|
| 1 | +"""RC4 compatible algorithm""" |
| 2 | + |
| 3 | +def arcfour(key, in_bytes, loops=20): |
| 4 | + |
| 5 | + kbox = bytearray(256) # create key box |
| 6 | + for i, car in enumerate(key): # copy key and vector |
| 7 | + kbox[i] = car |
| 8 | + j = len(key) |
| 9 | + for i in range(j, 256): # repeat until full |
| 10 | + kbox[i] = kbox[i-j] |
| 11 | + |
| 12 | + # [1] initialize sbox |
| 13 | + sbox = bytearray(range(256)) |
| 14 | + |
| 15 | + # repeat sbox mixing loop, as recommened in CipherSaber-2 |
| 16 | + # http://ciphersaber.gurus.com/faq.html#cs2 |
| 17 | + j = 0 |
| 18 | + for k in range(loops): |
| 19 | + for i in range(256): |
| 20 | + j = (j + sbox[i] + kbox[i]) % 256 |
| 21 | + sbox[i], sbox[j] = sbox[j], sbox[i] |
| 22 | + |
| 23 | + # main loop |
| 24 | + i = 0 |
| 25 | + j = 0 |
| 26 | + out_bytes = bytearray() |
| 27 | + |
| 28 | + for car in in_bytes: |
| 29 | + i = (i + 1) % 256 |
| 30 | + # [2] shuffle sbox |
| 31 | + j = (j + sbox[i]) % 256 |
| 32 | + sbox[i], sbox[j] = sbox[j], sbox[i] |
| 33 | + # [3] compute t |
| 34 | + t = (sbox[i] + sbox[j]) % 256 |
| 35 | + k = sbox[t] |
| 36 | + car = car ^ k |
| 37 | + out_bytes.append(car) |
| 38 | + |
| 39 | + return out_bytes |
| 40 | + |
| 41 | + |
| 42 | +def test(): |
| 43 | + from time import time |
| 44 | + clear = bytearray(b'1234567890' * 100000) |
| 45 | + t0 = time() |
| 46 | + cipher = arcfour(b'key', clear) |
| 47 | + print('elapsed time: %.2fs' % (time() - t0)) |
| 48 | + result = arcfour(b'key', cipher) |
| 49 | + assert result == clear, '%r != %r' % (result, clear) |
| 50 | + print('elapsed time: %.2fs' % (time() - t0)) |
| 51 | + print('OK') |
| 52 | + |
| 53 | + |
| 54 | +if __name__ == '__main__': |
| 55 | + test() |
0 commit comments