Python Crypto Toolkit - curiosa
This is the README file from the curiosa directory of Andrew
Kuchling's Python Crypto Toolkit.
-----BEGIN PGP SIGNED MESSAGE-----
The curiosa/ directory contains various cryptography-related
hacks that may of interest, but aren't really practical for real use.
One amusement is to try to write the shortest possible
encryption program. Recently numerous people have started exporting
cryptographic systems in their .signatures (and on mailing labels,
T-shirts, ...). This is aimed at making the North American export
regulations look silly. The most common one seen in .sig files on
Usenet is RSA in 3 lines of Perl:
#!/usr/local/bin/perl -s-- -export-a-crypto-system-sig -RSA-in-3-lines-PERL
($k,$n)=@ARGV;$m=unpack(H.$w,$m."\0"x$w),$_=`echo "16do$w 2+4Oi0$d*-^1[d2%
Sa2/d0ciphertext
cat ciphertext | rsa.py -d ac363601 1967cb529
#!/usr/local/bin/python
from sys import*;from string import*;a=argv;[s,p,q]=filter(lambda x:x[:1]!=
'-',a);d='-d'in a;e,n=atol(p,16),atol(q,16);l=(len(q)+1)/2;o,inb=l-d,l-1+d
while s:s=stdin.read(inb);s and map(stdout.write,map(lambda i,b=pow(reduce(
lambda x,y:(x<<8L)+y,map(ord,s)),e,n):chr(b>>8*i&255),range(o-1,-1,-1)))
* arc4.py (5 lines): ARC4 is short for `Alleged RC4'. The
real RC4 algorithm is proprietary to RSA Data Security Inc. In
September of 1994, someone posted C code to both the Cypherpunks
mailing list and to the Usenet newsgroup @code{sci.crypt}, claiming
that it implemented the RC4 algorithm. This posted code is what I'm
calling Alleged RC4, or ARC4 for short.
ARC4 is a private-key cipher; the same key is used to both
encrypt and decrypt. This is the script most likely to be of
practical use. It takes one argument, which is the key expressed in
hex bytes. The key can have any non-zero length.
An example: To encrypt and then decrypt a message with the key
'foo', or, in hex, 0x66 0x6f 0x6f:
cat 'Message.' | arc4.py 666f6f >ciphertext
cat ciphertext | arc4.py 666f6f
#!/usr/local/bin/python
from sys import*;from string import *;t,x,y,j,s,a=range(256),0,0,0,1,argv[1]
k=(map(lambda b:atoi(a[b:b+2],16), range(0,len(a),2))*256)[:256]
for i in t[:]:j=(k[i]+t[i]+j)%256;t[i],t[j]=t[j],t[i]
while(s):s=stdin.read(1);l,x=len(s),(x+1)%256;y,c=(y+t[x])%256,l and ord(s);(
t[x],t[y])=t[y],t[x];stdout.write(chr(c^t[(t[x]+t[y])%256])[:l])
* otp.py (2 lines): The only truly unbreakable encryption
method is the one-time pad, or OTP. In the OTP, the plaintext is
XORed with a stream of random data (the pad) to produce the
ciphertext. The recipient then XORs the ciphertext and gets the
plaintext again. This is secure because there is no way for an
eavesdropper to determine what the intended message is; the only thing
that can be learned is the length of the message.
This sounds trivial; just get some random data, XOR it with
the message, and there you go! But the problem is with that word
"random"; how do you get truly random data? The rand() function in C
or your favorite programming language is almost certainly a
pseudo-random generator; a small amount of state is used to generate a
sequence of numbers that *looks* random to various statistical tests.
However, given a few numbers of the sequence, it may be possible to
derive the rest of the sequence in either the backward or forward
direction. This is obviously unsafe for a one-time pad; if you could
get just a few characters of the plaintext, you can compute the value
of the pad at that point and then derive the rest of the pad.
Generating truly random numbers is difficult; usually some
physical phenomenon like keystroke timings, radioactive decay, or the
noise in a transistor is used. Then there's the problem of key
distribution; how does your correspondent get the random numbers?
Governments can afford to send a courier who carries the data in a
briefcase chained to his/her wrist; can you?
In any event, let us assume you've magically obtained some
random numbers and placed them in a file called "pad". otp.py simply
XORs two files together, so to encrypt a file called "message":
otp.py pad message >ciphertext
Decryption is similar:
otp.py pad ciphertext >output
#!/usr/local/bin/python
from sys import*;t=p=1;s=stdout;[i,j]=map(lambda f: open(f, 'r'), argv[1:3])
while(t and p):t,p=i.read(1),j.read(1);t and p and s.write(chr(ord(t)^ord(p)))
Andrew Kuchling
andrewk@cst.ca
fnord@cs.mcgill.ca
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMBGDBgRXhWZuGe+lAQE6KwP8DRr89B8IXPsGx51dm4/niX5pZYAIL9kZ
EoG6ZzpoN2WV49bIgWlBm7WYZH1Y9s76pC9h8gWrxJ4/YZIwAsNFLIN9NwNXu4OC
djnmpviI9OQhxSXcTs6JO3zL/OUyOCU43rYWYups+IzBeWydvC+PB2jpNzyNZBkS
ph6VekHeTfk=
=VPco
-----END PGP SIGNATURE-----