Korea encryption algorithm ARIA C + + implementation

/* 代码分为三个文件,constant.h是常量定义,aria.h是声明,同时鉴于模板分离编译,将aria.cpp实现部分也合并入aria.h  */
/* 另外附带了 main.cpp 测试代码 */


/* ----------------- constant.h start ----------------- */
#ifndef _CONSTANT_H_
#define _CONSTANT_H_

namespace triod
{
    const static unsigned short NUM_OF_ROUND_KEY            = 18;
    const static unsigned short SECTION_LEN                    = 128 / 8;
    const static unsigned short MAX_KEY_WIDTH                = 256 / 8;
    const static unsigned short DIFFUSE_TIMES                = 16;
    const static unsigned short DIFFUSE_XOR_OPRAND_TIMES    = 7;
    const static unsigned short CK_NUM                        = 4;
    const static unsigned short CK_SECTION_LENGTH            = 128 / 8;
    const static unsigned short SBOX_TYPES                    = 4;
    const static unsigned short SBOX_ELEMENTS_NUM            = 0x100;
    const static unsigned short ERROR_BYTE_NUM                = 7;

    enum { SBOX1, SBOX2, SBOX1_REVERSE, SBOX2_REVERSE };
    enum { LEFT, RIGHT, NOP };
    enum { MIN_LEN = 16, MID_LEN = 24, MAX_LEN = 32 };
    enum { MIN_ROUND = 12, MID_ROUND = 14, MAX_ROUND = 16 };

    const static unsigned char SBOX[SBOX_TYPES][SBOX_ELEMENTS_NUM] =
    {
        {
            0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76,
            0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0,
            0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15,
            0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75,
            0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84,
            0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf,
            0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8,
            0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2,
            0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73,
            0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb,
            0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79,
            0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08,
            0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a,
            0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e,
            0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf,
            0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16
        },
        {
            0xe2, 0x4e, 0x54, 0xfc, 0x94, 0xc2, 0x4a, 0xcc, 0x62, 0x0d, 0x6a, 0x46, 0x3c, 0x4d, 0x8b, 0xd1,
            0x5e, 0xfa, 0x64, 0xcb, 0xb4, 0x97, 0xbe, 0x2b, 0xbc, 0x77, 0x2e, 0x03, 0xd3, 0x19, 0x59, 0xc1,
            0x1d, 0x06, 0x41, 0x6b, 0x55, 0xf0, 0x99, 0x69, 0xea, 0x9c, 0x18, 0xae, 0x63, 0xdf, 0xe7, 0xbb,
            0x00, 0x73, 0x66, 0xfb, 0x96, 0x4c, 0x85, 0xe4, 0x3a, 0x09, 0x45, 0xaa, 0x0f, 0xee, 0x10, 0xeb,
            0x2d, 0x7f, 0xf4, 0x29, 0xac, 0xcf, 0xad, 0x91, 0x8d, 0x78, 0xc8, 0x95, 0xf9, 0x2f, 0xce, 0xcd,
            0x08, 0x7a, 0x88, 0x38, 0x5c, 0x83, 0x2a, 0x28, 0x47, 0xdb, 0xb8, 0xc7, 0x93, 0xa4, 0x12, 0x53,
            0xff, 0x87, 0x0e, 0x31, 0x36, 0x21, 0x58, 0x48, 0x01, 0x8e, 0x37, 0x74, 0x32, 0xca, 0xe9, 0xb1,
            0xb7, 0xab, 0x0c, 0xd7, 0xc4, 0x56, 0x42, 0x26, 0x07, 0x98, 0x60, 0xd9, 0xb6, 0xb9, 0x11, 0x40,
            0xec, 0x20, 0x8c, 0xbd, 0xa0, 0xc9, 0x84, 0x04, 0x49, 0x23, 0xf1, 0x4f, 0x50, 0x1f, 0x13, 0xdc,
            0xd8, 0xc0, 0x9e, 0x57, 0xe3, 0xc3, 0x7b, 0x65, 0x3b, 0x02, 0x8f, 0x3e, 0xe8, 0x25, 0x92, 0xe5,
            0x15, 0xdd, 0xfd, 0x17, 0xa9, 0xbf, 0xd4, 0x9a, 0x7e, 0xc5, 0x39, 0x67, 0xfe, 0x76, 0x9d, 0x43,
            0xa7, 0xe1, 0xd0, 0xf5, 0x68, 0xf2, 0x1b, 0x34, 0x70, 0x05, 0xa3, 0x8a, 0xd5, 0x79, 0x86, 0xa8,
            0x30, 0xc6, 0x51, 0x4b, 0x1e, 0xa6, 0x27, 0xf6, 0x35, 0xd2, 0x6e, 0x24, 0x16, 0x82, 0x5f, 0xda,
            0xe6, 0x75, 0xa2, 0xef, 0x2c, 0xb2, 0x1c, 0x9f, 0x5d, 0x6f, 0x80, 0x0a, 0x72, 0x44, 0x9b, 0x6c,
            0x90, 0x0b, 0x5b, 0x33, 0x7d, 0x5a, 0x52, 0xf3, 0x61, 0xa1, 0xf7, 0xb0, 0xd6, 0x3f, 0x7c, 0x6d,
            0xed, 0x14, 0xe0, 0xa5, 0x3d, 0x22, 0xb3, 0xf8, 0x89, 0xde, 0x71, 0x1a, 0xaf, 0xba, 0xb5, 0x81
        },
        {
            0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb,
            0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb,
            0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e,
            0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25,
            0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92,
            0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84,
            0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06,
            0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b,
            0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73,
            0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e,
            0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b,
            0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4,
            0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f,
            0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef,
            0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61,
            0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d
        },
        {
            0x30, 0x68, 0x99, 0x1b, 0x87, 0xb9, 0x21, 0x78, 0x50, 0x39, 0xdb, 0xe1, 0x72, 0x09, 0x62, 0x3c,
            0x3e, 0x7e, 0x5e, 0x8e, 0xf1, 0xa0, 0xcc, 0xa3, 0x2a, 0x1d, 0xfb, 0xb6, 0xd6, 0x20, 0xc4, 0x8d,
            0x81, 0x65, 0xf5, 0x89, 0xcb, 0x9d, 0x77, 0xc6, 0x57, 0x43, 0x56, 0x17, 0xd4, 0x40, 0x1a, 0x4d,
            0xc0, 0x63, 0x6c, 0xe3, 0xb7, 0xc8, 0x64, 0x6a, 0x53, 0xaa, 0x38, 0x98, 0x0c, 0xf4, 0x9b, 0xed,
            0x7f, 0x22, 0x76, 0xaf, 0xdd, 0x3a, 0x0b, 0x58, 0x67, 0x88, 0x06, 0xc3, 0x35, 0x0d, 0x01, 0x8b,
            0x8c, 0xc2, 0xe6, 0x5f, 0x02, 0x24, 0x75, 0x93, 0x66, 0x1e, 0xe5, 0xe2, 0x54, 0xd8, 0x10, 0xce,
            0x7a, 0xe8, 0x08, 0x2c, 0x12, 0x97, 0x32, 0xab, 0xb4, 0x27, 0x0a, 0x23, 0xdf, 0xef, 0xca, 0xd9,
            0xb8, 0xfa, 0xdc, 0x31, 0x6b, 0xd1, 0xad, 0x19, 0x49, 0xbd, 0x51, 0x96, 0xee, 0xe4, 0xa8, 0x41,
            0xda, 0xff, 0xcd, 0x55, 0x86, 0x36, 0xbe, 0x61, 0x52, 0xf8, 0xbb, 0x0e, 0x82, 0x48, 0x69, 0x9a,
            0xe0, 0x47, 0x9e, 0x5c, 0x04, 0x4b, 0x34, 0x15, 0x79, 0x26, 0xa7, 0xde, 0x29, 0xae, 0x92, 0xd7,
            0x84, 0xe9, 0xd2, 0xba, 0x5d, 0xf3, 0xc5, 0xb0, 0xbf, 0xa4, 0x3b, 0x71, 0x44, 0x46, 0x2b, 0xfc,
            0xeb, 0x6f, 0xd5, 0xf6, 0x14, 0xfe, 0x7c, 0x70, 0x5a, 0x7d, 0xfd, 0x2f, 0x18, 0x83, 0x16, 0xa5,
            0x91, 0x1f, 0x05, 0x95, 0x74, 0xa9, 0xc1, 0x5b, 0x4a, 0x85, 0x6d, 0x13, 0x07, 0x4f, 0x4e, 0x45,
            0xb2, 0x0f, 0xc9, 0x1c, 0xa6, 0xbc, 0xec, 0x73, 0x90, 0x7b, 0xcf, 0x59, 0x8f, 0xa1, 0xf9, 0x2d,
            0xf2, 0xb1, 0x00, 0x94, 0x37, 0x9f, 0xd0, 0x2e, 0x9c, 0x6e, 0x28, 0x3f, 0x80, 0xf0, 0x3d, 0xd3,
            0x25, 0x8a, 0xb5, 0xe7, 0x42, 0xb3, 0xc7, 0xea, 0xf7, 0x4c, 0x11, 0x33, 0x03, 0xa2, 0xac, 0x60
        }
    };

    const static unsigned char DIFFUSE_OPERATION[DIFFUSE_TIMES][DIFFUSE_XOR_OPRAND_TIMES] =
    {
        { 0x03, 0x04, 0x06, 0x08, 0x09, 0x0D, 0x0E },
        { 0x02, 0x05, 0x07, 0x08, 0x09, 0x0C, 0x0F },
        { 0x01, 0x04, 0x06, 0x0A, 0x0B, 0x0C, 0x0F },
        { 0x00, 0x05, 0x07, 0x0A, 0x0B, 0x0D, 0x0E },
        { 0x00, 0x02, 0x05, 0x08, 0x0B, 0x0E, 0x0F },
        { 0x01, 0x03, 0x04, 0x09, 0x0A, 0x0E, 0x0F },
        { 0x00, 0x02, 0x07, 0x09, 0x0A, 0x0C, 0x0D },
        { 0x01, 0x03, 0x06, 0x08, 0x0B, 0x0C, 0x0D },
        { 0x00, 0x01, 0x04, 0x07, 0x0A, 0x0D, 0x0F },
        { 0x00, 0x01, 0x05, 0x06, 0x0B, 0x0C, 0x0E },
        { 0x02, 0x03, 0x05, 0x06, 0x08, 0x0D, 0x0F },
        { 0x02, 0x03, 0x04, 0x07, 0x09, 0x0C, 0x0E },
        { 0x01, 0x02, 0x06, 0x07, 0x09, 0x0B, 0x0C },
        { 0x00, 0x03, 0x06, 0x07, 0x08, 0x0A, 0x0D },
        { 0x00, 0x03, 0x04, 0x05, 0x09, 0x0B, 0x0E },
        { 0x01, 0x02, 0x04, 0x05, 0x08, 0x0A, 0x0F }
    };

    // 为了和文档兼容,这里增加了一个 0 行
    const static unsigned char CK[CK_NUM][CK_SECTION_LENGTH] =
    {
        { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
        { 0x51, 0x7c, 0xc1, 0xb7, 0x27, 0x22, 0x0a, 0x94, 0xfe, 0x13, 0xab, 0xe8, 0xfa, 0x9a, 0x6e, 0xe0 },
        { 0x6d, 0xb1, 0x4a, 0xcc, 0x9e, 0x21, 0xc8, 0x20, 0xff, 0x28, 0xb1, 0xd5, 0xef, 0x5d, 0xe2, 0xb0 },
        { 0xdb, 0x92, 0x37, 0x1d, 0x21, 0x26, 0xe9, 0x70, 0x03, 0x24, 0x97, 0x75, 0x04, 0xe8, 0xc9, 0x0e }
    };

    const static unsigned char CK_ORDER[4][3] =
    {
        { 0, 0, 0 },
        { 1, 2, 3 },
        { 2, 3, 1 },
        { 3, 1, 2 }
    };

    const static unsigned char ROUNDS_BY_KEY_LENGTH[] = { 0, MIN_ROUND, MID_ROUND, MAX_ROUND };


    const static unsigned short ROUND_KEY_OP_ARRAY[NUM_OF_ROUND_KEY][6] =
    {
        { NOP, 0, 0, NOP, 0, 0 },        // 0

        { NOP, 0, 0, RIGHT, 1, 19 },    // 1
        { NOP, 1, 0, RIGHT, 2, 19 },    // 2
        { NOP, 2, 0, RIGHT, 3, 19 },    // 3
        { RIGHT, 0, 19, NOP, 3, 0 },    // 4

        { NOP, 0, 0, RIGHT, 1, 31 },    // 5
        { NOP, 1, 0, RIGHT, 2, 31 },    // 6
        { NOP, 2, 0, RIGHT, 3, 31 },    // 7
        { RIGHT, 0, 31, NOP, 3, 0 },    // 8

        { NOP, 0, 0, LEFT, 1, 61 },        // 9
        { NOP, 1, 0, LEFT, 2, 61 },        // 10
        { NOP, 2, 0, LEFT, 3, 61 },        // 11
        { LEFT, 0, 61, NOP, 3, 0 },        // 12

        { NOP, 0, 0, LEFT, 1, 31  },    // 13
        { NOP, 1, 0, LEFT, 2, 31 },        // 14
        { NOP, 2, 0, LEFT, 3, 31 },        // 15
        { LEFT, 0, 31, NOP, 3, 0 },        // 16
       
        { NOP, 0, 0, LEFT, 1, 19 }        // 17

/*
        { RIGHT, 0, 7, LEFT, 1, 11 },
        { LEFT, 1, 22, NOP, 2, 0 },
        { RIGHT, 2, 17, LEFT, 3, 16 },
        { RIGHT, 0, 14, LEFT, 3, 32 },
        { RIGHT, 0, 21, RIGHT, 2, 34 },
        { LEFT, 1, 33, LEFT, 3, 48 },
        { LEFT, 1, 44, RIGHT, 2, 51 },
        { RIGHT, 0, 28, LEFT, 3, 64 },
        { LEFT, 1, 55, LEFT, 3, 80 },
        { RIGHT, 0, 35, RIGHT, 2, 68 },
        { RIGHT, 0, 42, LEFT, 1, 66 },
        { LEFT, 1, 77, RIGHT, 2, 85 },
        { RIGHT, 0, 49, RIGHT, 2, 102  },
        { RIGHT, 2, 119, LEFT, 3, 112 },
        { RIGHT, 0, 56, LEFT, 1, 8 }
*/
    };


    const static unsigned char ODD_LAYER_BOX[] =
    {
        SBOX1, SBOX2, SBOX1_REVERSE, SBOX2_REVERSE,
        SBOX1, SBOX2, SBOX1_REVERSE, SBOX2_REVERSE,
        SBOX1, SBOX2, SBOX1_REVERSE, SBOX2_REVERSE,
        SBOX1, SBOX2, SBOX1_REVERSE, SBOX2_REVERSE
    };

    const static unsigned char EVEN_LAYER_BOX[] =
    {
        SBOX1_REVERSE, SBOX2_REVERSE, SBOX1, SBOX2,
        SBOX1_REVERSE, SBOX2_REVERSE, SBOX1, SBOX2,
        SBOX1_REVERSE, SBOX2_REVERSE, SBOX1, SBOX2,
        SBOX1_REVERSE, SBOX2_REVERSE, SBOX1, SBOX2
    };

    const static size_t ERROR_AT[SECTION_LEN][ERROR_BYTE_NUM] =
    {
        { 3, 4, 6, 8, 9, 13, 14 },
        { 2, 5, 7, 8, 9, 12, 15 },
        { 1, 4, 6, 10, 11, 12, 15 },
        { 0, 5, 7, 10, 11, 13, 14 },
        { 0, 2, 5, 8, 11, 14, 15 },
        { 1, 3, 4, 9, 10, 14, 15 },
        { 0, 2, 7, 9, 10, 12, 13 },
        { 1, 3, 6, 8, 11, 12, 13 },
        { 0, 1, 4, 7, 10, 13, 15 },
        { 0, 1, 5, 6, 11, 12, 14 },
        { 2, 3, 5, 6, 8, 13, 15 },
        { 2, 3, 4, 7, 9, 12, 14 },
        { 1, 2, 6, 7, 9, 11, 12 },
        { 0, 3, 6, 7, 8, 10, 13 },
        { 0, 3, 4, 5, 9, 11, 14 },
        { 1, 2, 4, 5, 8, 10, 15 }
    };
}
#endif

/* ----------------- constant.h start ----------------- */


/* ----------------- aria.h start ----------------- */
#ifndef _ARIA_H_
#define _ARIA_H_

#include <cstdio>
#include <ctime>
#include <cstring>
#include <set>
#include <vector>

#include "constant.h"

#define TEST 0

namespace triod
{
    template<int key_length>
    class ARIA
    {
    public:
        typedef const unsigned char        (&const_block)    [key_length];
        typedef unsigned char            (&block)        [key_length];          
       
        ARIA( const_block key );
       
        void encrypt( const_block text, block cipher );    // 注意rounds_比实际的加密需要的轮数少一轮,用于最后一步的不做diffuse的运算
       
       
        void decrypt( const_block cipher, block text );
       
        static void print_block( const_block text );

    private:
        virtual void function ( size_t round, block input, const_block round_key );
        virtual void function_last_round ( block input, const_block round_key );
       
        void generate_round_key(); // 生成轮密钥函数
        void diffuse( block input );         // The Diffusion Layer Function

        static void key_xor ( const_block lhs, const_block rhs, block output );    // 针对 128 bit 的序列专门设计的异或函数
        static void rotate_key ( unsigned short types, const_block input, size_t move_bits, block output ); // 针对 128 bit 的序列专门设计的循环移位函数
        static bool compare_section( const unsigned char* lhs, const unsigned char* rhs, size_t len );

        unsigned char key_[MAX_KEY_WIDTH];                                        // 主密钥, 256 bit
        unsigned char encrypt_round_key_[NUM_OF_ROUND_KEY][SECTION_LEN];        // 16 个加密轮密钥,每个 128 bit
        unsigned char decrypt_round_key_[NUM_OF_ROUND_KEY][SECTION_LEN];        // 16 个解密轮密钥,每个 128 bit

        size_t rounds_;
    }; // End of class ARIA
} // End of namespace triod






/* ---------------------------------- ARIA.cpp 并入ARIA.h 中,避免模板分离编译错误 ---------------------------------- */
// #include "ARIA.h"

namespace triod
{

    template<int key_length>
    ARIA<key_length>::ARIA( const_block key )
    {
        // 一个小小技巧,用于在编译期防止 key_length 非法
        char guard[(key_length == MIN_LEN || key_length == MID_LEN || key_length == MAX_LEN) ? 1 : -1] = { 0 };

        // 另一个技巧,计算加密解密轮数
        rounds_ = ROUNDS_BY_KEY_LENGTH[key_length / 10];

        memset( key_, 0, MAX_KEY_WIDTH );

        for ( size_t i = 0; i < NUM_OF_ROUND_KEY; ++i )
        {
            memset( encrypt_round_key_[i], 0, SECTION_LEN );
            memset( decrypt_round_key_[i], 0, SECTION_LEN );
        }

        // 不用 memcpy
        for ( size_t i = 0; i < key_length; ++i )
            key_[i] = key[i];

        this->generate_round_key();
    }


   
    template<int key_length>
    void ARIA<key_length>::encrypt( const_block text, block cipher )    // 注意rounds_比实际的加密需要的轮数少一轮,用于最后一步的不做diffuse的运算
    {
        memcpy ( cipher, text, SECTION_LEN );  
       
        for ( size_t i = 1; i < rounds_; ++i )
        {
            this->function( i, cipher, encrypt_round_key_[i] );

            #if TEST
            this->print_block( cipher );
            #endif
        }

        this->function_last_round( cipher, encrypt_round_key_[rounds_] );
        this->key_xor( cipher, encrypt_round_key_[rounds_ + 1], cipher );

        #if TEST
        this->print_block( cipher );
        printf( "Encrypt TEXT\n\n");
        #endif
    }

   
    template<int key_length>
    void ARIA<key_length>::decrypt( const_block cipher, block text )
    {
        // 注意rounds_比实际的加密需要的轮数少一轮,用于最后一步的不做diffuse的运算
        memcpy ( text, cipher, SECTION_LEN );
       
        for ( size_t i = 1; i < rounds_; ++i )
        {
            this->function( i % 2 == 1, text, decrypt_round_key_[i] );

            #if TEST
            for ( size_t j = 0; j < SECTION_LEN; ++j )
                printf( "%02x ", text[j] );
            printf( "\n");
            #endif
        }

        this->function_last_round( text, decrypt_round_key_[rounds_] );
        this->key_xor( text, decrypt_round_key_[rounds_ + 1], text );

        #if TEST
        for ( size_t j =0; j < SECTION_LEN; ++j )
            printf( "%02x ", text[j] );
        printf( "\nDecrypt TEXT\n\n");
        #endif
    }



/* ---------------------------------------------------------------------------------------- */
    template<int key_length>
    void ARIA<key_length>::function ( size_t round, block input, const_block round_key )
    {
        bool is_odd_layer = ( round % 2 == 1 );
       
        // 第一步,XOR
        this->key_xor( input, round_key, input );

        // 第二步,S-box layer
        for ( size_t i = 0; i < SECTION_LEN; ++i )
        {
            input[i] = SBOX[ is_odd_layer ? ODD_LAYER_BOX[i] : EVEN_LAYER_BOX[i] ][ input[i] ];
        }

        // 第三步,diffusion layer
        this->diffuse( input );
    }


    template<int key_length>
    void ARIA<key_length>::function_last_round ( block input, const_block round_key )
    {

        this->key_xor( input, round_key, input );            // 第一步,XOR

        for ( size_t i = 0; i < SECTION_LEN; ++i )            // 第二步,S-box layer
            input[i] = SBOX[EVEN_LAYER_BOX[i]][input[i]];
    }


    template<int key_length>
    void ARIA<key_length>::generate_round_key() // 生成轮密钥函数
    {
        // W 共有 4 个,每个 128 bit
        unsigned char W[4][SECTION_LEN];
       
        // kR,即 main key 的右 128 bits
        unsigned char KR[SECTION_LEN];
        memcpy ( KR, key_ + SECTION_LEN, SECTION_LEN );

        /* ------------------- 首先初始化 W 数组 ------------------- */
        // W[0] = KL,即 main key 的左 128 bits
        memcpy ( W[0], key_, SECTION_LEN );

        // 这里采用查表的方法:CK[ CK_ORDER[key_length / 10][0] ]
        // 来处理密钥长度不同时,CK不同的情况
        memcpy( W[1], W[0], SECTION_LEN );
        this->function( true, W[1], CK[ CK_ORDER[key_length / 10][0] ] );
        this->key_xor( W[1], KR, W[1] );

        memcpy( W[2], W[1], SECTION_LEN );
        this->function( false, W[2], CK[ CK_ORDER[key_length / 10][1] ] );
        this->key_xor( W[2], W[0], W[2] );

        memcpy( W[3], W[2], SECTION_LEN );
        this->function( true, W[3], CK[ CK_ORDER[key_length / 10][2] ] );
        this->key_xor( W[3], W[1], W[3] );

        #if TEST // 测试输出 W[k]
        for ( size_t i = 0; i < 4; ++i )
        {
            for ( size_t j = 0; j < 16; ++j )
                printf("%02x ", W[i][j]);
            printf("\n");
        }
        printf("W[k] END\n\n");
        #endif


        /* ------------------- 然后计算 encrypt_round_key_ ------------------- */  

        // 中间操作需要两个临时的数组
        unsigned char temp[2][SECTION_LEN];

        for ( size_t i = 1; i < NUM_OF_ROUND_KEY; ++i )
        {
            this->rotate_key( ROUND_KEY_OP_ARRAY[i][0], W[ ROUND_KEY_OP_ARRAY[i][1] ], ROUND_KEY_OP_ARRAY[i][2], temp[0] );
            this->rotate_key( ROUND_KEY_OP_ARRAY[i][3], W[ ROUND_KEY_OP_ARRAY[i][4] ], ROUND_KEY_OP_ARRAY[i][5], temp[1] );
            this->key_xor( temp[0], temp[1], encrypt_round_key_[i] );
        }

        #if TEST // 测试输出 encrypt round key
        for ( size_t i = 1; i < NUM_OF_ROUND_KEY; ++i )
        {
            for ( size_t j = 0; j < SECTION_LEN; ++j )
                printf("%02x ", encrypt_round_key_[i][j]);
            printf("\n");
        }
        printf("ENCRYPT ROUND KEY END\n\n");
        #endif

        /* ------------------- 然后计算 decrypt_round_key_ ------------------- */  
        memcpy( decrypt_round_key_[1], encrypt_round_key_[rounds_ + 1], SECTION_LEN );
        memcpy( decrypt_round_key_[rounds_ + 1], encrypt_round_key_[1], SECTION_LEN );
       
        for ( size_t i = 2; i <= rounds_; ++i )
        {
            memcpy( decrypt_round_key_[i], encrypt_round_key_[rounds_ + 2 - i], SECTION_LEN );
            this->diffuse( decrypt_round_key_[i] );
        }

        #if TEST // 测试输出 decrypt round key
        for ( size_t i = 1; i < NUM_OF_ROUND_KEY; ++i )
        {
            for ( size_t j = 0; j < SECTION_LEN; ++j )
                printf("%02x ", decrypt_round_key_[i][j]);
            printf("\n");
        }
        printf("DECRYPT ROUND KEY END\n\n");
        #endif
    }
   
    template<int key_length>
    void ARIA<key_length>::diffuse( block input )         // The Diffusion Layer Function
    {
        unsigned char temp[SECTION_LEN];
        memcpy ( temp, input, SECTION_LEN );

        for ( size_t i = 0; i < SECTION_LEN; ++i )
        {
            input[i] =
                temp[ DIFFUSE_OPERATION[i][0] ] ^
                temp[ DIFFUSE_OPERATION[i][1] ] ^
                temp[ DIFFUSE_OPERATION[i][2] ] ^
                temp[ DIFFUSE_OPERATION[i][3] ] ^
                temp[ DIFFUSE_OPERATION[i][4] ] ^
                temp[ DIFFUSE_OPERATION[i][5] ] ^
                temp[ DIFFUSE_OPERATION[i][6] ];
        }
    }



    /* ------------------- 下面是一些针对内存块的功能函数 ------------------- */
    template<int key_length>
    void ARIA<key_length>::key_xor ( const_block lhs, const_block rhs, block output )    // 针对 128 bit 的序列专门设计的异或函数
    {
        for ( size_t i = 0; i < SECTION_LEN; ++i )
            output[i] = lhs[i] ^ rhs[i];
    }

   
   
    template<int key_length>
    void ARIA<key_length>::rotate_key ( unsigned short types, const_block input, size_t move_bits, block output ) // 针对 128 bit 的序列专门设计的循环移位函数
    {
        size_t move_bytes = move_bits / 8;
        size_t remain_bits = move_bits % 8;
       
        unsigned char higher_bit;
        unsigned char lower_bit;

        if ( LEFT == types )
        {
            memcpy ( output, input + move_bytes, SECTION_LEN - move_bytes );
            memcpy ( output + SECTION_LEN - move_bytes, input, move_bytes );

            for ( size_t i = 0; i < remain_bits; ++i )
            {
                higher_bit = (output[0] & 0x80) >> 7;    // 保存最高位
                for ( size_t j = 0; j < SECTION_LEN - 1; ++j )
                {
                    output[j] <<= 1;                            // 左移之后,最低位用 0 补齐
                    lower_bit = (output[j + 1] & 0x80) >> 7;
                    output[j] |= lower_bit;                        // 0 | lower_bit = lower_bit
                }

                output[SECTION_LEN - 1] <<= 1;
                output[SECTION_LEN - 1] |= higher_bit;
            }

            return;
        }

        if ( RIGHT == types )
        {
            memcpy ( output, input + SECTION_LEN - move_bytes, move_bytes );
            memcpy ( output + move_bytes, input, SECTION_LEN - move_bytes );

            for ( size_t i = 0; i < remain_bits; ++i )
            {
                lower_bit = (output[0] & 0x01) << 7;
                higher_bit = (output[SECTION_LEN - 1] & 0x01) << 7;    // 保存最低位
                output[0] >>= 1;                                                        // 右移之后,最高位用 0 补齐
                output[0] |= higher_bit;                                            // 0 | lower_bit = lower_bit

                for ( size_t j = 1; j < SECTION_LEN; ++j )
                {
                    higher_bit = lower_bit;
                    lower_bit = (output[j] & 0x01) << 7;
                    output[j] >>= 1;                                // 右移之后,最高位用 0 补齐
                    output[j] |= higher_bit;                    // 0 | higher_bit = higher_bit
                }
            }
        }

        if ( NOP == types )
        {
            memcpy ( output, input, SECTION_LEN );
        }
    }

    template<int key_length>
    void ARIA<key_length>::print_block( const_block text )
    {
        for ( size_t i = 0; i < SECTION_LEN; ++i )
        {
            printf( "%02x ", text[i] );
        }
        printf( "\n" );
    }

    template<int key_length>
    bool ARIA<key_length>::compare_section( const unsigned char* lhs, const unsigned char* rhs, size_t len )
    {
        for ( size_t i = 0; i < len; ++i )
        {
            if ( lhs[i] != rhs[i] )
                return false;
        }

        return true;
    }

} // End of namespace triod
/* ---------------------------------- ARIA.cpp 并入ARIA.h 中,避免模板分离编译错误 ---------------------------------- */
#endif

/* ----------------- aria.h end ----------------- */



/* ----------------- main.cpp start ----------------- */
#include "ARIA.h"

#define NUM 16

int main()
{
    using triod::ARIA;

    unsigned char key[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f };
    unsigned char plaintext[] = { 0x11, 0x11, 0x11, 0x11, 0xaa, 0xaa, 0xaa, 0xaa, 0x11, 0x11, 0x11, 0x11, 0xbb, 0xbb, 0xbb, 0xbb };
    unsigned char ciphertext[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };


    /* 192 bits key
    unsigned char key[] =
    {
        0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
        0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77
    };
    */

    /* 256 bits key
    unsigned char key[] =
    {  
        0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
        0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
    };
    */


    ARIA<sizeof(key)> test(key);

    test.encrypt( plaintext, ciphertext );
    ARIA<sizeof(key)>::print_block( ciphertext );

    test.decrypt( ciphertext, plaintext );
    ARIA<sizeof(key)>::print_block( plaintext );
   
    return 0;
}

/* ----------------- main.cpp end ----------------- */


Learn More :