[Cryptech-Commits] [staging/core/hash/sha512] 05/09: Adding the Python functional model of the SHA-512 core.

git at cryptech.is git at cryptech.is
Tue Mar 17 13:15:17 UTC 2015


This is an automated email from the git hooks/post-receive script.

paul at psgd.org pushed a commit to branch master
in repository staging/core/hash/sha512.

commit 698c12454364872584ee3d47945a2ede0f89f2c4
Author: Joachim Strömbergson <joachim at secworks.se>
Date:   Sat Apr 5 14:14:31 2014 +0200

    Adding the Python functional model of the SHA-512 core.
---
 src/model/python/sha512.py | 345 +++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 345 insertions(+)

diff --git a/src/model/python/sha512.py b/src/model/python/sha512.py
new file mode 100755
index 0000000..844c9ef
--- /dev/null
+++ b/src/model/python/sha512.py
@@ -0,0 +1,345 @@
+#!/usr/bin/env python3
+# -*- coding: utf-8 -*-
+#=======================================================================
+#
+# sha512.py
+# ---------
+# Simple, pure Python model of the SHA-512 hash function. Used as a
+# reference for the HW implementation. The code follows the structure
+# of the HW implementation as much as possible.
+#
+#
+# Author: Joachim Strömbergson
+# Copyright (c) 2014, SUNET
+# All rights reserved.
+# 
+# Redistribution and use in source and binary forms, with or 
+# without modification, are permitted provided that the following 
+# conditions are met: 
+# 
+# 1. Redistributions of source code must retain the above copyright 
+#    notice, this list of conditions and the following disclaimer. 
+# 
+# 2. Redistributions in binary form must reproduce the above copyright 
+#    notice, this list of conditions and the following disclaimer in 
+#    the documentation and/or other materials provided with the 
+#    distribution. 
+# 
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
+# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 
+# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 
+# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
+# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER 
+# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 
+# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 
+# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 
+# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+#
+#=======================================================================
+
+#-------------------------------------------------------------------
+# Python module imports.
+#-------------------------------------------------------------------
+import sys
+
+
+#-------------------------------------------------------------------
+# Constants.
+#-------------------------------------------------------------------
+MAX_64BIT = 0xffffffffffffffff
+
+
+#-------------------------------------------------------------------
+# ChaCha()
+#-------------------------------------------------------------------
+class SHA512():
+    def __init__(self, mode = 'MODE_SHA_512', verbose = 0):
+        assert mode in ['MODE_SHA_512_224', 'MODE_SHA_512_256',
+                        'MODE_SHA_384', 'MODE_SHA_512']
+        self.mode = mode
+        self.verbose = verbose
+        self.mode 
+        self.NUM_ROUNDS = 80
+        self.H = [0] * 8
+        self.t1 = 0
+        self.t2 = 0
+        self.a = 0
+        self.b = 0
+        self.c = 0
+        self.d = 0
+        self.e = 0
+        self.f = 0
+        self.g = 0
+        self.h = 0
+        self.w = 0
+        self.W = [0] * 16
+        self.k = 0
+        self.K = [0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 
+                  0xe9b5dba58189dbbc, 0x3956c25bf348b538, 0x59f111f1b605d019,
+                  0x923f82a4af194f9b, 0xab1c5ed5da6d8118, 0xd807aa98a3030242,
+                  0x12835b0145706fbe, 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2,
+                  0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235,
+                  0xc19bf174cf692694, 0xe49b69c19ef14ad2, 0xefbe4786384f25e3,
+                  0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65, 0x2de92c6f592b0275,
+                  0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5,
+                  0x983e5152ee66dfab, 0xa831c66d2db43210, 0xb00327c898fb213f,
+                  0xbf597fc7beef0ee4, 0xc6e00bf33da88fc2, 0xd5a79147930aa725,
+                  0x06ca6351e003826f, 0x142929670a0e6e70, 0x27b70a8546d22ffc,
+                  0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df,
+                  0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6,
+                  0x92722c851482353b, 0xa2bfe8a14cf10364, 0xa81a664bbc423001,
+                  0xc24b8b70d0f89791, 0xc76c51a30654be30, 0xd192e819d6ef5218,
+                  0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8,
+                  0x19a4c116b8d2d0c8, 0x1e376c085141ab53, 0x2748774cdf8eeb99,
+                  0x34b0bcb5e19b48a8, 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb,
+                  0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3, 0x748f82ee5defb2fc,
+                  0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec,
+                  0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915,
+                  0xc67178f2e372532b, 0xca273eceea26619c, 0xd186b8c721c0c207,
+                  0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178, 0x06f067aa72176fba,
+                  0x0a637dc5a2c898a6, 0x113f9804bef90dae, 0x1b710b35131c471b,
+                  0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc,
+                  0x431d67c49c100d4c, 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a,
+                  0x5fcb6fab3ad6faec, 0x6c44198c4a475817]
+
+        
+    def init(self):
+        if self.mode == 'MODE_SHA_512_224':
+            self.H = [0x8c3d37c819544da2, 0x73e1996689dcd4d6,
+                      0x1dfab7ae32ff9c82, 0x679dd514582f9fcf,
+                      0x0f6d2b697bd44da8, 0x77e36f7304c48942,
+                      0x3f9d85a86a1d36c8, 0x1112e6ad91d692a1]
+
+        elif self.mode == 'MODE_SHA_512_256':
+            self.H = [0x22312194fc2bf72c, 0x9f555fa3c84c64c2, 
+                      0x2393b86b6f53b151, 0x963877195940eabd, 
+                      0x96283ee2a88effe3, 0xbe5e1e2553863992, 
+                      0x2b0199fc2c85b8aa, 0x0eb72ddc81c52ca2]
+                      
+        elif self.mode == 'MODE_SHA_384':
+            self.H = [0xcbbb9d5dc1059ed8, 0x629a292a367cd507,
+                      0x9159015a3070dd17, 0x152fecd8f70e5939, 
+                      0x67332667ffc00b31, 0x8eb44a8768581511, 
+                      0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4]
+
+        elif self.mode == 'MODE_SHA_512':
+            self.H = [0x6a09e667f3bcc908, 0xbb67ae8584caa73b,
+                      0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1, 
+                      0x510e527fade682d1, 0x9b05688c2b3e6c1f, 
+                      0x1f83d9abfb41bd6b, 0x5be0cd19137e2179]
+        
+
+    def next(self, block):
+        self._W_schedule(block)
+        self._copy_digest()
+        if self.verbose:
+            print("State after init:")
+            self._print_state(0)
+
+        for i in range(self.NUM_ROUNDS):
+            self._sha512_round(i)
+            if self.verbose:
+                self._print_state(i)
+
+        self._update_digest()
+
+
+    def get_digest(self):
+        if self.mode == 'MODE_SHA_512_224':
+            return self.H[0:3] # FIX THIS!
+
+        elif self.mode == 'MODE_SHA_512_256':
+            return self.H[0:4]
+
+        elif self.mode == 'MODE_SHA_384':
+            return self.H[0:6]
+
+        elif self.mode == 'MODE_SHA_512':
+            return self.H
+
+
+    def _copy_digest(self):
+        self.a = self.H[0] 
+        self.b = self.H[1] 
+        self.c = self.H[2] 
+        self.d = self.H[3] 
+        self.e = self.H[4] 
+        self.f = self.H[5] 
+        self.g = self.H[6] 
+        self.h = self.H[7]
+    
+    
+    def _update_digest(self):
+        self.H[0] = (self.H[0] + self.a) & MAX_64BIT
+        self.H[1] = (self.H[1] + self.b) & MAX_64BIT
+        self.H[2] = (self.H[2] + self.c) & MAX_64BIT
+        self.H[3] = (self.H[3] + self.d) & MAX_64BIT
+        self.H[4] = (self.H[4] + self.e) & MAX_64BIT
+        self.H[5] = (self.H[5] + self.f) & MAX_64BIT
+        self.H[6] = (self.H[6] + self.g) & MAX_64BIT
+        self.H[7] = (self.H[7] + self.h) & MAX_64BIT
+
+
+    def _print_state(self, round):
+        print("State at round 0x%02x:" % round)
+        print("t1 = 0x%016x, t2 = 0x%016x" % (self.t1, self.t2))
+        print("k  = 0x%016x, w  = 0x%016x" % (self.k,  self.w))
+        print("a  = 0x%016x, b  = 0x%016x" % (self.a,  self.b))
+        print("c  = 0x%016x, d  = 0x%016x" % (self.c,  self.d))
+        print("e  = 0x%016x, f  = 0x%016x" % (self.e,  self.f))
+        print("g  = 0x%016x, h  = 0x%016x" % (self.g,  self.h))
+        print("")
+
+
+    def _sha512_round(self, round):
+        self.k = self.K[round]
+        self.w = self._next_w(round)
+        self.t1 = self._T1(self.e, self.f, self.g, self.h, self.k, self.w)
+        self.t2 = self._T2(self.a, self.b, self.c)
+        self.h = self.g
+        self.g = self.f
+        self.f = self.e
+        self.e = (self.d + self.t1) & MAX_64BIT
+        self.d = self.c
+        self.c = self.b
+        self.b = self.a
+        self.a = (self.t1 + self.t2) & MAX_64BIT
+
+
+    def _next_w(self, round):
+        if (round < 16):
+            return self.W[round]
+
+        else:
+            tmp_w = (self._delta1(self.W[14]) +
+                     self.W[9] + 
+                     self._delta0(self.W[1]) +
+                     self.W[0]) & MAX_64BIT
+            for i in range(15):
+                self.W[i] = self.W[(i+1)]
+            self.W[15] = tmp_w
+            return tmp_w
+
+
+    def _W_schedule(self, block):
+        for i in range(16):
+            self.W[i] = block[i]
+
+
+    def _Ch(self, x, y, z):
+        return (x & y) ^ (~x & z)
+
+
+    def _Maj(self, x, y, z):
+        return (x & y) ^ (x & z) ^ (y & z)
+
+    def _sigma0(self, x):
+        return (self._rotr64(x, 28) ^ self._rotr64(x, 34) ^ self._rotr64(x, 39))
+
+
+    def _sigma1(self, x):
+        return (self._rotr64(x, 14) ^ self._rotr64(x, 18) ^ self._rotr64(x, 41))
+
+
+    def _delta0(self, x):
+        return (self._rotr64(x, 1) ^ self._rotr64(x, 8) ^ self._shr64(x, 7))
+
+
+    def _delta1(self, x):
+        return (self._rotr64(x, 19) ^ self._rotr64(x, 61) ^ self._shr64(x, 6))
+    
+
+    def _T1(self, e, f, g, h, k, w):
+        return (h + self._sigma1(e) + self._Ch(e, f, g) + k + w) & MAX_64BIT
+
+
+    def _T2(self, a, b, c):
+        return (self._sigma0(a) + self._Maj(a, b, c)) & MAX_64BIT
+
+
+    def _rotr64(self, n, r):
+        return ((n >> r) | (n << (64 - r))) & MAX_64BIT
+
+    
+    def _shr64(self, n, r):
+        return (n >> r)
+
+
+def compare_digests(digest, expected):
+    if (digest != expected):
+        print("Error:")
+        print("Got:")
+        print(digest)
+        print("Expected:")
+        print(expected)
+    else:
+        print("Test case ok.")
+        
+    
+#-------------------------------------------------------------------
+# main()
+#
+# If executed tests the ChaCha class using known test vectors.
+#-------------------------------------------------------------------
+def main():
+    print("Testing the SHA-512 Python model.")
+    print("---------------------------------")
+    print
+
+    # Single block message.
+    TC1_block = [0x6162638000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000,
+                 0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000,
+                 0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000,
+                 0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000018]
+
+    
+    my_sha512 = SHA512(mode = 'MODE_SHA_512', verbose=1);
+    TC1_expected = [0xDDAF35A193617ABA, 0xCC417349AE204131, 0x12E6FA4E89A97EA2, 0x0A9EEEE64B55D39A,
+                    0x2192992A274FC1A8, 0x36BA3C23A3FEEBBD, 0x454D4423643CE80E, 0x2A9AC94FA54CA49F]
+    my_sha512.init()
+    my_sha512.next(TC1_block)
+    my_digest = my_sha512.get_digest()
+    compare_digests(my_digest, TC1_expected)
+
+
+    my_sha512 = SHA512(mode = 'MODE_SHA_512_224', verbose=1);
+    TC2_expected = [0x4634270F707B6A54, 0xDAAE7530460842E2, 0x0E37ED265CEEE9A4, 0x3E8924AA00000000]
+    my_sha512.init()
+    my_sha512.next(TC1_block)
+    my_digest = my_sha512.get_digest()
+    compare_digests(my_digest, TC2_expected)
+
+
+    my_sha512 = SHA512(mode = 'MODE_SHA_512_256', verbose=1);
+    TC3_expected = [0x53048E2681941EF9, 0x9B2E29B76B4C7DAB, 0xE4C2D0C634FC6D46, 0xE0E2F13107E7AF23]
+    my_sha512.init()
+    my_sha512.next(TC1_block)
+    my_digest = my_sha512.get_digest()
+    compare_digests(my_digest, TC3_expected)
+
+
+    my_sha512 = SHA512(mode = 'MODE_SHA_384', verbose=1);
+    TC4_expected = [0xCB00753F45A35E8B, 0xB5A03D699AC65007, 0x272C32AB0EDED163, 0x1A8B605A43FF5BED,
+                    0x8086072BA1E7CC23, 0x58BAECA134C825A7]
+    my_sha512.init()
+    my_sha512.next(TC1_block)
+    my_digest = my_sha512.get_digest()
+    compare_digests(my_digest, TC4_expected)
+
+    
+
+#-------------------------------------------------------------------
+# __name__
+# Python thingy which allows the file to be run standalone as
+# well as parsed from within a Python interpreter.
+#-------------------------------------------------------------------
+if __name__=="__main__": 
+    # Run the main function.
+    sys.exit(main())
+
+#=======================================================================
+# EOF sha512.py
+#=======================================================================



More information about the Commits mailing list