mirror of
https://github.com/Sneed-Group/Poodletooth-iLand
synced 2024-12-27 13:42:28 -06:00
121 lines
4.2 KiB
Python
121 lines
4.2 KiB
Python
|
# -*- coding: utf-8 -*-
|
||
|
#
|
||
|
# Cipher/ARC4.py : ARC4
|
||
|
#
|
||
|
# ===================================================================
|
||
|
# The contents of this file are dedicated to the public domain. To
|
||
|
# the extent that dedication to the public domain is not available,
|
||
|
# everyone is granted a worldwide, perpetual, royalty-free,
|
||
|
# non-exclusive license to exercise all rights associated with the
|
||
|
# contents of this file for any purpose whatsoever.
|
||
|
# No rights are reserved.
|
||
|
#
|
||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||
|
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||
|
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||
|
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||
|
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||
|
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||
|
# SOFTWARE.
|
||
|
# ===================================================================
|
||
|
"""ARC4 symmetric cipher
|
||
|
|
||
|
ARC4_ (Alleged RC4) is an implementation of RC4 (Rivest's Cipher version 4),
|
||
|
a symmetric stream cipher designed by Ron Rivest in 1987.
|
||
|
|
||
|
The cipher started as a proprietary design, that was reverse engineered and
|
||
|
anonymously posted on Usenet in 1994. The company that owns RC4 (RSA Data
|
||
|
Inc.) never confirmed the correctness of the leaked algorithm.
|
||
|
|
||
|
Unlike RC2, the company has never published the full specification of RC4,
|
||
|
of whom it still holds the trademark.
|
||
|
|
||
|
ARC4 keys can vary in length from 40 to 2048 bits.
|
||
|
|
||
|
One problem of ARC4 is that it does not take a nonce or an IV. If it is required
|
||
|
to encrypt multiple messages with the same long-term key, a distinct
|
||
|
independent nonce must be created for each message, and a short-term key must
|
||
|
be derived from the combination of the long-term key and the nonce.
|
||
|
Due to the weak key scheduling algorithm of RC2, the combination must be carried
|
||
|
out with a complex function (e.g. a cryptographic hash) and not by simply
|
||
|
concatenating key and nonce.
|
||
|
|
||
|
New designs should not use ARC4. A good alternative is AES
|
||
|
(`Crypto.Cipher.AES`) in any of the modes that turn it into a stream cipher (OFB, CFB, or CTR).
|
||
|
|
||
|
As an example, encryption can be done as follows:
|
||
|
|
||
|
>>> from Crypto.Cipher import ARC4
|
||
|
>>> from Crypto.Hash import SHA
|
||
|
>>> from Crypto import Random
|
||
|
>>>
|
||
|
>>> key = b'Very long and confidential key'
|
||
|
>>> nonce = Random.new().read(16)
|
||
|
>>> tempkey = SHA.new(key+nonce).digest()
|
||
|
>>> cipher = ARC4.new(tempkey)
|
||
|
>>> msg = nonce + cipher.encrypt(b'Open the pod bay doors, HAL')
|
||
|
|
||
|
.. _ARC4: http://en.wikipedia.org/wiki/RC4
|
||
|
|
||
|
:undocumented: __revision__, __package__
|
||
|
"""
|
||
|
|
||
|
__revision__ = "$Id$"
|
||
|
|
||
|
from Crypto.Cipher import _ARC4
|
||
|
|
||
|
class ARC4Cipher:
|
||
|
"""ARC4 cipher object"""
|
||
|
|
||
|
|
||
|
def __init__(self, key, *args, **kwargs):
|
||
|
"""Initialize an ARC4 cipher object
|
||
|
|
||
|
See also `new()` at the module level."""
|
||
|
|
||
|
self._cipher = _ARC4.new(key, *args, **kwargs)
|
||
|
self.block_size = self._cipher.block_size
|
||
|
self.key_size = self._cipher.key_size
|
||
|
|
||
|
def encrypt(self, plaintext):
|
||
|
"""Encrypt a piece of data.
|
||
|
|
||
|
:Parameters:
|
||
|
plaintext : byte string
|
||
|
The piece of data to encrypt. It can be of any size.
|
||
|
:Return: the encrypted data (byte string, as long as the
|
||
|
plaintext).
|
||
|
"""
|
||
|
return self._cipher.encrypt(plaintext)
|
||
|
|
||
|
def decrypt(self, ciphertext):
|
||
|
"""Decrypt a piece of data.
|
||
|
|
||
|
:Parameters:
|
||
|
ciphertext : byte string
|
||
|
The piece of data to decrypt. It can be of any size.
|
||
|
:Return: the decrypted data (byte string, as long as the
|
||
|
ciphertext).
|
||
|
"""
|
||
|
return self._cipher.decrypt(ciphertext)
|
||
|
|
||
|
def new(key, *args, **kwargs):
|
||
|
"""Create a new ARC4 cipher
|
||
|
|
||
|
:Parameters:
|
||
|
key : byte string
|
||
|
The secret key to use in the symmetric cipher.
|
||
|
It can have any length, with a minimum of 40 bytes.
|
||
|
Its cryptograpic strength is always capped to 2048 bits (256 bytes).
|
||
|
|
||
|
:Return: an `ARC4Cipher` object
|
||
|
"""
|
||
|
return ARC4Cipher(key, *args, **kwargs)
|
||
|
|
||
|
#: Size of a data block (in bytes)
|
||
|
block_size = 1
|
||
|
#: Size of a key (in bytes)
|
||
|
key_size = xrange(1,256+1)
|
||
|
|