You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

563 lines
19 KiB

from sympy.core import symbols
from sympy.crypto.crypto import (cycle_list,
encipher_shift, encipher_affine, encipher_substitution,
check_and_join, encipher_vigenere, decipher_vigenere,
encipher_hill, decipher_hill, encipher_bifid5, encipher_bifid6,
bifid5_square, bifid6_square, bifid5, bifid6,
decipher_bifid5, decipher_bifid6, encipher_kid_rsa,
decipher_kid_rsa, kid_rsa_private_key, kid_rsa_public_key,
decipher_rsa, rsa_private_key, rsa_public_key, encipher_rsa,
lfsr_connection_polynomial, lfsr_autocorrelation, lfsr_sequence,
encode_morse, decode_morse, elgamal_private_key, elgamal_public_key,
encipher_elgamal, decipher_elgamal, dh_private_key, dh_public_key,
dh_shared_key, decipher_shift, decipher_affine, encipher_bifid,
decipher_bifid, bifid_square, padded_key, uniq, decipher_gm,
encipher_gm, gm_public_key, gm_private_key, encipher_bg, decipher_bg,
bg_private_key, bg_public_key, encipher_rot13, decipher_rot13,
encipher_atbash, decipher_atbash, NonInvertibleCipherWarning,
encipher_railfence, decipher_railfence)
from sympy.matrices import Matrix
from sympy.ntheory import isprime, is_primitive_root
from sympy.polys.domains import FF
from sympy.testing.pytest import raises, warns
from sympy.core.random import randrange
def test_encipher_railfence():
assert encipher_railfence("hello world",2) == "hlowrdel ol"
assert encipher_railfence("hello world",3) == "horel ollwd"
assert encipher_railfence("hello world",4) == "hwe olordll"
def test_decipher_railfence():
assert decipher_railfence("hlowrdel ol",2) == "hello world"
assert decipher_railfence("horel ollwd",3) == "hello world"
assert decipher_railfence("hwe olordll",4) == "hello world"
def test_cycle_list():
assert cycle_list(3, 4) == [3, 0, 1, 2]
assert cycle_list(-1, 4) == [3, 0, 1, 2]
assert cycle_list(1, 4) == [1, 2, 3, 0]
def test_encipher_shift():
assert encipher_shift("ABC", 0) == "ABC"
assert encipher_shift("ABC", 1) == "BCD"
assert encipher_shift("ABC", -1) == "ZAB"
assert decipher_shift("ZAB", -1) == "ABC"
def test_encipher_rot13():
assert encipher_rot13("ABC") == "NOP"
assert encipher_rot13("NOP") == "ABC"
assert decipher_rot13("ABC") == "NOP"
assert decipher_rot13("NOP") == "ABC"
def test_encipher_affine():
assert encipher_affine("ABC", (1, 0)) == "ABC"
assert encipher_affine("ABC", (1, 1)) == "BCD"
assert encipher_affine("ABC", (-1, 0)) == "AZY"
assert encipher_affine("ABC", (-1, 1), symbols="ABCD") == "BAD"
assert encipher_affine("123", (-1, 1), symbols="1234") == "214"
assert encipher_affine("ABC", (3, 16)) == "QTW"
assert decipher_affine("QTW", (3, 16)) == "ABC"
def test_encipher_atbash():
assert encipher_atbash("ABC") == "ZYX"
assert encipher_atbash("ZYX") == "ABC"
assert decipher_atbash("ABC") == "ZYX"
assert decipher_atbash("ZYX") == "ABC"
def test_encipher_substitution():
assert encipher_substitution("ABC", "BAC", "ABC") == "BAC"
assert encipher_substitution("123", "1243", "1234") == "124"
def test_check_and_join():
assert check_and_join("abc") == "abc"
assert check_and_join(uniq("aaabc")) == "abc"
assert check_and_join("ab c".split()) == "abc"
assert check_and_join("abc", "a", filter=True) == "a"
raises(ValueError, lambda: check_and_join('ab', 'a'))
def test_encipher_vigenere():
assert encipher_vigenere("ABC", "ABC") == "ACE"
assert encipher_vigenere("ABC", "ABC", symbols="ABCD") == "ACA"
assert encipher_vigenere("ABC", "AB", symbols="ABCD") == "ACC"
assert encipher_vigenere("AB", "ABC", symbols="ABCD") == "AC"
assert encipher_vigenere("A", "ABC", symbols="ABCD") == "A"
def test_decipher_vigenere():
assert decipher_vigenere("ABC", "ABC") == "AAA"
assert decipher_vigenere("ABC", "ABC", symbols="ABCD") == "AAA"
assert decipher_vigenere("ABC", "AB", symbols="ABCD") == "AAC"
assert decipher_vigenere("AB", "ABC", symbols="ABCD") == "AA"
assert decipher_vigenere("A", "ABC", symbols="ABCD") == "A"
def test_encipher_hill():
A = Matrix(2, 2, [1, 2, 3, 5])
assert encipher_hill("ABCD", A) == "CFIV"
A = Matrix(2, 2, [1, 0, 0, 1])
assert encipher_hill("ABCD", A) == "ABCD"
assert encipher_hill("ABCD", A, symbols="ABCD") == "ABCD"
A = Matrix(2, 2, [1, 2, 3, 5])
assert encipher_hill("ABCD", A, symbols="ABCD") == "CBAB"
assert encipher_hill("AB", A, symbols="ABCD") == "CB"
# message length, n, does not need to be a multiple of k;
# it is padded
assert encipher_hill("ABA", A) == "CFGC"
assert encipher_hill("ABA", A, pad="Z") == "CFYV"
def test_decipher_hill():
A = Matrix(2, 2, [1, 2, 3, 5])
assert decipher_hill("CFIV", A) == "ABCD"
A = Matrix(2, 2, [1, 0, 0, 1])
assert decipher_hill("ABCD", A) == "ABCD"
assert decipher_hill("ABCD", A, symbols="ABCD") == "ABCD"
A = Matrix(2, 2, [1, 2, 3, 5])
assert decipher_hill("CBAB", A, symbols="ABCD") == "ABCD"
assert decipher_hill("CB", A, symbols="ABCD") == "AB"
# n does not need to be a multiple of k
assert decipher_hill("CFA", A) == "ABAA"
def test_encipher_bifid5():
assert encipher_bifid5("AB", "AB") == "AB"
assert encipher_bifid5("AB", "CD") == "CO"
assert encipher_bifid5("ab", "c") == "CH"
assert encipher_bifid5("a bc", "b") == "BAC"
def test_bifid5_square():
A = bifid5
f = lambda i, j: symbols(A[5*i + j])
M = Matrix(5, 5, f)
assert bifid5_square("") == M
def test_decipher_bifid5():
assert decipher_bifid5("AB", "AB") == "AB"
assert decipher_bifid5("CO", "CD") == "AB"
assert decipher_bifid5("ch", "c") == "AB"
assert decipher_bifid5("b ac", "b") == "ABC"
def test_encipher_bifid6():
assert encipher_bifid6("AB", "AB") == "AB"
assert encipher_bifid6("AB", "CD") == "CP"
assert encipher_bifid6("ab", "c") == "CI"
assert encipher_bifid6("a bc", "b") == "BAC"
def test_decipher_bifid6():
assert decipher_bifid6("AB", "AB") == "AB"
assert decipher_bifid6("CP", "CD") == "AB"
assert decipher_bifid6("ci", "c") == "AB"
assert decipher_bifid6("b ac", "b") == "ABC"
def test_bifid6_square():
A = bifid6
f = lambda i, j: symbols(A[6*i + j])
M = Matrix(6, 6, f)
assert bifid6_square("") == M
def test_rsa_public_key():
assert rsa_public_key(2, 3, 1) == (6, 1)
assert rsa_public_key(5, 3, 3) == (15, 3)
with warns(NonInvertibleCipherWarning):
assert rsa_public_key(2, 2, 1) == (4, 1)
assert rsa_public_key(8, 8, 8) is False
def test_rsa_private_key():
assert rsa_private_key(2, 3, 1) == (6, 1)
assert rsa_private_key(5, 3, 3) == (15, 3)
assert rsa_private_key(23,29,5) == (667,493)
with warns(NonInvertibleCipherWarning):
assert rsa_private_key(2, 2, 1) == (4, 1)
assert rsa_private_key(8, 8, 8) is False
def test_rsa_large_key():
# Sample from
# http://www.herongyang.com/Cryptography/JCE-Public-Key-RSA-Private-Public-Key-Pair-Sample.html
p = int('101565610013301240713207239558950144682174355406589305284428666'\
'903702505233009')
q = int('894687191887545488935455605955948413812376003053143521429242133'\
'12069293984003')
e = int('65537')
d = int('893650581832704239530398858744759129594796235440844479456143566'\
'6999402846577625762582824202269399672579058991442587406384754958587'\
'400493169361356902030209')
assert rsa_public_key(p, q, e) == (p*q, e)
assert rsa_private_key(p, q, e) == (p*q, d)
def test_encipher_rsa():
puk = rsa_public_key(2, 3, 1)
assert encipher_rsa(2, puk) == 2
puk = rsa_public_key(5, 3, 3)
assert encipher_rsa(2, puk) == 8
with warns(NonInvertibleCipherWarning):
puk = rsa_public_key(2, 2, 1)
assert encipher_rsa(2, puk) == 2
def test_decipher_rsa():
prk = rsa_private_key(2, 3, 1)
assert decipher_rsa(2, prk) == 2
prk = rsa_private_key(5, 3, 3)
assert decipher_rsa(8, prk) == 2
with warns(NonInvertibleCipherWarning):
prk = rsa_private_key(2, 2, 1)
assert decipher_rsa(2, prk) == 2
def test_mutltiprime_rsa_full_example():
# Test example from
# https://iopscience.iop.org/article/10.1088/1742-6596/995/1/012030
puk = rsa_public_key(2, 3, 5, 7, 11, 13, 7)
prk = rsa_private_key(2, 3, 5, 7, 11, 13, 7)
assert puk == (30030, 7)
assert prk == (30030, 823)
msg = 10
encrypted = encipher_rsa(2 * msg - 15, puk)
assert encrypted == 18065
decrypted = (decipher_rsa(encrypted, prk) + 15) / 2
assert decrypted == msg
# Test example from
# https://www.scirp.org/pdf/JCC_2018032215502008.pdf
puk1 = rsa_public_key(53, 41, 43, 47, 41)
prk1 = rsa_private_key(53, 41, 43, 47, 41)
puk2 = rsa_public_key(53, 41, 43, 47, 97)
prk2 = rsa_private_key(53, 41, 43, 47, 97)
assert puk1 == (4391633, 41)
assert prk1 == (4391633, 294041)
assert puk2 == (4391633, 97)
assert prk2 == (4391633, 455713)
msg = 12321
encrypted = encipher_rsa(encipher_rsa(msg, puk1), puk2)
assert encrypted == 1081588
decrypted = decipher_rsa(decipher_rsa(encrypted, prk2), prk1)
assert decrypted == msg
def test_rsa_crt_extreme():
p = int(
'10177157607154245068023861503693082120906487143725062283406501' \
'54082258226204046999838297167140821364638180697194879500245557' \
'65445186962893346463841419427008800341257468600224049986260471' \
'92257248163014468841725476918639415726709736077813632961290911' \
'0256421232977833028677441206049309220354796014376698325101693')
q = int(
'28752342353095132872290181526607275886182793241660805077850801' \
'75689512797754286972952273553128181861830576836289738668745250' \
'34028199691128870676414118458442900035778874482624765513861643' \
'27966696316822188398336199002306588703902894100476186823849595' \
'103239410527279605442148285816149368667083114802852804976893')
r = int(
'17698229259868825776879500736350186838850961935956310134378261' \
'89771862186717463067541369694816245225291921138038800171125596' \
'07315449521981157084370187887650624061033066022458512942411841' \
'18747893789972315277160085086164119879536041875335384844820566' \
'0287479617671726408053319619892052000850883994343378882717849')
s = int(
'68925428438585431029269182233502611027091755064643742383515623' \
'64321310582896893395529367074942808353187138794422745718419645' \
'28291231865157212604266903677599180789896916456120289112752835' \
'98502265889669730331688206825220074713977607415178738015831030' \
'364290585369150502819743827343552098197095520550865360159439'
)
t = int(
'69035483433453632820551311892368908779778144568711455301541094' \
'31487047642322695357696860925747923189635033183069823820910521' \
'71172909106797748883261493224162414050106920442445896819806600' \
'15448444826108008217972129130625571421904893252804729877353352' \
'739420480574842850202181462656251626522910618936534699566291'
)
e = 65537
puk = rsa_public_key(p, q, r, s, t, e)
prk = rsa_private_key(p, q, r, s, t, e)
plaintext = 1000
ciphertext_1 = encipher_rsa(plaintext, puk)
ciphertext_2 = encipher_rsa(plaintext, puk, [p, q, r, s, t])
assert ciphertext_1 == ciphertext_2
assert decipher_rsa(ciphertext_1, prk) == \
decipher_rsa(ciphertext_1, prk, [p, q, r, s, t])
def test_rsa_exhaustive():
p, q = 61, 53
e = 17
puk = rsa_public_key(p, q, e, totient='Carmichael')
prk = rsa_private_key(p, q, e, totient='Carmichael')
for msg in range(puk[0]):
encrypted = encipher_rsa(msg, puk)
decrypted = decipher_rsa(encrypted, prk)
try:
assert decrypted == msg
except AssertionError:
raise AssertionError(
"The RSA is not correctly decrypted " \
"(Original : {}, Encrypted : {}, Decrypted : {})" \
.format(msg, encrypted, decrypted)
)
def test_rsa_multiprime_exhanstive():
primes = [3, 5, 7, 11]
e = 7
args = primes + [e]
puk = rsa_public_key(*args, totient='Carmichael')
prk = rsa_private_key(*args, totient='Carmichael')
n = puk[0]
for msg in range(n):
encrypted = encipher_rsa(msg, puk)
decrypted = decipher_rsa(encrypted, prk)
try:
assert decrypted == msg
except AssertionError:
raise AssertionError(
"The RSA is not correctly decrypted " \
"(Original : {}, Encrypted : {}, Decrypted : {})" \
.format(msg, encrypted, decrypted)
)
def test_rsa_multipower_exhanstive():
from sympy.core.numbers import igcd
primes = [5, 5, 7]
e = 7
args = primes + [e]
puk = rsa_public_key(*args, multipower=True)
prk = rsa_private_key(*args, multipower=True)
n = puk[0]
for msg in range(n):
if igcd(msg, n) != 1:
continue
encrypted = encipher_rsa(msg, puk)
decrypted = decipher_rsa(encrypted, prk)
try:
assert decrypted == msg
except AssertionError:
raise AssertionError(
"The RSA is not correctly decrypted " \
"(Original : {}, Encrypted : {}, Decrypted : {})" \
.format(msg, encrypted, decrypted)
)
def test_kid_rsa_public_key():
assert kid_rsa_public_key(1, 2, 1, 1) == (5, 2)
assert kid_rsa_public_key(1, 2, 2, 1) == (8, 3)
assert kid_rsa_public_key(1, 2, 1, 2) == (7, 2)
def test_kid_rsa_private_key():
assert kid_rsa_private_key(1, 2, 1, 1) == (5, 3)
assert kid_rsa_private_key(1, 2, 2, 1) == (8, 3)
assert kid_rsa_private_key(1, 2, 1, 2) == (7, 4)
def test_encipher_kid_rsa():
assert encipher_kid_rsa(1, (5, 2)) == 2
assert encipher_kid_rsa(1, (8, 3)) == 3
assert encipher_kid_rsa(1, (7, 2)) == 2
def test_decipher_kid_rsa():
assert decipher_kid_rsa(2, (5, 3)) == 1
assert decipher_kid_rsa(3, (8, 3)) == 1
assert decipher_kid_rsa(2, (7, 4)) == 1
def test_encode_morse():
assert encode_morse('ABC') == '.-|-...|-.-.'
assert encode_morse('SMS ') == '...|--|...||'
assert encode_morse('SMS\n') == '...|--|...||'
assert encode_morse('') == ''
assert encode_morse(' ') == '||'
assert encode_morse(' ', sep='`') == '``'
assert encode_morse(' ', sep='``') == '````'
assert encode_morse('!@#$%^&*()_+') == '-.-.--|.--.-.|...-..-|-.--.|-.--.-|..--.-|.-.-.'
assert encode_morse('12345') == '.----|..---|...--|....-|.....'
assert encode_morse('67890') == '-....|--...|---..|----.|-----'
def test_decode_morse():
assert decode_morse('-.-|.|-.--') == 'KEY'
assert decode_morse('.-.|..-|-.||') == 'RUN'
raises(KeyError, lambda: decode_morse('.....----'))
def test_lfsr_sequence():
raises(TypeError, lambda: lfsr_sequence(1, [1], 1))
raises(TypeError, lambda: lfsr_sequence([1], 1, 1))
F = FF(2)
assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)]
assert lfsr_sequence([F(0)], [F(1)], 2) == [F(1), F(0)]
F = FF(3)
assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)]
assert lfsr_sequence([F(0)], [F(2)], 2) == [F(2), F(0)]
assert lfsr_sequence([F(1)], [F(2)], 2) == [F(2), F(2)]
def test_lfsr_autocorrelation():
raises(TypeError, lambda: lfsr_autocorrelation(1, 2, 3))
F = FF(2)
s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5)
assert lfsr_autocorrelation(s, 2, 0) == 1
assert lfsr_autocorrelation(s, 2, 1) == -1
def test_lfsr_connection_polynomial():
F = FF(2)
x = symbols("x")
s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5)
assert lfsr_connection_polynomial(s) == x**2 + 1
s = lfsr_sequence([F(1), F(1)], [F(0), F(1)], 5)
assert lfsr_connection_polynomial(s) == x**2 + x + 1
def test_elgamal_private_key():
a, b, _ = elgamal_private_key(digit=100)
assert isprime(a)
assert is_primitive_root(b, a)
assert len(bin(a)) >= 102
def test_elgamal():
dk = elgamal_private_key(5)
ek = elgamal_public_key(dk)
P = ek[0]
assert P - 1 == decipher_elgamal(encipher_elgamal(P - 1, ek), dk)
raises(ValueError, lambda: encipher_elgamal(P, dk))
raises(ValueError, lambda: encipher_elgamal(-1, dk))
def test_dh_private_key():
p, g, _ = dh_private_key(digit = 100)
assert isprime(p)
assert is_primitive_root(g, p)
assert len(bin(p)) >= 102
def test_dh_public_key():
p1, g1, a = dh_private_key(digit = 100)
p2, g2, ga = dh_public_key((p1, g1, a))
assert p1 == p2
assert g1 == g2
assert ga == pow(g1, a, p1)
def test_dh_shared_key():
prk = dh_private_key(digit = 100)
p, _, ga = dh_public_key(prk)
b = randrange(2, p)
sk = dh_shared_key((p, _, ga), b)
assert sk == pow(ga, b, p)
raises(ValueError, lambda: dh_shared_key((1031, 14, 565), 2000))
def test_padded_key():
assert padded_key('b', 'ab') == 'ba'
raises(ValueError, lambda: padded_key('ab', 'ace'))
raises(ValueError, lambda: padded_key('ab', 'abba'))
def test_bifid():
raises(ValueError, lambda: encipher_bifid('abc', 'b', 'abcde'))
assert encipher_bifid('abc', 'b', 'abcd') == 'bdb'
raises(ValueError, lambda: decipher_bifid('bdb', 'b', 'abcde'))
assert encipher_bifid('bdb', 'b', 'abcd') == 'abc'
raises(ValueError, lambda: bifid_square('abcde'))
assert bifid5_square("B") == \
bifid5_square('BACDEFGHIKLMNOPQRSTUVWXYZ')
assert bifid6_square('B0') == \
bifid6_square('B0ACDEFGHIJKLMNOPQRSTUVWXYZ123456789')
def test_encipher_decipher_gm():
ps = [131, 137, 139, 149, 151, 157, 163, 167,
173, 179, 181, 191, 193, 197, 199]
qs = [89, 97, 101, 103, 107, 109, 113, 127,
131, 137, 139, 149, 151, 157, 47]
messages = [
0, 32855, 34303, 14805, 1280, 75859, 38368,
724, 60356, 51675, 76697, 61854, 18661,
]
for p, q in zip(ps, qs):
pri = gm_private_key(p, q)
for msg in messages:
pub = gm_public_key(p, q)
enc = encipher_gm(msg, pub)
dec = decipher_gm(enc, pri)
assert dec == msg
def test_gm_private_key():
raises(ValueError, lambda: gm_public_key(13, 15))
raises(ValueError, lambda: gm_public_key(0, 0))
raises(ValueError, lambda: gm_public_key(0, 5))
assert 17, 19 == gm_public_key(17, 19)
def test_gm_public_key():
assert 323 == gm_public_key(17, 19)[1]
assert 15 == gm_public_key(3, 5)[1]
raises(ValueError, lambda: gm_public_key(15, 19))
def test_encipher_decipher_bg():
ps = [67, 7, 71, 103, 11, 43, 107, 47,
79, 19, 83, 23, 59, 127, 31]
qs = qs = [7, 71, 103, 11, 43, 107, 47,
79, 19, 83, 23, 59, 127, 31, 67]
messages = [
0, 328, 343, 148, 1280, 758, 383,
724, 603, 516, 766, 618, 186,
]
for p, q in zip(ps, qs):
pri = bg_private_key(p, q)
for msg in messages:
pub = bg_public_key(p, q)
enc = encipher_bg(msg, pub)
dec = decipher_bg(enc, pri)
assert dec == msg
def test_bg_private_key():
raises(ValueError, lambda: bg_private_key(8, 16))
raises(ValueError, lambda: bg_private_key(8, 8))
raises(ValueError, lambda: bg_private_key(13, 17))
assert 23, 31 == bg_private_key(23, 31)
def test_bg_public_key():
assert 5293 == bg_public_key(67, 79)
assert 713 == bg_public_key(23, 31)
raises(ValueError, lambda: bg_private_key(13, 17))