X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;ds=sidebyside;f=jh%2Fjh_simple_small_core.c;fp=jh%2Fjh_simple_small_core.c;h=c3c97aed8cea63c1dd143f9540db0f27dc721357;hb=e2a5b474634f8c07d75119c2affdc6bb7f4e7848;hp=0000000000000000000000000000000000000000;hpb=bd740a03aa9137d46277a2eee05ac6be538ef69d;p=avr-crypto-lib.git
diff --git a/jh/jh_simple_small_core.c b/jh/jh_simple_small_core.c
new file mode 100644
index 0000000..c3c97ae
--- /dev/null
+++ b/jh/jh_simple_small_core.c
@@ -0,0 +1,182 @@
+/* jh_simple_speed.c */
+/*
+ This file is part of the AVR-Crypto-Lib.
+ Copyright (C) 2006-2010 Daniel Otte (daniel.otte@rub.de)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+*/
+
+#include
+#include
+#include
+#include
+#include "memxor.h"
+#include "jh_simple.h"
+
+#define DEBUG 0
+
+#if DEBUG
+#include "cli.h"
+#endif
+
+static uint8_t sbox0[] PROGMEM =
+ { 9, 0, 4, 11, 13, 12, 3, 15, 1, 10, 2, 6, 7, 5, 8, 14 };
+static uint8_t sbox1[] PROGMEM =
+ { 3, 12, 6, 13, 5, 7, 1, 9, 15, 2, 0, 4, 11, 10, 14, 8 };
+
+static uint8_t round_const_0[] PROGMEM = {
+ 0x6a, 0x09, 0xe6, 0x67, 0xf3, 0xbc, 0xc9, 0x08,
+ 0xb2, 0xfb, 0x13, 0x66, 0xea, 0x95, 0x7d, 0x3e,
+ 0x3a, 0xde, 0xc1, 0x75, 0x12, 0x77, 0x50, 0x99,
+ 0xda, 0x2f, 0x59, 0x0b, 0x06, 0x67, 0x32, 0x2a,
+};
+
+static
+uint8_t jh_l(uint8_t v, uint8_t w){
+ v ^= ((w<<1)^(w>>3)^((w>>2)&2))&0xf;
+ w ^= ((v<<1)^(v>>3)^((v>>2)&2))&0xf;
+ return v|(w<<4);
+}
+
+static
+void jh_round(uint8_t* a, uint8_t* rc){
+ uint8_t b[128];
+ uint8_t i,r,x,y;
+ for(i=0; i<128; ++i){
+ if(i%4==0){
+ r = rc[i/4];
+ }
+ x = pgm_read_byte(((r&0x80)?sbox1:sbox0)+(a[i]>>4));
+ y = pgm_read_byte(((r&0x40)?sbox1:sbox0)+(a[i]&0xf));
+ a[i]=jh_l(y,x);
+ r<<=2;
+ }
+ /* pi permutation */
+ for(i=1; i<128; i+=2){
+ a[i] = (a[i]<<4)|(a[i]>>4);
+ }
+ /* P' permutation */
+ for(i=0; i<64; ++i){
+ b[i] = (a[i*2]&0xF0) | (a[i*2+1]>>4);
+ b[64+i] = (a[i*2]<<4) | (a[i*2+1]&0x0F);
+ }
+ memcpy(a,b,64);
+ /* phi permutation */
+ for(i=64; i<128; i+=1){
+ a[i] = (b[i]<<4)|(b[i]>>4);
+ }
+}
+
+static
+void jh_next_round_const(uint8_t* a){
+ uint8_t b[32];
+ uint8_t i,x,y;
+ for(i=0; i<32; ++i){
+ x = pgm_read_byte(sbox0+(a[i]>>4));
+ y = pgm_read_byte(sbox0+(a[i]&0xf));
+ a[i]=jh_l(y,x);
+ }
+ /* pi permutation */
+ for(i=1; i<32; i+=2){
+ a[i] = (a[i]<<4)|(a[i]>>4);
+ }
+ /* P' permutation */
+ for(i=0; i<16; ++i){
+ b[i] = (a[i*2]&0xF0) | (a[i*2+1]>>4);
+ b[16+i] = (a[i*2]<<4) | (a[i*2+1]&0x0F);
+ }
+ memcpy(a,b,16);
+ /* phi permutation */
+ for(i=16; i<32; i+=1){
+ a[i] = (b[i]<<4)|(b[i]>>4);
+ }
+}
+
+
+
+static inline
+void group(uint8_t *a){
+ uint8_t b[128];
+ uint8_t i,x,y;
+ for(i=0; i<128; ++i){
+ x = (((a[i/8+ 0])>>4)&0x8)
+ | (((a[i/8+ 32])>>5)&0x4)
+ | (((a[i/8+ 64])>>6)&0x2)
+ | (((a[i/8+ 96])>>7)&0x1);
+ a[i/8] <<= 1; a[i/8+32]<<=1; a[i/8+64]<<=1; a[i/8+96]<<=1;
+ y = (((a[i/8+ 16])>>4)&0x8)
+ | (((a[i/8+ 48])>>5)&0x4)
+ | (((a[i/8+ 80])>>6)&0x2)
+ | (((a[i/8+112])>>7)&0x1);
+ a[i/8+16] <<= 1; a[i/8+48]<<=1; a[i/8+80]<<=1; a[i/8+112]<<=1;
+ b[i]= (x<<4)|y;
+ }
+ memcpy(a,b,128);
+}
+
+static inline
+void degroup(uint8_t *a){
+ uint8_t b[128];
+ static uint8_t idx[]={112,80,48,16,96,64,32,0};
+ uint8_t i,j,k,t;
+ for(i=0;i<128;++i){
+ j=i/8;
+ t = a[i];
+ for(k=0; k<8; ++k){
+ b[j+idx[k]]<<=1; b[j+idx[k]] |= t&1; t>>=1;
+ }
+ }
+ memcpy(a,b,128);
+}
+
+void jh_encrypt(uint8_t* a){
+ uint8_t i;
+ uint8_t rc[32];
+ /* grouping */
+#if DEBUG
+ cli_putstr_P(PSTR("\r\n== pre group ==\r\n"));
+ cli_hexdump_block(a, 128, 4, 16);
+#endif
+ group(a);
+ for(i=0;i<32;++i){
+ rc[i] = pgm_read_byte(&(round_const_0[i]));
+ }
+ for(i=0;i<35;++i){
+ jh_round(a, rc);
+ jh_next_round_const(rc);
+ }
+ uint8_t r,x,y;
+
+ for(i=0; i<128; ++i){
+ if(i%4==0){
+ r = rc[i/4];
+ }
+ x = pgm_read_byte(((r&0x80)?sbox1:sbox0)+(a[i]>>4));
+ y = pgm_read_byte(((r&0x40)?sbox1:sbox0)+(a[i]&0xf));
+ a[i]=(x<<4)|y;
+ r<<=2;
+ }
+ /* degrouping */
+#if DEBUG
+ cli_putstr_P(PSTR("\r\n== pre degroup ==\r\n"));
+ cli_hexdump_block(a, 128, 4, 16);
+#endif
+ degroup(a);
+#if DEBUG
+ cli_putstr_P(PSTR("\r\n== post degroup ==\r\n"));
+ cli_hexdump_block(a, 128, 4, 16);
+#endif
+}
+
+