DBG: 1b\r\n"); goto error;} + testrun_serpent(); + goto restart; + continue; + error: + uart_putstr("ERROR\r\n"); + } + + +} + diff --git a/serpent.c b/serpent.c new file mode 100644 index 0000000..ef7d199 --- /dev/null +++ b/serpent.c @@ -0,0 +1,343 @@ +/* serpent.c + * a bitsliced implementation of the serpent cipher for avr microcontrollers + * author: Daniel Otte + * license: GPLv3 + */ + +#include +#include /* memset() */ +#include + +#include "uart.h" +#include "debug.h" + + +/* + S0: 3 8 15 1 10 6 5 11 14 13 4 2 7 0 9 12 + S1: 15 12 2 7 9 0 5 10 1 11 14 8 6 13 3 4 + S2: 8 6 7 9 3 12 10 15 13 1 14 4 0 11 5 2 + S3: 0 15 11 8 12 9 6 3 13 1 2 4 10 7 5 14 + S4: 1 15 8 3 12 0 11 6 2 5 4 10 9 14 7 13 + S5: 15 5 2 11 4 10 9 12 0 3 14 8 13 6 7 1 + S6: 7 2 12 5 8 4 6 11 14 9 1 15 13 3 10 0 + S7: 1 13 15 0 14 8 2 11 7 4 12 10 9 3 5 6 +*/ + +uint8_t sbox[] PROGMEM = { + 0x38, 0xF1, 0xA6, 0x5B, 0xED, 0x42, 0x70, 0x9C, + 0xFC, 0x27, 0x90, 0x5A, 0x1B, 0xE8, 0x6D, 0x34, + 0x86, 0x79, 0x3C, 0xAF, 0xD1, 0xE4, 0x0B, 0x52, + 0x0F, 0xB8, 0xC9, 0x63, 0xD1, 0x24, 0xA7, 0x5E, + 0x1F, 0x83, 0xC0, 0xB6, 0x25, 0x4A, 0x9E, 0x7D, + 0xF5, 0x2B, 0x4A, 0x9C, 0x03, 0xE8, 0xD6, 0x71, + 0x72, 0xC5, 0x84, 0x6B, 0xE9, 0x1F, 0xD3, 0xA0, + 0x1D, 0xF0, 0xE8, 0x2B, 0x74, 0xCA, 0x93, 0x56, +/* now the inverted sboxes */ + 0xD3, 0xB0, 0xA6, 0x5C, 0x1E, 0x47, 0xF9, 0x82, + 0x58, 0x2E, 0xF6, 0xC3, 0xB4, 0x79, 0x1D, 0xA0, + 0xC9, 0xF4, 0xBE, 0x12, 0x03, 0x6D, 0x58, 0xA7, + 0x09, 0xA7, 0xBE, 0x6D, 0x35, 0xC2, 0x48, 0xF1, + 0x50, 0x83, 0xA9, 0x7E, 0x2C, 0xB6, 0x4F, 0xD1, + 0x8F, 0x29, 0x41, 0xDE, 0xB6, 0x53, 0x7C, 0xA0, + 0xFA, 0x1D, 0x53, 0x60, 0x49, 0xE7, 0x2C, 0x8B, + 0x30, 0x6D, 0x9E, 0xF8, 0x5C, 0xB7, 0xA1, 0x42 +}; + +/* + InvS0: 13 3 11 0 10 6 5 12 1 14 4 7 15 9 8 2 + InvS1: 5 8 2 14 15 6 12 3 11 4 7 9 1 13 10 0 + InvS2: 12 9 15 4 11 14 1 2 0 3 6 13 5 8 10 7 + InvS3: 0 9 10 7 11 14 6 13 3 5 12 2 4 8 15 1 + InvS4: 5 0 8 3 10 9 7 14 2 12 11 6 4 15 13 1 + InvS5: 8 15 2 9 4 1 13 14 11 6 5 3 7 12 10 0 + InvS6: 15 10 1 13 5 3 6 0 4 9 14 7 2 12 8 11 + InvS7: 3 0 6 13 9 14 15 8 5 12 11 7 10 1 4 2 +*/ +/* +uint8_t invsbox[] PROGMEM = { + 0xD3, 0xB0, 0xA6, 0x5C, 0x1E, 0x47, 0xF9, 0x82, + 0x58, 0x2E, 0xF6, 0xC3, 0xB4, 0x79, 0x1D, 0xA0, + 0xC9, 0xF4, 0xBE, 0x12, 0x03, 0x6D, 0x58, 0xA7, + 0x09, 0xA7, 0xBE, 0x6D, 0x35, 0xC2, 0x48, 0xF1, + 0x50, 0x83, 0xA9, 0x7E, 0x2C, 0xB6, 0x4F, 0xD1, + 0x8F, 0x29, 0x41, 0xDE, 0xB6, 0x53, 0x7C, 0xA0, + 0xFA, 0x1D, 0x53, 0x60, 0x49, 0xE7, 0x2C, 0x8B, + 0x30, 0x6D, 0x9E, 0xF8, 0x5C, 0xB7, 0xA1, 0x42 +} +*/ + +static uint8_t byteflip(uint8_t v){ + uint8_t tab[] = { 0x0, 0x8, 0x4, 0xC, + 0x2, 0xA, 0x6, 0xE, + 0x1, 0x9, 0x5, 0xD, + 0x3, 0xB, 0x7, 0xF }; + uint8_t ret; + ret = ((tab[v&0xf]) << 4) | tab[v>>4]; + return ret; +} + +static uint8_t getbit(void* b, uint8_t addr){ + uint8_t t; + t = ((uint8_t*)b)[addr/8]; + t = (t&(1<<(addr&0x7)))?1:0; + return t; +} + +static void setbit(void* b, uint8_t addr, uint8_t v){ + uint8_t t; + t = ((uint8_t*)b)[addr/8]; + if(v){ + t |= 1<<(addr&0x7); + } else { + t &= ~(1<<(addr&0x7)); + } + ((uint8_t*)b)[addr/8] = t; +} +/* +uint8_t ip_table[] PROGMEM = { + 0, 32, 64, 96, 1, 33, 65, 97, 2, 34, 66, 98, 3, 35, 67, 99, + 4, 36, 68, 100, 5, 37, 69, 101, 6, 38, 70, 102, 7, 39, 71, 103, + 8, 40, 72, 104, 9, 41, 73, 105, 10, 42, 74, 106, 11, 43, 75, 107, + 12, 44, 76, 108, 13, 45, 77, 109, 14, 46, 78, 110, 15, 47, 79, 111, + 16, 48, 80, 112, 17, 49, 81, 113, 18, 50, 82, 114, 19, 51, 83, 115, + 20, 52, 84, 116, 21, 53, 85, 117, 22, 54, 86, 118, 23, 55, 87, 119, + 24, 56, 88, 120, 25, 57, 89, 121, 26, 58, 90, 122, 27, 59, 91, 123, + 28, 60, 92, 124, 29, 61, 93, 125, 30, 62, 94, 126, 31, 63, 95, 127 +}; +* / +uint8_t fp_table[] PROGMEM = { + 0, 4, 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 52, 56, 60, + 64, 68, 72, 76, 80, 84, 88, 92, 96, 100, 104, 108, 112, 116, 120, 124, + 1, 5, 9, 13, 17, 21, 25, 29, 33, 37, 41, 45, 49, 53, 57, 61, + 65, 69, 73, 77, 81, 85, 89, 93, 97, 101, 105, 109, 113, 117, 121, 125, + 2, 6, 10, 14, 18, 22, 26, 30, 34, 38, 42, 46, 50, 54, 58, 62, + 66, 70, 74, 78, 82, 86, 90, 94, 98, 102, 106, 110, 114, 118, 122, 126, + 3, 7, 11, 15, 19, 23, 27, 31, 35, 39, 43, 47, 51, 55, 59, 63, + 67, 71, 75, 79, 83, 87, 91, 95, 99, 103, 107, 111, 115, 119, 123, 127 +}; +*/ +/* +static void ip_stupid(void* out, void* in){ + uint8_t i,x,t; + for(i=0; i<128; ++i){ + t = pgm_read_byte(ip_table + i); + x = getbit(in, t); + setbit(out, i, x); + } +} +*/ +/* +static void fp_stupid(void* out, void* in){ + uint8_t i,x,t; + for(i=0; i<128; ++i){ + t = pgm_read_byte(fp_table + i); + x = getbit(in, t); + setbit(out, i, x); + } +} +*/ +/* this is a implementation of the needed propertys only! */ +#define SHR_O(a) c=(a)&1; ((a) = (a)>>1) +#define SHR_I(a) ((a) = (c?0x80:0x00)| ((a)>>1)) + +static void ip(uint8_t *o, uint32_t *i){ + uint8_t c; // carry + uint8_t n,m; + memset(o, 0, 16); + for(n=0; n<16; ++n){ + for(m=0; m<2; ++m){ + SHR_O(i[0]); + SHR_I(o[n]); + SHR_O(i[1]); + SHR_I(o[n]); + SHR_O(i[2]); + SHR_I(o[n]); + SHR_O(i[3]); + SHR_I(o[n]); + } + } +} + +#undef SHR_I +#define SHR_I(a) ((a) = (c?0x80000000L:0x00L)| ((a)>>1)) /* we use 32-bit words here */ + + +static void fp(uint32_t *o, uint32_t *i){ + uint8_t c; // carry + uint8_t n,m; + memset(o, 0, 16); + for(n=0; n<4; ++n){ + for(m=0; m<8; ++m){ + SHR_O(i[n]); + SHR_I(o[0]); + SHR_O(i[n]); + SHR_I(o[1]); + SHR_O(i[n]); + SHR_I(o[2]); + SHR_O(i[n]); + SHR_I(o[3]); + } + } +} + +/******************************************************************************/ + +static void sbox128x(uint8_t box, void* w){ + uint8_t sb[16]; + uint8_t i,t,x; + box &= 0x0f; + /* load sbox */ + for(i=0; i<8; ++i){ + t = pgm_read_byte(sbox + box*8 + i); + sb[2*i+0]=t>>4; + sb[2*i+1]=t&0xf; + } + uint8_t o[16]; + ip(o, w); + + for(i=0; i<16; ++i){ + t = ((uint8_t*)o)[i]; + x = sb[t>>4]; + x <<= 4; + x |= sb[t&0xf]; + ((uint8_t*)o)[i] = x; + } + fp(w, o); +} + +static void sbox128(void * w, uint8_t box){ + sbox128x(box&0x7, w); +} + +static void inv_sbox128(void * w, uint8_t box){ + sbox128x(((box&0x7)|0x8), w); +} + +/******************************************************************************/ + +void memxor(void * dest, void * src, uint8_t size){ + while(size--){ + *((uint8_t*)dest) ^= *((uint8_t*)src); + dest = (uint8_t*)dest +1; + src = (uint8_t*)src +1; + } +} + +/******************************************************************************/ + +uint32_t rotl32(uint32_t a, uint8_t n){ + return ((a<>(32-n))); +} + + +uint32_t rotr32(uint32_t a, uint8_t n){ + return ((a>>n) | (a<<(32-n))); +} + + +#define X0 (((uint32_t*)b)[0]) +#define X1 (((uint32_t*)b)[1]) +#define X2 (((uint32_t*)b)[2]) +#define X3 (((uint32_t*)b)[3]) + +static void lt(uint8_t *b){ + X0 = rotl32(X0, 13); + X2 = rotl32(X2, 3); + X1 ^= X0 ^ X2; + X3 ^= X2 ^ (X0 << 3); + X1 = rotl32(X1, 1); + X3 = rotl32(X3, 7); + X0 ^= X1 ^ X3; + X2 ^= X3 ^ (X1 << 7); + X0 = rotl32(X0, 5); + X2 = rotr32(X2, 10); +} + +static void inv_lt(uint8_t *b){ + X2 = rotl32(X2, 10); + X0 = rotr32(X0, 5); + X2 ^= X3 ^ (X1 << 7); + X0 ^= X1 ^ X3; + X3 = rotr32(X3, 7); + X1 = rotr32(X1, 1); + X3 ^= X2 ^ (X0 << 3); + X1 ^= X0 ^ X2; + X2 = rotr32(X2, 3); + X0 = rotr32(X0, 13); +} + +typedef uint32_t serpent_subkey_t[4]; + +typedef struct serpent_ctx_st { + serpent_subkey_t k[33]; +} serpent_ctx_t; + + +#define GOLDEN_RATIO 0x9e3779b9l + +static uint32_t gen_w(uint32_t * b, uint8_t i){ + uint32_t ret; + ret = b[0] ^ b[3] ^ b[5] ^ b[7] ^ GOLDEN_RATIO ^ (uint32_t)i; + ret = rotl32(ret, 11); + return ret; +} + +/* key must be 256bit (32 byte) large! */ +void serpent_genctx(void * key, serpent_ctx_t * ctx){ + uint32_t buffer[8]; + uint8_t i,j; + memcpy(buffer, key, 32); + for(i=0; i<33; ++i){ + for(j=0; j<4; ++j){ + ctx->k[i][j] = gen_w(buffer, i*4+j); + memmove(buffer, &(buffer[1]), 7*4); /* shift buffer one to the "left" */ + buffer[7] = ctx->k[i][j]; +/* + uart_putstr("\r\n w["); + uart_putc('0'+(4*i+j)/100); + uart_putc('0'+((4*i+j)/10)%10); + uart_putc('0'+(4*i+j)%10); + uart_putstr("] = "); + uart_hexdump(&(ctx->k[i][j]), 4); +*/ + } + } + for(i=0; i<33; ++i){ + sbox128(ctx->k[i],3-i); + } +} + + +void serpent_enc(void* buffer, serpent_ctx_t * ctx){ + uint8_t i; + for(i=0; i<31; ++i){ + memxor((uint8_t*)buffer, ctx->k[i], 16); + sbox128(buffer, i); + lt((uint8_t*)buffer); + } + memxor((uint8_t*)buffer, ctx->k[i], 16); + sbox128(buffer, i); + ++i; + memxor((uint8_t*)buffer, ctx->k[i], 16); +} + +void serpent_dec(void* buffer, serpent_ctx_t * ctx){ + int8_t i=32; + + memxor((uint8_t*)buffer, ctx->k[i], 16); + --i; + inv_sbox128(buffer, i); + memxor((uint8_t*)buffer, ctx->k[i], 16); + --i; + for(; i>=0; --i){ + inv_lt((uint8_t*)buffer); + inv_sbox128(buffer, i); + memxor((uint8_t*)buffer, ctx->k[i], 16); + } +} + + + + + + diff --git a/serpent.h b/serpent.h new file mode 100644 index 0000000..e72178d --- /dev/null +++ b/serpent.h @@ -0,0 +1,24 @@ +/* serpent.h + * a bitsliced implementation of the serpent cipher for avr microcontrollers + * author: Daniel Otte + * license: GPLv3 + */ + +#ifndef SERPENT_H_ +#define SERPENT_H_ + +#include + +typedef uint8_t serpent_subkey_t[16]; + +typedef struct serpent_ctx_st { + serpent_subkey_t k[33]; +} serpent_ctx_t; + +/* key must be 256bit (32 byte) large! */ +void serpent_genctx(void * key, serpent_ctx_t * ctx); +void serpent_enc(void * buffer, serpent_ctx_t * ctx); +void serpent_dec(void * buffer, serpent_ctx_t * ctx); + + +#endif /*SERPENT_H_*/