//This program is free software: you can redistribute it and/or modify it under the terms #of the GNU General Public License as published by the Free Software Foundation, either #version 3 of the License, or (at your option) any later version. //This program is distributed in the hope that it will be useful, but WITHOUT ANY #WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A #PARTICULAR PURPOSE. See the GNU General Public License for more details. //You should have received a copy of the GNU General Public License along with this #program. If not, see /* * idea.c - C source code for IDEA block cipher. * IDEA (International Data Encryption Algorithm), formerly known as * IPES (Improved Proposed Encryption Standard). * Algorithm developed by Xuejia Lai and James L. Massey, of ETH Zurich. * This implementation modified and derived from original C code * developed by Xuejia Lai. * Zero-based indexing added, names changed from IPES to IDEA. * CFB functions added. Random number routines added. * * Integration to CRYPT.C Copyright 1994 Willis E. Howard, III. * Problems with main() fixed. Code for burn() and fill0() was * written. INDENT was run with my favorite settings. * * Optimized for speed 21 Oct 92 by Colin Plumb. * Very minor speedup on 23 Feb 93 by Colin Plumb. * idearand() given a separate expanded key on 25 Feb 93, Colin Plumb. * Totally restructured to eliminate static variables, 1 Aug 1993, Colin Plumb * * (You know, I can't find any code in here that I haven't written. * A few comments seem to be original, particularly the legalese * below, but I don't think the authors mind having that reproduced. * Thus, I hereby place this work in the public domain. -Colin) * * There are two adjustments that can be made to this code to * speed it up. Defaults may be used for PCs. Only the -DIDEA32 * pays off significantly if selectively set or not set. * Experiment to see what works best for your machine. * * Multiplication: default is inline, -DAVOID_JUMPS uses a * different version that does not do any conditional * jumps (a few percent worse on a SPARC), while * -DSMALL_CACHE takes it out of line to stay * within a small on-chip code cache. * Variables: normally, 16-bit variables are used, but some * machines (notably RISCs) do not have 16-bit registers, * so they do a great deal of masking. -DIDEA32 uses "int" * register variables and masks explicitly only where * necessary. On a SPARC, for example, this boosts * performance by 30%. * * The IDEA(tm) block cipher is covered by a patent held by ETH and a * Swiss company called Ascom-Tech AG. The Swiss patent number is * PCT/CH91/00117. International patents are pending. IDEA(tm) is a * trademark of Ascom-Tech AG. There is no license fee required for * noncommercial use. Commercial users may obtain licensing details * from Dieter Profos, Ascom Tech AG, Solothurn Lab, Postfach 151, 4502 * Solothurn, Switzerland, Tel +41 65 242885, Fax +41 65 235761. * * The IDEA block cipher uses a 64-bit block size, and a 128-bit key * size. It breaks the 64-bit cipher block into four 16-bit words * because all of the primitive inner operations are done with 16-bit * arithmetic. It likewise breaks the 128-bit cipher key into eight * 16-bit words. * * For further information on the IDEA cipher, see these papers: * 1) Xuejia Lai, "Detailed Description and a Software Implementation of * the IPES Cipher", Institute for Signal and Information * Processing, ETH-Zentrum, Zurich, Switzerland, 1991 * 2) Xuejia Lai, James L. Massey, Sean Murphy, "Markov Ciphers and * Differential Cryptanalysis", Advances in Cryptology- EUROCRYPT'91 * * This code runs on arrays of bytes by taking pairs in big-endian * order to make the 16-bit words that IDEA uses internally. This * produces the same result regardless of the byte order of the * native CPU. */ #include "idea.h" #include #ifdef IDEA32 /* Use >16-bit temporaries */ #define low16(x) ((x) & 0xFFFF) typedef unsigned int uint16; /* at LEAST 16 bits, maybe more */ #else #define low16(x) (x) /* this is only ever applied to uint16's */ typedef word16 uint16; #endif /* * Multiplication, modulo (2**16)+1 * Note that this code is structured on the assumption that * untaken branches are cheaper than taken branches, and the * compiler doesn't schedule branches. */ #ifdef SMALL_CACHE static uint16 mul (register uint16 a, register uint16 b) { register word32 p; p = (word32) a *b; if (p) { b = low16 (p); a = p >> 16; return (b - a) + (b < a); } else if (a) { return 1 - b; } else { return 1 - a; } } /* mul */ #endif /* SMALL_CACHE */ /* * Compute the multiplicative inverse of x, modulo 65537, using Euclid's * algorithm. It is unrolled twice to avoid swapping the registers each * iteration, and some subtracts of t have been changed to adds. */ static uint16 mulInv (uint16 x) { uint16 t0, t1; uint16 q, y; if (x <= 1) return x; /* 0 and 1 are self-inverse */ t1 = 0x10001L / x; /* Since x >= 2, this fits into 16 bits */ y = 0x10001L % x; if (y == 1) return low16 (1 - t1); t0 = 1; do { q = x / y; x = x % y; t0 += q * t1; if (x == 1) return t0; q = y / x; y = y % x; t1 += q * t0; } while (y != 1); return low16 (1 - t1); } /* mukInv */ /* * Expand a 128-bit user key to a working encryption key EK */ static void ideaExpandKey (byte const * userkey, word16 * EK) { int i, j; for (j = 0; j < 8; j++) { EK[j] = (userkey[0] << 8) + userkey[1]; userkey += 2; } for (i = 0; j < IDEAKEYLEN; j++) { i++; EK[i + 7] = EK[i & 7] << 9 | EK[i + 1 & 7] >> 7; EK += i & 8; i &= 7; } } /* ideaExpandKey */ /* * Compute IDEA decryption key DK from an expanded IDEA encryption key EK * Note that the input and output may be the same. Thus, the key is * inverted into an internal buffer, and then copied to the output. */ static void ideaInvertKey (word16 const * EK, word16 DK[IDEAKEYLEN]) { int i; uint16 t1, t2, t3; word16 temp[IDEAKEYLEN]; word16 *p = temp + IDEAKEYLEN; t1 = mulInv (*EK++); t2 = -*EK++; t3 = -*EK++; *--p = mulInv (*EK++); *--p = t3; *--p = t2; *--p = t1; for (i = 0; i < IDEAROUNDS - 1; i++) { t1 = *EK++; *--p = *EK++; *--p = t1; t1 = mulInv (*EK++); t2 = -*EK++; t3 = -*EK++; *--p = mulInv (*EK++); *--p = t2; *--p = t3; *--p = t1; } t1 = *EK++; *--p = *EK++; *--p = t1; t1 = mulInv (*EK++); t2 = -*EK++; t3 = -*EK++; *--p = mulInv (*EK++); *--p = t3; *--p = t2; *--p = t1; /* Copy and destroy temp copy */ memcpy (DK, temp, sizeof (temp)); for (i=0; i>16, x = (x-t16) + (x>16, \ x = (x-t16)+(x> 8) | (x1 << 8); x2 = (x2 >> 8) | (x2 << 8); x3 = (x3 >> 8) | (x3 << 8); x4 = (x4 >> 8) | (x4 << 8); #endif do { MUL (x1, *key++); x2 += *key++; x3 += *key++; MUL (x4, *key++); s3 = x3; x3 ^= x1; MUL (x3, *key++); s2 = x2; x2 ^= x4; x2 += x3; MUL (x2, *key++); x3 += x2; x1 ^= x2; x4 ^= x3; x2 ^= s3; x3 ^= s2; } while (--r); MUL (x1, *key++); x3 += *key++; x2 += *key++; MUL (x4, *key); out = (word16 *) outbuf; #ifdef HIGHFIRST *out++ = x1; *out++ = x3; *out++ = x2; *out = x4; #else /* !HIGHFIRST */ *out++ = (x1 >> 8) | (x1 << 8); *out++ = (x3 >> 8) | (x3 << 8); *out++ = (x2 >> 8) | (x2 << 8); *out = (x4 >> 8) | (x4 << 8); #endif } /* ideaCipher */ /*-------------------------------------------------------------*/ #ifdef TEST #include #include /* * Using Microsoft C 6.0 and the command line: cl /DTEST /G3 idea.c * this module performed at 1819 kbps on a Gateway 2000 4DX2-66V * but only at 330 kbps with compiler option /G0 for 8086 mode. */ /* * This is the number of Kbytes of test data to encrypt. * It defaults to 1 MByte. */ long TestCount = 65536L; int main (void) { /* Test driver for IDEA cipher */ int i, j, k; byte userkey[16]; word16 EK[IDEAKEYLEN], DK[IDEAKEYLEN]; byte XX[8], YY[8], ZZ[8]; clock_t start, end; long l; /* Make a sample user key for testing... */ for (i = 0; i < 16; i++) userkey[i] = i + 1; /* Compute encryption subkeys from user key... */ ideaExpandKey (userkey, EK); printf ("\nEncryption key subblocks: "); for (j = 0; j < IDEAROUNDS + 1; j++) { printf ("\nround %d: ", j + 1); if (j < IDEAROUNDS) for (i = 0; i < 6; i++) printf (" %6u", EK[j * 6 + i]); else for (i = 0; i < 4; i++) printf (" %6u", EK[j * 6 + i]); } /* Compute decryption subkeys from encryption subkeys... */ ideaInvertKey (EK, DK); printf ("\nDecryption key subblocks: "); for (j = 0; j < IDEAROUNDS + 1; j++) { printf ("\nround %d: ", j + 1); if (j < IDEAROUNDS) for (i = 0; i < 6; i++) printf (" %6u", DK[j * 6 + i]); else for (i = 0; i < 4; i++) printf (" %6u", DK[j * 6 + i]); } /* Make a sample plaintext pattern for testing... */ for (k = 0; k < 8; k++) XX[k] = k; printf ("\n Encrypting %ld bytes (%ld blocks)...\n", TestCount * (long ) 16, TestCount); fflush (stdout); start = clock (); memcpy (YY, XX, 8); for (l = 0; l < TestCount; l++) ideaCipher (YY, YY, EK); /* repeated encryption */ memcpy (ZZ, YY, 8); for (l = 0; l < TestCount; l++) ideaCipher (ZZ, ZZ, DK); /* repeated decryption */ end = clock () - start; l = end * 1000 / CLOCKS_PER_SEC + 1; i = l / 1000; j = l % 1000; l = 128L * TestCount / l; printf ("%d.%03d seconds = %ld kbps\n", i, j, l); printf ("\nX %3u %3u %3u %3u %3u %3u %3u %3u \n", XX[0], XX[1], XX[2], XX[3], XX[4], XX[5], XX[6], XX[7]); printf ("\nY %3u %3u %3u %3u %3u %3u %3u %3u \n", YY[0], YY[1], YY[2], YY[3], YY[4], YY[5], YY[6], YY[7]); printf ("\nZ %3u %3u %3u %3u %3u %3u %3u %3u \n", ZZ[0], ZZ[1], ZZ[2], ZZ[3], ZZ[4], ZZ[5], ZZ[6], ZZ[7]); /* Now decrypted ZZ should be same as original XX */ for (k = 0; k < 8; k++) if (XX[k] != ZZ[k]) { printf ("\n\07Error! Noninvertable encryption.\n"); exit (-1); /* error exit */ } printf ("\nNormal exit.\n"); return 0; /* normal exit */ } /* main */ #endif /* TEST */ /*************************************************************************/ void ideaCfbReinit (struct IdeaCfbContext * context, byte const * iv) { int i; if (iv) memcpy (context->iv, iv, 8); else for (i=0; i<8; i++) /* fill0 (context->iv, 8) */ context->iv[i] = '\0'; context->bufleft = 0; } void ideaCfbInit (struct IdeaCfbContext * context, byte const (key[16])) { ideaExpandKey (key, context->key); ideaCfbReinit (context, 0); } void ideaCfbDestroy (struct IdeaCfbContext * context) { /* burn (*context) */ int i; for (i=0; ikey[i] = 0; for (i=0; i<8; i++) context->iv[i] = '\0'; context->bufleft = 0; } /* * Encrypt a buffer of data, using IDEA in CFB mode. * There are more compact ways of writing this, but this is * written for speed. */ void ideaCfbEncrypt (struct IdeaCfbContext * context, byte const * src, byte * dest, int count) { int bufleft = context->bufleft; byte *bufptr = context->iv + 8 - bufleft; /* If there are no more bytes to encrypt that there are bytes * in the buffer, XOR them in and return. */ if (count <= bufleft) { context->bufleft = bufleft - count; while (count--) { *dest++ = *bufptr++ ^= *src++; } return; } count -= bufleft; /* Encrypt the first bufleft (0 to 7) bytes of the input by XOR * with the last bufleft bytes in the iv buffer. */ while (bufleft--) { *dest++ = (*bufptr++ ^= *src++); } /* Encrypt middle blocks of the input by cranking the cipher, * XORing 8-byte blocks, and repeating until the count * is 8 or less. */ while (count > 8) { bufptr = context->iv; ideaCipher (bufptr, bufptr, context->key); bufleft = 8; count -= 8; do { *dest++ = (*bufptr++ ^= *src++); } while (--bufleft); } /* Do the last 1 to 8 bytes */ bufptr = context->iv; ideaCipher (bufptr, bufptr, context->key); context->bufleft = 8 - count; do { *dest++ = (*bufptr++ ^= *src++); } while (--count); } /* * Decrypt a buffer of data, using IDEA in CFB mode. * There are more compact ways of writing this, but this is * written for speed. */ void ideaCfbDecrypt (struct IdeaCfbContext * context, byte const * src, byte * dest, int count) { int bufleft = context->bufleft; static byte *bufptr; byte t; bufptr = context->iv + (8 - bufleft); if (count <= bufleft) { context->bufleft = bufleft - count; while (count--) { t = *bufptr; *dest++ = t ^ (*bufptr++ = *src++); } return; } count -= bufleft; while (bufleft--) { t = *bufptr; *dest++ = t ^ (*bufptr++ = *src++); } while (count > 8) { bufptr = context->iv; ideaCipher (bufptr, bufptr, context->key); bufleft = 8; count -= 8; do { t = *bufptr; *dest++ = t ^ (*bufptr++ = *src++); } while (--bufleft); } bufptr = context->iv; ideaCipher (bufptr, bufptr, context->key); context->bufleft = 8 - count; do { t = *bufptr; *dest++ = t ^ (*bufptr++ = *src++); } while (--count); } /********************************************************************/ /* * Initialize a cryptographic random-number generator. * key and seed should be arbitrary; timestamp should * be a current timestamp. */ void ideaRandInit (struct IdeaRandContext * context, byte const (key[16]), byte const (seed[8]), word32 timestamp) { int i; ideaExpandKey (key, context->key); context->bufleft = 0; memcpy (context->internalbuf, seed, 8); for (i = 0; i < 8; i++) { context->timestamp[i] = (byte) timestamp; timestamp >>= 8; } ideaCipher (context->timestamp, context->timestamp, context->key); } /* * Cryptographic pseudo-random-number generator, used for generating * session keys. * Much of the design comes from Appendix C of ANSI X9.17. */ byte ideaRandByte (struct IdeaRandContext * c) { int i; if (!c->bufleft) { /* Compute next 8 bytes of output */ for (i = 0; i < 8; i++) c->outbuf[i] = c->internalbuf[i] ^ c->timestamp[i]; ideaCipher (c->outbuf, c->outbuf, c->key); /* Compute new seed vector */ for (i = 0; i < 8; i++) c->internalbuf[i] = c->outbuf[i] ^ c->timestamp[i]; ideaCipher (c->internalbuf, c->internalbuf, c->key); c->bufleft = 8; } return c->outbuf[--c->bufleft]; } /* end of idea.c */