123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562 |
- from sympy.core import symbols
- from sympy.crypto.crypto import (cycle_list,
- encipher_shift, encipher_affine, encipher_substitution,
- check_and_join, encipher_vigenere, decipher_vigenere,
- encipher_hill, decipher_hill, encipher_bifid5, encipher_bifid6,
- bifid5_square, bifid6_square, bifid5, bifid6,
- decipher_bifid5, decipher_bifid6, encipher_kid_rsa,
- decipher_kid_rsa, kid_rsa_private_key, kid_rsa_public_key,
- decipher_rsa, rsa_private_key, rsa_public_key, encipher_rsa,
- lfsr_connection_polynomial, lfsr_autocorrelation, lfsr_sequence,
- encode_morse, decode_morse, elgamal_private_key, elgamal_public_key,
- encipher_elgamal, decipher_elgamal, dh_private_key, dh_public_key,
- dh_shared_key, decipher_shift, decipher_affine, encipher_bifid,
- decipher_bifid, bifid_square, padded_key, uniq, decipher_gm,
- encipher_gm, gm_public_key, gm_private_key, encipher_bg, decipher_bg,
- bg_private_key, bg_public_key, encipher_rot13, decipher_rot13,
- encipher_atbash, decipher_atbash, NonInvertibleCipherWarning,
- encipher_railfence, decipher_railfence)
- from sympy.matrices import Matrix
- from sympy.ntheory import isprime, is_primitive_root
- from sympy.polys.domains import FF
- from sympy.testing.pytest import raises, warns
- from sympy.core.random import randrange
- def test_encipher_railfence():
- assert encipher_railfence("hello world",2) == "hlowrdel ol"
- assert encipher_railfence("hello world",3) == "horel ollwd"
- assert encipher_railfence("hello world",4) == "hwe olordll"
- def test_decipher_railfence():
- assert decipher_railfence("hlowrdel ol",2) == "hello world"
- assert decipher_railfence("horel ollwd",3) == "hello world"
- assert decipher_railfence("hwe olordll",4) == "hello world"
- def test_cycle_list():
- assert cycle_list(3, 4) == [3, 0, 1, 2]
- assert cycle_list(-1, 4) == [3, 0, 1, 2]
- assert cycle_list(1, 4) == [1, 2, 3, 0]
- def test_encipher_shift():
- assert encipher_shift("ABC", 0) == "ABC"
- assert encipher_shift("ABC", 1) == "BCD"
- assert encipher_shift("ABC", -1) == "ZAB"
- assert decipher_shift("ZAB", -1) == "ABC"
- def test_encipher_rot13():
- assert encipher_rot13("ABC") == "NOP"
- assert encipher_rot13("NOP") == "ABC"
- assert decipher_rot13("ABC") == "NOP"
- assert decipher_rot13("NOP") == "ABC"
- def test_encipher_affine():
- assert encipher_affine("ABC", (1, 0)) == "ABC"
- assert encipher_affine("ABC", (1, 1)) == "BCD"
- assert encipher_affine("ABC", (-1, 0)) == "AZY"
- assert encipher_affine("ABC", (-1, 1), symbols="ABCD") == "BAD"
- assert encipher_affine("123", (-1, 1), symbols="1234") == "214"
- assert encipher_affine("ABC", (3, 16)) == "QTW"
- assert decipher_affine("QTW", (3, 16)) == "ABC"
- def test_encipher_atbash():
- assert encipher_atbash("ABC") == "ZYX"
- assert encipher_atbash("ZYX") == "ABC"
- assert decipher_atbash("ABC") == "ZYX"
- assert decipher_atbash("ZYX") == "ABC"
- def test_encipher_substitution():
- assert encipher_substitution("ABC", "BAC", "ABC") == "BAC"
- assert encipher_substitution("123", "1243", "1234") == "124"
- def test_check_and_join():
- assert check_and_join("abc") == "abc"
- assert check_and_join(uniq("aaabc")) == "abc"
- assert check_and_join("ab c".split()) == "abc"
- assert check_and_join("abc", "a", filter=True) == "a"
- raises(ValueError, lambda: check_and_join('ab', 'a'))
- def test_encipher_vigenere():
- assert encipher_vigenere("ABC", "ABC") == "ACE"
- assert encipher_vigenere("ABC", "ABC", symbols="ABCD") == "ACA"
- assert encipher_vigenere("ABC", "AB", symbols="ABCD") == "ACC"
- assert encipher_vigenere("AB", "ABC", symbols="ABCD") == "AC"
- assert encipher_vigenere("A", "ABC", symbols="ABCD") == "A"
- def test_decipher_vigenere():
- assert decipher_vigenere("ABC", "ABC") == "AAA"
- assert decipher_vigenere("ABC", "ABC", symbols="ABCD") == "AAA"
- assert decipher_vigenere("ABC", "AB", symbols="ABCD") == "AAC"
- assert decipher_vigenere("AB", "ABC", symbols="ABCD") == "AA"
- assert decipher_vigenere("A", "ABC", symbols="ABCD") == "A"
- def test_encipher_hill():
- A = Matrix(2, 2, [1, 2, 3, 5])
- assert encipher_hill("ABCD", A) == "CFIV"
- A = Matrix(2, 2, [1, 0, 0, 1])
- assert encipher_hill("ABCD", A) == "ABCD"
- assert encipher_hill("ABCD", A, symbols="ABCD") == "ABCD"
- A = Matrix(2, 2, [1, 2, 3, 5])
- assert encipher_hill("ABCD", A, symbols="ABCD") == "CBAB"
- assert encipher_hill("AB", A, symbols="ABCD") == "CB"
- # message length, n, does not need to be a multiple of k;
- # it is padded
- assert encipher_hill("ABA", A) == "CFGC"
- assert encipher_hill("ABA", A, pad="Z") == "CFYV"
- def test_decipher_hill():
- A = Matrix(2, 2, [1, 2, 3, 5])
- assert decipher_hill("CFIV", A) == "ABCD"
- A = Matrix(2, 2, [1, 0, 0, 1])
- assert decipher_hill("ABCD", A) == "ABCD"
- assert decipher_hill("ABCD", A, symbols="ABCD") == "ABCD"
- A = Matrix(2, 2, [1, 2, 3, 5])
- assert decipher_hill("CBAB", A, symbols="ABCD") == "ABCD"
- assert decipher_hill("CB", A, symbols="ABCD") == "AB"
- # n does not need to be a multiple of k
- assert decipher_hill("CFA", A) == "ABAA"
- def test_encipher_bifid5():
- assert encipher_bifid5("AB", "AB") == "AB"
- assert encipher_bifid5("AB", "CD") == "CO"
- assert encipher_bifid5("ab", "c") == "CH"
- assert encipher_bifid5("a bc", "b") == "BAC"
- def test_bifid5_square():
- A = bifid5
- f = lambda i, j: symbols(A[5*i + j])
- M = Matrix(5, 5, f)
- assert bifid5_square("") == M
- def test_decipher_bifid5():
- assert decipher_bifid5("AB", "AB") == "AB"
- assert decipher_bifid5("CO", "CD") == "AB"
- assert decipher_bifid5("ch", "c") == "AB"
- assert decipher_bifid5("b ac", "b") == "ABC"
- def test_encipher_bifid6():
- assert encipher_bifid6("AB", "AB") == "AB"
- assert encipher_bifid6("AB", "CD") == "CP"
- assert encipher_bifid6("ab", "c") == "CI"
- assert encipher_bifid6("a bc", "b") == "BAC"
- def test_decipher_bifid6():
- assert decipher_bifid6("AB", "AB") == "AB"
- assert decipher_bifid6("CP", "CD") == "AB"
- assert decipher_bifid6("ci", "c") == "AB"
- assert decipher_bifid6("b ac", "b") == "ABC"
- def test_bifid6_square():
- A = bifid6
- f = lambda i, j: symbols(A[6*i + j])
- M = Matrix(6, 6, f)
- assert bifid6_square("") == M
- def test_rsa_public_key():
- assert rsa_public_key(2, 3, 1) == (6, 1)
- assert rsa_public_key(5, 3, 3) == (15, 3)
- with warns(NonInvertibleCipherWarning):
- assert rsa_public_key(2, 2, 1) == (4, 1)
- assert rsa_public_key(8, 8, 8) is False
- def test_rsa_private_key():
- assert rsa_private_key(2, 3, 1) == (6, 1)
- assert rsa_private_key(5, 3, 3) == (15, 3)
- assert rsa_private_key(23,29,5) == (667,493)
- with warns(NonInvertibleCipherWarning):
- assert rsa_private_key(2, 2, 1) == (4, 1)
- assert rsa_private_key(8, 8, 8) is False
- def test_rsa_large_key():
- # Sample from
- # http://www.herongyang.com/Cryptography/JCE-Public-Key-RSA-Private-Public-Key-Pair-Sample.html
- p = int('101565610013301240713207239558950144682174355406589305284428666'\
- '903702505233009')
- q = int('894687191887545488935455605955948413812376003053143521429242133'\
- '12069293984003')
- e = int('65537')
- d = int('893650581832704239530398858744759129594796235440844479456143566'\
- '6999402846577625762582824202269399672579058991442587406384754958587'\
- '400493169361356902030209')
- assert rsa_public_key(p, q, e) == (p*q, e)
- assert rsa_private_key(p, q, e) == (p*q, d)
- def test_encipher_rsa():
- puk = rsa_public_key(2, 3, 1)
- assert encipher_rsa(2, puk) == 2
- puk = rsa_public_key(5, 3, 3)
- assert encipher_rsa(2, puk) == 8
- with warns(NonInvertibleCipherWarning):
- puk = rsa_public_key(2, 2, 1)
- assert encipher_rsa(2, puk) == 2
- def test_decipher_rsa():
- prk = rsa_private_key(2, 3, 1)
- assert decipher_rsa(2, prk) == 2
- prk = rsa_private_key(5, 3, 3)
- assert decipher_rsa(8, prk) == 2
- with warns(NonInvertibleCipherWarning):
- prk = rsa_private_key(2, 2, 1)
- assert decipher_rsa(2, prk) == 2
- def test_mutltiprime_rsa_full_example():
- # Test example from
- # https://iopscience.iop.org/article/10.1088/1742-6596/995/1/012030
- puk = rsa_public_key(2, 3, 5, 7, 11, 13, 7)
- prk = rsa_private_key(2, 3, 5, 7, 11, 13, 7)
- assert puk == (30030, 7)
- assert prk == (30030, 823)
- msg = 10
- encrypted = encipher_rsa(2 * msg - 15, puk)
- assert encrypted == 18065
- decrypted = (decipher_rsa(encrypted, prk) + 15) / 2
- assert decrypted == msg
- # Test example from
- # https://www.scirp.org/pdf/JCC_2018032215502008.pdf
- puk1 = rsa_public_key(53, 41, 43, 47, 41)
- prk1 = rsa_private_key(53, 41, 43, 47, 41)
- puk2 = rsa_public_key(53, 41, 43, 47, 97)
- prk2 = rsa_private_key(53, 41, 43, 47, 97)
- assert puk1 == (4391633, 41)
- assert prk1 == (4391633, 294041)
- assert puk2 == (4391633, 97)
- assert prk2 == (4391633, 455713)
- msg = 12321
- encrypted = encipher_rsa(encipher_rsa(msg, puk1), puk2)
- assert encrypted == 1081588
- decrypted = decipher_rsa(decipher_rsa(encrypted, prk2), prk1)
- assert decrypted == msg
- def test_rsa_crt_extreme():
- p = int(
- '10177157607154245068023861503693082120906487143725062283406501' \
- '54082258226204046999838297167140821364638180697194879500245557' \
- '65445186962893346463841419427008800341257468600224049986260471' \
- '92257248163014468841725476918639415726709736077813632961290911' \
- '0256421232977833028677441206049309220354796014376698325101693')
- q = int(
- '28752342353095132872290181526607275886182793241660805077850801' \
- '75689512797754286972952273553128181861830576836289738668745250' \
- '34028199691128870676414118458442900035778874482624765513861643' \
- '27966696316822188398336199002306588703902894100476186823849595' \
- '103239410527279605442148285816149368667083114802852804976893')
- r = int(
- '17698229259868825776879500736350186838850961935956310134378261' \
- '89771862186717463067541369694816245225291921138038800171125596' \
- '07315449521981157084370187887650624061033066022458512942411841' \
- '18747893789972315277160085086164119879536041875335384844820566' \
- '0287479617671726408053319619892052000850883994343378882717849')
- s = int(
- '68925428438585431029269182233502611027091755064643742383515623' \
- '64321310582896893395529367074942808353187138794422745718419645' \
- '28291231865157212604266903677599180789896916456120289112752835' \
- '98502265889669730331688206825220074713977607415178738015831030' \
- '364290585369150502819743827343552098197095520550865360159439'
- )
- t = int(
- '69035483433453632820551311892368908779778144568711455301541094' \
- '31487047642322695357696860925747923189635033183069823820910521' \
- '71172909106797748883261493224162414050106920442445896819806600' \
- '15448444826108008217972129130625571421904893252804729877353352' \
- '739420480574842850202181462656251626522910618936534699566291'
- )
- e = 65537
- puk = rsa_public_key(p, q, r, s, t, e)
- prk = rsa_private_key(p, q, r, s, t, e)
- plaintext = 1000
- ciphertext_1 = encipher_rsa(plaintext, puk)
- ciphertext_2 = encipher_rsa(plaintext, puk, [p, q, r, s, t])
- assert ciphertext_1 == ciphertext_2
- assert decipher_rsa(ciphertext_1, prk) == \
- decipher_rsa(ciphertext_1, prk, [p, q, r, s, t])
- def test_rsa_exhaustive():
- p, q = 61, 53
- e = 17
- puk = rsa_public_key(p, q, e, totient='Carmichael')
- prk = rsa_private_key(p, q, e, totient='Carmichael')
- for msg in range(puk[0]):
- encrypted = encipher_rsa(msg, puk)
- decrypted = decipher_rsa(encrypted, prk)
- try:
- assert decrypted == msg
- except AssertionError:
- raise AssertionError(
- "The RSA is not correctly decrypted " \
- "(Original : {}, Encrypted : {}, Decrypted : {})" \
- .format(msg, encrypted, decrypted)
- )
- def test_rsa_multiprime_exhanstive():
- primes = [3, 5, 7, 11]
- e = 7
- args = primes + [e]
- puk = rsa_public_key(*args, totient='Carmichael')
- prk = rsa_private_key(*args, totient='Carmichael')
- n = puk[0]
- for msg in range(n):
- encrypted = encipher_rsa(msg, puk)
- decrypted = decipher_rsa(encrypted, prk)
- try:
- assert decrypted == msg
- except AssertionError:
- raise AssertionError(
- "The RSA is not correctly decrypted " \
- "(Original : {}, Encrypted : {}, Decrypted : {})" \
- .format(msg, encrypted, decrypted)
- )
- def test_rsa_multipower_exhanstive():
- from sympy.core.numbers import igcd
- primes = [5, 5, 7]
- e = 7
- args = primes + [e]
- puk = rsa_public_key(*args, multipower=True)
- prk = rsa_private_key(*args, multipower=True)
- n = puk[0]
- for msg in range(n):
- if igcd(msg, n) != 1:
- continue
- encrypted = encipher_rsa(msg, puk)
- decrypted = decipher_rsa(encrypted, prk)
- try:
- assert decrypted == msg
- except AssertionError:
- raise AssertionError(
- "The RSA is not correctly decrypted " \
- "(Original : {}, Encrypted : {}, Decrypted : {})" \
- .format(msg, encrypted, decrypted)
- )
- def test_kid_rsa_public_key():
- assert kid_rsa_public_key(1, 2, 1, 1) == (5, 2)
- assert kid_rsa_public_key(1, 2, 2, 1) == (8, 3)
- assert kid_rsa_public_key(1, 2, 1, 2) == (7, 2)
- def test_kid_rsa_private_key():
- assert kid_rsa_private_key(1, 2, 1, 1) == (5, 3)
- assert kid_rsa_private_key(1, 2, 2, 1) == (8, 3)
- assert kid_rsa_private_key(1, 2, 1, 2) == (7, 4)
- def test_encipher_kid_rsa():
- assert encipher_kid_rsa(1, (5, 2)) == 2
- assert encipher_kid_rsa(1, (8, 3)) == 3
- assert encipher_kid_rsa(1, (7, 2)) == 2
- def test_decipher_kid_rsa():
- assert decipher_kid_rsa(2, (5, 3)) == 1
- assert decipher_kid_rsa(3, (8, 3)) == 1
- assert decipher_kid_rsa(2, (7, 4)) == 1
- def test_encode_morse():
- assert encode_morse('ABC') == '.-|-...|-.-.'
- assert encode_morse('SMS ') == '...|--|...||'
- assert encode_morse('SMS\n') == '...|--|...||'
- assert encode_morse('') == ''
- assert encode_morse(' ') == '||'
- assert encode_morse(' ', sep='`') == '``'
- assert encode_morse(' ', sep='``') == '````'
- assert encode_morse('!@#$%^&*()_+') == '-.-.--|.--.-.|...-..-|-.--.|-.--.-|..--.-|.-.-.'
- assert encode_morse('12345') == '.----|..---|...--|....-|.....'
- assert encode_morse('67890') == '-....|--...|---..|----.|-----'
- def test_decode_morse():
- assert decode_morse('-.-|.|-.--') == 'KEY'
- assert decode_morse('.-.|..-|-.||') == 'RUN'
- raises(KeyError, lambda: decode_morse('.....----'))
- def test_lfsr_sequence():
- raises(TypeError, lambda: lfsr_sequence(1, [1], 1))
- raises(TypeError, lambda: lfsr_sequence([1], 1, 1))
- F = FF(2)
- assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)]
- assert lfsr_sequence([F(0)], [F(1)], 2) == [F(1), F(0)]
- F = FF(3)
- assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)]
- assert lfsr_sequence([F(0)], [F(2)], 2) == [F(2), F(0)]
- assert lfsr_sequence([F(1)], [F(2)], 2) == [F(2), F(2)]
- def test_lfsr_autocorrelation():
- raises(TypeError, lambda: lfsr_autocorrelation(1, 2, 3))
- F = FF(2)
- s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5)
- assert lfsr_autocorrelation(s, 2, 0) == 1
- assert lfsr_autocorrelation(s, 2, 1) == -1
- def test_lfsr_connection_polynomial():
- F = FF(2)
- x = symbols("x")
- s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5)
- assert lfsr_connection_polynomial(s) == x**2 + 1
- s = lfsr_sequence([F(1), F(1)], [F(0), F(1)], 5)
- assert lfsr_connection_polynomial(s) == x**2 + x + 1
- def test_elgamal_private_key():
- a, b, _ = elgamal_private_key(digit=100)
- assert isprime(a)
- assert is_primitive_root(b, a)
- assert len(bin(a)) >= 102
- def test_elgamal():
- dk = elgamal_private_key(5)
- ek = elgamal_public_key(dk)
- P = ek[0]
- assert P - 1 == decipher_elgamal(encipher_elgamal(P - 1, ek), dk)
- raises(ValueError, lambda: encipher_elgamal(P, dk))
- raises(ValueError, lambda: encipher_elgamal(-1, dk))
- def test_dh_private_key():
- p, g, _ = dh_private_key(digit = 100)
- assert isprime(p)
- assert is_primitive_root(g, p)
- assert len(bin(p)) >= 102
- def test_dh_public_key():
- p1, g1, a = dh_private_key(digit = 100)
- p2, g2, ga = dh_public_key((p1, g1, a))
- assert p1 == p2
- assert g1 == g2
- assert ga == pow(g1, a, p1)
- def test_dh_shared_key():
- prk = dh_private_key(digit = 100)
- p, _, ga = dh_public_key(prk)
- b = randrange(2, p)
- sk = dh_shared_key((p, _, ga), b)
- assert sk == pow(ga, b, p)
- raises(ValueError, lambda: dh_shared_key((1031, 14, 565), 2000))
- def test_padded_key():
- assert padded_key('b', 'ab') == 'ba'
- raises(ValueError, lambda: padded_key('ab', 'ace'))
- raises(ValueError, lambda: padded_key('ab', 'abba'))
- def test_bifid():
- raises(ValueError, lambda: encipher_bifid('abc', 'b', 'abcde'))
- assert encipher_bifid('abc', 'b', 'abcd') == 'bdb'
- raises(ValueError, lambda: decipher_bifid('bdb', 'b', 'abcde'))
- assert encipher_bifid('bdb', 'b', 'abcd') == 'abc'
- raises(ValueError, lambda: bifid_square('abcde'))
- assert bifid5_square("B") == \
- bifid5_square('BACDEFGHIKLMNOPQRSTUVWXYZ')
- assert bifid6_square('B0') == \
- bifid6_square('B0ACDEFGHIJKLMNOPQRSTUVWXYZ123456789')
- def test_encipher_decipher_gm():
- ps = [131, 137, 139, 149, 151, 157, 163, 167,
- 173, 179, 181, 191, 193, 197, 199]
- qs = [89, 97, 101, 103, 107, 109, 113, 127,
- 131, 137, 139, 149, 151, 157, 47]
- messages = [
- 0, 32855, 34303, 14805, 1280, 75859, 38368,
- 724, 60356, 51675, 76697, 61854, 18661,
- ]
- for p, q in zip(ps, qs):
- pri = gm_private_key(p, q)
- for msg in messages:
- pub = gm_public_key(p, q)
- enc = encipher_gm(msg, pub)
- dec = decipher_gm(enc, pri)
- assert dec == msg
- def test_gm_private_key():
- raises(ValueError, lambda: gm_public_key(13, 15))
- raises(ValueError, lambda: gm_public_key(0, 0))
- raises(ValueError, lambda: gm_public_key(0, 5))
- assert 17, 19 == gm_public_key(17, 19)
- def test_gm_public_key():
- assert 323 == gm_public_key(17, 19)[1]
- assert 15 == gm_public_key(3, 5)[1]
- raises(ValueError, lambda: gm_public_key(15, 19))
- def test_encipher_decipher_bg():
- ps = [67, 7, 71, 103, 11, 43, 107, 47,
- 79, 19, 83, 23, 59, 127, 31]
- qs = qs = [7, 71, 103, 11, 43, 107, 47,
- 79, 19, 83, 23, 59, 127, 31, 67]
- messages = [
- 0, 328, 343, 148, 1280, 758, 383,
- 724, 603, 516, 766, 618, 186,
- ]
- for p, q in zip(ps, qs):
- pri = bg_private_key(p, q)
- for msg in messages:
- pub = bg_public_key(p, q)
- enc = encipher_bg(msg, pub)
- dec = decipher_bg(enc, pri)
- assert dec == msg
- def test_bg_private_key():
- raises(ValueError, lambda: bg_private_key(8, 16))
- raises(ValueError, lambda: bg_private_key(8, 8))
- raises(ValueError, lambda: bg_private_key(13, 17))
- assert 23, 31 == bg_private_key(23, 31)
- def test_bg_public_key():
- assert 5293 == bg_public_key(67, 79)
- assert 713 == bg_public_key(23, 31)
- raises(ValueError, lambda: bg_private_key(13, 17))
|