| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278 |
- import {
- BlockCipher,
- } from './cipher-core.js';
- // Lookup tables
- const _SBOX = [];
- const INV_SBOX = [];
- const _SUB_MIX_0 = [];
- const _SUB_MIX_1 = [];
- const _SUB_MIX_2 = [];
- const _SUB_MIX_3 = [];
- const INV_SUB_MIX_0 = [];
- const INV_SUB_MIX_1 = [];
- const INV_SUB_MIX_2 = [];
- const INV_SUB_MIX_3 = [];
- // Compute lookup tables
- // Compute double table
- const d = [];
- for (let i = 0; i < 256; i += 1) {
- if (i < 128) {
- d[i] = i << 1;
- } else {
- d[i] = (i << 1) ^ 0x11b;
- }
- }
- // Walk GF(2^8)
- let x = 0;
- let xi = 0;
- for (let i = 0; i < 256; i += 1) {
- // Compute sbox
- let sx = xi ^ (xi << 1) ^ (xi << 2) ^ (xi << 3) ^ (xi << 4);
- sx = (sx >>> 8) ^ (sx & 0xff) ^ 0x63;
- _SBOX[x] = sx;
- INV_SBOX[sx] = x;
- // Compute multiplication
- const x2 = d[x];
- const x4 = d[x2];
- const x8 = d[x4];
- // Compute sub bytes, mix columns tables
- let t = (d[sx] * 0x101) ^ (sx * 0x1010100);
- _SUB_MIX_0[x] = (t << 24) | (t >>> 8);
- _SUB_MIX_1[x] = (t << 16) | (t >>> 16);
- _SUB_MIX_2[x] = (t << 8) | (t >>> 24);
- _SUB_MIX_3[x] = t;
- // Compute inv sub bytes, inv mix columns tables
- t = (x8 * 0x1010101) ^ (x4 * 0x10001) ^ (x2 * 0x101) ^ (x * 0x1010100);
- INV_SUB_MIX_0[sx] = (t << 24) | (t >>> 8);
- INV_SUB_MIX_1[sx] = (t << 16) | (t >>> 16);
- INV_SUB_MIX_2[sx] = (t << 8) | (t >>> 24);
- INV_SUB_MIX_3[sx] = t;
- // Compute next counter
- if (!x) {
- xi = 1;
- x = xi;
- } else {
- x = x2 ^ d[d[d[x8 ^ x2]]];
- xi ^= d[d[xi]];
- }
- }
- // Precomputed Rcon lookup
- const RCON = [0x00, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36];
- /**
- * AES block cipher algorithm.
- */
- export class AESAlgo extends BlockCipher {
- _doReset() {
- let t;
- // Skip reset of nRounds has been set before and key did not change
- if (this._nRounds && this._keyPriorReset === this._key) {
- return;
- }
- // Shortcuts
- this._keyPriorReset = this._key;
- const key = this._keyPriorReset;
- const keyWords = key.words;
- const keySize = key.sigBytes / 4;
- // Compute number of rounds
- this._nRounds = keySize + 6;
- const nRounds = this._nRounds;
- // Compute number of key schedule rows
- const ksRows = (nRounds + 1) * 4;
- // Compute key schedule
- this._keySchedule = [];
- const keySchedule = this._keySchedule;
- for (let ksRow = 0; ksRow < ksRows; ksRow += 1) {
- if (ksRow < keySize) {
- keySchedule[ksRow] = keyWords[ksRow];
- } else {
- t = keySchedule[ksRow - 1];
- if (!(ksRow % keySize)) {
- // Rot word
- t = (t << 8) | (t >>> 24);
- // Sub word
- t = (_SBOX[t >>> 24] << 24)
- | (_SBOX[(t >>> 16) & 0xff] << 16)
- | (_SBOX[(t >>> 8) & 0xff] << 8)
- | _SBOX[t & 0xff];
- // Mix Rcon
- t ^= RCON[(ksRow / keySize) | 0] << 24;
- } else if (keySize > 6 && ksRow % keySize === 4) {
- // Sub word
- t = (_SBOX[t >>> 24] << 24)
- | (_SBOX[(t >>> 16) & 0xff] << 16)
- | (_SBOX[(t >>> 8) & 0xff] << 8)
- | _SBOX[t & 0xff];
- }
- keySchedule[ksRow] = keySchedule[ksRow - keySize] ^ t;
- }
- }
- // Compute inv key schedule
- this._invKeySchedule = [];
- const invKeySchedule = this._invKeySchedule;
- for (let invKsRow = 0; invKsRow < ksRows; invKsRow += 1) {
- const ksRow = ksRows - invKsRow;
- if (invKsRow % 4) {
- t = keySchedule[ksRow];
- } else {
- t = keySchedule[ksRow - 4];
- }
- if (invKsRow < 4 || ksRow <= 4) {
- invKeySchedule[invKsRow] = t;
- } else {
- invKeySchedule[invKsRow] = INV_SUB_MIX_0[_SBOX[t >>> 24]]
- ^ INV_SUB_MIX_1[_SBOX[(t >>> 16) & 0xff]]
- ^ INV_SUB_MIX_2[_SBOX[(t >>> 8) & 0xff]]
- ^ INV_SUB_MIX_3[_SBOX[t & 0xff]];
- }
- }
- }
- encryptBlock(M, offset) {
- this._doCryptBlock(
- M, offset, this._keySchedule, _SUB_MIX_0, _SUB_MIX_1, _SUB_MIX_2, _SUB_MIX_3, _SBOX,
- );
- }
- decryptBlock(M, offset) {
- const _M = M;
- // Swap 2nd and 4th rows
- let t = _M[offset + 1];
- _M[offset + 1] = _M[offset + 3];
- _M[offset + 3] = t;
- this._doCryptBlock(
- _M,
- offset,
- this._invKeySchedule,
- INV_SUB_MIX_0,
- INV_SUB_MIX_1,
- INV_SUB_MIX_2,
- INV_SUB_MIX_3,
- INV_SBOX,
- );
- // Inv swap 2nd and 4th rows
- t = _M[offset + 1];
- _M[offset + 1] = _M[offset + 3];
- _M[offset + 3] = t;
- }
- _doCryptBlock(M, offset, keySchedule, SUB_MIX_0, SUB_MIX_1, SUB_MIX_2, SUB_MIX_3, SBOX) {
- const _M = M;
- // Shortcut
- const nRounds = this._nRounds;
- // Get input, add round key
- let s0 = _M[offset] ^ keySchedule[0];
- let s1 = _M[offset + 1] ^ keySchedule[1];
- let s2 = _M[offset + 2] ^ keySchedule[2];
- let s3 = _M[offset + 3] ^ keySchedule[3];
- // Key schedule row counter
- let ksRow = 4;
- // Rounds
- for (let round = 1; round < nRounds; round += 1) {
- // Shift rows, sub bytes, mix columns, add round key
- const t0 = SUB_MIX_0[s0 >>> 24]
- ^ SUB_MIX_1[(s1 >>> 16) & 0xff]
- ^ SUB_MIX_2[(s2 >>> 8) & 0xff]
- ^ SUB_MIX_3[s3 & 0xff]
- ^ keySchedule[ksRow];
- ksRow += 1;
- const t1 = SUB_MIX_0[s1 >>> 24]
- ^ SUB_MIX_1[(s2 >>> 16) & 0xff]
- ^ SUB_MIX_2[(s3 >>> 8) & 0xff]
- ^ SUB_MIX_3[s0 & 0xff]
- ^ keySchedule[ksRow];
- ksRow += 1;
- const t2 = SUB_MIX_0[s2 >>> 24]
- ^ SUB_MIX_1[(s3 >>> 16) & 0xff]
- ^ SUB_MIX_2[(s0 >>> 8) & 0xff]
- ^ SUB_MIX_3[s1 & 0xff]
- ^ keySchedule[ksRow];
- ksRow += 1;
- const t3 = SUB_MIX_0[s3 >>> 24]
- ^ SUB_MIX_1[(s0 >>> 16) & 0xff]
- ^ SUB_MIX_2[(s1 >>> 8) & 0xff]
- ^ SUB_MIX_3[s2 & 0xff]
- ^ keySchedule[ksRow];
- ksRow += 1;
- // Update state
- s0 = t0;
- s1 = t1;
- s2 = t2;
- s3 = t3;
- }
- // Shift rows, sub bytes, add round key
- const t0 = (
- (SBOX[s0 >>> 24] << 24)
- | (SBOX[(s1 >>> 16) & 0xff] << 16)
- | (SBOX[(s2 >>> 8) & 0xff] << 8)
- | SBOX[s3 & 0xff]
- ) ^ keySchedule[ksRow];
- ksRow += 1;
- const t1 = (
- (SBOX[s1 >>> 24] << 24)
- | (SBOX[(s2 >>> 16) & 0xff] << 16)
- | (SBOX[(s3 >>> 8) & 0xff] << 8)
- | SBOX[s0 & 0xff]
- ) ^ keySchedule[ksRow];
- ksRow += 1;
- const t2 = (
- (SBOX[s2 >>> 24] << 24)
- | (SBOX[(s3 >>> 16) & 0xff] << 16)
- | (SBOX[(s0 >>> 8) & 0xff] << 8)
- | SBOX[s1 & 0xff]
- ) ^ keySchedule[ksRow];
- ksRow += 1;
- const t3 = (
- (SBOX[s3 >>> 24] << 24)
- | (SBOX[(s0 >>> 16) & 0xff] << 16) | (SBOX[(s1 >>> 8) & 0xff] << 8) | SBOX[s2 & 0xff]
- ) ^ keySchedule[ksRow];
- ksRow += 1;
- // Set output
- _M[offset] = t0;
- _M[offset + 1] = t1;
- _M[offset + 2] = t2;
- _M[offset + 3] = t3;
- }
- }
- AESAlgo.keySize = 256 / 32;
- /**
- * Shortcut functions to the cipher's object interface.
- *
- * @example
- *
- * var ciphertext = CryptoJS.AES.encrypt(message, key, cfg);
- * var plaintext = CryptoJS.AES.decrypt(ciphertext, key, cfg);
- */
- export const AES = BlockCipher._createHelper(AESAlgo);
|