0,0 → 1,77 |
from blockcipher import * |
import Crypto.Cipher.Blowfish |
|
def new(key,mode=MODE_ECB,IV=None,counter=None,segment_size=None): |
"""Create a new cipher object |
|
Blowfish using pycrypto for algo and pycryptoplus for ciphermode |
|
key = raw string containing the key |
mode = Blowfish.MODE_ECB/CBC/CFB/OFB/CTR/CMAC, default is ECB |
IV = IV as a raw string, default is "all zero" IV |
-> only needed for CBC mode |
counter = counter object (CryptoPlus.Util.util.Counter) |
-> only needed for CTR mode |
segment_size = amount of bits to use from the keystream in each chain part |
-> supported values: multiple of 8 between 8 and the blocksize |
of the cipher (only per byte access possible), default is 8 |
-> only needed for CFB mode |
|
EXAMPLES: |
********** |
IMPORTING: |
----------- |
>>> from CryptoPlus.Cipher import Blowfish |
|
ECB EXAMPLE: http://www.schneier.com/code/vectors.txt |
------------- |
>>> cipher = Blowfish.new(('0131D9619DC1376E').decode('hex')) |
>>> ( cipher.encrypt(('5CD54CA83DEF57DA').decode('hex')) ).encode('hex') |
'b1b8cc0b250f09a0' |
>>> ( cipher.decrypt((_).decode('hex')) ).encode('hex') |
'5cd54ca83def57da' |
|
CBC, CFB, OFB EXAMPLE: http://www.schneier.com/code/vectors.txt |
---------------------- |
>>> key = ('0123456789ABCDEFF0E1D2C3B4A59687').decode('hex') |
>>> IV = ('FEDCBA9876543210').decode('hex') |
>>> plaintext = ('37363534333231204E6F77206973207468652074696D6520').decode('hex') |
>>> cipher = Blowfish.new(key,Blowfish.MODE_CBC,IV) |
>>> ciphertext = cipher.encrypt(plaintext) |
>>> (ciphertext).encode('hex').upper() |
'6B77B4D63006DEE605B156E27403979358DEB9E7154616D9' |
|
|
>>> key = '0123456789ABCDEFF0E1D2C3B4A59687'.decode('hex') |
>>> iv = 'FEDCBA9876543210'.decode('hex') |
>>> plaintext = '37363534333231204E6F77206973207468652074696D6520666F722000'.decode('hex') |
|
>>> cipher = Blowfish.new(key,Blowfish.MODE_CBC,iv) |
>>> ciphertext = cipher.encrypt(plaintext) |
>>> (ciphertext).encode('hex').upper() |
'6B77B4D63006DEE605B156E27403979358DEB9E7154616D9' |
|
>>> cipher = Blowfish.new(key,Blowfish.MODE_CFB,iv,segment_size=64) |
>>> ciphertext = cipher.encrypt(plaintext) |
>>> (ciphertext).encode('hex').upper() |
'E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3' |
|
>>> cipher = Blowfish.new(key,Blowfish.MODE_OFB,iv) |
>>> ciphertext = cipher.encrypt(plaintext) |
>>> (ciphertext).encode('hex').upper() |
'E73214A2822139CA62B343CC5B65587310DD908D0C241B2263C2CF80DA' |
""" |
return Blowfish(key,mode,IV,counter,segment_size) |
|
class Blowfish(BlockCipher): |
def __init__(self,key,mode,IV,counter,segment_size): |
cipher_module = Crypto.Cipher.Blowfish.new |
self.blocksize = 8 |
BlockCipher.__init__(self,key,mode,IV,counter,cipher_module,segment_size) |
|
def _test(): |
import doctest |
doctest.testmod() |
|
if __name__ == "__main__": |
_test() |