CryptoAES.Mod 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341
  1. MODULE CryptoAES; (** AES (Rijndael) de/encryption *)
  2. (* 2002.07.22 g.f. *)
  3. IMPORT S := SYSTEM, Ciphers := CryptoCiphers, U := CryptoUtils;
  4. CONST
  5. MaxRounds = 14;
  6. ECB = Ciphers.ECB; CBC = Ciphers.CBC; CTR = Ciphers.CTR;
  7. b0 = S.VAL( SET32, 0000000FFH ); b1 = S.VAL( SET32, 00000FF00H );
  8. b2 = S.VAL( SET32, 000FF0000H ); b3 = S.VAL( SET32, 0FF000000H );
  9. TYPE
  10. RTable = ARRAY 256 OF SET32;
  11. RKeys = ARRAY 4*(MaxRounds + 1) OF SET32;
  12. VAR
  13. e0, e1, e2, e3, e4: RTable;
  14. d0, d1, d2, d3, d4: RTable;
  15. rcon: ARRAY 10 OF SET32; (* for 128-bit blocks, Rijndael never uses more than 10 rcon values *)
  16. TYPE
  17. Cipher* = OBJECT (Ciphers.Cipher)
  18. TYPE
  19. Block = ARRAY 4 OF SET32;
  20. Ind4 = RECORD a, b, c, d: LONGINT END;
  21. VAR
  22. rounds: SHORTINT;
  23. key, dkey: RKeys;
  24. iv: Block;
  25. PROCEDURE InitKey*( CONST src: ARRAY OF CHAR; keybits: LONGINT );
  26. BEGIN
  27. InitKey^( src, keybits );
  28. IF keybits = 128 THEN rounds := Init128( src )
  29. ELSIF keybits = 192 THEN rounds := Init192( src )
  30. ELSE rounds := Init256( src )
  31. END;
  32. InvertKeys
  33. END InitKey;
  34. PROCEDURE SetIV*( CONST src: ARRAY OF CHAR; mode: SHORTINT );
  35. BEGIN
  36. SetIV^( src, mode ); (* set mode *)
  37. U.BufferToBlockBE( src, 0, iv );
  38. END SetIV;
  39. PROCEDURE IncIV;
  40. VAR i, x: LONGINT;
  41. BEGIN
  42. i := 4;
  43. REPEAT
  44. DEC( i );
  45. x := S.VAL( LONGINT, iv[i] ) + 1; iv[i] := S.VAL( SET32, x )
  46. UNTIL (x # 0) OR (i = 0)
  47. END IncIV;
  48. PROCEDURE Encrypt*( VAR buf: ARRAY OF CHAR; ofs, len: LONGINT );
  49. VAR i, j: LONGINT; x, y: Block;
  50. BEGIN
  51. ASSERT( isKeyInitialized );
  52. ASSERT( len MOD blockSize = 0 ); (* padding must have been added *)
  53. i := 0;
  54. WHILE i < len DO
  55. U.BufferToBlockBE( buf, ofs + i, x );
  56. CASE mode OF
  57. | ECB:
  58. FOR j := 0 TO 3 DO x[j] := x[j] / key[j] END;
  59. RoundE( x );
  60. | CBC:
  61. FOR j := 0 TO 3 DO x[j] := x[j] / key[j] / iv[j] END;
  62. RoundE( x );
  63. iv := x;
  64. | CTR:
  65. FOR j := 0 TO 3 DO y[j] := iv[j] / key[j] END;
  66. RoundE( y );
  67. FOR j := 0 TO 3 DO x[j] := x[j] / y[j] END;
  68. IncIV
  69. END;
  70. U.BlockToBufferBE( x, buf, ofs + i );
  71. INC( i, blockSize )
  72. END
  73. END Encrypt;
  74. PROCEDURE Decrypt*( VAR buf: ARRAY OF CHAR; ofs, len: LONGINT );
  75. VAR x0, x, y: Block; i, j: LONGINT;
  76. BEGIN
  77. ASSERT( isKeyInitialized );
  78. ASSERT( len MOD blockSize = 0 ); (* padding must have been added *)
  79. i := 0;
  80. WHILE i < len DO
  81. U.BufferToBlockBE( buf, ofs + i, x0 );
  82. CASE mode OF
  83. | ECB:
  84. FOR j := 0 TO 3 DO x[j] := x0[j] / dkey[j] END;
  85. RoundD( x );
  86. | CBC:
  87. FOR j := 0 TO 3 DO x[j] := x0[j] / dkey[j] END;
  88. RoundD( x );
  89. FOR j := 0 TO 3 DO x[j] := x[j] / iv[j] END;
  90. iv := x0;
  91. | CTR:
  92. FOR j := 0 TO 3 DO y[j] := iv[j] / key[j] END;
  93. RoundE( y );
  94. FOR j := 0 TO 3 DO x[j] := x0[j] / y[j] END;
  95. IncIV
  96. END;
  97. U.BlockToBufferBE( x, buf, ofs + i );
  98. INC( i, blockSize )
  99. END
  100. END Decrypt;
  101. PROCEDURE RoundE( VAR b: Block );
  102. VAR p, r: LONGINT; t0, t1, t2, t3, s0, s1, s2, s3: Ind4;
  103. BEGIN
  104. split( b[0], s0 ); split( b[1], s1 ); split( b[2], s2 ); split( b[3], s3 );
  105. r := rounds DIV 2; p := 0;
  106. LOOP
  107. split( e0[s0.d]/e1[s1.c]/e2[s2.b]/e3[s3.a]/key[p + 4], t0 );
  108. split( e0[s1.d]/e1[s2.c]/e2[s3.b]/e3[s0.a]/key[p + 5], t1 );
  109. split( e0[s2.d]/e1[s3.c]/e2[s0.b]/e3[s1.a]/key[p + 6], t2 );
  110. split( e0[s3.d]/e1[s0.c]/e2[s1.b]/e3[s2.a]/key[p + 7], t3 );
  111. INC( p, 8 ); DEC( r );
  112. IF r = 0 THEN EXIT END;
  113. split( e0[t0.d]/e1[t1.c]/e2[t2.b]/e3[t3.a]/key[p + 0], s0 );
  114. split( e0[t1.d]/e1[t2.c]/e2[t3.b]/e3[t0.a]/key[p + 1], s1 );
  115. split( e0[t2.d]/e1[t3.c]/e2[t0.b]/e3[t1.a]/key[p + 2], s2 );
  116. split( e0[t3.d]/e1[t0.c]/e2[t1.b]/e3[t2.a]/key[p + 3], s3 );
  117. END;
  118. b[0] := (e4[t0.d]*b3)/(e4[t1.c]*b2)/(e4[t2.b]*b1)/(e4[t3.a]*b0)/key[p + 0];
  119. b[1] := (e4[t1.d]*b3)/(e4[t2.c]*b2)/(e4[t3.b]*b1)/(e4[t0.a]*b0)/key[p + 1];
  120. b[2] := (e4[t2.d]*b3)/(e4[t3.c]*b2)/(e4[t0.b]*b1)/(e4[t1.a]*b0)/key[p + 2];
  121. b[3] := (e4[t3.d]*b3)/(e4[t0.c]*b2)/(e4[t1.b]*b1)/(e4[t2.a]*b0)/key[p + 3];
  122. END RoundE;
  123. PROCEDURE RoundD( VAR b: Block );
  124. VAR p, r: LONGINT; t0, t1, t2, t3, s0, s1, s2, s3: Ind4;
  125. BEGIN
  126. split( b[0], s0 ); split( b[1], s1 ); split( b[2], s2 ); split( b[3], s3 );
  127. r := rounds DIV 2; p := 0;
  128. LOOP
  129. split( d0[s0.d]/d1[s3.c]/d2[s2.b]/d3[s1.a]/dkey[p + 4], t0 );
  130. split( d0[s1.d]/d1[s0.c]/d2[s3.b]/d3[s2.a]/dkey[p + 5], t1 );
  131. split( d0[s2.d]/d1[s1.c]/d2[s0.b]/d3[s3.a]/dkey[p + 6], t2 );
  132. split( d0[s3.d]/d1[s2.c]/d2[s1.b]/d3[s0.a]/dkey[p + 7], t3 );
  133. INC( p, 8 ); DEC( r );
  134. IF r = 0 THEN EXIT END;
  135. split( d0[t0.d]/d1[t3.c]/d2[t2.b]/d3[t1.a]/dkey[p + 0], s0 );
  136. split( d0[t1.d]/d1[t0.c]/d2[t3.b]/d3[t2.a]/dkey[p + 1], s1 );
  137. split( d0[t2.d]/d1[t1.c]/d2[t0.b]/d3[t3.a]/dkey[p + 2], s2 );
  138. split( d0[t3.d]/d1[t2.c]/d2[t1.b]/d3[t0.a]/dkey[p + 3], s3 );
  139. END;
  140. b[0] := (d4[t0.d]*b3)/(d4[t3.c]*b2)/(d4[t2.b]*b1)/(d4[t1.a]*b0)/dkey[p + 0];
  141. b[1] := (d4[t1.d]*b3)/(d4[t0.c]*b2)/(d4[t3.b]*b1)/(d4[t2.a]*b0)/dkey[p + 1];
  142. b[2] := (d4[t2.d]*b3)/(d4[t1.c]*b2)/(d4[t0.b]*b1)/(d4[t3.a]*b0)/dkey[p + 2];
  143. b[3] := (d4[t3.d]*b3)/(d4[t2.c]*b2)/(d4[t1.b]*b1)/(d4[t0.a]*b0)/dkey[p + 3];
  144. END RoundD;
  145. PROCEDURE -split( s: SET32; VAR b: Ind4 ); (* split set into 4 indexes *)
  146. BEGIN
  147. b.a := S.VAL( LONGINT, s ) MOD 100H;
  148. b.b := S.VAL( LONGINT, s ) DIV 100H MOD 100H;
  149. b.c := S.VAL( LONGINT, s ) DIV 10000H MOD 100H;
  150. b.d := S.VAL( LONGINT, s ) DIV 1000000H MOD 100H;
  151. END split;
  152. PROCEDURE Init128( CONST src: ARRAY OF CHAR ): SHORTINT;
  153. VAR i, p: LONGINT; ib: Ind4;
  154. BEGIN
  155. FOR i := 0 TO 3 DO key[i] := U.SetFromBufferBE( src, 4*i ) END;
  156. p := 0; i := 0;
  157. LOOP
  158. split( key[p + 3], ib );
  159. key[p + 4] := key[p] / (e4[ib.c]*b3) / (e4[ib.b]*b2) / (e4[ib.a]*b1) / (e4[ib.d]*b0) / rcon[i];
  160. key[p + 5] := key[p + 1] / key[p + 4];
  161. key[p + 6] := key[p + 2] / key[p + 5];
  162. key[p + 7] := key[p + 3] / key[p + 6];
  163. INC( i );
  164. IF i = 10 THEN EXIT END;
  165. INC( p, 4 );
  166. END;
  167. RETURN 10
  168. END Init128;
  169. PROCEDURE Init192( CONST src: ARRAY OF CHAR ): SHORTINT;
  170. VAR i, p: LONGINT; ib: Ind4;
  171. BEGIN
  172. FOR i := 0 TO 5 DO key[i] := U.SetFromBufferBE( src, 4*i ) END;
  173. p := 0; i := 0;
  174. LOOP
  175. split( key[p + 5], ib );
  176. key[p + 6] := key[p] / (e4[ib.c]*b3) / (e4[ib.b]*b2) / (e4[ib.a]*b1) / (e4[ib.d]*b0) / rcon[i];
  177. key[p + 7] := key[p + 1] / key[p + 6];
  178. key[p + 8] := key[p + 2] / key[p + 7];
  179. key[p + 9] := key[p + 3] / key[p + 8];
  180. INC( i );
  181. IF i = 8 THEN EXIT END;
  182. key[p + 10] := key[p + 4] / key[p + 9];
  183. key[p + 11] := key[p + 5] / key[p + 10];
  184. INC( p, 6 );
  185. END;
  186. RETURN 12
  187. END Init192;
  188. PROCEDURE Init256( CONST src: ARRAY OF CHAR ): SHORTINT;
  189. VAR i, p: LONGINT; ib: Ind4;
  190. BEGIN
  191. FOR i := 0 TO 7 DO key[i] := U.SetFromBufferBE( src, 4*i ) END;
  192. p := 0; i := 0;
  193. LOOP
  194. split( key[p + 7], ib );
  195. key[p + 8] := key[p] / (e4[ib.c]*b3) / (e4[ib.b]*b2) / (e4[ib.a]*b1) / (e4[ib.d]*b0) / rcon[i];
  196. key[p + 9] := key[p + 1] / key[p + 8];
  197. key[p + 10] := key[p + 2] / key[p + 9];
  198. key[p + 11] := key[p + 3] / key[p + 10];
  199. INC( i );
  200. IF i = 7 THEN EXIT END;
  201. split( key[p + 11], ib );
  202. key[p + 12] := key[p + 4] / (e4[ib.d]*b3) / (e4[ib.c]*b2) / (e4[ib.b]*b1) / (e4[ib.a]*b0);
  203. key[p + 13] := key[p + 5] / key[p + 12];
  204. key[p + 14] := key[p + 6] / key[p + 13];
  205. key[p + 15] := key[p + 7] / key[p + 14];
  206. INC( p, 8 );
  207. END;
  208. RETURN 14
  209. END Init256;
  210. PROCEDURE InvertKeys;
  211. VAR i, j, k, p: LONGINT; t: SET32; ib: Ind4;
  212. PROCEDURE ind( s: SET32 ): LONGINT; (* extract index byte 0 *)
  213. BEGIN
  214. RETURN S.VAL( LONGINT, s ) MOD 100H
  215. END ind;
  216. BEGIN
  217. dkey := key;
  218. (* invert the order of the round keys: *)
  219. i := 0; j := 4*rounds;
  220. WHILE i < j DO
  221. FOR k := 0 TO 3 DO t := dkey[i + k]; dkey[i + k] := dkey[j + k]; dkey[j + k] := t END;
  222. INC( i, 4 ); DEC( j, 4 );
  223. END;
  224. (* apply the inverse MixColumn transform to all round keys but the first and the last: *)
  225. FOR i := 1 TO rounds - 1 DO
  226. p := 4*i;
  227. split( dkey[p + 0], ib );
  228. dkey[p + 0] := d0[ind( e4[ib.d] )] / d1[ind( e4[ib.c] )] / d2[ind( e4[ib.b] )] / d3[ind( e4[ib.a] )];
  229. split( dkey[p + 1], ib );
  230. dkey[p + 1] := d0[ind( e4[ib.d] )] / d1[ind( e4[ib.c] )] / d2[ind( e4[ib.b] )] / d3[ind( e4[ib.a] )];
  231. split( dkey[p + 2], ib );
  232. dkey[p + 2] := d0[ind( e4[ib.d] )] / d1[ind( e4[ib.c] )] / d2[ind( e4[ib.b] )] / d3[ind( e4[ib.a] )];
  233. split( dkey[p + 3], ib );
  234. dkey[p + 3] := d0[ind( e4[ib.d] )] / d1[ind( e4[ib.c] )] / d2[ind( e4[ib.b] )] / d3[ind( e4[ib.a] )];
  235. END;
  236. END InvertKeys;
  237. PROCEDURE & Init*;
  238. BEGIN
  239. SetNameAndBlocksize( "aes", 16 )
  240. END Init;
  241. END Cipher;
  242. PROCEDURE NewCipher*(): Ciphers.Cipher;
  243. VAR cipher: Cipher;
  244. BEGIN
  245. NEW( cipher ); RETURN cipher
  246. END NewCipher;
  247. (*-------------------------------------------------------------------------------*)
  248. PROCEDURE Initialize;
  249. VAR
  250. i1, i2, i4, i8, i9, ib, id, ie, v1, v2, v3, t: LONGINT;
  251. buf: U.InitBuffer;
  252. PROCEDURE xor( a, b: LONGINT ): LONGINT;
  253. BEGIN
  254. RETURN S.VAL( LONGINT, S.VAL( SET32, a ) / S.VAL( SET32, b ) )
  255. END xor;
  256. PROCEDURE f1( x: LONGINT ): LONGINT;
  257. VAR y: LONGINT;
  258. BEGIN
  259. y := 2*x;
  260. IF y < 256 THEN RETURN y ELSE RETURN xor( y, 11BH ) END
  261. END f1;
  262. BEGIN
  263. NEW( buf, 2048 );
  264. buf.Add( " 63 7C 77 7B F2 6B 6F C5 30 01 67 2B FE D7 AB 76 " );
  265. buf.Add( " CA 82 C9 7D FA 59 47 F0 AD D4 A2 AF 9C A4 72 C0 " );
  266. buf.Add( " B7 FD 93 26 36 3F F7 CC 34 A5 E5 F1 71 D8 31 15 " );
  267. buf.Add( " 04 C7 23 C3 18 96 05 9A 07 12 80 E2 EB 27 B2 75 " );
  268. buf.Add( " 09 83 2C 1A 1B 6E 5A A0 52 3B D6 B3 29 E3 2F 84 " );
  269. buf.Add( " 53 D1 00 ED 20 FC B1 5B 6A CB BE 39 4A 4C 58 CF " );
  270. buf.Add( " D0 EF AA FB 43 4D 33 85 45 F9 02 7F 50 3C 9F A8 " );
  271. buf.Add( " 51 A3 40 8F 92 9D 38 F5 BC B6 DA 21 10 FF F3 D2 " );
  272. buf.Add( " CD 0C 13 EC 5F 97 44 17 C4 A7 7E 3D 64 5D 19 73 " );
  273. buf.Add( " 60 81 4F DC 22 2A 90 88 46 EE B8 14 DE 5E 0B DB " );
  274. buf.Add( " E0 32 3A 0A 49 06 24 5C C2 D3 AC 62 91 95 E4 79 " );
  275. buf.Add( " E7 C8 37 6D 8D D5 4E A9 6C 56 F4 EA 65 7A AE 08 " );
  276. buf.Add( " BA 78 25 2E 1C A6 B4 C6 E8 DD 74 1F 4B BD 8B 8A " );
  277. buf.Add( " 70 3E B5 66 48 03 F6 0E 61 35 57 B9 86 C1 1D 9E " );
  278. buf.Add( " E1 F8 98 11 69 D9 8E 94 9B 1E 87 E9 CE 55 28 DF " );
  279. buf.Add( " 8C A1 89 0D BF E6 42 68 41 99 2D 0F B0 54 BB 16 " );
  280. FOR i1 := 0 TO 255 DO
  281. v1 := buf.GetInt(); v2 := f1( v1 ); v3 := xor( v2, v1 );
  282. i2 := f1( i1 ); i4 := f1( i2 ); i8 := f1( i4 ); i9 := xor( i8, i1 );
  283. ib := xor( i9, i2 ); id := xor( i9, i4 ); ie := xor( i8, xor( i4, i2 ) );
  284. e0[i1] := S.VAL( SET32, ((v2*100H + v1)*100H + v1)*100H + v3 );
  285. e1[i1] := S.VAL( SET32, ((v3*100H + v2)*100H + v1)*100H + v1 );
  286. e2[i1] := S.VAL( SET32, ((v1*100H + v3)*100H + v2)*100H + v1 );
  287. e3[i1] := S.VAL( SET32, ((v1*100H + v1)*100H + v3)*100H + v2 );
  288. e4[i1] := S.VAL( SET32, ((v1*100H + v1)*100H + v1)*100H + v1 );
  289. d0[v1] := S.VAL( SET32, ((ie*100H + i9)*100H + id)*100H + ib );
  290. d1[v1] := S.VAL( SET32, ((ib*100H + ie)*100H + i9)*100H + id );
  291. d2[v1] := S.VAL( SET32, ((id*100H + ib)*100H + ie)*100H + i9 );
  292. d3[v1] := S.VAL( SET32, ((i9*100H + id)*100H + ib)*100H + ie );
  293. d4[v1] := S.VAL( SET32, ((i1*100H + i1)*100H + i1)*100H + i1 );
  294. END;
  295. t := 1;
  296. FOR i1 := 0 TO 9 DO
  297. rcon[i1] := S.VAL( SET32, ASH( t, 24 ) );
  298. t := f1( t );
  299. END;
  300. END Initialize;
  301. BEGIN
  302. Initialize;
  303. END CryptoAES.