home *** CD-ROM | disk | FTP | other *** search
- /* idea.c - C source code for IDEA block cipher.
- * IDEA (International Data Encryption Algorithm), formerly known as
- * IPES (Improved Proposed Encryption Standard).
- * Algorithm developed by Xuejia Lai and James L. Massey, of ETH Zurich.
- * This implementation modified and derived from original C code
- * developed by Xuejia Lai.
- * Zero-based indexing added, names changed from IPES to IDEA.
- * CFB functions added. Random number routines added.
- *
- * Optimized for speed 21 Oct 92 by Colin Plumb.
- * Very minor speedup on 23 Feb 93 by Colin Plumb.
- * idearand() given a separate expanded key on 25 Feb 93, Colin Plumb.
- *
- * There are two adjustments that can be made to this code to
- * speed it up. Defaults may be used for PCs. Only the -DIDEA32
- * pays off significantly if selectively set or not set.
- * Experiment to see what works better for you.
- *
- * Multiplication: default is inline, -DAVOID_JUMPS uses a
- * different version that does not do any conditional
- * jumps (a few percent worse on a SPARC), while
- * -DSMALL_CACHE takes it out of line to stay
- * within a small on-chip code cache.
- * Variables: normally, 16-bit variables are used, but some
- * machines (notably RISCs) do not have 16-bit registers,
- * so they do a great deal of masking. -DIDEA32 uses "int"
- * register variables and masks explicitly only where
- * necessary. On a SPARC, for example, this boosts
- * performace by 30%.
- *
- * The IDEA(tm) block cipher is covered by a patent held by ETH and a
- * Swiss company called Ascom-Tech AG. The Swiss patent number is
- * PCT/CH91/00117. International patents are pending. IDEA(tm) is a
- * trademark of Ascom-Tech AG. There is no license fee required for
- * noncommercial use. Commercial users may obtain licensing details
- * from Dieter Profos, Ascom Tech AG, Solothurn Lab, Postfach 151, 4502
- * Solothurn, Switzerland, Tel +41 65 242885, Fax +41 65 235761.
- *
- * The IDEA block cipher uses a 64-bit block size, and a 128-bit key
- * size. It breaks the 64-bit cipher block into four 16-bit words
- * because all of the primitive inner operations are done with 16-bit
- * arithmetic. It likewise breaks the 128-bit cipher key into eight
- * 16-bit words.
- *
- * For further information on the IDEA cipher, see these papers:
- * 1) Xuejia Lai, "Detailed Description and a Software Implementation of
- * the IPES Cipher", Institute for Signal and Information
- * Processing, ETH-Zentrum, Zurich, Switzerland, 1991
- * 2) Xuejia Lai, James L. Massey, Sean Murphy, "Markov Ciphers and
- * Differential Cryptanalysis", Advances in Cryptology- EUROCRYPT'91
- *
- * This code assumes that each pair of 8-bit bytes comprising a 16-bit
- * word in the key and in the cipher block are externally represented
- * with the Most Significant Byte (MSB) first, regardless of the
- * internal native byte order of the target CPU.
- */
-
- #include "idea.h"
-
- #ifdef TEST
- #include <stdio.h>
- #include <time.h>
- #endif
-
- #define ROUNDS 8 /* Don't change this value, should be 8 */
- #define KEYLEN (6*ROUNDS+4) /* length of key schedule */
-
- typedef word16 IDEAkey[KEYLEN];
-
- #ifdef IDEA32 /* Use >16-bit temporaries */
- #define low16(x) ((x) & 0xFFFF)
- typedef unsigned int uint16; /* at LEAST 16 bits, maybe more */
- #else
- #define low16(x) (x) /* this is only ever applied to uint16's */
- typedef word16 uint16;
- #endif
-
- #ifdef _GNUC_
- /* __const__ simply means there are no side effects for this function,
- * which is useful info for the gcc optimizer */
- #define CONST __const__
- #else
- #define CONST
- #endif
-
- static void en_key_idea(word16 *userkey, word16 *Z);
- static void de_key_idea(IDEAkey Z, IDEAkey DK);
- static void cipher_idea(word16 in[4], word16 out[4], CONST IDEAkey Z);
-
- /*
- * Multiplication, modulo (2**16)+1
- * Note that this code is structured like this on the assumption that
- * untaken branches are cheaper than taken branches, and the compiler
- * doesn't schedule branches.
- */
- #ifdef SMALL_CACHE
- CONST static uint16 mul(register uint16 a, register uint16 b)
- {
- register word32 p;
-
- if (a)
- { if (b)
- { p = (word32)a * b;
- b = low16(p);
- a = p>>16;
- return b - a + (b < a);
- }
- else
- { return 1-a;
- }
- }
- else
- { return 1-b;
- }
- } /* mul */
- #endif /* SMALL_CACHE */
-
- /*
- * Compute multiplicative inverse of x, modulo (2**16)+1,
- * using Euclid's GCD algorithm. It is unrolled twice to
- * avoid swapping the meaning of the registers each iteration,
- * and some subtracts of t have been changed to adds.
- */
- CONST static uint16 inv(uint16 x)
- {
- uint16 t0, t1;
- uint16 q, y;
-
- if (x <= 1)
- return x; /* 0 and 1 are self-inverse */
- t1 = 0x10001L / x; /* Since x >= 2, this fits into 16 bits */
- y = 0x10001L % x;
- if (y == 1)
- return low16(1-t1);
- t0 = 1;
- do
- { q = x / y;
- x = x % y;
- t0 += q * t1;
- if (x == 1)
- return t0;
- q = y / x;
- y = y % x;
- t1 += q * t0;
- } while (y != 1);
- return low16(1-t1);
- } /* inv */
-
- /* Compute IDEA encryption subkeys Z */
- static void en_key_idea(word16 *userkey, word16 *Z)
- {
- int i,j;
-
- /*
- * shifts
- */
- for (j=0; j<8; j++)
- Z[j] = *userkey++;
-
- for (i=0; j<KEYLEN; j++)
- { i++;
- Z[i+7] = Z[i & 7] << 9 | Z[i+1 & 7] >> 7;
- Z += i & 8;
- i &= 7;
- }
- } /* en_key_idea */
-
- /* Compute IDEA decryption subkeys DK from encryption subkeys Z */
- /* Note: these buffers *may* overlap! */
- static void de_key_idea(IDEAkey Z, IDEAkey DK)
- {
- int j;
- uint16 t1, t2, t3;
- IDEAkey T;
- word16 *p = T + KEYLEN;
-
- t1 = inv(*Z++);
- t2 = -*Z++;
- t3 = -*Z++;
- *--p = inv(*Z++);
- *--p = t3;
- *--p = t2;
- *--p = t1;
-
- for (j = 1; j < ROUNDS; j++)
- {
- t1 = *Z++;
- *--p = *Z++;
- *--p = t1;
-
- t1 = inv(*Z++);
- t2 = -*Z++;
- t3 = -*Z++;
- *--p = inv(*Z++);
- *--p = t2;
- *--p = t3;
- *--p = t1;
- }
- t1 = *Z++;
- *--p = *Z++;
- *--p = t1;
-
- t1 = inv(*Z++);
- t2 = -*Z++;
- t3 = -*Z++;
- *--p = inv(*Z++);
- *--p = t3;
- *--p = t2;
- *--p = t1;
- /* Copy and destroy temp copy */
- for (j = 0, p = T; j < KEYLEN; j++)
- {
- *DK++ = *p;
- *p++ = 0;
- }
- } /* de_key_idea */
-
- /*
- * MUL(x,y) computes x = x*y, modulo 0x10001. Requires two temps,
- * t16 and t32. x must me a side-effect-free lvalue. y may be
- * anything, but unlike x, must be strictly 16 bits even if low16()
- * is #defined.
- * All of these are equivalent - see which is faster on your machine
- */
- #ifdef SMALL_CACHE
- #define MUL(x,y) (x = mul(low16(x),y))
- #else
- #ifdef AVOID_JUMPS
- #define MUL(x,y) (x = low16(x-1), t16 = low16((y)-1), \
- t32 = (word32)x*t16+x+t16+1, x = low16(t32), \
- t16 = t32>>16, x = x-t16+(x<t16) )
- #else
- #define MUL(x,y) ((t16 = (y)) ? (x=low16(x)) ? \
- t32 = (word32)x*t16, x = low16(t32), t16 = t32>>16, \
- x = x-t16+(x<t16) : \
- (x = 1-t16) : (x = 1-x))
- #endif
- #endif
-
- /* IDEA encryption/decryption algorithm */
- /* Note that in and out can be the same buffer */
- static void cipher_idea(word16 in[4], word16 out[4], register CONST IDEAkey Z)
- {
- register uint16 x1, x2, x3, x4, s2, s3;
- #ifndef SMALL_CACHE
- register uint16 t16;
- register word32 t32;
- #endif
-
- int r = ROUNDS;
-
- x1 = *in++; x2 = *in++;
- x3 = *in++; x4 = *in;
- do
- {
- MUL(x1,*Z++);
- x2 += *Z++;
- x3 += *Z++;
- MUL(x4, *Z++);
-
- s3 = x3;
- x3 ^= x1;
- MUL(x3, *Z++);
- s2 = x2;
- x2 ^= x4;
- x2 += x3;
- MUL(x2, *Z++);
- x3 += x2;
-
- x1 ^= x2;
- x4 ^= x3;
-
- x2 ^= s3;
- x3 ^= s2;
- } while (--r);
- MUL(x1, *Z++);
- *out++ = x1;
- *out++ = x3 + *Z++;
- *out++ = x2 + *Z++;
- MUL(x4, *Z);
- *out = x4;
- } /* cipher_idea */
-
- /*-------------------------------------------------------------*/
-
- #ifdef TEST
- /*
- * This is the number of Kbytes of test data to encrypt.
- * It defaults to 1 MByte.
- */
- #ifndef KBYTES
- #define KBYTES 1024
- #endif
-
- void main(void)
- { /* Test driver for IDEA cipher */
- int i, j, k;
- IDEAkey Z, DK;
- word16 XX[4], TT[4], YY[4];
- word16 userkey[8];
- clock_t start, end;
- long l;
-
- /* Make a sample user key for testing... */
- for(i=0; i<8; i++)
- userkey[i] = i+1;
-
- /* Compute encryption subkeys from user key... */
- en_key_idea(userkey,Z);
- printf("\nEncryption key subblocks: ");
- for(j=0; j<ROUNDS+1; j++)
- {
- printf("\nround %d: ", j+1);
- if (j==ROUNDS)
- for(i=0; i<4; i++)
- printf(" %6u", Z[j*6+i]);
- else
- for(i=0; i<6; i++)
- printf(" %6u", Z[j*6+i]);
- }
-
- /* Compute decryption subkeys from encryption subkeys... */
- de_key_idea(Z,DK);
- printf("\nDecryption key subblocks: ");
- for(j=0; j<ROUNDS+1; j++)
- {
- printf("\nround %d: ", j+1);
- if (j==ROUNDS)
- for(i=0; i<4; i++)
- printf(" %6u", DK[j*6+i]);
- else
- for(i=0; i<6; i++)
- printf(" %6u", DK[j*6+i]);
- }
-
- /* Make a sample plaintext pattern for testing... */
- for (k=0; k<4; k++)
- XX[k] = k;
-
- printf("\n Encrypting %d KBytes (%ld blocks)...", KBYTES, KBYTES*64l);
- fflush(stdout);
- start = clock();
- cipher_idea(XX,YY,Z); /* encrypt plaintext XX, making YY */
- for (l = 1; l < 64*KBYTES; l++)
- cipher_idea(YY,YY,Z); /* repeated encryption */
- cipher_idea(YY,TT,DK); /* decrypt ciphertext YY, making TT */
- for (l = 1; l < 64*KBYTES; l++)
- cipher_idea(TT,TT,DK); /* repeated decryption */
- end = clock() - start;
- l = end * 1000. / CLOCKS_PER_SEC + 1;
- i = l/1000;
- j = l%1000;
- l = KBYTES * 1024. * CLOCKS_PER_SEC / end;
- printf("%d.%03d seconds = %ld bytes per second\n", i, j, l);
-
- printf("\nX %6u %6u %6u %6u \n",
- XX[0], XX[1], XX[2], XX[3]);
- printf("Y %6u %6u %6u %6u \n",
- YY[0], YY[1], YY[2], YY[3]);
- printf("T %6u %6u %6u %6u \n",
- TT[0], TT[1], TT[2], TT[3]);
-
- /* Now decrypted TT should be same as original XX */
- for (k=0; k<4; k++)
- if (TT[k] != XX[k])
- {
- printf("\n\07Error! Noninvertable encryption.\n");
- exit(-1); /* error exit */
- }
- printf("\nNormal exit.\n");
- exit(0); /* normal exit */
- } /* main */
-
-
- #endif /* TEST */
-
-
- /*************************************************************************/
-
-
- /*
- * xorbuf - change buffer via xor with random mask block
- * Used for Cipher Feedback (CFB) or Cipher Block Chaining
- * (CBC) modes of encryption.
- * Can be applied for any block encryption algorithm,
- * with any block size, such as the DES or the IDEA cipher.
- */
- static void xorbuf(register byteptr buf, register byteptr mask,
- register int count)
- /* count must be > 0 */
- {
- if (count)
- do
- *buf++ ^= *mask++;
- while (--count);
- } /* xorbuf */
-
-
- /*
- * cfbshift - shift bytes into IV for CFB input
- * Used only for Cipher Feedback (CFB) mode of encryption.
- * Can be applied for any block encryption algorithm with any
- * block size, such as the DES or the IDEA cipher.
- */
- static void cfbshift(register byteptr iv, register byteptr buf,
- register int count, int blocksize)
- /* iv is the initialization vector.
- * buf is the buffer pointer.
- * count is the number of bytes to shift in...must be > 0.
- * blocksize is 8 bytes for DES or IDEA ciphers.
- */
- {
- int retained;
- if (count)
- {
- retained = blocksize-count; /* number bytes in iv to retain */
- /* left-shift retained bytes of IV over by count bytes to make room */
- while (retained--)
- {
- *iv = *(iv+count);
- iv++;
- }
- /* now copy count bytes from buf to shifted tail of IV */
- do *iv++ = *buf++;
- while (--count);
- }
- } /* cfbshift */
-
-
-
- /* Key schedules for IDEA encryption and decryption */
- static IDEAkey Z;
- static word16 *iv_idea; /* pointer to IV for CFB or CBC */
- static boolean cfb_dc_idea; /* TRUE iff CFB decrypting */
-
-
- /* initkey_idea initializes IDEA for ECB mode operations */
- static void initkey_idea(byte key[16], boolean decryp)
- {
- word16 userkey[8]; /* IDEA key is 16 bytes long */
- int i;
- /* Assume each pair of bytes comprising a word is ordered MSB-first. */
- for (i=0; i<8; i++)
- {
- userkey[i] = (key[0]<<8) + key[1];
- key++; key++;
- }
- en_key_idea(userkey,Z);
- if (decryp)
- {
- de_key_idea(Z,Z); /* compute inverse key schedule DK */
- }
- for (i=0; i<8; i++) /* Erase dangerous traces */
- userkey[i] = 0;
- } /* initkey_idea */
-
-
- /* Run a 64-bit block thru IDEA in ECB (Electronic Code Book) mode,
- using the currently selected key schedule.
- */
- static void idea_ecb(word16 *inbuf, word16 *outbuf)
- {
- /* Assume each pair of bytes comprising a word is ordered MSB-first. */
- #ifndef HIGHFIRST /* If this is a least-significant-byte-first CPU */
- word16 x;
-
- /* Invert the byte order for each 16-bit word for internal use. */
- x = inbuf[0]; outbuf[0] = x >> 8 | x << 8;
- x = inbuf[1]; outbuf[1] = x >> 8 | x << 8;
- x = inbuf[2]; outbuf[2] = x >> 8 | x << 8;
- x = inbuf[3]; outbuf[3] = x >> 8 | x << 8;
- cipher_idea(outbuf, outbuf, Z);
- x = outbuf[0]; outbuf[0] = x >> 8 | x << 8;
- x = outbuf[1]; outbuf[1] = x >> 8 | x << 8;
- x = outbuf[2]; outbuf[2] = x >> 8 | x << 8;
- x = outbuf[3]; outbuf[3] = x >> 8 | x << 8;
- #else /* HIGHFIRST */
- /* Byte order for internal and external representations is the same. */
- cipher_idea(inbuf, outbuf, Z);
- #endif /* HIGHFIRST */
- } /* idea_ecb */
-
-
- /*
- * initcfb - Initializes the IDEA key schedule tables via key,
- * and initializes the Cipher Feedback mode IV.
- * References context variables cfb_dc_idea and iv_idea.
- */
- void initcfb_idea(word16 iv0[4], byte key[16], boolean decryp)
- /* iv0 is copied to global iv_idea, buffer will be destroyed by ideacfb.
- key is pointer to key buffer.
- decryp is TRUE if decrypting, FALSE if encrypting.
- */
- {
- iv_idea = iv0;
- cfb_dc_idea = decryp;
- initkey_idea(key,FALSE);
- } /* initcfb_idea */
-
-
- /*
- * ideacfb - encipher a buffer with IDEA enciphering algorithm,
- * using Cipher Feedback (CFB) mode.
- *
- * Assumes initcfb_idea has already been called.
- * References context variables cfb_dc_idea and iv_idea.
- */
- void ideacfb(byteptr buf, int count)
- /* buf is input, output buffer, may be more than 1 block.
- * count is byte count of buffer. May be > IDEABLOCKSIZE.
- */
- {
- int chunksize; /* smaller of count, IDEABLOCKSIZE */
- word16 temp[IDEABLOCKSIZE/2];
-
- while ((chunksize = min(count,IDEABLOCKSIZE)) > 0)
- {
- idea_ecb(iv_idea,temp); /* encrypt iv_idea, making temp. */
-
- if (cfb_dc_idea) /* buf is ciphertext */
- /* shift in ciphertext to IV... */
- cfbshift((byte *)iv_idea,buf,chunksize,IDEABLOCKSIZE);
-
- /* convert buf via xor */
- xorbuf(buf,(byte *)temp,chunksize); /* buf now has enciphered output */
-
- if (!cfb_dc_idea) /* buf was plaintext, is now ciphertext */
- /* shift in ciphertext to IV... */
- cfbshift((byte *)iv_idea,buf,chunksize,IDEABLOCKSIZE);
-
- count -= chunksize;
- buf += chunksize;
- }
- } /* ideacfb */
-
-
- /*
- close_idea function erases all the key schedule information when
- we are all done with a set of operations for a particular IDEA key
- context. This is to prevent any sensitive data from being left
- around in memory.
- */
- void close_idea(void) /* erase current key schedule tables */
- {
- short i;
- for (i = 0; i < KEYLEN; i++)
- Z[i] = 0;
- } /* close_idea() */
-
- /********************************************************************/
-
- /*
- * These buffers are used by init_idearand, idearand, and close_idearand.
- */
- static word16 dtbuf_idea[4] = {0}; /* buffer for enciphered timestamp */
- static word16 randseed_idea[4] = {0}; /* seed for IDEA random # generator */
- static word16 randbuf_idea[4] = {0}; /* buffer for IDEA random # generator */
- static byte randbuf_idea_counter = 0; /* # of random bytes left in randbuf_idea */
- static IDEAkey randkey_idea; /* Expanded key for IDEA random # generator */
-
- /*
- * init_idearand - initialize idearand, IDEA random number generator.
- * Used for generating cryptographically strong random numbers.
- * Much of the design comes from Appendix C of ANSI X9.17.
- * key is pointer to IDEA key buffer.
- * seed is pointer to random number seed buffer.
- * tstamp is a 32-bit timestamp
- */
- void init_idearand(byte key[16], byte seed[8], word32 tstamp)
- {
- int i;
-
- en_key_idea((word16 *)key, randkey_idea);
-
- for (i=0; i<4; i++) /* capture timestamp material */
- { dtbuf_idea[i] = tstamp; /* get bottom word */
- tstamp = tstamp >> 16; /* drop bottom word */
- /* tstamp has only 4 bytes-- last 4 bytes will always be 0 */
- }
- /* Start with enciphered timestamp: */
- cipher_idea(dtbuf_idea, dtbuf_idea, randkey_idea);
-
- /* initialize seed material */
- for (i=0; i<8; i++)
- ((byte *)randseed_idea)[i] = seed[i];
-
- randbuf_idea_counter = 0; /* # of random bytes left in randbuf_idea */
-
- } /* init_idearand */
-
-
- /*
- * idearand - IDEA pseudo-random number generator
- * Used for generating cryptographically strong random numbers.
- * Much of the design comes from Appendix C of ANSI X9.17.
- */
- byte idearand(void)
- {
- int i;
- if (randbuf_idea_counter==0) /* if random buffer is spent...*/
- { /* Combine enciphered timestamp with seed material: */
- for (i=0; i<4; i++)
- randseed_idea[i] ^= dtbuf_idea[i];
- cipher_idea(randseed_idea,randbuf_idea,randkey_idea); /* fill new block */
-
- /* Compute new seed vector: */
- for (i=0; i<4; i++)
- randseed_idea[i] = randbuf_idea[i] ^ dtbuf_idea[i];
- cipher_idea(randseed_idea,randseed_idea,randkey_idea); /* fill new seed */
-
- randbuf_idea_counter = 8; /* reset counter for full buffer */
- }
- /* Take a byte from randbuf_idea: */
- return(((byte *)randbuf_idea)[--randbuf_idea_counter]);
- } /* idearand */
-
-
- void close_idearand(void)
- { /* Erase random IDEA buffers and wipe out IDEA key info */
- int i;
- for (i=0; i<4; i++)
- { randbuf_idea[i] = 0;
- randseed_idea[i] = 0;
- dtbuf_idea[i] = 0;
- }
- for (i = 0; i<KEYLEN; i++)
- randkey_idea[i] = 0;
- } /* close_idearand */
-
- /* end of idea.c */
-
-