Zoltan Hudak / Enigma

Dependents:   Enigma_Hello

Committer:
hudakz
Date:
Tue Sep 24 09:17:40 2019 +0000
Revision:
3:9590c44c9ecd
Parent:
2:ee55abc2b6a2
Child:
4:107a360171fe
Encryption library based on the Enigma machine.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
hudakz 0:7a702d2d6b54 1 #include "Enigma.h"
hudakz 0:7a702d2d6b54 2
hudakz 0:7a702d2d6b54 3 /*$off*/
hudakz 0:7a702d2d6b54 4 // Internal wiring of the five available rotors
hudakz 0:7a702d2d6b54 5 const uint8_t Enigma::ROTOR_I[256] = {
hudakz 0:7a702d2d6b54 6 0xe0, 0xd7, 0xf1, 0x7a, 0x92, 0x84, 0x5e, 0x1b, 0xd6, 0x38, 0x79, 0x10, 0x7c, 0xa6, 0x1f, 0x4d,
hudakz 0:7a702d2d6b54 7 0x4f, 0x30, 0x19, 0xdd, 0x61, 0x00, 0xa2, 0x82, 0x98, 0xf9, 0x2f, 0x6a, 0xc5, 0x64, 0x9d, 0x9b,
hudakz 0:7a702d2d6b54 8 0xca, 0x17, 0xd4, 0x24, 0x2b, 0x20, 0xd5, 0xea, 0xba, 0x25, 0x2e, 0x08, 0x78, 0x32, 0xaf, 0xe6,
hudakz 0:7a702d2d6b54 9 0x4c, 0x13, 0x56, 0xbd, 0xd9, 0xe5, 0x33, 0xee, 0x69, 0xf3, 0x0f, 0x99, 0xbb, 0x4e, 0x01, 0x77,
hudakz 0:7a702d2d6b54 10 0x9c, 0x91, 0xf0, 0x89, 0xf8, 0x74, 0xb1, 0x95, 0x88, 0x42, 0xd0, 0x50, 0xfc, 0xa7, 0x7e, 0x7d,
hudakz 0:7a702d2d6b54 11 0x59, 0x73, 0x6d, 0x45, 0x5b, 0x3d, 0x3b, 0x34, 0x97, 0xed, 0xde, 0x47, 0xf4, 0xe1, 0x60, 0xe4,
hudakz 0:7a702d2d6b54 12 0x2a, 0xad, 0xfb, 0x81, 0xa9, 0x29, 0x57, 0x51, 0xc4, 0x3f, 0x53, 0x1d, 0xbe, 0x06, 0xfa, 0x85,
hudakz 0:7a702d2d6b54 13 0x12, 0x3a, 0x8a, 0x96, 0x63, 0x07, 0x8c, 0xd3, 0x72, 0xe3, 0x54, 0xcb, 0x4b, 0x35, 0x0b, 0xeb,
hudakz 0:7a702d2d6b54 14 0xda, 0xd2, 0x3e, 0x7f, 0x1a, 0xb6, 0x0c, 0xc0, 0xb2, 0xc8, 0xa8, 0x66, 0x39, 0x8e, 0xf5, 0xa4,
hudakz 0:7a702d2d6b54 15 0xdf, 0xe2, 0x8d, 0x44, 0x31, 0x7b, 0x14, 0xdc, 0xa3, 0xc3, 0xfd, 0x1e, 0xef, 0x23, 0x9a, 0x2d,
hudakz 0:7a702d2d6b54 16 0xf7, 0xb8, 0xc1, 0x94, 0x36, 0x5d, 0x48, 0x68, 0x80, 0xec, 0x4a, 0x41, 0xb4, 0xe8, 0x16, 0x6e,
hudakz 0:7a702d2d6b54 17 0x49, 0x43, 0x18, 0x11, 0x9f, 0xd8, 0x8b, 0x83, 0xcc, 0x03, 0xcf, 0x5c, 0x27, 0xc6, 0x02, 0xe7,
hudakz 0:7a702d2d6b54 18 0xcd, 0x70, 0x5a, 0x04, 0xff, 0xc7, 0xb0, 0x76, 0xb7, 0x26, 0xb3, 0xce, 0x15, 0x6c, 0xb5, 0x0d,
hudakz 0:7a702d2d6b54 19 0x93, 0x09, 0xf2, 0xdb, 0xbc, 0x37, 0xaa, 0x87, 0xf6, 0xab, 0x67, 0x21, 0x28, 0xc2, 0xc9, 0x52,
hudakz 0:7a702d2d6b54 20 0x0e, 0x5f, 0x58, 0xae, 0x22, 0x6f, 0x86, 0x2c, 0x0a, 0x1c, 0x62, 0x9e, 0xa5, 0x46, 0x05, 0xac,
hudakz 0:7a702d2d6b54 21 0x65, 0x40, 0x75, 0x6b, 0xb9, 0xe9, 0xd1, 0x8f, 0x71, 0xfe, 0x55, 0xa0, 0xa1, 0x3c, 0x90, 0xbf
hudakz 0:7a702d2d6b54 22 };
hudakz 0:7a702d2d6b54 23
hudakz 0:7a702d2d6b54 24 const uint8_t Enigma::ROTOR_II[256] = {
hudakz 0:7a702d2d6b54 25 0xff, 0xa2, 0x4f, 0x1a, 0x1b, 0x20, 0x9b, 0xec, 0x47, 0x3e, 0xe7, 0x0d, 0x0f, 0x34, 0x50, 0x46,
hudakz 0:7a702d2d6b54 26 0x41, 0x9a, 0xf6, 0x63, 0xb6, 0x83, 0xea, 0x51, 0x88, 0xd4, 0xc1, 0x52, 0x42, 0x37, 0xc0, 0xc6,
hudakz 0:7a702d2d6b54 27 0xe3, 0x1e, 0xf7, 0xa9, 0x60, 0x4b, 0xda, 0x2d, 0x94, 0x7f, 0x85, 0x2f, 0xa0, 0x6a, 0xfa, 0xc8,
hudakz 0:7a702d2d6b54 28 0xde, 0x06, 0x8d, 0x75, 0xf8, 0xee, 0xaa, 0xc7, 0xef, 0x38, 0x14, 0x69, 0x23, 0x05, 0x8c, 0x3d,
hudakz 0:7a702d2d6b54 29 0x5d, 0xc9, 0x13, 0x2e, 0xab, 0x6c, 0x32, 0xc5, 0xfc, 0xb4, 0xb0, 0x98, 0x1d, 0xbc, 0x2a, 0xa6,
hudakz 0:7a702d2d6b54 30 0x3f, 0xf2, 0xac, 0xc4, 0x8e, 0xbb, 0xf9, 0x49, 0xad, 0x9c, 0xd5, 0x57, 0xeb, 0xa1, 0x3b, 0x15,
hudakz 0:7a702d2d6b54 31 0x7d, 0x28, 0x89, 0xb5, 0xb7, 0xe1, 0x5b, 0x65, 0xdc, 0x10, 0x82, 0x36, 0xb8, 0x2c, 0x25, 0x7a,
hudakz 0:7a702d2d6b54 32 0x91, 0x2b, 0xfe, 0x9f, 0x07, 0x01, 0xa4, 0x6f, 0xae, 0x79, 0xf5, 0xd9, 0x48, 0x5c, 0x6d, 0x74,
hudakz 0:7a702d2d6b54 33 0xb1, 0x8a, 0x58, 0x33, 0xd0, 0x6e, 0x40, 0xbd, 0x4d, 0x97, 0xcf, 0x62, 0x84, 0x30, 0x67, 0xa7,
hudakz 0:7a702d2d6b54 34 0xe6, 0xe2, 0xb2, 0x61, 0x80, 0x92, 0x0e, 0x68, 0x4e, 0x66, 0x81, 0x16, 0x90, 0x53, 0x11, 0xbe,
hudakz 0:7a702d2d6b54 35 0x6b, 0xd1, 0x04, 0xd3, 0x08, 0x70, 0x95, 0x93, 0x4c, 0xa5, 0xdf, 0xd6, 0x5e, 0xa8, 0x7e, 0x9e,
hudakz 0:7a702d2d6b54 36 0x19, 0xe0, 0x77, 0x73, 0xbf, 0xf1, 0x21, 0x9d, 0x55, 0xfd, 0xe8, 0x56, 0xdb, 0xce, 0x64, 0x43,
hudakz 0:7a702d2d6b54 37 0x0c, 0x29, 0x0b, 0x44, 0x31, 0xe9, 0x8f, 0x1f, 0x8b, 0x27, 0xed, 0x3a, 0xfb, 0x12, 0xca, 0x59,
hudakz 0:7a702d2d6b54 38 0x1c, 0xdd, 0xb3, 0x87, 0x3c, 0x96, 0x78, 0x86, 0x54, 0xd2, 0xcc, 0x26, 0x99, 0xc3, 0x71, 0x02,
hudakz 0:7a702d2d6b54 39 0xf0, 0xe4, 0x45, 0x22, 0x18, 0xd8, 0x5f, 0xd7, 0xb9, 0xcd, 0xba, 0x5a, 0x7b, 0xf4, 0xaf, 0xa3,
hudakz 0:7a702d2d6b54 40 0x00, 0x24, 0x35, 0x7c, 0x09, 0x39, 0x03, 0x17, 0xcb, 0xf3, 0x72, 0x4a, 0xe5, 0x76, 0xc2, 0x0a
hudakz 0:7a702d2d6b54 41 };
hudakz 0:7a702d2d6b54 42
hudakz 0:7a702d2d6b54 43 const uint8_t Enigma::ROTOR_III[256] = {
hudakz 0:7a702d2d6b54 44 0x1c, 0xb8, 0x5a, 0xa6, 0xc2, 0xf9, 0x78, 0xf6, 0x41, 0x22, 0xd7, 0x1e, 0xad, 0xcc, 0x96, 0xe0,
hudakz 0:7a702d2d6b54 45 0x59, 0x69, 0x09, 0x73, 0xe8, 0xfc, 0x1a, 0x17, 0xa2, 0x12, 0xfe, 0x00, 0xfd, 0x7e, 0x0c, 0x60,
hudakz 0:7a702d2d6b54 46 0x54, 0x8d, 0x2e, 0xfa, 0x9e, 0xb1, 0xa5, 0x3f, 0x03, 0x7b, 0xb9, 0xbf, 0x90, 0xdd, 0xe5, 0xd2,
hudakz 0:7a702d2d6b54 47 0x2f, 0x99, 0xcd, 0x80, 0x79, 0xcb, 0xc6, 0x5e, 0x31, 0x08, 0x29, 0xea, 0xd9, 0x58, 0xf2, 0x4f,
hudakz 0:7a702d2d6b54 48 0x4e, 0x02, 0xc0, 0x98, 0x34, 0x47, 0x64, 0xb4, 0xce, 0x5c, 0x8c, 0xa4, 0x28, 0x83, 0xcf, 0x44,
hudakz 0:7a702d2d6b54 49 0xec, 0xc9, 0xf4, 0x30, 0x56, 0xb2, 0x1b, 0x8f, 0x07, 0xff, 0x35, 0x6e, 0x0f, 0x7c, 0xae, 0x11,
hudakz 0:7a702d2d6b54 50 0xab, 0xe1, 0x13, 0xa0, 0xc8, 0xe9, 0x2c, 0x70, 0x82, 0x91, 0xee, 0x76, 0xbb, 0xde, 0x20, 0x7f,
hudakz 0:7a702d2d6b54 51 0xf0, 0x5b, 0xe4, 0x36, 0xa7, 0x2d, 0x89, 0x53, 0x93, 0x24, 0xa1, 0x3e, 0x51, 0xd0, 0xf8, 0x95,
hudakz 0:7a702d2d6b54 52 0xdb, 0x77, 0x8a, 0x40, 0x8b, 0xc3, 0xdc, 0x3d, 0xd4, 0x9f, 0x19, 0xbe, 0xd3, 0xe7, 0x45, 0x10,
hudakz 0:7a702d2d6b54 53 0x8e, 0x9d, 0x0d, 0x57, 0xa9, 0x72, 0x21, 0x49, 0x52, 0x04, 0xd8, 0xf1, 0xeb, 0x4c, 0xb0, 0x14,
hudakz 0:7a702d2d6b54 54 0x87, 0x55, 0x33, 0xa8, 0x61, 0x38, 0x39, 0x65, 0x42, 0x0e, 0xe2, 0xb5, 0x4b, 0x94, 0x27, 0xf7,
hudakz 0:7a702d2d6b54 55 0x06, 0x48, 0xd6, 0x6d, 0xb3, 0x50, 0x85, 0x6a, 0xbd, 0x3c, 0xdf, 0x6b, 0x67, 0x01, 0xfb, 0x86,
hudakz 0:7a702d2d6b54 56 0x63, 0xf3, 0xbc, 0x23, 0x88, 0xf5, 0xca, 0x2b, 0x18, 0xc4, 0x3b, 0x5f, 0x84, 0x7d, 0xed, 0xda,
hudakz 0:7a702d2d6b54 57 0x1d, 0xd1, 0x74, 0x0a, 0x43, 0x75, 0xc7, 0x32, 0x62, 0xb6, 0x16, 0xe6, 0x4a, 0xa3, 0x37, 0x71,
hudakz 0:7a702d2d6b54 58 0x81, 0x26, 0xaf, 0x68, 0x2a, 0x9a, 0x5d, 0x3a, 0x7a, 0xb7, 0xe3, 0x46, 0x0b, 0xd5, 0x25, 0x4d,
hudakz 0:7a702d2d6b54 59 0xc1, 0x66, 0xaa, 0x1f, 0x05, 0xba, 0x9c, 0x6c, 0x9b, 0xac, 0x97, 0x6f, 0xef, 0xc5, 0x92, 0x15
hudakz 0:7a702d2d6b54 60 };
hudakz 0:7a702d2d6b54 61
hudakz 0:7a702d2d6b54 62 const uint8_t Enigma::ROTOR_IV[256] = {
hudakz 0:7a702d2d6b54 63 0xc1, 0x1b, 0x04, 0xe6, 0x4a, 0x89, 0xaa, 0xbe, 0x78, 0x05, 0x8f, 0x1a, 0x02, 0x81, 0x45, 0x3a,
hudakz 0:7a702d2d6b54 64 0xaf, 0xee, 0x68, 0xd4, 0x71, 0x5d, 0x92, 0x90, 0x36, 0x0d, 0x21, 0x14, 0x46, 0xbc, 0x09, 0xb2,
hudakz 0:7a702d2d6b54 65 0xef, 0x8d, 0xba, 0x8c, 0xac, 0xdd, 0x01, 0xd8, 0xda, 0xcf, 0xff, 0xfc, 0xf6, 0x48, 0xf2, 0xb9,
hudakz 0:7a702d2d6b54 66 0x95, 0x59, 0xc4, 0x76, 0xb6, 0xca, 0x58, 0x2c, 0x07, 0xec, 0x2a, 0x47, 0x99, 0x8a, 0x31, 0x20,
hudakz 0:7a702d2d6b54 67 0xe2, 0x7f, 0x30, 0xbd, 0x8e, 0xb5, 0x70, 0x0b, 0x18, 0x37, 0x75, 0xb1, 0x94, 0xc7, 0x06, 0x00,
hudakz 0:7a702d2d6b54 68 0x73, 0xc8, 0xcc, 0x9e, 0xe9, 0x2d, 0x1d, 0x44, 0x98, 0x1f, 0x93, 0xfb, 0x41, 0x50, 0xad, 0x32,
hudakz 0:7a702d2d6b54 69 0x61, 0xbb, 0xf1, 0xfe, 0x24, 0xce, 0xb4, 0xab, 0x72, 0xea, 0x25, 0x67, 0xcd, 0x53, 0x26, 0x7a,
hudakz 0:7a702d2d6b54 70 0x77, 0xa8, 0x23, 0x19, 0x79, 0xd1, 0x9c, 0x5f, 0xf5, 0xc0, 0x1c, 0x5b, 0xe3, 0xc6, 0x6e, 0xd5,
hudakz 0:7a702d2d6b54 71 0xe0, 0x10, 0x3d, 0x66, 0x7d, 0x33, 0x51, 0x6c, 0x82, 0xd6, 0x84, 0x40, 0xdb, 0xe8, 0xc9, 0x62,
hudakz 0:7a702d2d6b54 72 0xf3, 0x5c, 0xd3, 0x60, 0x4d, 0x96, 0x08, 0x8b, 0xfa, 0xd0, 0xb7, 0x7e, 0xc2, 0x55, 0xb8, 0x63,
hudakz 0:7a702d2d6b54 73 0x86, 0x2f, 0x97, 0xa9, 0xa6, 0x3e, 0x34, 0xcb, 0x0e, 0x38, 0x6d, 0xbf, 0xf7, 0x11, 0x6b, 0x0a,
hudakz 0:7a702d2d6b54 74 0xeb, 0xf0, 0x15, 0x0c, 0xb3, 0x12, 0x88, 0xa4, 0x69, 0xd2, 0x9f, 0xa1, 0x9a, 0x39, 0x27, 0x2b,
hudakz 0:7a702d2d6b54 75 0x4f, 0x03, 0x91, 0xa5, 0x3b, 0xde, 0xf9, 0x4b, 0x28, 0x9b, 0x1e, 0x17, 0xe7, 0x6f, 0xdf, 0x16,
hudakz 0:7a702d2d6b54 76 0x43, 0xf4, 0xdc, 0x7c, 0x87, 0x54, 0xe4, 0xa3, 0x52, 0x0f, 0xe5, 0x49, 0xed, 0x56, 0xfd, 0xe1,
hudakz 0:7a702d2d6b54 77 0x13, 0x22, 0x85, 0x9d, 0x4c, 0xd9, 0x65, 0x3c, 0x6a, 0x5e, 0xb0, 0xa0, 0x29, 0x2e, 0x42, 0x35,
hudakz 0:7a702d2d6b54 78 0xae, 0x5a, 0x4e, 0xa7, 0xc3, 0x7b, 0xa2, 0x83, 0x64, 0x74, 0xf8, 0xd7, 0x80, 0x3f, 0xc5, 0x57
hudakz 0:7a702d2d6b54 79 };
hudakz 0:7a702d2d6b54 80
hudakz 0:7a702d2d6b54 81 const uint8_t Enigma::ROTOR_V[256] = {
hudakz 0:7a702d2d6b54 82 0xfe, 0xc8, 0x49, 0x21, 0xa5, 0x5a, 0xf4, 0xa8, 0xc3, 0x1b, 0x9a, 0x5e, 0x22, 0xae, 0x7f, 0xea,
hudakz 0:7a702d2d6b54 83 0x8f, 0xf1, 0x15, 0x73, 0xe3, 0xce, 0x05, 0x3c, 0x08, 0x07, 0xeb, 0x96, 0xcf, 0x98, 0x29, 0xbd,
hudakz 0:7a702d2d6b54 84 0x03, 0xad, 0x9e, 0x32, 0x0e, 0xc1, 0xb9, 0xd2, 0x83, 0xd6, 0x4d, 0x14, 0x1c, 0x68, 0x9d, 0x31,
hudakz 0:7a702d2d6b54 85 0xa2, 0x97, 0x01, 0x7e, 0xe5, 0xf6, 0x2d, 0x27, 0xe8, 0xf5, 0xf9, 0xb2, 0x10, 0x82, 0xd8, 0x66,
hudakz 0:7a702d2d6b54 86 0x76, 0x8e, 0x19, 0xfd, 0xa3, 0xa6, 0x8a, 0xd0, 0x2f, 0xc9, 0xb4, 0x9c, 0xd7, 0x38, 0xdf, 0x99,
hudakz 0:7a702d2d6b54 87 0xef, 0xc4, 0x09, 0xb1, 0x13, 0x3a, 0x6d, 0xbc, 0x58, 0x7c, 0x4c, 0x11, 0x7d, 0xe2, 0x30, 0xc7,
hudakz 0:7a702d2d6b54 88 0x2b, 0x6b, 0xab, 0x6e, 0x63, 0x7b, 0xff, 0x9b, 0x57, 0xd4, 0x61, 0x51, 0x26, 0x37, 0x4a, 0xed,
hudakz 0:7a702d2d6b54 89 0xb6, 0xac, 0xc5, 0x92, 0x89, 0x91, 0xcc, 0x1f, 0x0c, 0xa0, 0x6f, 0x94, 0xec, 0xa4, 0xdc, 0x4f,
hudakz 0:7a702d2d6b54 90 0x8b, 0xdb, 0x6c, 0x40, 0xc6, 0x48, 0x54, 0x45, 0x16, 0xe9, 0x6a, 0x20, 0x52, 0x67, 0x55, 0x34,
hudakz 0:7a702d2d6b54 91 0x90, 0x79, 0xf0, 0x33, 0x9f, 0xda, 0x87, 0xf2, 0x85, 0xf3, 0x00, 0xf7, 0xbf, 0x69, 0xa9, 0x50,
hudakz 0:7a702d2d6b54 92 0x59, 0x36, 0xe0, 0x3d, 0x06, 0x0f, 0x46, 0x44, 0xb5, 0x56, 0xe7, 0x77, 0x3b, 0x5c, 0x0b, 0xe4,
hudakz 0:7a702d2d6b54 93 0x35, 0xc2, 0x72, 0x41, 0x2e, 0x0d, 0xaf, 0xf8, 0xc0, 0x0a, 0x17, 0x24, 0x95, 0x81, 0xee, 0x1d,
hudakz 0:7a702d2d6b54 94 0x2a, 0xa7, 0xcb, 0xd1, 0x12, 0x02, 0xb7, 0x42, 0x84, 0x4e, 0x28, 0x78, 0x8c, 0x1a, 0xb0, 0x5b,
hudakz 0:7a702d2d6b54 95 0x7a, 0xfa, 0xde, 0xbb, 0x93, 0x88, 0xcd, 0xe1, 0xfc, 0x04, 0x1e, 0x43, 0x8d, 0x74, 0x80, 0x25,
hudakz 0:7a702d2d6b54 96 0x47, 0xa1, 0xaa, 0x39, 0xdd, 0xb3, 0xd5, 0x3f, 0x65, 0x5d, 0xba, 0x18, 0x71, 0x60, 0x75, 0x62,
hudakz 0:7a702d2d6b54 97 0x2c, 0x4b, 0x53, 0xca, 0x64, 0xe6, 0x23, 0x5f, 0x3e, 0x86, 0x70, 0xfb, 0xd3, 0xd9, 0xbe, 0xb8
hudakz 0:7a702d2d6b54 98 };
hudakz 0:7a702d2d6b54 99
hudakz 0:7a702d2d6b54 100 // Internal wiring of the reflector
hudakz 0:7a702d2d6b54 101 const uint8_t Enigma::REFLECTOR[256] = {
hudakz 0:7a702d2d6b54 102 0x31, 0x74, 0x9c, 0xc4, 0x2a, 0x7e, 0xc6, 0x69, 0x19, 0xa3, 0x5d, 0x91, 0xe7, 0x15, 0x2f, 0xa1,
hudakz 0:7a702d2d6b54 103 0x29, 0x7c, 0xd1, 0x80, 0x9e, 0x0d, 0xf0, 0xda, 0xff, 0x08, 0xd5, 0xfc, 0xdf, 0xa0, 0x58, 0xaf,
hudakz 0:7a702d2d6b54 104 0x4d, 0xc3, 0x8f, 0x46, 0x97, 0x70, 0xcd, 0x48, 0xea, 0x10, 0x04, 0xd3, 0x44, 0xd6, 0x51, 0x0e,
hudakz 0:7a702d2d6b54 105 0xfe, 0x00, 0xa2, 0x9d, 0x59, 0x50, 0x98, 0x6c, 0x53, 0x8c, 0xd8, 0x92, 0xa8, 0x87, 0x84, 0x6f,
hudakz 0:7a702d2d6b54 106 0x6d, 0xb6, 0x9a, 0xe3, 0x2c, 0x79, 0x23, 0xa7, 0x27, 0xa9, 0x66, 0xdb, 0xb5, 0x20, 0x68, 0x5b,
hudakz 0:7a702d2d6b54 107 0x35, 0x2e, 0xb1, 0x38, 0x89, 0xc7, 0xf1, 0x96, 0x1e, 0x34, 0xcb, 0x4f, 0x83, 0x0a, 0xf9, 0xfb,
hudakz 0:7a702d2d6b54 108 0x6b, 0xe2, 0xd0, 0x93, 0x71, 0x75, 0x4a, 0x8d, 0x4e, 0x07, 0x86, 0x60, 0x37, 0x40, 0xcc, 0x3f,
hudakz 0:7a702d2d6b54 109 0x25, 0x64, 0xe4, 0xc1, 0x01, 0x65, 0xfa, 0xb4, 0xf4, 0x45, 0xb2, 0xa5, 0x11, 0x7f, 0x05, 0x7d,
hudakz 0:7a702d2d6b54 110 0x13, 0xc8, 0xdd, 0x5c, 0x3e, 0x99, 0x6a, 0x3d, 0xf7, 0x54, 0xad, 0xc9, 0x39, 0x67, 0xe8, 0x22,
hudakz 0:7a702d2d6b54 111 0xef, 0x0b, 0x3b, 0x63, 0xf2, 0xd4, 0x57, 0x24, 0x36, 0x85, 0x42, 0xab, 0x02, 0x33, 0x14, 0xed,
hudakz 0:7a702d2d6b54 112 0x1d, 0x0f, 0x32, 0x09, 0xd7, 0x7b, 0xb0, 0x47, 0x3c, 0x49, 0xfd, 0x9b, 0xe6, 0x8a, 0xe0, 0x1f,
hudakz 0:7a702d2d6b54 113 0xa6, 0x52, 0x7a, 0xbd, 0x77, 0x4c, 0x41, 0xbf, 0xf6, 0xbb, 0xd9, 0xb9, 0xdc, 0xb3, 0xc0, 0xb7,
hudakz 0:7a702d2d6b54 114 0xbe, 0x73, 0xd2, 0x21, 0x03, 0xce, 0x06, 0x55, 0x81, 0x8b, 0xe5, 0x5a, 0x6e, 0x26, 0xc5, 0xee,
hudakz 0:7a702d2d6b54 115 0x62, 0x12, 0xc2, 0x2b, 0x95, 0x1a, 0x2d, 0xa4, 0x3a, 0xba, 0x17, 0x4b, 0xbc, 0x82, 0xec, 0x1c,
hudakz 0:7a702d2d6b54 116 0xae, 0xf5, 0x61, 0x43, 0x72, 0xca, 0xac, 0x0c, 0x8e, 0xf3, 0x28, 0xf8, 0xde, 0x9f, 0xcf, 0x90,
hudakz 0:7a702d2d6b54 117 0x16, 0x56, 0x94, 0xe9, 0x78, 0xe1, 0xb8, 0x88, 0xeb, 0x5e, 0x76, 0x5f, 0x1b, 0xaa, 0x30, 0x18
hudakz 0:7a702d2d6b54 118 };
hudakz 0:7a702d2d6b54 119 /*$on*/
hudakz 0:7a702d2d6b54 120
hudakz 0:7a702d2d6b54 121 /**
hudakz 0:7a702d2d6b54 122 * @brief Constructor
hudakz 0:7a702d2d6b54 123 * @note Selects which rotors are going to be used and sets their intial position.
hudakz 2:ee55abc2b6a2 124 * @note Also connects pairs of plugs on the plugboard with cords.
hudakz 0:7a702d2d6b54 125 * @param
hudakz 0:7a702d2d6b54 126 * @retval
hudakz 0:7a702d2d6b54 127 */
hudakz 0:7a702d2d6b54 128 Enigma::Enigma
hudakz 0:7a702d2d6b54 129 (
hudakz 0:7a702d2d6b54 130 const uint8_t* leftRotorSel,
hudakz 0:7a702d2d6b54 131 const uint8_t* middleRotorSel,
hudakz 0:7a702d2d6b54 132 const uint8_t* rightRotorSel,
hudakz 0:7a702d2d6b54 133 uint8_t leftRotorPos,
hudakz 0:7a702d2d6b54 134 uint8_t middleRotorPos,
hudakz 2:ee55abc2b6a2 135 uint8_t rightRotorPos,
hudakz 2:ee55abc2b6a2 136 uint8_t (*plugboard)[2],
hudakz 2:ee55abc2b6a2 137 uint8_t cords
hudakz 0:7a702d2d6b54 138 ) :
hudakz 0:7a702d2d6b54 139 _len(256),
hudakz 0:7a702d2d6b54 140 _leftRotorPos(leftRotorPos),
hudakz 0:7a702d2d6b54 141 _middleRotorPos(middleRotorPos),
hudakz 2:ee55abc2b6a2 142 _rightRotorPos(rightRotorPos),
hudakz 2:ee55abc2b6a2 143 _cords(cords)
hudakz 0:7a702d2d6b54 144 {
hudakz 0:7a702d2d6b54 145 // Initialize entry wheel.
hudakz 0:7a702d2d6b54 146 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 147 _entryWheel[i] = i;
hudakz 0:7a702d2d6b54 148 }
hudakz 0:7a702d2d6b54 149
hudakz 1:a21920e248d3 150 // Select three rotors out of fives.
hudakz 0:7a702d2d6b54 151 _leftRotor = const_cast<uint8_t*>(leftRotorSel);
hudakz 0:7a702d2d6b54 152 _middleRotor = const_cast<uint8_t*>(middleRotorSel);
hudakz 0:7a702d2d6b54 153 _rightRotor = const_cast<uint8_t*>(rightRotorSel);
hudakz 0:7a702d2d6b54 154
hudakz 1:a21920e248d3 155 // Initialize reflector.
hudakz 0:7a702d2d6b54 156 _reflector = const_cast<uint8_t*>(REFLECTOR);
hudakz 2:ee55abc2b6a2 157
hudakz 3:9590c44c9ecd 158 // Connect the plugboard
hudakz 2:ee55abc2b6a2 159 _plugboard = new uint8_t[cords][2];
hudakz 2:ee55abc2b6a2 160 for (size_t i = 0; i < cords; i++) {
hudakz 2:ee55abc2b6a2 161 for (size_t j = 0; j < 2; j++) {
hudakz 2:ee55abc2b6a2 162 _plugboard[i][j] = plugboard[i][j];
hudakz 2:ee55abc2b6a2 163 }
hudakz 2:ee55abc2b6a2 164 }
hudakz 0:7a702d2d6b54 165 }
hudakz 0:7a702d2d6b54 166
hudakz 0:7a702d2d6b54 167 /**
hudakz 1:a21920e248d3 168 * @brief Encrypts a byte array.
hudakz 2:ee55abc2b6a2 169 * @note Encryption capability is extended from 26 upper case letters to any byte.
hudakz 1:a21920e248d3 170 * @retval out Pointer to a byte array to store the encrypted bytes in.
hudakz 1:a21920e248d3 171 * @param in Pointer to a byte array to be encrypted.
hudakz 1:a21920e248d3 172 * @param len Length of the byte array.
hudakz 3:9590c44c9ecd 173 * @retval Pointer to a byte array containing the encrypted bytes.
hudakz 0:7a702d2d6b54 174 */
hudakz 1:a21920e248d3 175 uint8_t* Enigma::encrypt(uint8_t* out, const uint8_t* in, size_t len)
hudakz 0:7a702d2d6b54 176 {
hudakz 2:ee55abc2b6a2 177 bool found;
hudakz 2:ee55abc2b6a2 178
hudakz 0:7a702d2d6b54 179 // Sets initial permutation
hudakz 0:7a702d2d6b54 180 int leftRotorPos = _leftRotorPos;
hudakz 0:7a702d2d6b54 181 int middleRotorPos = _middleRotorPos;
hudakz 0:7a702d2d6b54 182 int rightRotorPos = _rightRotorPos;
hudakz 0:7a702d2d6b54 183
hudakz 0:7a702d2d6b54 184 for (size_t i = 0; i < len; i++) {
hudakz 1:a21920e248d3 185 uint8_t byte = in[i];
hudakz 0:7a702d2d6b54 186
hudakz 3:9590c44c9ecd 187 // Swap bytes cross-connected with cords
hudakz 2:ee55abc2b6a2 188 found = false;
hudakz 2:ee55abc2b6a2 189 for (size_t j = 0; j < _cords; j++) {
hudakz 2:ee55abc2b6a2 190 for (size_t k = 0; k < 2; k++) {
hudakz 2:ee55abc2b6a2 191 if (_plugboard[j][k] == byte) {
hudakz 2:ee55abc2b6a2 192 byte = k == 0 ? _plugboard[j][1] : _plugboard[j][0];
hudakz 2:ee55abc2b6a2 193 found = true;
hudakz 2:ee55abc2b6a2 194 break;
hudakz 2:ee55abc2b6a2 195 }
hudakz 2:ee55abc2b6a2 196 }
hudakz 2:ee55abc2b6a2 197 if (found) {
hudakz 2:ee55abc2b6a2 198 break;
hudakz 2:ee55abc2b6a2 199 }
hudakz 2:ee55abc2b6a2 200 }
hudakz 2:ee55abc2b6a2 201
hudakz 1:a21920e248d3 202 // Advance right rotor on every byte entry
hudakz 0:7a702d2d6b54 203 rightRotorPos = _mod(rightRotorPos + 1);
hudakz 0:7a702d2d6b54 204
hudakz 1:a21920e248d3 205 // Avance mid rotor using a notch located at position #13
hudakz 0:7a702d2d6b54 206 if ((rightRotorPos % 13) == 0) {
hudakz 0:7a702d2d6b54 207 middleRotorPos = _mod(middleRotorPos + 2);
hudakz 0:7a702d2d6b54 208 }
hudakz 0:7a702d2d6b54 209
hudakz 2:ee55abc2b6a2 210 // Advance left rotor using a notch located at position #201
hudakz 2:ee55abc2b6a2 211 if ((middleRotorPos % 201) == 0) {
hudakz 0:7a702d2d6b54 212 leftRotorPos = _mod(leftRotorPos + 1);
hudakz 0:7a702d2d6b54 213 }
hudakz 0:7a702d2d6b54 214
hudakz 0:7a702d2d6b54 215 // Pass through rotors
hudakz 1:a21920e248d3 216 byte = _rightRotor[_mod(byte + rightRotorPos)];
hudakz 1:a21920e248d3 217 byte = _middleRotor[_mod(byte + middleRotorPos - rightRotorPos)];
hudakz 1:a21920e248d3 218 byte = _leftRotor[_mod(byte + leftRotorPos - middleRotorPos)];
hudakz 0:7a702d2d6b54 219
hudakz 0:7a702d2d6b54 220 // Pass through reflector
hudakz 1:a21920e248d3 221 byte = _reflector[_mod(byte - leftRotorPos)];
hudakz 1:a21920e248d3 222 byte = _entryWheel[_mod(byte + leftRotorPos)];
hudakz 0:7a702d2d6b54 223
hudakz 0:7a702d2d6b54 224 // Inverse pass trough rotors
hudakz 1:a21920e248d3 225 byte = _entryWheel[_mod(_find(byte, _leftRotor) - leftRotorPos + middleRotorPos)];
hudakz 1:a21920e248d3 226 byte = _entryWheel[_mod(_find(byte, _middleRotor) - middleRotorPos + rightRotorPos)];
hudakz 1:a21920e248d3 227 byte = _entryWheel[_mod(_find(byte, _rightRotor) - rightRotorPos)];
hudakz 0:7a702d2d6b54 228
hudakz 3:9590c44c9ecd 229 // Swap bytes cross-connected with cords
hudakz 2:ee55abc2b6a2 230 found = false;
hudakz 2:ee55abc2b6a2 231 for (size_t j = 0; j < _cords; j++) {
hudakz 2:ee55abc2b6a2 232 for (size_t k = 0; k < 2; k++) {
hudakz 2:ee55abc2b6a2 233 if (_plugboard[j][k] == byte) {
hudakz 2:ee55abc2b6a2 234 byte = k == 0 ? _plugboard[j][1] : _plugboard[j][0];
hudakz 2:ee55abc2b6a2 235 found = true;
hudakz 2:ee55abc2b6a2 236 break;
hudakz 2:ee55abc2b6a2 237 }
hudakz 2:ee55abc2b6a2 238 }
hudakz 2:ee55abc2b6a2 239 if (found) {
hudakz 2:ee55abc2b6a2 240 break;
hudakz 2:ee55abc2b6a2 241 }
hudakz 2:ee55abc2b6a2 242 }
hudakz 2:ee55abc2b6a2 243
hudakz 1:a21920e248d3 244 out[i] = byte;
hudakz 0:7a702d2d6b54 245 }
hudakz 0:7a702d2d6b54 246
hudakz 0:7a702d2d6b54 247 return out;
hudakz 0:7a702d2d6b54 248 }
hudakz 0:7a702d2d6b54 249
hudakz 0:7a702d2d6b54 250 /**
hudakz 1:a21920e248d3 251 * @brief Decrypts a byte array.
hudakz 3:9590c44c9ecd 252 * @note Decryption capability is extended from 26 upper case letters to any byte.
hudakz 1:a21920e248d3 253 * @retval out Pointer to a byte array to store the decrypted bytes in.
hudakz 1:a21920e248d3 254 * @param in Pointer to a byte array to be decrypted.
hudakz 1:a21920e248d3 255 * @param len Length of the byte array.
hudakz 3:9590c44c9ecd 256 * @retval Pointer to a byte array containing the decrypted bytes.
hudakz 0:7a702d2d6b54 257 */
hudakz 1:a21920e248d3 258 uint8_t* Enigma::decrypt(uint8_t* out, const uint8_t* in, size_t len)
hudakz 0:7a702d2d6b54 259 {
hudakz 0:7a702d2d6b54 260 return encrypt(out, in, len);
hudakz 0:7a702d2d6b54 261 }
hudakz 0:7a702d2d6b54 262
hudakz 0:7a702d2d6b54 263 /**
hudakz 0:7a702d2d6b54 264 * @brief Generates a new rotor wiring.
hudakz 1:a21920e248d3 265 * @note Prints to the serial terminal. The generated byte array
hudakz 1:a21920e248d3 266 * shall be then copy & pasted to his source code and recompiled.
hudakz 0:7a702d2d6b54 267 * @param name Rotor's name. Should be "I", "II", "III", "IV" or "V"
hudakz 0:7a702d2d6b54 268 * @param seed A number to seed the pseudo-ramdom generator with.
hudakz 0:7a702d2d6b54 269 * @retval
hudakz 0:7a702d2d6b54 270 */
hudakz 0:7a702d2d6b54 271 void Enigma::genRotorWiring(const char* name, unsigned seed)
hudakz 0:7a702d2d6b54 272 {
hudakz 0:7a702d2d6b54 273 uint8_t* rotor = new uint8_t[_len];
hudakz 0:7a702d2d6b54 274 srand(seed);
hudakz 0:7a702d2d6b54 275 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 276 rotor[i] = i;
hudakz 0:7a702d2d6b54 277 }
hudakz 0:7a702d2d6b54 278 for (int j = 0; j < (rand() % 1000 + 1000); j++) {
hudakz 0:7a702d2d6b54 279 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 280 uint8_t byte = rotor[i];
hudakz 0:7a702d2d6b54 281 int k = rand() % _len;
hudakz 0:7a702d2d6b54 282 rotor[i] = rotor[k];
hudakz 0:7a702d2d6b54 283 rotor[k] = byte;
hudakz 0:7a702d2d6b54 284 }
hudakz 0:7a702d2d6b54 285 }
hudakz 0:7a702d2d6b54 286
hudakz 0:7a702d2d6b54 287 printf("const uint8_t Enigma::ROTOR_%s[256] = {\r\n", name);
hudakz 0:7a702d2d6b54 288 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 289 if (i == 255) {
hudakz 0:7a702d2d6b54 290 printf("0x%.2x\n", rotor[i]);
hudakz 0:7a702d2d6b54 291 }
hudakz 0:7a702d2d6b54 292 else {
hudakz 0:7a702d2d6b54 293 switch (i % 16) {
hudakz 0:7a702d2d6b54 294 case 0:
hudakz 0:7a702d2d6b54 295 printf(" 0x%.2x, ", rotor[i]);
hudakz 0:7a702d2d6b54 296 break;
hudakz 0:7a702d2d6b54 297
hudakz 0:7a702d2d6b54 298 case 15:
hudakz 0:7a702d2d6b54 299 printf("0x%.2x,\n", rotor[i]);
hudakz 0:7a702d2d6b54 300 break;
hudakz 0:7a702d2d6b54 301
hudakz 0:7a702d2d6b54 302 default:
hudakz 0:7a702d2d6b54 303 printf("0x%.2x, ", rotor[i]);
hudakz 0:7a702d2d6b54 304 }
hudakz 0:7a702d2d6b54 305 }
hudakz 0:7a702d2d6b54 306 }
hudakz 0:7a702d2d6b54 307
hudakz 0:7a702d2d6b54 308 printf("};\r\n\r\n");
hudakz 0:7a702d2d6b54 309
hudakz 0:7a702d2d6b54 310 delete[] rotor;
hudakz 0:7a702d2d6b54 311 }
hudakz 0:7a702d2d6b54 312
hudakz 0:7a702d2d6b54 313 /**
hudakz 0:7a702d2d6b54 314 * @brief Generates a reflector wiring.
hudakz 1:a21920e248d3 315 * @note Prints to the serial terminal. The generated byte array
hudakz 1:a21920e248d3 316 * shall be then copy & pasted to his source code and recompiled.
hudakz 0:7a702d2d6b54 317 * @param seed A number to seed the pseudo-ramdom generator with.
hudakz 0:7a702d2d6b54 318 * @retval
hudakz 0:7a702d2d6b54 319 */
hudakz 0:7a702d2d6b54 320 void Enigma::genReflectorWiring(unsigned seed)
hudakz 0:7a702d2d6b54 321 {
hudakz 0:7a702d2d6b54 322 uint8_t* reflector = new uint8_t[_len];
hudakz 0:7a702d2d6b54 323 uint8_t* modified = new uint8_t[_len];
hudakz 0:7a702d2d6b54 324 size_t k;
hudakz 0:7a702d2d6b54 325
hudakz 0:7a702d2d6b54 326 srand(seed);
hudakz 0:7a702d2d6b54 327 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 328 reflector[i] = i;
hudakz 0:7a702d2d6b54 329 }
hudakz 0:7a702d2d6b54 330
hudakz 0:7a702d2d6b54 331 memset(modified, 0, _len);
hudakz 0:7a702d2d6b54 332
hudakz 0:7a702d2d6b54 333 for (size_t i = 0; i < _len; i++) {
hudakz 3:9590c44c9ecd 334
hudakz 0:7a702d2d6b54 335 if (modified[i] != 0) {
hudakz 3:9590c44c9ecd 336
hudakz 3:9590c44c9ecd 337
hudakz 0:7a702d2d6b54 338 continue;
hudakz 0:7a702d2d6b54 339 }
hudakz 0:7a702d2d6b54 340
hudakz 0:7a702d2d6b54 341 do {
hudakz 0:7a702d2d6b54 342 k = i + 1 + rand() % (_len - i - 1);
hudakz 0:7a702d2d6b54 343 } while (modified[k]);
hudakz 0:7a702d2d6b54 344
hudakz 0:7a702d2d6b54 345 uint8_t byte = reflector[k];
hudakz 0:7a702d2d6b54 346 reflector[k] = reflector[i];
hudakz 0:7a702d2d6b54 347 reflector[i] = byte;
hudakz 0:7a702d2d6b54 348 modified[i] = 1;
hudakz 0:7a702d2d6b54 349 modified[k] = 1;
hudakz 0:7a702d2d6b54 350 }
hudakz 0:7a702d2d6b54 351
hudakz 0:7a702d2d6b54 352 delete[] modified;
hudakz 0:7a702d2d6b54 353
hudakz 0:7a702d2d6b54 354 printf("const uint8_t Enigma::REFLECTOR[256] = {\r\n");
hudakz 0:7a702d2d6b54 355 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 356 if (i == 255) {
hudakz 0:7a702d2d6b54 357 printf("0x%.2x\n", reflector[i]);
hudakz 0:7a702d2d6b54 358 }
hudakz 0:7a702d2d6b54 359 else {
hudakz 0:7a702d2d6b54 360 switch (i % 16) {
hudakz 0:7a702d2d6b54 361 case 0:
hudakz 0:7a702d2d6b54 362 printf(" 0x%.2x, ", reflector[i]);
hudakz 0:7a702d2d6b54 363 break;
hudakz 0:7a702d2d6b54 364
hudakz 0:7a702d2d6b54 365 case 15:
hudakz 0:7a702d2d6b54 366 printf("0x%.2x,\n", reflector[i]);
hudakz 0:7a702d2d6b54 367 break;
hudakz 0:7a702d2d6b54 368
hudakz 0:7a702d2d6b54 369 default:
hudakz 0:7a702d2d6b54 370 printf("0x%.2x, ", reflector[i]);
hudakz 0:7a702d2d6b54 371 }
hudakz 0:7a702d2d6b54 372 }
hudakz 0:7a702d2d6b54 373 }
hudakz 0:7a702d2d6b54 374
hudakz 0:7a702d2d6b54 375 printf("};\r\n\r\n");
hudakz 0:7a702d2d6b54 376
hudakz 0:7a702d2d6b54 377 delete[] reflector;
hudakz 0:7a702d2d6b54 378 }
hudakz 0:7a702d2d6b54 379
hudakz 0:7a702d2d6b54 380 /**
hudakz 0:7a702d2d6b54 381 * @brief
hudakz 0:7a702d2d6b54 382 * @note
hudakz 0:7a702d2d6b54 383 * @param
hudakz 0:7a702d2d6b54 384 * @retval
hudakz 0:7a702d2d6b54 385 */
hudakz 0:7a702d2d6b54 386 size_t Enigma::_mod(long i)
hudakz 0:7a702d2d6b54 387 {
hudakz 0:7a702d2d6b54 388 return((i % _len + _len) % _len);
hudakz 0:7a702d2d6b54 389 }
hudakz 0:7a702d2d6b54 390
hudakz 0:7a702d2d6b54 391 /**
hudakz 0:7a702d2d6b54 392 * @brief
hudakz 0:7a702d2d6b54 393 * @note
hudakz 0:7a702d2d6b54 394 * @param
hudakz 0:7a702d2d6b54 395 * @retval
hudakz 0:7a702d2d6b54 396 */
hudakz 0:7a702d2d6b54 397 int Enigma::_find(uint8_t byte, uint8_t* array)
hudakz 0:7a702d2d6b54 398 {
hudakz 0:7a702d2d6b54 399 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 400 if (array[i] == byte) {
hudakz 0:7a702d2d6b54 401 return i;
hudakz 0:7a702d2d6b54 402 }
hudakz 0:7a702d2d6b54 403 }
hudakz 0:7a702d2d6b54 404
hudakz 0:7a702d2d6b54 405 return -1;
hudakz 3:9590c44c9ecd 406 }