-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtrivium2.py
142 lines (117 loc) · 4.29 KB
/
trivium2.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
#Nguyễn Trung Kiên_20205090
import binascii
import secrets
from collections import deque
from itertools import repeat
import sys
import argparse
class Trivium:
def __init__(self, key, iv):
self.state = None
self.counter = 0
self.key = key
self.iv = iv
'''
<Key and IV setup>
288-bit Initialize state
(s 1 , s2 , . . . , s93 ) <- (K1, . . . , K80 , 0, . . . , 0)
(s 94, s95 , . . . , s177) <- (IV1 , . . . , IV80 , 0, . . . , 0)
(s 178 , s279 , . . . , s288) <- (0, . . . , 0, 1, 1, 1)
'''
# bit 1 -> 93
init_list = list(map(int, list(self.key)))
init_list += list(repeat(0, 13))
# bit 94 -> 177
init_list += list(map(int, list(self.iv)))
init_list += list(repeat(0, 4))
# bit 178 -> 288
init_list += list(repeat(0, 108))
init_list += list([1, 1, 1])
self.state = deque(init_list)
# Do 4 full cycles, drop output
for i in range(4 * 288):
self._gen_keystream()
def keystream_1(self, number):
keystream = []
for i in range(number):
keystream.append(self._gen_keystream())
return bits_to_hex(keystream)
def _gen_keystream(self):
'''
<Key stream generation>
for i = 1 to N do
t1 <- s66 + s93
t2 <- s162 + s177
t3 <- s243 + s288
zi <- t1 + t2 + t3
t1 <- t1 + s91 · s92 + s171
t2 <- t2 + s175 · s176 + s264
t3 <- t3 + s286 · s287 + s69
(s1 , s2 , . . . , s93 ) <- (t3, s1 , . . . , s92)
(s94 , s95 , . . . , s177 ) <- (t1 , s94, . . . , s176 )
(s178 , s279 , . . . , s288) <- (t2 , s178 , . . . , s287 )
end for
'''
t_1 = self.state[65] ^ self.state[92]
t_2 = self.state[161] ^ self.state[176]
t_3 = self.state[242] ^ self.state[287]
z = t_1 ^ t_2 ^ t_3
t_1 = t_1 ^ self.state[90] & self.state[91] ^ self.state[170]
t_2 = t_2 ^ self.state[174] & self.state[175] ^ self.state[263]
t_3 = t_3 ^ self.state[285] & self.state[286] ^ self.state[68]
self.state.rotate() #1 positive rotation
self.state[0] = t_3
self.state[93] = t_1
self.state[177] = t_2
return z
def encrypt(self, message, keystream):
keystream = _hex_to_bytes(keystream)
buffer = bytearray()
for i in range(len(keystream)):
buffer.append(message[i] ^ keystream[i] & 0xff)
return buffer
def decrypt(self, cipher, keystream):
keystream = _hex_to_bytes(keystream)
buffer = bytearray()
for i in range(len(keystream)):
buffer.append(cipher[i] ^ keystream[i] & 0xff)
return buffer.decode()
def _hex_to_bytes(s):
return [_allbytes[s[i:i+2].upper()] for i in range(0, len(s), 2)]
def bits_to_hex(b):
return "".join(["%02X" % sum([b[i + j] << j for j in range(8)]) for i in range(0, len(b), 8)])
_allbytes = dict([("%02X" % i, i) for i in range(256)])
def get_random_bits(length):
randbits = secrets.randbits(length)
randstring = '{0:080b}'.format(randbits)
return bytearray(map(int ,randstring))
def get_bytes_from_file(filename):
return open(filename, "rb").read()
def encrypt(input, output):
key = get_random_bits(80)
iv = get_random_bits(80)
plain = get_bytes_from_file(input)
print("Plain: ", plain)
trivium = Trivium(key, iv)
keystream = trivium.keystream_1(len(plain) * 8)
print("IV in hex: {}".format(bits_to_hex(iv)))
print("Key in hex: {}".format(bits_to_hex(key)))
print("Keystream in hex: {}".format(keystream))
cipher = trivium.encrypt(plain, keystream)
print("Cipher: {}".format(cipher.hex()))
print(cipher)
with open(output, "wb") as output_file:
# 80 first bits of the output file is iv
output_file.write(iv)
output_file.write(cipher)
def main():
parser = argparse.ArgumentParser(description='Decryption or encryption using Trivium stream cipher.')
parser.add_argument('-k', '--key', action='store', dest='key', type=str, help='An 80 bit key')
parser.add_argument('M', help='Ciphertext file or plaintext file')
parser.add_argument('-o', action='store', dest='out', type=str, help='Output file')
argv = parser.parse_args()
input = argv.M
output = argv.out
encrypt(input, output)
if __name__ == "__main__":
main()