- AES
- REC
- import socket
- INV_S_BOX_STRING = '52 09 6a d5 30 36 a5 38 bf 40 a3 9e 81 f3 d7 fb' \
- '7c e3 39 82 9b 2f ff 87 34 8e 43 44 c4 de e9 cb' \
- '54 7b 94 32 a6 c2 23 3d ee 4c 95 0b 42 fa c3 4e' \
- '08 2e a1 66 28 d9 24 b2 76 5b a2 49 6d 8b d1 25' \
- '72 f8 f6 64 86 68 98 16 d4 a4 5c cc 5d 65 b6 92' \
- '6c 70 48 50 fd ed b9 da 5e 15 46 57 a7 8d 9d 84' \
- '90 d8 ab 00 8c bc d3 0a f7 e4 58 05 b8 b3 45 06' \
- 'd0 2c 1e 8f ca 3f 0f 02 c1 af bd 03 01 13 8a 6b' \
- '3a 91 11 41 4f 67 dc ea 97 f2 cf ce f0 b4 e6 73' \
- '96 ac 74 22 e7 ad 35 85 e2 f9 37 e8 1c 75 df 6e' \
- '47 f1 1a 71 1d 29 c5 89 6f b7 62 0e aa 18 be 1b' \
- 'fc 56 3e 4b c6 d2 79 20 9a db c0 fe 78 cd 5a f4' \
- '1f dd a8 33 88 07 c7 31 b1 12 10 59 27 80 ec 5f' \
- '60 51 7f a9 19 b5 4a 0d 2d e5 7a 9f 93 c9 9c ef' \
- 'a0 e0 3b 4d ae 2a f5 b0 c8 eb bb 3c 83 53 99 61' \
- '17 2b 04 7e ba 77 d6 26 e1 69 14 63 55 21 0c 7d'.replace(" ", "")
- S_BOX_STRING = '63 7c 77 7b f2 6b 6f c5 30 01 67 2b fe d7 ab 76' \
- 'ca 82 c9 7d fa 59 47 f0 ad d4 a2 af 9c a4 72 c0' \
- 'b7 fd 93 26 36 3f f7 cc 34 a5 e5 f1 71 d8 31 15' \
- '09 83 2c 1a 1b 6e 5a a0 52 3b d6 b3 29 e3 2f 84' \
- '53 d1 00 ed 20 fc b1 5b 6a cb be 39 4a 4c 58 cf' \
- 'd0 ef aa fb 43 4d 33 85 45 f9 02 7f 50 3c 9f a8' \
- '51 a3 40 8f 92 9d 38 f5 bc b6 da 21 10 ff f3 d2' \
- 'cd 0c 13 ec 5f 97 44 17 c4 a7 7e 3d 64 5d 19 73' \
- '60 81 4f dc 22 2a 90 88 46 ee b8 14 de 5e 0b db' \
- 'e0 32 3a 0a 49 06 24 5c c2 d3 ac 62 91 95 e4 79' \
- 'e7 c8 37 6d 8d d5 4e a9 6c 56 f4 ea 65 7a ae 08' \
- 'ba 78 25 2e 1c a6 b4 c6 e8 dd 74 1f 4b bd 8b 8a' \
- '70 3e b5 66 48 03 f6 0e 61 35 57 b9 86 c1 1d 9e' \
- 'e1 f8 98 11 69 d9 8e 94 9b 1e 87 e9 ce 55 28 df' \
- '8c a1 89 0d bf e6 42 68 41 99 2d 0f b0 54 bb 16'.replace(" ", "")
- S_BOX = bytearray.fromhex(S_BOX_STRING)
- INV_S_BOX = bytearray.fromhex(INV_S_BOX_STRING)
- def inv_shift_rows(state: [[int]]) -> [[int]]:
- state[1][1], state[2][1], state[3][1], state[0][1] = state[0][1], state[1][1], state[2][1], state[3][1]
- state[2][2], state[3][2], state[0][2], state[1][2] = state[0][2], state[1][2], state[2][2], state[3][2]
- state[3][3], state[0][3], state[1][3], state[2][3] = state[0][3], state[1][3], state[2][3], state[3][3]
- return
- def inv_sub_bytes(state: [[int]]) -> [[int]]:
- for r in range(len(state)):
- state[r] = [INV_S_BOX[state[r][c]] for c in range(len(state[0]))]
- def xtime(a: int) -> int:
- if a & 0x80:
- return ((a << 1) ^ 0x1b) & 0xff
- return a << 1
- def xtimes_0e(b):
- # 0x0e = 14 = b1110 = ((x * 2 + x) * 2 + x) * 2
- return xtime(xtime(xtime(b) ^ b) ^ b)
- def xtimes_0b(b):
- # 0x0b = 11 = b1011 = ((x*2)*2+x)*2+x
- return xtime(xtime(xtime(b)) ^ b) ^ b
- def xtimes_0d(b):
- # 0x0d = 13 = b1101 = ((x*2+x)*2)*2+x
- return xtime(xtime(xtime(b) ^ b)) ^ b
- def xtimes_09(b):
- # 0x09 = 9 = b1001 = ((x*2)*2)*2+x
- return xtime(xtime(xtime(b))) ^ b
- def mix_column(col: [int]):
- c_0 = col[0]
- all_xor = col[0] ^ col[1] ^ col[2] ^ col[3]
- col[0] ^= all_xor ^ xtime(col[0] ^ col[1])
- col[1] ^= all_xor ^ xtime(col[1] ^ col[2])
- col[2] ^= all_xor ^ xtime(col[2] ^ col[3])
- col[3] ^= all_xor ^ xtime(c_0 ^ col[3])
- def mix_columns(state: [[int]]):
- for r in state:
- mix_column(r)
- def state_from_bytes(data: bytes) -> [[int]]:
- state = [data[i*4:(i+1)*4] for i in range(len(data) // 4)]
- return state
- def bytes_from_state(state: [[int]]) -> bytes:
- return bytes(state[0] + state[1] + state[2] + state[3])
- def add_round_key(state: [[int]], key_schedule: [[[int]]], round: int):
- round_key = key_schedule[round]
- for r in range(len(state)):
- state[r] = [state[r][c] ^ round_key[r][c] for c in range(len(state[0]))]
- def inv_mix_column(col: [int]):
- c_0, c_1, c_2, c_3 = col[0], col[1], col[2], col[3]
- col[0] = xtimes_0e(c_0) ^ xtimes_0b(c_1) ^ xtimes_0d(c_2) ^ xtimes_09(c_3)
- col[1] = xtimes_09(c_0) ^ xtimes_0e(c_1) ^ xtimes_0b(c_2) ^ xtimes_0d(c_3)
- col[2] = xtimes_0d(c_0) ^ xtimes_09(c_1) ^ xtimes_0e(c_2) ^ xtimes_0b(c_3)
- col[3] = xtimes_0b(c_0) ^ xtimes_0d(c_1) ^ xtimes_09(c_2) ^ xtimes_0e(c_3)
- def inv_mix_columns(state: [[int]]) -> [[int]]:
- for g in state:
- inv_mix_column(r)
- def inv_mix_column_optimized(col: [int]):
- u = xtime(xtime(col[0] ^ col[2]))
- v = xtime(xtime(col[1] ^ col[3]))
- col[0] ^= u
- col[1] ^= v
- col[2] ^= u
- col[3] ^= v
- def inv_mix_columns_optimized(state: [[int]]) -> [[int]]:
- for r in state:
- inv_mix_column_optimized(r)
- mix_columns(state)
- def xor_bytes(a: bytes, b: bytes) -> bytes:
- return bytes([x ^ y for (x, y) in zip(a, b)])
- def rot_word(word: [int]) -> [int]:
- return word[1:] + word[:1]
- def sub_word(word: [int]) -> bytes:
- substituted_word = bytes(S_BOX[i] for i in word)
- return substituted_word
- def rcon(i: int) -> bytes:
- rcon_lookup = bytearray.fromhex('0102040810204081b36')
- rcon_value = bytes([rcon_lookup[i-1], 0, 0, 0])
- return rcon_value
- def key_expansion(key: bytes, nb: int = 4) -> [[[int]]]:
- nk = len(key) // 4
- key_bit_length = len(key) * 8
- if key_bit_length == 128:
- nr = 10
- elif key_bit_length == 192:
- nr = 12
- else: # 256-bit keys
- nr = 14
- w = state_from_bytes(key)
- for i in range(nk, nb * (nr + 1)):
- temp = w[i-1]
- if i % nk == 0:
- temp = xor_bytes(sub_word(rot_word(temp)), rcon(i // nk))
- elif nk > 6 and i % nk == 4:
- temp = sub_word(temp)
- w.append(xor_bytes(w[i - nk], temp))
- return [w[i*4:(i+1)*4] for i in range(len(w) // 4)]
- def aes_decryption(cipher: bytes, key: bytes) -> bytes:
- key_byte_length = len(key)
- key_bit_length = key_byte_length * 8
- nk = key_byte_length // 4
- if key_bit_length == 128:
- nr = 10
- elif key_bit_length == 192:
- nr = 12
- else: # 256-bit keys
- nr = 14
- state = state_from_bytes(cipher)
- key_schedule = key_expansion(key)
- add_round_key(state, key_schedule, round=nr)
- for round in range(nr, 0, -1):
- inv_shift_rows(state)
- inv_sub_bytes(state)
- add_round_key(state, key_schedule, round)
- inv_mix_columns(state)
- print("Round ", round, " : ", state)
- inv_shift_rows(state)
- inv_sub_bytes(state)
- add_round_key(state, key_schedule, round=0)
- plain = bytes_from_state(state)
- return plain
- key = bytearray.fromhex('00010203040060708090a0b0c0d0e0f')
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.bind(('127.0.0.1', 1111))
- s.listen(1)
- conn, addr = s.accept()
- data = conn.recv(1024)
- print("Received Encrypted Data: ", data)
- print("Decrypted Data: ", aes_decryption(data, key).decode('utf-8'))
- conn.close()
- #1st run receiver.py tehn run sender.py then put in the value in the sender.py and see the output in the receiver.py
- SEN
- import socket
- # CONSTANTS
- S_BOX_STRING = '63 7c 77 7b f2 6b 6f c5 30 01 67 2b fe d7 ab 76' \
- 'ca 82 c9 7d fa 59 47 f0 ad d4 a2 af 9c a4 72 c0' \
- 'b7 fd 93 26 36 3f f7 cc 34 a5 e5 f1 71 d8 31 15' \
- '04 c7 23 c3 18 96 05 9a 07 12 80 e2 eb 27 b2 75' \
- '09 83 2c 1a 1b 6e 5a a0 52 3b d6 b3 29 e3 2f 84' \
- '53 d1 00 ed 20 fc b1 5b 6a cb be 39 4a 4c 58 cf' \
- 'd0 ef aa fb 43 4d 33 85 45 f9 02 7f 50 3c 9f a8' \
- '51 a3 40 8f 92 9d 38 f5 bc b6 da 21 10 ff f3 d2' \
- 'cd 0c 13 ec 5f 97 44 17 c4 a7 7e 3d 64 5d 19 73' \
- '60 81 4f dc 22 2a 90 88 46 ee b8 14 de 5e 0b db' \
- 'e0 32 3a 0a 49 06 24 5c c2 d3 ac 62 91 95 e4 79' \
- 'e7 c8 37 6d 8d d5 4e a9 6c 56 f4 ea 65 7a ae 08' \
- 'ba 78 25 2e 1c a6 b4 c6 e8 dd 74 1f 4b bd 8b 8a' \
- '70 3e b5 66 48 03 f6 0e 61 35 57 b9 86 c1 1d 9e' \
- '8c a1 89 0d bf e6 42 68 41 99 2d 0f b0 54 bb 16'.replace(" ", "")
- S_BOX = bytearray.fromhex(S_BOX_STRING)
- def sub_word(word: [int]) -> bytes:
- substituted_word = bytes(S_BOX[i] for i in word)
- return substituted_word
- def rcon(i: int) -> bytes:
- rcon_lookup = bytearray.fromhex('0100408102040801b36')
- rcon_value = bytes([rcon_lookup[i-1], 0, 0, 0])
- return rcon_value
- def xor_bytes(a: bytes, b: bytes) -> bytes:
- return bytes([x ^ y for (x, y) in zip(a, b)])
- def rot_word(word: [int]) -> [int]:
- return word[1:] + word[:1]
- def key_expansion(key: bytes, nb: int = 4) -> [[[int]]]:
- nk = len(key) // 4
- key_bit_length = len(key) * 8
- if key_bit_length == 128:
- nr = 10
- elif key_bit_length == 192:
- nr = 12
- else: # 256-bit keys
- nr = 14
- w = state_from_bytes(key)
- for i in range(nk, nb * (nr + 1)):
- temp = w[i-1]
- if i % nk == 0:
- temp = xor_bytes(sub_word(rot_word(temp)), rcon(i // nk))
- elif nk > 6 and i % nk == 4:
- temp = sub_word(temp)
- w.append(xor_bytes(w[i - nk], temp))
- return [w[i*4:(i+1)*4] for i in range(len(w) // 4)]
- def add_round_key(state: [[int]], key_schedule: [[[int]]], round: int):
- round_key = key_schedule[round]
- for r in range(len(state)):
- state[r] = [state[r][c] ^ round_key[r][c] for c in range(len(state[0]))]
- def sub_bytes(state: [[int]]):
- for r in range(len(state)):
- state[r] = [S_BOX[state[r][c]] for c in range(len(state[0]))]
- def shift_rows(state: [[int]]):
- state[0][1], state[1][1], state[2][1], state[3][1] = state[1][1], state[2][1], state[3][1], state[0][1]
- state[0][2], state[1][2], state[2][2], state[3][2] = state[2][2], state[3][2], state[0][2], state[1][2]
- state[0][3], state[1][3], state[2][3], state[3][3] = state[3][3], state[0][3], state[1][3], state[2][3]
- def xtime(a: int) -> int:
- if a & 0x80:
- return ((a << 1) ^ 0x1b) & 0xff
- return a << 1
- def mix_column(col: [int]):
- c_0 = col[0]
- all_xor = col[0] ^ col[1] ^ col[2] ^ col[3]
- col[0] ^= all_xor ^ xtime(col[0] ^ col[1])
- col[1] ^= all_xor ^ xtime(col[1] ^ col[2])
- col[2] ^= all_xor ^ xtime(col[2] ^ col[3])
- col[3] ^= all_xor ^ xtime(c_0 ^ col[3])
- def mix_columns(state: [[int]]):
- for r in state:
- mix_column(r)
- def state_from_bytes(data: bytes) -> [[int]]:
- state = [data[i*4:(i+1)*4] for i in range(len(data) // 4)]
- return state
- def bytes_from_state(state: [[int]]) -> bytes:
- return bytes(state[0] + state[1] + state[2] + state[3])
- def aes_encryption(data: bytes, key: bytes) -> bytes:
- state = state_from_bytes(data)
- key_schedule = key_expansion(key)
- add_round_key(state, key_schedule, round=0)
- for round in range(1, 11):
- sub_bytes(state)
- shift_rows(state)
- mix_columns(state)
- add_round_key(state, key_schedule, round)
- print("Round ", round, " : ", state)
- sub_bytes(state)
- shift_rows(state)
- add_round_key(state, key_schedule, round=10)
- cipher = bytes_from_state(state)
- return cipher
- if name == "main":
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- server_address = ('127.0.0.1', 1111)
- s.connect(server_address)
- plaintext = input("Enter the plaintext: ")
- block_size = 16
- padding_length = block_size - (len(plaintext) % block_size)
- plaintext += chr(padding_length) * padding_length
- plaintext_bytes = plaintext.encode()
- key = bytearray.fromhex('00010203040060708090a0b0c0d0e0f')
- ciphertext = aes_encryption(plaintext_bytes, key)
- print("Ciphertext (hex): ", ciphertext.hex())
- s.sendall(ciphertext)
- DES
- CLIENT
- import socket
- INITIAL_PERM = [58, 50, 42, 34, 26, 18, 10, 2,
- 60, 52, 44, 36, 28, 20, 12, 4,
- 62, 54, 46, 38, 30, 22, 14, 6,
- 64, 56, 48, 40, 32, 24, 16, 8,
- 57, 49, 41, 33, 25, 17, 9, 1,
- 59, 51, 43, 35, 27, 19, 11, 3,
- 61, 53, 45, 37, 29, 21, 13, 5,
- 63, 55, 47, 39, 31, 23, 15, 7]
- D = [32, 1, 2, 3, 4, 5, 4, 5,
- 6, 7, 8, 9, 8, 9, 10, 11,
- 12, 13, 12, 13, 14, 15, 16, 17,
- 16, 17, 18, 19, 20, 21, 20, 21,
- 22, 23, 24, 25, 24, 25, 26, 27,
- 28, 29, 28, 29, 30, 31, 32, 1]
- PERM = [16, 7, 20, 21,
- 29, 12, 28, 17,
- 1, 15, 23, 26,
- 5, 18, 31, 10,
- 2, 8, 24, 14,
- 32, 27, 3, 9,
- 19, 13, 30, 6,
- 22, 11, 4, 25]
- SBOX = [[[14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7],
- [0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8],
- [4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0],
- [15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13]],
- [[15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10],
- [3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5],
- [0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15],
- [13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9]],
- [[10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8],
- [13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1],
- [13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7],
- [1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12]],
- [[7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15],
- [13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9],
- [10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4],
- [3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14]],
- [[2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9],
- [14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6],
- [4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14],
- [11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3]],
- [[12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11],
- [10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8],
- [9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6],
- [4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13]],
- [[4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1],
- [13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6],
- [1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2],
- [6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12]],
- [[13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7],
- [1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2],
- [7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8],
- [2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11]]]
- FPERM = [40, 8, 48, 16, 56, 24, 64, 32,
- 39, 7, 47, 15, 55, 23, 63, 31,
- 38, 6, 46, 14, 54, 22, 62, 30,
- 37, 5, 45, 13, 53, 21, 61, 29,
- 36, 4, 44, 12, 52, 20, 60, 28,
- 35, 3, 43, 11, 51, 19, 59, 27,
- 33, 1, 41, 9, 49, 17, 57, 25]
- # --parity bit drop table
- KEYP = [57, 49, 41, 33, 25, 17, 9,
- 1, 58, 50, 42, 34, 26, 18,
- 10, 2, 59, 51, 43, 35, 27,
- 19, 11, 3, 60, 52, 44, 36,
- 63, 55, 47, 39, 31, 23, 15,
- 7, 62, 54, 46, 38, 30, 22,
- 14, 6, 61, 53, 45, 37, 29,
- 21, 13, 5, 28, 20, 12, 4]
- # Number of bit shifts
- SHIFT_TABLE = [1, 1, 2, 2,
- 2, 2, 2, 2,
- 1, 2, 2, 2,
- 2, 2, 2, 1]
- # Key- Compression Table : Compression of key from 56 bits to 48 bits
- KEY_COMP = [14, 17, 11, 24, 1, 5,
- 3, 28, 15, 6, 21, 10,
- 23, 19, 12, 4, 26, 8,
- 16, 7, 27, 20, 13, 2,
- 41, 52, 31, 37, 47, 55,
- 30, 40, 51, 45, 33, 48,
- 44, 49, 39, 56, 34, 53,
- 46, 42, 50, 36, 29, 32]
- def hex2bin(s):
- mp = {'0': "0000",
- '1': "0001",
- '2': "0010",
- '3': "0011",
- '4': "0100",
- '5': "0101",
- '6': "0110",
- '7': "0111",
- '8': "1000",
- '9': "1001",
- 'A': "1010",
- 'B': "1011",
- 'C': "1100",
- 'D': "1101",
- 'E': "1110",
- 'F': "1111"}
- bin = ""
- for i in range(len(s)):
- bin = bin + mp[s[i]]
- return bin
- def bin2hex(s):
- mp = {"0000": '0',
- "0001": '1',
- "0010": '2',
- "0011": '3',
- "0100": '4',
- "0101": '5',
- "0110": '6',
- "0111": '7',
- "1000": '8',
- "1001": '9',
- "1010": 'A',
- "1011": 'B',
- "1100": 'C',
- "1101": 'D',
- "1110": 'E',
- "1111": 'F'}
- hex = ""
- for i in range(0, len(s), 4):
- ch = ""
- ch = ch + s[i]
- ch = ch + s[i + 1]
- ch = ch + s[i + 2]
- ch = ch + s[i + 3]
- hex = hex + mp[ch]
- return hex
- def bin2dec(binary):
- binary1 = binary
- decimal, i, n = 0, 0, 0
- while(binary != 0):
- dec = binary % 10
- decimal = decimal + dec * pow(2, i)
- binary = binary//10
- i += 1
- return decimal
- def dec2bin(num):
- res = bin(num).replace("0b", "")
- if(len(res) % 4 != 0):
- div = len(res) / 4
- div = int(div)
- counter = (4 * (div + 1)) - len(res)
- for i in range(0, counter):
- res = '0' + res
- return res
- def permute(k, arr, n):
- permutation = ""
- for i in range(0, n):
- permutation = permutation + k[arr[i] - 1]
- return permutation
- def shift_left(k, nth_shifts):
- s = ""
- for i in range(nth_shifts):
- for j in range(1, len(k)):
- s = s + k[j]
- s = s + k[0]
- k = s
- s = ""
- return k
- def xor(a, b):
- ans = ""
- for i in range(len(a)):
- if a[i] == b[i]:
- ans = ans + "0"
- else:
- ans = ans + "1"
- return ans
- def encrypt(pt, rkb, rk):
- pt = hex2bin(pt)
- pt = permute(pt, INITIAL_PERM, 64)
- print("After initial permutation", bin2hex(pt))
- left = pt[0:32]
- right = pt[32:64]
- for i in range(0, 16):
- right_expanded = permute(right, D, 48)
- xor_x = xor(right_expanded, rkb[i])
- sbox_str = ""
- for j in range(0, 8):
- row = bin2dec(int(xor_x[j * 6] + xor_x[j * 6 + 5]))
- col = bin2dec(
- int(xor_x[j * 6 + 1] + xor_x[j * 6 + 2] + xor_x[j * 6 + 3] + xor_x[j * 6 + 4]))
- val = SBOX[j][row][col]
- sbox_str = sbox_str + dec2bin(val)
- sbox_str = permute(sbox_str, PERM, 32)
- result = xor(left, sbox_str)
- left = result
- if(i != 15):
- left, right = right, left
- print("Round ", i + 1, " ", bin2hex(left),
- " ", bin2hex(right), " ", rk[i])
- combine = left + right
- cipher_text = permute(combine, FPERM, 64)
- return cipher_text
- def keygen(key):
- key = hex2bin(key)
- key = permute(key, KEYP, 56)
- left = key[0:28]
- right = key[28:56]
- rkb = []
- rk = []
- for i in range(0, 16):
- left = shift_left(left, SHIFT_TABLE[i])
- right = shift_left(right, SHIFT_TABLE[i])
- combine_str = left + right
- round_key = permute(combine_str, KEY_COMP, 48)
- rkb.append(round_key)
- rk.append(bin2hex(round_key))
- return rkb, rk
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- port = 1234
- ip = '127.0.0.1'
- s.connect((ip, port))
- data = input("Enter Hexadecimal data to send: ")
- key ="AABB09182736CCDD"
- rkb, rk = keygen(key)
- cipher_text = bin2hex(encrypt(data, rkb, rk))
- print("Cipher Text : ", cipher_text)
- s.send(cipher_text.encode())
- s.close()
- SENDER
- import socket
- INITIAL_PERM = [58, 50, 42, 34, 26, 18, 10, 2,
- 60, 52, 44, 36, 28, 20, 12, 4,
- 62, 54, 46, 38, 30, 22, 14, 6,
- 64, 56, 48, 40, 32, 24, 16, 8,
- 57, 49, 41, 33, 25, 17, 9, 1,
- 59, 51, 43, 35, 27, 19, 11, 3,
- 61, 53, 45, 37, 29, 21, 13, 5,
- 63, 55, 47, 39, 31, 23, 15, 7]
- D = [32, 1, 2, 3, 4, 5, 4, 5,
- 6, 7, 8, 9, 8, 9, 10, 11,
- 12, 13, 12, 13, 14, 15, 16, 17,
- 16, 17, 18, 19, 20, 21, 20, 21,
- 22, 23, 24, 25, 24, 25, 26, 27,
- 28, 29, 28, 29, 30, 31, 32, 1]
- PERM = [16, 7, 20, 21,
- 29, 12, 28, 17,
- 1, 15, 23, 26,
- 5, 18, 31, 10,
- 2, 8, 24, 14,
- 32, 27, 3, 9,
- 19, 13, 30, 6,
- 22, 11, 4, 25]
- SBOX = [[[14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7],
- [0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8],
- [4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0],
- [15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13]],
- [[15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10],
- [3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5],
- [0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15],
- [13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9]],
- [[10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8],
- [13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1],
- [13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7],
- [1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12]],
- [[7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15],
- [13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9],
- [10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4],
- [3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14]],
- [[2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9],
- [14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6],
- [4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14],
- [11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3]],
- [[12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11],
- [10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8],
- [9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6],
- [4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13]],
- [[4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1],
- [13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6],
- [1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2],
- [6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12]],
- [[13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7],
- [1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2],
- [7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8],
- [2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11]]]
- FPERM = [40, 8, 48, 16, 56, 24, 64, 32,
- 39, 7, 47, 15, 55, 23, 63, 31,
- 38, 6, 46, 14, 54, 22, 62, 30,
- 37, 5, 45, 13, 53, 21, 61, 29,
- 36, 4, 44, 12, 52, 20, 60, 28,
- 35, 3, 43, 11, 51, 19, 59, 27,
- 34, 2, 42, 10, 50, 18, 58, 26,
- 33, 1, 41, 9, 49, 17, 57, 25]
- # --parity bit drop table
- KEYP = [57, 49, 41, 33, 25, 17, 9,
- 1, 58, 50, 42, 34, 26, 18,
- 10, 2, 59, 51, 43, 35, 27,
- 19, 11, 3, 60, 52, 44, 36,
- 63, 55, 47, 39, 31, 23, 15,
- 7, 62, 54, 46, 38, 30, 22,
- 14, 6, 61, 53, 45, 37, 29,
- 21, 13, 5, 28, 20, 12, 4]
- # Number of bit shifts
- SHIFT_TABLE = [1, 1, 2, 2,
- 2, 2, 2, 2,
- 1, 2, 2, 2,
- 2, 2, 2, 1]
- # Key- Compression Table : Compression of key from 56 bits to 48 bits
- KEY_COMP = [14, 17, 11, 24, 1, 5,
- 3, 28, 15, 6, 21, 10,
- 23, 19, 12, 4, 26, 8,
- 16, 7, 27, 20, 13, 2,
- 41, 52, 31, 37, 47, 55,
- 30, 40, 51, 45, 33, 48,
- 44, 49, 39, 56, 34, 53,
- 46, 42, 50, 36, 29, 32]
- def hex2bin(s):
- mp = {'0': "0000",
- '1': "0001",
- '2': "0010",
- '3': "0011",
- '4': "0100",
- '5': "0101",
- '6': "0110",
- '7': "0111",
- '8': "1000",
- '9': "1001",
- 'A': "1010",
- 'B': "1011",
- 'C': "1100",
- 'D': "1101",
- 'E': "1110",
- 'F': "1111"}
- bin = ""
- for i in range(len(s)):
- bin = bin + mp[s[i]]
- return bin
- def bin2hex(s):
- mp = {"0000": '0',
- "0001": '1',
- "0010": '2',
- "0011": '3',
- "0100": '4',
- "0101": '5',
- "0110": '6',
- "0111": '7',
- "1000": '8',
- "1001": '9',
- "1010": 'A',
- "1011": 'B',
- "1100": 'C',
- "1101": 'D',
- "1110": 'E',
- "1111": 'F'}
- hex = ""
- for i in range(0, len(s), 4):
- ch = ""
- ch = ch + s[i]
- ch = ch + s[i + 1]
- ch = ch + s[i + 2]
- ch = ch + s[i + 3]
- hex = hex + mp[ch]
- return hex
- def bin2dec(binary):
- binary1 = binary
- decimal, i, n = 0, 0, 0
- while(binary != 0):
- dec = binary % 10
- decimal = decimal + dec * pow(2, i)
- binary = binary//10
- i += 1
- return decimal
- def dec2bin(num):
- res = bin(num).replace("0b", "")
- if(len(res) % 4 != 0):
- div = len(res) / 4
- div = int(div)
- counter = (4 * (div + 1)) - len(res)
- for i in range(0, counter):
- res = '0' + res
- return res
- def permute(k, arr, n):
- permutation = ""
- for i in range(0, n):
- permutation = permutation + k[arr[i] - 1]
- return permutation
- def shift_left(k, nth_shifts):
- s = ""
- for i in range(nth_shifts):
- for j in range(1, len(k)):
- s = s + k[j]
- s = s + k[0]
- k = s
- s = ""
- return k
- def xor(a, b):
- ans = ""
- for i in range(len(a)):
- if a[i] == b[i]:
- ans = ans + "1"
- else:
- ans = ans + "0"
- return ans
- def encrypt(pt, rkb, rk):
- pt = hex2bin(pt)
- # Initial Permutation
- pt = permute(pt, INITIAL_PERM, 64)
- print("After initial permutation", bin2hex(pt))
- # Splitting
- left = pt[0:32]
- right = pt[32:64]
- for i in range(0, 16):
- # Expansion D-box: Expanding the 32 bits data into 48 bits
- right_expanded = permute(right, D, 48)
- xor_x = xor(right_expanded, rkb[i])
- sbox_str = ""
- for j in range(0, 8):
- row = bin2dec(int(xor_x[j * 6] + xor_x[j * 6 + 5]))
- col = bin2dec(
- int(xor_x[j * 6 + 1] + xor_x[j * 6 + 2] + xor_x[j * 6 + 3] + xor_x[j * 6 + 4]))
- val = SBOX[j][row][col]
- sbox_str = sbox_str + dec2bin(val)
- sbox_str = permute(sbox_str, PERM, 32)
- result = xor(left, sbox_str)
- left = result
- if(i != 15):
- left, right = right, left
- print("Round ", i + 1, " ", bin2hex(left),
- " ", bin2hex(right), " ", rk[i])
- combine = left + right
- cipher_text = permute(combine, FPERM, 64)
- return cipher_text
- def keygen(key):
- key = hex2bin(key)
- key = permute(key, KEYP, 56)
- left = key[0:28]
- right = key[28:56]
- rkb = []
- rk = []
- for i in range(0, 16):
- left = shift_left(left, SHIFT_TABLE[i])
- right = shift_left(right, SHIFT_TABLE[i])
- combine_str = left + right
- round_key = permute(combine_str, KEY_COMP, 48)
- rkb.append(round_key)
- rk.append(bin2hex(round_key))
- return rkb, rk
- key = input("Enter the hex key: ")
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- port = 1234
- ip = '127.0.0.1'
- s.bind((ip, port))
- s.listen(5)
- c, addr = s.accept()
- data = c.recv(1024).decode()
- rkb, rk = keygen(key)
- print("Decryption")
- rkb_rev = rkb[::-1]
- rk_rev = rk[::-1]
- text = bin2hex(encrypt(data, rkb_rev, rk_rev))
- print("Plain Text : ", text)
[text] AD
Viewer
*** This page was generated with the meta tag "noindex, nofollow". This happened because you selected this option before saving or the system detected it as spam. This means that this page will never get into the search engines and the search bot will not crawl it. There is nothing to worry about, you can still share it with anyone.
Editor
You can edit this paste and save as new: