147 lines
3.4 KiB
C
147 lines
3.4 KiB
C
/* present128.c */
|
|
/*
|
|
This file is part of the AVR-Crypto-Lib.
|
|
Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
/**
|
|
* present128.c
|
|
* a implementation of the PRESENT block-cipher
|
|
* author: Daniel Otte
|
|
* email: daniel.otte@rub.de
|
|
* license: GPLv3
|
|
*
|
|
* */
|
|
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
#include <avr/pgmspace.h>
|
|
#include "memxor.h"
|
|
#include "present_common.h"
|
|
#include "present128.h"
|
|
|
|
static
|
|
void key_update_128(uint8_t* buffer, uint8_t round){
|
|
uint8_t j;
|
|
uint8_t t8;
|
|
union __attribute__((packed)){
|
|
uint8_t v8[2];
|
|
uint16_t v16;
|
|
} tmp;
|
|
/* rotate buffer 67 right */
|
|
for(j=0; j<8; ++j){
|
|
tmp.v8[0] = buffer[j];
|
|
buffer[j] = buffer[j + 8];
|
|
buffer[j + 8] = tmp.v8[0];
|
|
}
|
|
j=0;
|
|
t8 = (uint16_t)buffer[15] << (5);
|
|
do{
|
|
tmp.v8[1] = buffer[j];
|
|
tmp.v16 >>= 3;
|
|
buffer[j] = tmp.v8[1] | t8;
|
|
t8 = tmp.v8[0] & 0xe0;
|
|
}while(++j<16);
|
|
/* rotating done now substitution */
|
|
buffer[0] = present_sbox(buffer[0]);
|
|
/* xor with round counter */
|
|
buffer[8] ^= round << 6;
|
|
buffer[7] ^= round >> 2;
|
|
}
|
|
|
|
|
|
static
|
|
void key_update_128_inv(uint8_t* buffer, uint8_t round){
|
|
uint8_t j;
|
|
uint8_t t8;
|
|
union __attribute__((packed)){
|
|
uint8_t v8[2];
|
|
uint16_t v16;
|
|
} tmp;
|
|
/* xor with round counter */
|
|
buffer[8] ^= round << 6;
|
|
buffer[7] ^= round >> 2;
|
|
|
|
/* rotating done now substitution */
|
|
buffer[0] = present_sbox_inv(buffer[0]);
|
|
|
|
/* rotate buffer 67 left */
|
|
for(j=0; j<8; ++j){
|
|
tmp.v8[0] = buffer[j];
|
|
buffer[j] = buffer[j + 8];
|
|
buffer[j + 8] = tmp.v8[0];
|
|
}
|
|
j=15;
|
|
t8 = (uint16_t)buffer[0] >> (5);
|
|
do{
|
|
tmp.v8[0] = buffer[j];
|
|
tmp.v16 <<= 3;
|
|
buffer[j] = tmp.v8[0] | t8;
|
|
t8 = tmp.v8[1] & 0x07;
|
|
}while(j--);
|
|
}
|
|
|
|
void present128_init(const uint8_t* key, uint8_t keysize_b, present128_ctx_t* ctx){
|
|
uint8_t i;
|
|
memcpy(ctx->fwd_key, key, 16);
|
|
memcpy(ctx->rev_key, key, 16);
|
|
for(i=1; i<32; ++i){
|
|
key_update_128(ctx->rev_key, i);
|
|
}
|
|
}
|
|
|
|
void present128_enc(void* buffer, present128_ctx_t* ctx){
|
|
present_generic_enc(buffer, (uint8_t*)ctx, 16, key_update_128);
|
|
}
|
|
|
|
void present128_dec(void* buffer, present128_ctx_t* ctx){
|
|
present_generic_dec(buffer, (uint8_t*)ctx, 16, key_update_128_inv);
|
|
}
|
|
|
|
/*
|
|
void present128_enc(void* buffer, present128_ctx_t* ctx){
|
|
uint8_t i,j,tmp[8], k[16];
|
|
memcpy(k, ctx->fwd_key, 16);
|
|
memxor(buffer, k, 8);
|
|
for(i=1; i<32; ++i){
|
|
j = 7;
|
|
do{
|
|
tmp[j] = present_sbox(((uint8_t*)buffer)[j]);
|
|
}while(j--);
|
|
present_p(buffer, tmp);
|
|
key_update_128(k, i);
|
|
memxor(buffer, k, 8);
|
|
}
|
|
}
|
|
|
|
void present128_dec(void* buffer, present128_ctx_t* ctx){
|
|
uint8_t j,tmp[8], k[16];
|
|
uint8_t i;
|
|
memcpy(k, ctx->rev_key, 16);
|
|
memxor(buffer, k, 8);
|
|
i = 31;
|
|
do{
|
|
present_p(tmp, buffer);
|
|
present_p(buffer, tmp);
|
|
j = 7;
|
|
do{
|
|
((uint8_t*)buffer)[j] = present_sbox_inv(((uint8_t*)buffer)[j]);
|
|
}while(j--);
|
|
key_update_128_inv(k, i);
|
|
memxor(buffer, k, 8);
|
|
}while(--i);
|
|
}
|
|
*/
|