Gabriel Tofvesson 22df2e7fcb Ran tests (everything worked)
Renamed a variable
Implemented a custom AES function as "Rijndael128"
  - Built in key derivation at the moment (PBKDF2-HMAC-SHA1)
  - Added built-in string encryption/decryption
  - All encryption functions compute the results using the underlying mathematical models instead of using tables, simply to demonstrate the inner workings of AES
Simplified some methods for readability and convenience
Removed unnecessary use of BigInteger
Replaced manually (and terribly) calculated Galois field arithmetic with Galois2 methods to make the code simpler and more understandable
2018-02-21 22:40:17 +01:00

61 lines
2.0 KiB
C#

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
namespace Tofvesson.Crypto
{
// Class for key derivation
public static class KDF
{
public delegate byte[] HashFunction(byte[] message);
public static byte[] HMAC(byte[] key, byte[] message, HashFunction func, int blockSizeBytes)
{
if (key.Length > blockSizeBytes) key = func(key);
else if (key.Length < blockSizeBytes)
{
byte[] b = new byte[blockSizeBytes];
Array.Copy(key, b, key.Length);
key = b;
}
byte[] o_key_pad = new byte[blockSizeBytes];
byte[] i_key_pad = new byte[blockSizeBytes];
for (int i = 0; i < blockSizeBytes; ++i)
{
o_key_pad[i] = (byte)(key[i] ^ 0x5c);
i_key_pad[i] = (byte)(key[i] ^ 0x36);
}
return func(Support.Concatenate(o_key_pad, func(Support.Concatenate(i_key_pad, message))));
}
public static byte[] HMAC_SHA1(byte[] key, byte[] message) => HMAC(key, message, SHA.SHA1, 64);
public delegate byte[] PRF(byte[] key, byte[] salt);
public static byte[] PBKDF2(PRF function, byte[] password, byte[] salt, int iterations, int dklen)
{
byte[] dk = new byte[0];
uint iter = 1;
while (dk.Length < dklen)
{
// F-function
byte[] u = function(password, Support.Concatenate(salt, Support.WriteToArray(new byte[4], Support.SwapEndian(iter), 0)));
byte[] ures = new byte[u.Length];
Array.Copy(u, ures, u.Length);
for(int i = 1; i<iterations; ++i)
{
u = function(password, u);
for (int j = 0; j < u.Length; ++j) ures[j] ^= u[j];
}
dk = Support.Concatenate(dk, ures);
++iter;
}
return dk.ToLength(dklen);
}
}
}