experimental salsa20-ctr cipher; close #108
This commit is contained in:
parent
ddce0dd39f
commit
ed39505dc1
2 changed files with 124 additions and 4 deletions
|
@ -20,16 +20,22 @@
|
||||||
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
# SOFTWARE.
|
# SOFTWARE.
|
||||||
|
|
||||||
|
import os
|
||||||
import sys
|
import sys
|
||||||
import hashlib
|
import hashlib
|
||||||
import string
|
import string
|
||||||
import struct
|
import struct
|
||||||
import logging
|
import logging
|
||||||
|
import encrypt_salsa20
|
||||||
|
|
||||||
|
|
||||||
def random_string(length):
|
def random_string(length):
|
||||||
|
try:
|
||||||
import M2Crypto.Rand
|
import M2Crypto.Rand
|
||||||
return M2Crypto.Rand.rand_bytes(length)
|
return M2Crypto.Rand.rand_bytes(length)
|
||||||
|
except ImportError:
|
||||||
|
# TODO really strong enough on Linux?
|
||||||
|
return os.urandom(length)
|
||||||
|
|
||||||
|
|
||||||
cached_tables = {}
|
cached_tables = {}
|
||||||
|
@ -110,6 +116,7 @@ method_supported = {
|
||||||
'rc2-cfb': (16, 8),
|
'rc2-cfb': (16, 8),
|
||||||
'rc4': (16, 0),
|
'rc4': (16, 0),
|
||||||
'seed-cfb': (16, 16),
|
'seed-cfb': (16, 16),
|
||||||
|
'salsa20-ctr': (32, 8),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -138,7 +145,6 @@ class Encryptor(object):
|
||||||
return len(self.cipher_iv)
|
return len(self.cipher_iv)
|
||||||
|
|
||||||
def get_cipher(self, password, method, op, iv=None):
|
def get_cipher(self, password, method, op, iv=None):
|
||||||
import M2Crypto.EVP
|
|
||||||
password = password.encode('utf-8')
|
password = password.encode('utf-8')
|
||||||
method = method.lower()
|
method = method.lower()
|
||||||
m = self.get_cipher_len(method)
|
m = self.get_cipher_len(method)
|
||||||
|
@ -148,9 +154,13 @@ class Encryptor(object):
|
||||||
iv = iv_[:m[1]]
|
iv = iv_[:m[1]]
|
||||||
if op == 1:
|
if op == 1:
|
||||||
self.cipher_iv = iv[:m[1]] # this iv is for cipher not decipher
|
self.cipher_iv = iv[:m[1]] # this iv is for cipher not decipher
|
||||||
|
if method != 'salsa20-ctr':
|
||||||
|
import M2Crypto.EVP
|
||||||
return M2Crypto.EVP.Cipher(method.replace('-', '_'), key, iv, op,
|
return M2Crypto.EVP.Cipher(method.replace('-', '_'), key, iv, op,
|
||||||
key_as_bytes=0, d='md5', salt=None, i=1,
|
key_as_bytes=0, d='md5', salt=None, i=1,
|
||||||
padding=1)
|
padding=1)
|
||||||
|
else:
|
||||||
|
return encrypt_salsa20.Salsa20Cipher(method, key, iv, op)
|
||||||
|
|
||||||
logging.error('method %s not supported' % method)
|
logging.error('method %s not supported' % method)
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
|
|
110
shadowsocks/encrypt_salsa20.py
Normal file
110
shadowsocks/encrypt_salsa20.py
Normal file
|
@ -0,0 +1,110 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
import time
|
||||||
|
import struct
|
||||||
|
import logging
|
||||||
|
import sys
|
||||||
|
|
||||||
|
slow_xor = False
|
||||||
|
imported = False
|
||||||
|
|
||||||
|
BLOCK_SIZE = 16384
|
||||||
|
|
||||||
|
|
||||||
|
def run_imports():
|
||||||
|
global imported, slow_xor, salsa20, numpy
|
||||||
|
if not imported:
|
||||||
|
imported = True
|
||||||
|
try:
|
||||||
|
import numpy
|
||||||
|
except ImportError:
|
||||||
|
logging.error('can not import numpy, using SLOW XOR')
|
||||||
|
logging.error('please install numpy if you use salsa20')
|
||||||
|
slow_xor = True
|
||||||
|
try:
|
||||||
|
import salsa20
|
||||||
|
except ImportError:
|
||||||
|
logging.error('you have to install salsa20 before you use salsa20')
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
|
||||||
|
def numpy_xor(a, b):
|
||||||
|
if slow_xor:
|
||||||
|
return py_xor_str(a, b)
|
||||||
|
ab = numpy.frombuffer(a, dtype=numpy.byte)
|
||||||
|
bb = numpy.frombuffer(b, dtype=numpy.byte)
|
||||||
|
c = numpy.bitwise_xor(ab, bb)
|
||||||
|
r = c.tostring()
|
||||||
|
return r
|
||||||
|
|
||||||
|
|
||||||
|
def py_xor_str(a, b):
|
||||||
|
c = []
|
||||||
|
for i in xrange(0, len(a)):
|
||||||
|
c.append(chr(ord(a[i]) ^ ord(b[i])))
|
||||||
|
return ''.join(c)
|
||||||
|
|
||||||
|
|
||||||
|
class Salsa20Cipher(object):
|
||||||
|
"""a salsa20 CTR implemetation, provides m2crypto like cipher API"""
|
||||||
|
|
||||||
|
def __init__(self, alg, key, iv, op, key_as_bytes=0, d=None, salt=None,
|
||||||
|
i=1, padding=1):
|
||||||
|
run_imports()
|
||||||
|
if alg != 'salsa20-ctr':
|
||||||
|
raise Exception('unknown algorithm')
|
||||||
|
self._key = key
|
||||||
|
self._nonce = struct.unpack('<Q', iv)[0]
|
||||||
|
self._pos = 0
|
||||||
|
self._next_stream()
|
||||||
|
|
||||||
|
def _next_stream(self):
|
||||||
|
self._nonce &= 0xFFFFFFFFFFFFFFFF
|
||||||
|
self._stream = salsa20.Salsa20_keystream(BLOCK_SIZE,
|
||||||
|
struct.pack('<Q', self._nonce),
|
||||||
|
self._key)
|
||||||
|
self._nonce += 1
|
||||||
|
|
||||||
|
def update(self, data):
|
||||||
|
results = []
|
||||||
|
while True:
|
||||||
|
remain = BLOCK_SIZE - self._pos
|
||||||
|
cur_data = data[:remain]
|
||||||
|
cur_data_len = len(cur_data)
|
||||||
|
cur_stream = self._stream[self._pos:self._pos + cur_data_len]
|
||||||
|
self._pos = (self._pos + cur_data_len) % BLOCK_SIZE
|
||||||
|
data = data[remain:]
|
||||||
|
|
||||||
|
results.append(numpy_xor(cur_data, cur_stream))
|
||||||
|
# results.append(cur_data)
|
||||||
|
|
||||||
|
if not data:
|
||||||
|
break
|
||||||
|
self._next_stream()
|
||||||
|
return ''.join(results)
|
||||||
|
|
||||||
|
|
||||||
|
def test():
|
||||||
|
from os import urandom
|
||||||
|
import random
|
||||||
|
|
||||||
|
rounds = 1 * 10
|
||||||
|
plain = urandom(BLOCK_SIZE * rounds)
|
||||||
|
cipher = Salsa20Cipher('salsa20-ctr', 'k' * 32, 'i' * 8, 1)
|
||||||
|
decipher = Salsa20Cipher('salsa20-ctr', 'k' * 32, 'i' * 8, 1)
|
||||||
|
results = []
|
||||||
|
pos = 0
|
||||||
|
print 'start'
|
||||||
|
start = time.time()
|
||||||
|
while pos < len(plain):
|
||||||
|
l = random.randint(10000, 32768)
|
||||||
|
c = cipher.update(plain[pos:pos + l])
|
||||||
|
results.append(decipher.update(c))
|
||||||
|
pos += l
|
||||||
|
assert ''.join(results) == plain
|
||||||
|
end = time.time()
|
||||||
|
print BLOCK_SIZE * rounds / (end - start)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
test()
|
Loading…
Add table
Reference in a new issue