diff --git a/AES/AES.cpp b/AES/AES.cpp new file mode 100644 index 0000000..3e21a26 --- /dev/null +++ b/AES/AES.cpp @@ -0,0 +1,301 @@ +#define AES_API +#include "AES.h" +#include "Galois.h" +#include + +namespace CryptoCPP { namespace Crypto { + AES_API AES::Digest::Digest(const char * message, const size_t size) : message(message), size(size) + { } + AES_API AES::Digest::Digest(const char * message) : message(message), size(strlen(message)) + { } + + AES_API AES::AES(const char * key, KeySize bitsize) : size(bitsize) + { + this->key = expand_key(key, bitsize); + } + + AES_API AES::AES(const AES & copy) : size(copy.size) + { + this->key = new char[size == AES128 ? 16 : size == AES192 ? 24 : 32]; + memcpy(key, copy.key, size == AES128 ? 16 : size == AES192 ? 24 : 32); + } + + AES_API AES::AES(char * key, KeySize size) : size(size) + { + this->key = key; + } + + AES_API AES::Digest * AES::encrypt(Digest d) + { + // Allocate states + size_t state_count = (d.size / 16) + (d.size % 16 == 0 ? 0 : 1); + char * states = new char[state_count * 16]; + + // Set up state properly + memset(states + d.size, 0, (state_count * 16) - d.size); + memcpy(states, d.message, d.size); + + // Encrypt states + for (size_t t = 0; t < state_count; ++t) encrypt(states + (t * 16)); + + return new Digest(states, state_count * 16); + } + + AES_API AES::Digest * AES::decrypt(Digest d) + { + // Allocate states + size_t state_count = d.size / 16; + char * states = new char[state_count * 16]; + + // Set up state properly + memcpy(states, d.message, d.size); + + // Encrypt states + for (size_t t = 0; t < state_count; ++t) decrypt(states + (t * 16)); + + return new Digest(states, d.size); + } + + AES_API AES::Serialized* AES::serialize() + { + AES::Serialized * s = new AES::Serialized(); + s->data_size = size == AES128 ? 16 : size == AES192 ? 24 : 32; + s->data = new char[1 + s->data_size]; + memcpy(s->data + 1, key, s->data_size); + s->data[0] = size == AES128 ? 0 : size == AES192 ? 1 : 2; + return s; + } + + AES_API AES * AES::deserialize(char* data) + { + KeySize size = data[0] == 0 ? AES128 : data[0] == 1 ? AES192 : AES256; + char * key = new char[size == AES128 ? 16 : size == AES192 ? 24 : 32]; + return new AES(key, size); + } + + AES_API AES * AES::deserialize(AES::Serialized* ser) + { + return deserialize(ser->data); + } + + + AES_API void AES::encrypt(char* state) + { + size_t last_round = size == AES128 ? 9 : size == AES192 ? 11 : 13; + + // Initial round. Just just xor the key for this round input the input + add_round_key(state, key); + + // Rounds 1 - last + for (size_t rounds = 1; rounds < 10; ++rounds) + { + sub_bytes(state); + shift_rows(state); + if (rounds != last_round) mix_columns(state); + add_round_key(state, key + (rounds * 16)); + } + } + + AES_API void AES::decrypt(char* state) + { + size_t last_round = size == AES128 ? 9 : size == AES192 ? 11 : 13; + + for (int rounds = last_round; rounds > 0; --rounds) + { + inv_add_round_key(state, key + (rounds * 16)); + if (rounds != last_round) inv_mix_columns(state); + inv_shift_rows(state); + inv_sub_bytes(state); + } + + inv_add_round_key(state, key); + } + + // Key expansion + AES_API unsigned int AES::key_schedule_core(unsigned int input, size_t rcon_iteration) + { + char * convert = (char*)&input; + for (size_t t = 0; t < 4; ++t) + convert[t] = sbox(convert[t]); + convert[3] ^= rcon(rcon_iteration); + return input; + } + + AES_API char* AES::expand_key(const char* key, KeySize size) + { + size_t n = size == AES128 ? 16 : size == AES192 ? 24 : 32; + size_t b = size == AES128 ? 176 : size == AES192 ? 208 : 240; + + char* output = new char[b]; + //memset(output + n, 0, b - n); + memcpy(output, key, n); + + size_t rcon_iter = 1; + + size_t accruedBytes = n; + while (accruedBytes < b) + { + // Generate 4 new bytes of extended key + unsigned int _t = key_schedule_core(*(unsigned int *)(output + accruedBytes - 4), rcon_iter); + char * t = (char*)&_t; + ++rcon_iter; + for (size_t i = 0; i < 4; ++i) t[i] ^= output[accruedBytes - n + i]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + + // Generate 12 new bytes of extended key + for (int i = 0; i < 3; ++i) + { + memcpy(t, output + accruedBytes - 4, 4); + for (size_t j = 0; j < 4; ++j) t[j] ^= output[accruedBytes - n + j]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + + // Special processing for 256-bit key schedule + if (size == AES256) + { + memcpy(t, output + accruedBytes - 4, 4); + for (size_t j = 0; j < 4; ++j) t[j] = (sbox(t[j]) ^ output[accruedBytes - n + j]); + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + // Special processing for 192-bit key schedule + if (size != AES128) + for (int i = size == AES192 ? 1 : 2; i >= 0; --i) + { + memcpy(t, output + accruedBytes - 4, 4); + for (int j = 0; j < 4; ++j) t[j] ^= output[accruedBytes - n + j]; + memcpy(output + accruedBytes, t, 4); + accruedBytes += 4; + } + } + + return output; + } + + AES_API char AES::rcon(unsigned int iteration) + { + return iteration == 0 ? 0x8d : Math::Galois(2, 283, iteration).get_lowest() & 255; + } + + AES_API char AES::sbox(char c) + { + Math::Galois * inv = Math::Galois(2, 283, c).inv(); + c = affine(inv->get_lowest() & 255); + delete inv; + return c; + } + + // Encryption functions + AES_API void AES::add_round_key(char* state, char* roundKey) + { + for (size_t t = 0; t < 16; ++t) state[t] ^= roundKey[t]; + } + + AES_API void AES::mix_columns(char* state) + { + for (int i = 0; i < 4; ++i) + for (int j = 0; j < 4; ++j) + for (int k = 0; k < 4; ++k) + { + Math::Galois g = Math::Galois(2, 283, state[k + i * 4]); + Math::Galois mix = Math::Galois(2, 283, mix_matrix[(k + 4 - j) % 4]); + Math::Galois * result = g.mul(&mix); + state[j + i * 4] ^= result->get_lowest() & 255; + delete result; + } + } + + AES_API void AES::shift_rows(char* state) + { + for (size_t i = 1; i < 4; ++i) + { + unsigned int value = get_row(state, i); + for (size_t j = 0; j < i; ++j) value = rotate(value); + write_to_row(value, state, i); + } + } + + AES_API void AES::sub_bytes(char* state) + { + for (size_t t = 0; t < 16; ++t) + state[t] = sbox(state[t]); + } + + AES_API char AES::affine(char value) + { + return (value ^ rot(value, 1) ^ rot(value, 2) ^ rot(value, 3) ^ rot(value, 4) ^ 0b01100011); + } + + + // Inverse encryption functions + AES_API void AES::inv_add_round_key(char* state, char* roundKey) + { + add_round_key(state, roundKey); + } + + AES_API void AES::inv_mix_columns(char* state) + { + for (int i = 0; i < 4; ++i) + for (int j = 0; j < 4; ++j) + for (int k = 0; k < 4; ++k) + { + Math::Galois g = Math::Galois(2, 283, state[k + i * 4]); + Math::Galois mix = Math::Galois(2, 283, unmix_matrix[(k + 4 - j) % 4]); + Math::Galois * result = g.mul(&mix); + state[j + i * 4] ^= result->get_lowest() & 255; + delete result; + } + } + + AES_API void AES::inv_shift_rows(char* state) + { + for (size_t i = 1; i < 4; ++i) + { + unsigned int value = get_row(state, i); + for (size_t j = 3; j >= i; --j) value = rotate(value); + write_to_row(value, state, i); + } + } + + AES_API void AES::inv_sub_bytes(char* state) + { + for (size_t t = 0; t < 16; ++t) + { + Math::Galois * inv = Math::Galois(2, 283, inv_affine(state[t])).inv(); + state[t] = inv->get_lowest() & 255; + delete inv; + } + } + + AES_API char AES::inv_affine(char value) + { + return rot(value, 1) ^ rot(value, 3) ^ rot(value, 6) ^ 0b00000101; + } + + + // Helper functions + AES_API void AES::write_to_row(unsigned int value, char* to, size_t row) + { + to[row] = value & 255; + to[row + 4] = (value >> 8) & 255; + to[row + 8] = (value >> 16) & 255; + to[row + 12] = (value >> 24) & 255; + } + + AES_API unsigned int AES::rotate(unsigned int i) + { + return (i >> 24) | (i << 8); + } + + AES_API unsigned int AES::get_row(char* from, size_t row) + { + return (from[row] | (from[row + 4] << 8) | (from[row + 8] << 16) | (from[row + 12] << 24)); + } + + AES_API char AES::rot(char value, size_t by) + { + return (value << by) | (value >> (8 - by)); + } +}} \ No newline at end of file diff --git a/AES/AES.h b/AES/AES.h new file mode 100644 index 0000000..fa1d5bb --- /dev/null +++ b/AES/AES.h @@ -0,0 +1,85 @@ +#pragma once + +#if defined(__MINGW32__) || defined(_WIN32) + +#if defined(AES_API) +#undef AES_API +#define AES_API __declspec(dllexport) +#else +#define AES_API __declspec(dllimport) +#endif + +#endif + +#ifndef AES_API +#if __GNUC__ >= 4 +#define AES_API __attribute__ ((visibility ("default"))) +#else +#define AES_API +#endif +#endif + + +namespace CryptoCPP { namespace Crypto { + + // MixColumns matrix basis + static const char mix_matrix[4] = { 2, 3, 1, 1 }; + static const char unmix_matrix[4] = { 14, 11, 13, 9 }; + + class AES { + public: + struct Digest { + AES_API Digest(const char * message, const size_t size); + AES_API Digest(const char * message); + const char* message; + const size_t size; + }; + enum KeySize{ AES128, AES192, AES256 }; + + AES_API AES(const char * key, KeySize bitsize = AES128); + AES_API AES(const AES & copy); + + AES_API Digest * encrypt(Digest d); + AES_API Digest * decrypt(Digest d); + + // Serialization + struct Serialized { + char* data; + size_t data_size; + }; + AES_API Serialized* serialize(); + AES_API static AES * deserialize(char* data); + AES_API static AES * deserialize(Serialized* ser); + + protected: + char* key; + const KeySize size; + + AES_API AES(char * key, KeySize size); + + AES_API void encrypt(char* state); + AES_API void decrypt(char* state); + + AES_API static unsigned int key_schedule_core(unsigned int input, size_t rcon_iteration); + AES_API static char* expand_key(const char* key, KeySize size); + AES_API static char rcon(unsigned int iteration); + AES_API static char sbox(char c); + + AES_API static void add_round_key(char* state, char* roundKey); + AES_API static void mix_columns(char* state); + AES_API static void shift_rows(char* state); + AES_API static void sub_bytes(char* state); + AES_API static char affine(char value); + + AES_API static void inv_add_round_key(char* state, char* roundKey); + AES_API static void inv_mix_columns(char* state); + AES_API static void inv_shift_rows(char* state); + AES_API static void inv_sub_bytes(char* state); + AES_API static char inv_affine(char value); + + AES_API static void write_to_row(unsigned int value, char* to, size_t row); + AES_API static unsigned int rotate(unsigned int i); + AES_API static unsigned int get_row(char* from, size_t row); + AES_API static char rot(char value, size_t by); + }; +}} \ No newline at end of file diff --git a/AES/AES.vcxproj b/AES/AES.vcxproj index 3f9fe5e..58a6987 100644 --- a/AES/AES.vcxproj +++ b/AES/AES.vcxproj @@ -69,13 +69,17 @@ - + + $(SolutionDir)XMath;$(IncludePath) + $(SolutionDir)Debug;$(LibraryPath) + Level3 Disabled true true + $(SolutionDir)XMath;%(AdditionalIncludeDirectories) @@ -115,6 +119,15 @@ + + + + + {5f9ad03f-b1f0-4db3-b39a-49b66895774c} + + + + diff --git a/AES/AES.vcxproj.filters b/AES/AES.vcxproj.filters index 6a1782f..0571ee6 100644 --- a/AES/AES.vcxproj.filters +++ b/AES/AES.vcxproj.filters @@ -14,4 +14,14 @@ rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms + + + Header Files + + + + + Source Files + + \ No newline at end of file diff --git a/Crypto/Crypto.vcxproj b/Crypto/Crypto.vcxproj index 42e9a96..4d8661c 100644 --- a/Crypto/Crypto.vcxproj +++ b/Crypto/Crypto.vcxproj @@ -77,7 +77,7 @@ Disabled true true - C:\Users\Lenovo\source\repos\Crypto\XMath;%(AdditionalIncludeDirectories) + $(SolutionDir)AES;$(SolutionDir)XMath;%(AdditionalIncludeDirectories) @@ -120,6 +120,9 @@ + + {e1176bbf-344b-4041-ab24-a7109e969339} + {5f9ad03f-b1f0-4db3-b39a-49b66895774c} diff --git a/Crypto/Start.cpp b/Crypto/Start.cpp index c7a8376..4299028 100644 --- a/Crypto/Start.cpp +++ b/Crypto/Start.cpp @@ -2,6 +2,7 @@ #include "BigInteger.h" #include "Matrix.h" #include "Galois.h" +#include "AES.h" using namespace CryptoCPP::Math; diff --git a/XMath/Galois.cpp b/XMath/Galois.cpp index 880290a..ce8e191 100644 --- a/XMath/Galois.cpp +++ b/XMath/Galois.cpp @@ -248,6 +248,20 @@ namespace CryptoCPP{ return new Galois(characteristic, (BLOCK*)do_copy(irreducible, irreducible_size * sizeof(BLOCK)), irreducible_size, result, result_size); } + + GALOIS_API BLOCK * Galois::to_array(size_t * size) + { + BLOCK * b = new BLOCK[data_size]; + memcpy(b, data, data_size); + if(size!=0) *size = data_size; + return b; + } + + GALOIS_API BLOCK Galois::get_lowest() + { + return data_size == 0 ? 0 : data[0]; + } + // These internal functions assume that an adequate state size has been chose GALOIS_API void Galois::iadd(BLOCK * data, size_t data_size, size_t bin_size, BLOCK * state, size_t state_size, BLOCK characteristic) { diff --git a/XMath/Galois.h b/XMath/Galois.h index 6db5968..60cd94a 100644 --- a/XMath/Galois.h +++ b/XMath/Galois.h @@ -53,6 +53,10 @@ namespace CryptoCPP { // Inverse multiplication GALOIS_API Galois * inv() const; + // Get internal value + GALOIS_API BLOCK * to_array(size_t * size = 0); + GALOIS_API BLOCK get_lowest(); + protected: static const BLOCK high_bit = 1 << ((sizeof(BLOCK) * 8) - 1); // GF parameters & value