root/galaxy-central/eggs/pycrypto-2.0.1-py2.6-macosx-10.6-universal-ucs2.egg/Crypto/Protocol/AllOrNothing.py @ 3

リビジョン 3, 10.7 KB (コミッタ: kohda, 14 年 前)

Install Unix tools  http://hannonlab.cshl.edu/galaxy_unix_tools/galaxy.html

行番号 
1"""This file implements all-or-nothing package transformations.
2
3An all-or-nothing package transformation is one in which some text is
4transformed into message blocks, such that all blocks must be obtained before
5the reverse transformation can be applied.  Thus, if any blocks are corrupted
6or lost, the original message cannot be reproduced.
7
8An all-or-nothing package transformation is not encryption, although a block
9cipher algorithm is used.  The encryption key is randomly generated and is
10extractable from the message blocks.
11
12This class implements the All-Or-Nothing package transformation algorithm
13described in:
14
15Ronald L. Rivest.  "All-Or-Nothing Encryption and The Package Transform"
16http://theory.lcs.mit.edu/~rivest/fusion.pdf
17
18"""
19
20__revision__ = "$Id: AllOrNothing.py,v 1.8 2003/02/28 15:23:20 akuchling Exp $"
21
22import operator
23import string
24from Crypto.Util.number import bytes_to_long, long_to_bytes
25
26
27
28class AllOrNothing:
29    """Class implementing the All-or-Nothing package transform.
30
31    Methods for subclassing:
32
33        _inventkey(key_size):
34            Returns a randomly generated key.  Subclasses can use this to
35            implement better random key generating algorithms.  The default
36            algorithm is probably not very cryptographically secure.
37
38    """
39
40    def __init__(self, ciphermodule, mode=None, IV=None):
41        """AllOrNothing(ciphermodule, mode=None, IV=None)
42
43        ciphermodule is a module implementing the cipher algorithm to
44        use.  It must provide the PEP272 interface.
45
46        Note that the encryption key is randomly generated
47        automatically when needed.  Optional arguments mode and IV are
48        passed directly through to the ciphermodule.new() method; they
49        are the feedback mode and initialization vector to use.  All
50        three arguments must be the same for the object used to create
51        the digest, and to undigest'ify the message blocks.
52        """
53
54        self.__ciphermodule = ciphermodule
55        self.__mode = mode
56        self.__IV = IV
57        self.__key_size = ciphermodule.key_size
58        if self.__key_size == 0:
59            self.__key_size = 16
60
61    __K0digit = chr(0x69)
62
63    def digest(self, text):
64        """digest(text:string) : [string]
65
66        Perform the All-or-Nothing package transform on the given
67        string.  Output is a list of message blocks describing the
68        transformed text, where each block is a string of bit length equal
69        to the ciphermodule's block_size.
70        """
71
72        # generate a random session key and K0, the key used to encrypt the
73        # hash blocks.  Rivest calls this a fixed, publically-known encryption
74        # key, but says nothing about the security implications of this key or
75        # how to choose it.
76        key = self._inventkey(self.__key_size)
77        K0 = self.__K0digit * self.__key_size
78
79        # we need two cipher objects here, one that is used to encrypt the
80        # message blocks and one that is used to encrypt the hashes.  The
81        # former uses the randomly generated key, while the latter uses the
82        # well-known key.
83        mcipher = self.__newcipher(key)
84        hcipher = self.__newcipher(K0)
85
86        # Pad the text so that its length is a multiple of the cipher's
87        # block_size.  Pad with trailing spaces, which will be eliminated in
88        # the undigest() step.
89        block_size = self.__ciphermodule.block_size
90        padbytes = block_size - (len(text) % block_size)
91        text = text + ' ' * padbytes
92
93        # Run through the algorithm:
94        # s: number of message blocks (size of text / block_size)
95        # input sequence: m1, m2, ... ms
96        # random key K' (`key' in the code)
97        # Compute output sequence: m'1, m'2, ... m's' for s' = s + 1
98        # Let m'i = mi ^ E(K', i) for i = 1, 2, 3, ..., s
99        # Let m's' = K' ^ h1 ^ h2 ^ ... hs
100        # where hi = E(K0, m'i ^ i) for i = 1, 2, ... s
101        #
102        # The one complication I add is that the last message block is hard
103        # coded to the number of padbytes added, so that these can be stripped
104        # during the undigest() step
105        s = len(text) / block_size
106        blocks = []
107        hashes = []
108        for i in range(1, s+1):
109            start = (i-1) * block_size
110            end = start + block_size
111            mi = text[start:end]
112            assert len(mi) == block_size
113            cipherblock = mcipher.encrypt(long_to_bytes(i, block_size))
114            mticki = bytes_to_long(mi) ^ bytes_to_long(cipherblock)
115            blocks.append(mticki)
116            # calculate the hash block for this block
117            hi = hcipher.encrypt(long_to_bytes(mticki ^ i, block_size))
118            hashes.append(bytes_to_long(hi))
119
120        # Add the padbytes length as a message block
121        i = i + 1
122        cipherblock = mcipher.encrypt(long_to_bytes(i, block_size))
123        mticki = padbytes ^ bytes_to_long(cipherblock)
124        blocks.append(mticki)
125
126        # calculate this block's hash
127        hi = hcipher.encrypt(long_to_bytes(mticki ^ i, block_size))
128        hashes.append(bytes_to_long(hi))
129
130        # Now calculate the last message block of the sequence 1..s'.  This
131        # will contain the random session key XOR'd with all the hash blocks,
132        # so that for undigest(), once all the hash blocks are calculated, the
133        # session key can be trivially extracted.  Calculating all the hash
134        # blocks requires that all the message blocks be received, thus the
135        # All-or-Nothing algorithm succeeds.
136        mtick_stick = bytes_to_long(key) ^ reduce(operator.xor, hashes)
137        blocks.append(mtick_stick)
138
139        # we convert the blocks to strings since in Python, byte sequences are
140        # always represented as strings.  This is more consistent with the
141        # model that encryption and hash algorithms always operate on strings.
142        return map(long_to_bytes, blocks)
143
144
145    def undigest(self, blocks):
146        """undigest(blocks : [string]) : string
147
148        Perform the reverse package transformation on a list of message
149        blocks.  Note that the ciphermodule used for both transformations
150        must be the same.  blocks is a list of strings of bit length
151        equal to the ciphermodule's block_size.
152        """
153
154        # better have at least 2 blocks, for the padbytes package and the hash
155        # block accumulator
156        if len(blocks) < 2:
157            raise ValueError, "List must be at least length 2."
158
159        # blocks is a list of strings.  We need to deal with them as long
160        # integers
161        blocks = map(bytes_to_long, blocks)
162
163        # Calculate the well-known key, to which the hash blocks are
164        # encrypted, and create the hash cipher.
165        K0 = self.__K0digit * self.__key_size
166        hcipher = self.__newcipher(K0)
167
168        # Since we have all the blocks (or this method would have been called
169        # prematurely), we can calcualte all the hash blocks.
170        hashes = []
171        for i in range(1, len(blocks)):
172            mticki = blocks[i-1] ^ i
173            hi = hcipher.encrypt(long_to_bytes(mticki))
174            hashes.append(bytes_to_long(hi))
175
176        # now we can calculate K' (key).  remember the last block contains
177        # m's' which we don't include here
178        key = blocks[-1] ^ reduce(operator.xor, hashes)
179
180        # and now we can create the cipher object
181        mcipher = self.__newcipher(long_to_bytes(key))
182        block_size = self.__ciphermodule.block_size
183
184        # And we can now decode the original message blocks
185        parts = []
186        for i in range(1, len(blocks)):
187            cipherblock = mcipher.encrypt(long_to_bytes(i, block_size))
188            mi = blocks[i-1] ^ bytes_to_long(cipherblock)
189            parts.append(mi)
190
191        # The last message block contains the number of pad bytes appended to
192        # the original text string, such that its length was an even multiple
193        # of the cipher's block_size.  This number should be small enough that
194        # the conversion from long integer to integer should never overflow
195        padbytes = int(parts[-1])
196        text = string.join(map(long_to_bytes, parts[:-1]), '')
197        return text[:-padbytes]
198
199    def _inventkey(self, key_size):
200        # TBD: Not a very secure algorithm.  Eventually, I'd like to use JHy's
201        # kernelrand module
202        import time
203        from Crypto.Util import randpool
204        # TBD: key_size * 2 to work around possible bug in RandomPool?
205        pool = randpool.RandomPool(key_size * 2)
206        while key_size > pool.entropy:
207            pool.add_event()
208
209        # we now have enough entropy in the pool to get a key_size'd key
210        return pool.get_bytes(key_size)
211
212    def __newcipher(self, key):
213        if self.__mode is None and self.__IV is None:
214            return self.__ciphermodule.new(key)
215        elif self.__IV is None:
216            return self.__ciphermodule.new(key, self.__mode)
217        else:
218            return self.__ciphermodule.new(key, self.__mode, self.__IV)
219
220
221
222if __name__ == '__main__':
223    import sys
224    import getopt
225    import base64
226
227    usagemsg = '''\
228Test module usage: %(program)s [-c cipher] [-l] [-h]
229
230Where:
231    --cipher module
232    -c module
233        Cipher module to use.  Default: %(ciphermodule)s
234
235    --aslong
236    -l
237        Print the encoded message blocks as long integers instead of base64
238        encoded strings
239
240    --help
241    -h
242        Print this help message
243'''
244
245    ciphermodule = 'AES'
246    aslong = 0
247
248    def usage(code, msg=None):
249        if msg:
250            print msg
251        print usagemsg % {'program': sys.argv[0],
252                          'ciphermodule': ciphermodule}
253        sys.exit(code)
254
255    try:
256        opts, args = getopt.getopt(sys.argv[1:],
257                                   'c:l', ['cipher=', 'aslong'])
258    except getopt.error, msg:
259        usage(1, msg)
260
261    if args:
262        usage(1, 'Too many arguments')
263
264    for opt, arg in opts:
265        if opt in ('-h', '--help'):
266            usage(0)
267        elif opt in ('-c', '--cipher'):
268            ciphermodule = arg
269        elif opt in ('-l', '--aslong'):
270            aslong = 1
271
272    # ugly hack to force __import__ to give us the end-path module
273    module = __import__('Crypto.Cipher.'+ciphermodule, None, None, ['new'])
274
275    a = AllOrNothing(module)
276    print 'Original text:\n=========='
277    print __doc__
278    print '=========='
279    msgblocks = a.digest(__doc__)
280    print 'message blocks:'
281    for i, blk in map(None, range(len(msgblocks)), msgblocks):
282        # base64 adds a trailing newline
283        print '    %3d' % i,
284        if aslong:
285            print bytes_to_long(blk)
286        else:
287            print base64.encodestring(blk)[:-1]
288    #
289    # get a new undigest-only object so there's no leakage
290    b = AllOrNothing(module)
291    text = b.undigest(msgblocks)
292    if text == __doc__:
293        print 'They match!'
294    else:
295        print 'They differ!'
Note: リポジトリブラウザについてのヘルプは TracBrowser を参照してください。