/* Regarding lincense information of any cipher algorithm used in the tests please refer to: RC4 Ron Rivest (RSA Security) MD5 Ron Rivest (RSA Security) RC4PP Shevek at https://crypto.anarres.info/2016/rc4_pencilandpaper zx8 Karl-Uwe Frank at http://www.freecx.co.uk/crypto/zx8/ SBox8 Karl-Uwe Frank at http://www.freecx.co.uk/crypto/SBox8/ ---------------------------------------------------------------------------- The test routine made by Karl-Uwe Frank and licensed as: This is free and unencumbered software released into the public domain. Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means. In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. For more information, please refer to */ #include #include #include #include // needed to generate uint32 on a 64bit OS #include #include "md5/md5.h" #include "md5/md5.c" #define swap(X,Y) { uint8_t T = X; X = Y; Y = T; } // rm -f ./keystream_byte_positions; gcc -std=c99 -O3 -fomit-frame-pointer -mtune=native keystream_byte_positions.c -o keystream_byte_positions // for i in {aaa,bbb,ccc,ddd}; do nice -n 19 ./keystream_byte_positions 128 256 $((8**8)) $i rc4; done // for i in {64,128,256}; do nice -n 19 ./keystream_byte_positions $i 256 $((8**8)) abc rc4; done void MD5hash(unsigned char *data, unsigned int dataLen, unsigned char *digest) { MD5_CTX c; MD5Init(&c); MD5Update(&c, data, dataLen); MD5Final(digest, &c); } static uint8_t a, b, c, d, j, k, t; static uint8_t SBox[256]; static uint8_t z[256], x[256]; void rc4_KSA(uint8_t key[], uint8_t keyLen); void rc4x_KSA(uint8_t key[], uint8_t keyLen); uint8_t rc4_PRGA(); uint8_t rc4_PP(); void SBox8_INIT(); void SBox8_KSA(uint8_t key[], uint8_t keyLen); uint8_t SBox8_PRGA(); uint8_t SBox8a2_PRGA(); void zx8_KSA(uint8_t key[], uint8_t keyLen); uint8_t zx8_PRGA(); //############################################################# //----------------------------------------- // KSA = Key Schedule Algorithm // void rc4_KSA(uint8_t key[], uint8_t keyLen) { uint8_t j = k = 0; for (int i=0; i<256; i++) { SBox[i] = i; } for (int i=0; i<256; i++) { k = (i % keyLen); j = (j + SBox[i] + key[k]); swap(SBox[i], SBox[j]); } a=0; b=0; } //----------------------------------------- // KSA = Key Schedule Algorithm // void rc4x_KSA(uint8_t key[], uint8_t keyLen) { uint8_t j = k = 0; for (int i=0; i<256; i++) { SBox[i] = i; } for (int i=0; i<256; i++) { k = (i % keyLen); for (int n=0; n<8; n++) j = rc4_PRGA(); j = j + SBox[i] + key[k]; swap(SBox[i], SBox[j]); } a=0; b=0; } //----------------------------------------- // // Pseudo Random Generation Algorithm // uint8_t rc4_PRGA() { uint8_t t = 0; a = a + 1; b = b + SBox[a]; swap(SBox[a], SBox[b]); t = SBox[a] + SBox[b]; return SBox[t]; } //############################################################# //----------------------------------------- // // Pen and Paper RC4 as proposed at // https://crypto.anarres.info/2016/rc4_pencilandpaper // uint8_t rc4_PP() { uint8_t t = 0; uint8_t k = b; a = a + 1; b = b + SBox[a]; swap(SBox[a], SBox[b]); t = SBox[a] + SBox[b] + k; return SBox[t]; } //############################################################# //----------------------------------------- // INIT = Initialise the Internal State // void SBox8_INIT() { // SBox initalisation for (int i=0; i<256; i++) { SBox[i] = i; } a = b = c = d = j = 0; } //----------------------------------------- // KSA = Key Schedule Algorithm (Version 2) // void SBox8_KSA(uint8_t key[], uint8_t keyLen) { uint8_t t, k = 0; // Shuffle the Key into the Permutation for (int i=0; i<256; i++) { k = i % keyLen; for (int n=0; n<8; n++) t = SBox8_PRGA(); t = t + SBox[i] + key[k]; swap(SBox[i], SBox[t]); } } //----------------------------------------- // KSA = Key Schedule Algorithm // void SBox8a2_KSA(uint8_t key[], uint8_t keyLen) { uint8_t k = 0; // Shuffle the Key into the Permutation for (int i=0; i<256; i++) { k = i % keyLen; for (int n=0; n<8; n++) j = SBox8_PRGA(); j = j + SBox[i] + key[k]; swap(SBox[i], SBox[j]); } } //----------------------------------------- // // Pseudo Random Generation Algorithm (Version 2) // uint8_t SBox8_PRGA() { a += SBox[b]; b += SBox[a]; c += (a ^ b) + j + SBox[j]; swap(SBox[c], SBox[j]); d = SBox[(SBox[c] + SBox[d]) &0xff]; j++; return ((a + b) ^ (c + d)); } //----------------------------------------- // // Pseudo Random Generation Algorithm (Version a2) // uint8_t SBox8a2_PRGA() { a = a + (SBox[d] >> 5); b = a + (b ^ c); c = a + (SBox[b] << 3); d = a + (d ^ t); t = a + t; swap(SBox[t], SBox[j]); j++; return (b ^ c ^ d); } //############################################################# //----------------------------------------- // // Key Schedule Algorithm (ps) // void zx8_KSA(uint8_t key[], uint8_t keyLen) { // Key must be at least 12 Characters long // and should have >= 60-Bit of Entropy. int i; unsigned char j, k, n, t; // Prefill the Arrays for (i=0; i<256; i++) { z[i] = i; x[i] = i; } a=0; b=0; j=0; k=0; n=0, t=0; for (i=0; i<256; i++) { k = (i % keyLen); for (n=0; n<128; n++) t = zx8_PRGA(); j = (t + j + z[i] + key[k]); swap(z[i], z[j]); for (n=0; n<128; n++) t = zx8_PRGA(); j = (t + j + x[i] + z[x[j]]); swap(x[i], x[j]); } // Reset the Array Indices Start Point a=0; b=0; } //----------------------------------------- // // Pseudo Random Generation Algorithm (ps) // unsigned char zx8_PRGA() { unsigned char n1, n2, y, m; // Calculate distant Array Element Indices n1 = z[a] + x[a]; n2 = z[b] + x[b]; // First Swap randomly selected Array Element swap(z[a], z[n1]); swap(x[a], x[n2]); // Update the global Carry on Array Indices a = a + b + (n1^n2); b = b + 1; // Second Swap sequentially cycle over every Array Element swap(z[b], z[n1]); swap(x[b], x[n2]); // Calculate the internal State Selector Value y = (z[n1] ^ x[n2]); // Calculate the internal State Protection Value m = (n1 + n2); // Never reveal internal State Values directly return (z[x[y]] ^ m); } //############################################################# //----------------------------------------- // void ShowUsage(char* ThisName) { fprintf(stderr, "\nUsage : %s 128 256 65536 abc rc4 (0.07)\n", ThisName); fprintf(stderr, "\n 128 = Size of Keys in Bit (32 to 256)\n"); fprintf(stderr, "\n 256 = Length of Keystream in Byte (1 to 256)\n"); fprintf(stderr, "\n abc = Initial Value for Hash Generation\n"); fprintf(stderr, "\n 65536 = Quantity of Keystreams to generate\n"); fprintf(stderr, "\n rc4 = Algorithm for Keystream Generation (rc4, rc4pp, sbox8, zx8)\n"); fprintf(stderr, "\n"); fprintf(stderr, "\nOptional:"); fprintf(stderr, "\n 0.07 = Percentage of upper and lower Limit per Occurence of a Byte\n"); } int main (int argc, char *argv[]) { uint16_t Key_BitSize = 128; uint16_t Key_ByteSize = Key_BitSize/8; uint32_t KeyStream_Len = 256; uint64_t TestRunCount = 65536; uint64_t OverflowLimit = 0; uint64_t UnderflowLimit = 0; uint64_t OverflowMax = 0; uint64_t UnderflowMin = 0; uint64_t Overflow = 0; uint64_t Underflow = 0; float LimitPercent = 0.10; uint8_t out_8bit = 0; uint8_t CipherSwitch = 0; char HashInit[64] = "\0"; char CipherName[10] = "\0"; char hashString[128] = "\0"; char tempString[128] = "\0"; uint8_t hashDigest[256] = {0,}; uint8_t tempDigest[256] = {0,}; uint32_t byte_matrix[256][256]; uint32_t byte_homebox[256]; memset(byte_matrix, 0, sizeof(uint32_t)*256*256); memset(byte_homebox, 0, sizeof(uint32_t)*256); memset(HashInit, '\0', strlen(HashInit)); memset(CipherName, '\0', strlen(CipherName)); memset(hashString, '\0', strlen(hashString)); memset(tempString, '\0', strlen(tempString)); char* PrgName; PrgName = argv[0]; if (argc < 2) { ShowUsage(PrgName); return 1; } if (argc >= 5) { Key_BitSize = atoi(argv[1]); Key_ByteSize = Key_BitSize/8; KeyStream_Len = atoi(argv[2]); TestRunCount = atoi(argv[3]); snprintf(HashInit, sizeof(HashInit), "%s", argv[4]); if ((Key_BitSize == 0) || (Key_BitSize > 256) || (KeyStream_Len == 0) || (KeyStream_Len > 256) || (TestRunCount == 0)) { ShowUsage(PrgName); return 1; } } // If a Limit Value is passed keep it if ((argc == 7) && (atof(argv[6]) > 0)) { LimitPercent = atof(argv[6]); } else { // Adjust the Base Limit Value uint64_t temp = (TestRunCount / 256); if (temp > 256) { LimitPercent = (LimitPercent/2); OverflowLimit = temp * (1 + LimitPercent); UnderflowLimit = temp / (1 + LimitPercent); } else { // Lift the Limit LimitPercent = 0.20; OverflowLimit = 256 * (1 + LimitPercent); UnderflowLimit = 256 / (1 + LimitPercent); } } OverflowMax = OverflowLimit; UnderflowMin = UnderflowLimit; if (argc >= 6) { snprintf(CipherName, sizeof(CipherName), "%s", argv[5]); } if (strcmp(CipherName, "sbox8") == 0) { CipherSwitch = 1; } else if (strcmp(CipherName, "zx8") == 0) { CipherSwitch = 2; } else if (strcmp(CipherName, "rc4pp") == 0) { CipherSwitch = 3; } else if (strcmp(CipherName, "rc4x") == 0) { CipherSwitch = 4; } else if (strcmp(CipherName, "sbox8a2") == 0) { CipherSwitch = 5; } else { CipherSwitch = 0; snprintf(CipherName, sizeof(CipherName), "%s", "rc4\0"); } char OutFile[129] = ""; snprintf(OutFile, sizeof(OutFile), "bytepos_matrix_%s-%u-%u-%llu-%s.txt", CipherName, Key_BitSize, KeyStream_Len, TestRunCount, HashInit); OutFile[sizeof(OutFile)] = '\0'; FILE* fOutMatrixTXT = fopen(OutFile, "w+"); if (fOutMatrixTXT == NULL) { fprintf(stderr, "error creating file: %s\n", OutFile); return -1; } snprintf(OutFile, sizeof(OutFile), "bytepos_matrix_%s-%u-%u-%llu-%s.csv", CipherName, Key_BitSize, KeyStream_Len, TestRunCount, HashInit); OutFile[sizeof(OutFile)] = '\0'; FILE* fOutMatrixCSV = fopen(OutFile, "w+"); if (fOutMatrixCSV == NULL) { fprintf(stderr, "error creating file: %s\n", OutFile); return -1; } snprintf(OutFile, sizeof(OutFile), "byte_in_homebox_%s-%u-%u-%llu-%s.csv", CipherName, Key_BitSize, KeyStream_Len, TestRunCount, HashInit); OutFile[sizeof(OutFile)] = '\0'; FILE* fOutHomeBoxCSV = fopen(OutFile, "w+"); if (fOutHomeBoxCSV == NULL) { fprintf(stderr, "error creating file: %s\n", OutFile); return -1; } // Build the first Hash String for the Random Keys snprintf(hashString, sizeof(hashString), "%s", HashInit); uint32_t dLen = strlen(hashString); // Test Loop for (uint64_t runs=0; runs 128) { // Prepend Hex String if any for (int i=0; i<16; i++) { // Save the current Digest tempDigest[i] = hashDigest[i]; // Build a String of the current Digest in Hex String Notation // snprintf(tempString, sizeof(tempString), "%s%02x", tempString, hashDigest[i]); // some compiler don't understand this sprintf(tempString, "%s%02x", tempString, hashDigest[i]); } tempString[sizeof(tempString)] = '\0'; dLen = strlen(tempString); //--> printf("tempString = %s\n", tempString); MD5hash(tempString, dLen, hashDigest); // Extend the Digest for (int i=16; i for (int i=0; i 1) ) { for (int col=0; col OverflowLimit ){ fprintf(fOutMatrixTXT, "*%9d|", byte_matrix_value); // fprintf(fOutMatrixTXT, "%10d|", byte_matrix_value); Overflow++; } else if ( byte_matrix_value < UnderflowLimit ){ fprintf(fOutMatrixTXT, "-%9d|", byte_matrix_value); // fprintf(fOutMatrixTXT, "%10d|", byte_matrix_value); Underflow++; } else { fprintf(fOutMatrixTXT, "%10d|", byte_matrix_value); } if (byte_matrix_value > OverflowMax) OverflowMax = byte_matrix_value; if (byte_matrix_value < UnderflowMin) UnderflowMin = byte_matrix_value; fprintf(fOutMatrixCSV, "%d,", byte_matrix_value); } fprintf(fOutMatrixTXT, "\n"); fprintf(fOutMatrixCSV, "\n"); fprintf(fOutHomeBoxCSV, "%d\n", byte_homebox[row]); } fprintf(fOutMatrixTXT, "\nTotal (Limit %d%%)\n============================\n", (int)(LimitPercent *100)); fprintf(fOutMatrixTXT, "Upper Limit = %llu\n", OverflowLimit); fprintf(fOutMatrixTXT, "Upper Limit reached = %llu times\n", Overflow); fprintf(fOutMatrixTXT, "Highest Value found = %llu\n\n", OverflowMax); fprintf(fOutMatrixTXT, "Lower Limit = %llu\n", UnderflowLimit); fprintf(fOutMatrixTXT, "Lower Limit reached = %llu times\n", Underflow); fprintf(fOutMatrixTXT, "Lowest Value found = %llu\n\n", UnderflowMin); fclose(fOutMatrixTXT); fclose(fOutMatrixCSV); fclose(fOutHomeBoxCSV); return 0; }