SM4Engine.cs 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
  5. using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities;
  6. using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  7. namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines
  8. {
  9. /// <summary>SM4 Block Cipher - SM4 is a 128 bit block cipher with a 128 bit key.</summary>
  10. /// <remarks>
  11. /// The implementation here is based on the document <a href="http://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
  12. /// by Whitfield Diffie and George Ledin, which is a translation of Prof. LU Shu-wang's original standard.
  13. /// </remarks>
  14. public class SM4Engine
  15. : IBlockCipher
  16. {
  17. private const int BlockSize = 16;
  18. private static readonly byte[] Sbox =
  19. {
  20. 0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7, 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05,
  21. 0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3, 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99,
  22. 0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62,
  23. 0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95, 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6,
  24. 0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba, 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8,
  25. 0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b, 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35,
  26. 0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87,
  27. 0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52, 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e,
  28. 0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5, 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1,
  29. 0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55, 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3,
  30. 0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60, 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f,
  31. 0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f, 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51,
  32. 0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f, 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8,
  33. 0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd, 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0,
  34. 0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e, 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84,
  35. 0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20, 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48
  36. };
  37. private static readonly uint[] CK =
  38. {
  39. 0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269,
  40. 0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9,
  41. 0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249,
  42. 0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9,
  43. 0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229,
  44. 0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,
  45. 0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209,
  46. 0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279
  47. };
  48. private static readonly uint[] FK =
  49. {
  50. 0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc
  51. };
  52. private uint[] rk;
  53. // non-linear substitution tau.
  54. private static uint tau(uint A)
  55. {
  56. uint b0 = Sbox[A >> 24];
  57. uint b1 = Sbox[(A >> 16) & 0xFF];
  58. uint b2 = Sbox[(A >> 8) & 0xFF];
  59. uint b3 = Sbox[A & 0xFF];
  60. return (b0 << 24) | (b1 << 16) | (b2 << 8) | b3;
  61. }
  62. private static uint L_ap(uint B)
  63. {
  64. return B ^ Integers.RotateLeft(B, 13) ^ Integers.RotateLeft(B, 23);
  65. }
  66. private uint T_ap(uint Z)
  67. {
  68. return L_ap(tau(Z));
  69. }
  70. // Key expansion
  71. private void ExpandKey(bool forEncryption, byte[] key)
  72. {
  73. uint K0 = Pack.BE_To_UInt32(key, 0) ^ FK[0];
  74. uint K1 = Pack.BE_To_UInt32(key, 4) ^ FK[1];
  75. uint K2 = Pack.BE_To_UInt32(key, 8) ^ FK[2];
  76. uint K3 = Pack.BE_To_UInt32(key, 12) ^ FK[3];
  77. if (forEncryption)
  78. {
  79. rk[0] = K0 ^ T_ap(K1 ^ K2 ^ K3 ^ CK[0]);
  80. rk[1] = K1 ^ T_ap(K2 ^ K3 ^ rk[0] ^ CK[1]);
  81. rk[2] = K2 ^ T_ap(K3 ^ rk[0] ^ rk[1] ^ CK[2]);
  82. rk[3] = K3 ^ T_ap(rk[0] ^ rk[1] ^ rk[2] ^ CK[3]);
  83. for (int i = 4; i < 32; ++i)
  84. {
  85. rk[i] = rk[i - 4] ^ T_ap(rk[i - 3] ^ rk[i - 2] ^ rk[i - 1] ^ CK[i]);
  86. }
  87. }
  88. else
  89. {
  90. rk[31] = K0 ^ T_ap(K1 ^ K2 ^ K3 ^ CK[0]);
  91. rk[30] = K1 ^ T_ap(K2 ^ K3 ^ rk[31] ^ CK[1]);
  92. rk[29] = K2 ^ T_ap(K3 ^ rk[31] ^ rk[30] ^ CK[2]);
  93. rk[28] = K3 ^ T_ap(rk[31] ^ rk[30] ^ rk[29] ^ CK[3]);
  94. for (int i = 27; i >= 0; --i)
  95. {
  96. rk[i] = rk[i + 4] ^ T_ap(rk[i + 3] ^ rk[i + 2] ^ rk[i + 1] ^ CK[31 - i]);
  97. }
  98. }
  99. }
  100. // Linear substitution L
  101. private static uint L(uint B)
  102. {
  103. return B ^ Integers.RotateLeft(B, 2) ^ Integers.RotateLeft(B, 10) ^ Integers.RotateLeft(B, 18) ^ Integers.RotateLeft(B, 24);
  104. }
  105. // Mixer-substitution T
  106. private static uint T(uint Z)
  107. {
  108. return L(tau(Z));
  109. }
  110. public virtual void Init(bool forEncryption, ICipherParameters parameters)
  111. {
  112. KeyParameter keyParameter = parameters as KeyParameter;
  113. if (null == keyParameter)
  114. throw new ArgumentException("invalid parameter passed to SM4 init - " + BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), "parameters");
  115. byte[] key = keyParameter.GetKey();
  116. if (key.Length != 16)
  117. throw new ArgumentException("SM4 requires a 128 bit key", "parameters");
  118. if (null == rk)
  119. {
  120. rk = new uint[32];
  121. }
  122. ExpandKey(forEncryption, key);
  123. }
  124. public virtual string AlgorithmName
  125. {
  126. get { return "SM4"; }
  127. }
  128. public virtual bool IsPartialBlockOkay
  129. {
  130. get { return false; }
  131. }
  132. public virtual int GetBlockSize()
  133. {
  134. return BlockSize;
  135. }
  136. public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff)
  137. {
  138. if (null == rk)
  139. throw new InvalidOperationException("SM4 not initialised");
  140. Check.DataLength(input, inOff, BlockSize, "input buffer too short");
  141. Check.OutputLength(output, outOff, BlockSize, "output buffer too short");
  142. uint X0 = Pack.BE_To_UInt32(input, inOff);
  143. uint X1 = Pack.BE_To_UInt32(input, inOff + 4);
  144. uint X2 = Pack.BE_To_UInt32(input, inOff + 8);
  145. uint X3 = Pack.BE_To_UInt32(input, inOff + 12);
  146. for (int i = 0; i < 32; i += 4)
  147. {
  148. X0 ^= T(X1 ^ X2 ^ X3 ^ rk[i ]); // F0
  149. X1 ^= T(X2 ^ X3 ^ X0 ^ rk[i + 1]); // F1
  150. X2 ^= T(X3 ^ X0 ^ X1 ^ rk[i + 2]); // F2
  151. X3 ^= T(X0 ^ X1 ^ X2 ^ rk[i + 3]); // F3
  152. }
  153. Pack.UInt32_To_BE(X3, output, outOff);
  154. Pack.UInt32_To_BE(X2, output, outOff + 4);
  155. Pack.UInt32_To_BE(X1, output, outOff + 8);
  156. Pack.UInt32_To_BE(X0, output, outOff + 12);
  157. return BlockSize;
  158. }
  159. public virtual void Reset()
  160. {
  161. }
  162. }
  163. }
  164. #pragma warning restore
  165. #endif