Zoltan Hudak / Enigma

Dependents:   Enigma_Hello

Committer:
hudakz
Date:
Tue Sep 24 08:52:11 2019 +0000
Revision:
2:ee55abc2b6a2
Parent:
1:a21920e248d3
Child:
3:9590c44c9ecd
Encryption library based on the Enigma machine.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
hudakz 0:7a702d2d6b54 1 #include "Enigma.h"
hudakz 0:7a702d2d6b54 2
hudakz 0:7a702d2d6b54 3 /*$off*/
hudakz 0:7a702d2d6b54 4 // Internal wiring of the five available rotors
hudakz 0:7a702d2d6b54 5 const uint8_t Enigma::ROTOR_I[256] = {
hudakz 0:7a702d2d6b54 6 0xe0, 0xd7, 0xf1, 0x7a, 0x92, 0x84, 0x5e, 0x1b, 0xd6, 0x38, 0x79, 0x10, 0x7c, 0xa6, 0x1f, 0x4d,
hudakz 0:7a702d2d6b54 7 0x4f, 0x30, 0x19, 0xdd, 0x61, 0x00, 0xa2, 0x82, 0x98, 0xf9, 0x2f, 0x6a, 0xc5, 0x64, 0x9d, 0x9b,
hudakz 0:7a702d2d6b54 8 0xca, 0x17, 0xd4, 0x24, 0x2b, 0x20, 0xd5, 0xea, 0xba, 0x25, 0x2e, 0x08, 0x78, 0x32, 0xaf, 0xe6,
hudakz 0:7a702d2d6b54 9 0x4c, 0x13, 0x56, 0xbd, 0xd9, 0xe5, 0x33, 0xee, 0x69, 0xf3, 0x0f, 0x99, 0xbb, 0x4e, 0x01, 0x77,
hudakz 0:7a702d2d6b54 10 0x9c, 0x91, 0xf0, 0x89, 0xf8, 0x74, 0xb1, 0x95, 0x88, 0x42, 0xd0, 0x50, 0xfc, 0xa7, 0x7e, 0x7d,
hudakz 0:7a702d2d6b54 11 0x59, 0x73, 0x6d, 0x45, 0x5b, 0x3d, 0x3b, 0x34, 0x97, 0xed, 0xde, 0x47, 0xf4, 0xe1, 0x60, 0xe4,
hudakz 0:7a702d2d6b54 12 0x2a, 0xad, 0xfb, 0x81, 0xa9, 0x29, 0x57, 0x51, 0xc4, 0x3f, 0x53, 0x1d, 0xbe, 0x06, 0xfa, 0x85,
hudakz 0:7a702d2d6b54 13 0x12, 0x3a, 0x8a, 0x96, 0x63, 0x07, 0x8c, 0xd3, 0x72, 0xe3, 0x54, 0xcb, 0x4b, 0x35, 0x0b, 0xeb,
hudakz 0:7a702d2d6b54 14 0xda, 0xd2, 0x3e, 0x7f, 0x1a, 0xb6, 0x0c, 0xc0, 0xb2, 0xc8, 0xa8, 0x66, 0x39, 0x8e, 0xf5, 0xa4,
hudakz 0:7a702d2d6b54 15 0xdf, 0xe2, 0x8d, 0x44, 0x31, 0x7b, 0x14, 0xdc, 0xa3, 0xc3, 0xfd, 0x1e, 0xef, 0x23, 0x9a, 0x2d,
hudakz 0:7a702d2d6b54 16 0xf7, 0xb8, 0xc1, 0x94, 0x36, 0x5d, 0x48, 0x68, 0x80, 0xec, 0x4a, 0x41, 0xb4, 0xe8, 0x16, 0x6e,
hudakz 0:7a702d2d6b54 17 0x49, 0x43, 0x18, 0x11, 0x9f, 0xd8, 0x8b, 0x83, 0xcc, 0x03, 0xcf, 0x5c, 0x27, 0xc6, 0x02, 0xe7,
hudakz 0:7a702d2d6b54 18 0xcd, 0x70, 0x5a, 0x04, 0xff, 0xc7, 0xb0, 0x76, 0xb7, 0x26, 0xb3, 0xce, 0x15, 0x6c, 0xb5, 0x0d,
hudakz 0:7a702d2d6b54 19 0x93, 0x09, 0xf2, 0xdb, 0xbc, 0x37, 0xaa, 0x87, 0xf6, 0xab, 0x67, 0x21, 0x28, 0xc2, 0xc9, 0x52,
hudakz 0:7a702d2d6b54 20 0x0e, 0x5f, 0x58, 0xae, 0x22, 0x6f, 0x86, 0x2c, 0x0a, 0x1c, 0x62, 0x9e, 0xa5, 0x46, 0x05, 0xac,
hudakz 0:7a702d2d6b54 21 0x65, 0x40, 0x75, 0x6b, 0xb9, 0xe9, 0xd1, 0x8f, 0x71, 0xfe, 0x55, 0xa0, 0xa1, 0x3c, 0x90, 0xbf
hudakz 0:7a702d2d6b54 22 };
hudakz 0:7a702d2d6b54 23
hudakz 0:7a702d2d6b54 24 const uint8_t Enigma::ROTOR_II[256] = {
hudakz 0:7a702d2d6b54 25 0xff, 0xa2, 0x4f, 0x1a, 0x1b, 0x20, 0x9b, 0xec, 0x47, 0x3e, 0xe7, 0x0d, 0x0f, 0x34, 0x50, 0x46,
hudakz 0:7a702d2d6b54 26 0x41, 0x9a, 0xf6, 0x63, 0xb6, 0x83, 0xea, 0x51, 0x88, 0xd4, 0xc1, 0x52, 0x42, 0x37, 0xc0, 0xc6,
hudakz 0:7a702d2d6b54 27 0xe3, 0x1e, 0xf7, 0xa9, 0x60, 0x4b, 0xda, 0x2d, 0x94, 0x7f, 0x85, 0x2f, 0xa0, 0x6a, 0xfa, 0xc8,
hudakz 0:7a702d2d6b54 28 0xde, 0x06, 0x8d, 0x75, 0xf8, 0xee, 0xaa, 0xc7, 0xef, 0x38, 0x14, 0x69, 0x23, 0x05, 0x8c, 0x3d,
hudakz 0:7a702d2d6b54 29 0x5d, 0xc9, 0x13, 0x2e, 0xab, 0x6c, 0x32, 0xc5, 0xfc, 0xb4, 0xb0, 0x98, 0x1d, 0xbc, 0x2a, 0xa6,
hudakz 0:7a702d2d6b54 30 0x3f, 0xf2, 0xac, 0xc4, 0x8e, 0xbb, 0xf9, 0x49, 0xad, 0x9c, 0xd5, 0x57, 0xeb, 0xa1, 0x3b, 0x15,
hudakz 0:7a702d2d6b54 31 0x7d, 0x28, 0x89, 0xb5, 0xb7, 0xe1, 0x5b, 0x65, 0xdc, 0x10, 0x82, 0x36, 0xb8, 0x2c, 0x25, 0x7a,
hudakz 0:7a702d2d6b54 32 0x91, 0x2b, 0xfe, 0x9f, 0x07, 0x01, 0xa4, 0x6f, 0xae, 0x79, 0xf5, 0xd9, 0x48, 0x5c, 0x6d, 0x74,
hudakz 0:7a702d2d6b54 33 0xb1, 0x8a, 0x58, 0x33, 0xd0, 0x6e, 0x40, 0xbd, 0x4d, 0x97, 0xcf, 0x62, 0x84, 0x30, 0x67, 0xa7,
hudakz 0:7a702d2d6b54 34 0xe6, 0xe2, 0xb2, 0x61, 0x80, 0x92, 0x0e, 0x68, 0x4e, 0x66, 0x81, 0x16, 0x90, 0x53, 0x11, 0xbe,
hudakz 0:7a702d2d6b54 35 0x6b, 0xd1, 0x04, 0xd3, 0x08, 0x70, 0x95, 0x93, 0x4c, 0xa5, 0xdf, 0xd6, 0x5e, 0xa8, 0x7e, 0x9e,
hudakz 0:7a702d2d6b54 36 0x19, 0xe0, 0x77, 0x73, 0xbf, 0xf1, 0x21, 0x9d, 0x55, 0xfd, 0xe8, 0x56, 0xdb, 0xce, 0x64, 0x43,
hudakz 0:7a702d2d6b54 37 0x0c, 0x29, 0x0b, 0x44, 0x31, 0xe9, 0x8f, 0x1f, 0x8b, 0x27, 0xed, 0x3a, 0xfb, 0x12, 0xca, 0x59,
hudakz 0:7a702d2d6b54 38 0x1c, 0xdd, 0xb3, 0x87, 0x3c, 0x96, 0x78, 0x86, 0x54, 0xd2, 0xcc, 0x26, 0x99, 0xc3, 0x71, 0x02,
hudakz 0:7a702d2d6b54 39 0xf0, 0xe4, 0x45, 0x22, 0x18, 0xd8, 0x5f, 0xd7, 0xb9, 0xcd, 0xba, 0x5a, 0x7b, 0xf4, 0xaf, 0xa3,
hudakz 0:7a702d2d6b54 40 0x00, 0x24, 0x35, 0x7c, 0x09, 0x39, 0x03, 0x17, 0xcb, 0xf3, 0x72, 0x4a, 0xe5, 0x76, 0xc2, 0x0a
hudakz 0:7a702d2d6b54 41 };
hudakz 0:7a702d2d6b54 42
hudakz 0:7a702d2d6b54 43 const uint8_t Enigma::ROTOR_III[256] = {
hudakz 0:7a702d2d6b54 44 0x1c, 0xb8, 0x5a, 0xa6, 0xc2, 0xf9, 0x78, 0xf6, 0x41, 0x22, 0xd7, 0x1e, 0xad, 0xcc, 0x96, 0xe0,
hudakz 0:7a702d2d6b54 45 0x59, 0x69, 0x09, 0x73, 0xe8, 0xfc, 0x1a, 0x17, 0xa2, 0x12, 0xfe, 0x00, 0xfd, 0x7e, 0x0c, 0x60,
hudakz 0:7a702d2d6b54 46 0x54, 0x8d, 0x2e, 0xfa, 0x9e, 0xb1, 0xa5, 0x3f, 0x03, 0x7b, 0xb9, 0xbf, 0x90, 0xdd, 0xe5, 0xd2,
hudakz 0:7a702d2d6b54 47 0x2f, 0x99, 0xcd, 0x80, 0x79, 0xcb, 0xc6, 0x5e, 0x31, 0x08, 0x29, 0xea, 0xd9, 0x58, 0xf2, 0x4f,
hudakz 0:7a702d2d6b54 48 0x4e, 0x02, 0xc0, 0x98, 0x34, 0x47, 0x64, 0xb4, 0xce, 0x5c, 0x8c, 0xa4, 0x28, 0x83, 0xcf, 0x44,
hudakz 0:7a702d2d6b54 49 0xec, 0xc9, 0xf4, 0x30, 0x56, 0xb2, 0x1b, 0x8f, 0x07, 0xff, 0x35, 0x6e, 0x0f, 0x7c, 0xae, 0x11,
hudakz 0:7a702d2d6b54 50 0xab, 0xe1, 0x13, 0xa0, 0xc8, 0xe9, 0x2c, 0x70, 0x82, 0x91, 0xee, 0x76, 0xbb, 0xde, 0x20, 0x7f,
hudakz 0:7a702d2d6b54 51 0xf0, 0x5b, 0xe4, 0x36, 0xa7, 0x2d, 0x89, 0x53, 0x93, 0x24, 0xa1, 0x3e, 0x51, 0xd0, 0xf8, 0x95,
hudakz 0:7a702d2d6b54 52 0xdb, 0x77, 0x8a, 0x40, 0x8b, 0xc3, 0xdc, 0x3d, 0xd4, 0x9f, 0x19, 0xbe, 0xd3, 0xe7, 0x45, 0x10,
hudakz 0:7a702d2d6b54 53 0x8e, 0x9d, 0x0d, 0x57, 0xa9, 0x72, 0x21, 0x49, 0x52, 0x04, 0xd8, 0xf1, 0xeb, 0x4c, 0xb0, 0x14,
hudakz 0:7a702d2d6b54 54 0x87, 0x55, 0x33, 0xa8, 0x61, 0x38, 0x39, 0x65, 0x42, 0x0e, 0xe2, 0xb5, 0x4b, 0x94, 0x27, 0xf7,
hudakz 0:7a702d2d6b54 55 0x06, 0x48, 0xd6, 0x6d, 0xb3, 0x50, 0x85, 0x6a, 0xbd, 0x3c, 0xdf, 0x6b, 0x67, 0x01, 0xfb, 0x86,
hudakz 0:7a702d2d6b54 56 0x63, 0xf3, 0xbc, 0x23, 0x88, 0xf5, 0xca, 0x2b, 0x18, 0xc4, 0x3b, 0x5f, 0x84, 0x7d, 0xed, 0xda,
hudakz 0:7a702d2d6b54 57 0x1d, 0xd1, 0x74, 0x0a, 0x43, 0x75, 0xc7, 0x32, 0x62, 0xb6, 0x16, 0xe6, 0x4a, 0xa3, 0x37, 0x71,
hudakz 0:7a702d2d6b54 58 0x81, 0x26, 0xaf, 0x68, 0x2a, 0x9a, 0x5d, 0x3a, 0x7a, 0xb7, 0xe3, 0x46, 0x0b, 0xd5, 0x25, 0x4d,
hudakz 0:7a702d2d6b54 59 0xc1, 0x66, 0xaa, 0x1f, 0x05, 0xba, 0x9c, 0x6c, 0x9b, 0xac, 0x97, 0x6f, 0xef, 0xc5, 0x92, 0x15
hudakz 0:7a702d2d6b54 60 };
hudakz 0:7a702d2d6b54 61
hudakz 0:7a702d2d6b54 62 const uint8_t Enigma::ROTOR_IV[256] = {
hudakz 0:7a702d2d6b54 63 0xc1, 0x1b, 0x04, 0xe6, 0x4a, 0x89, 0xaa, 0xbe, 0x78, 0x05, 0x8f, 0x1a, 0x02, 0x81, 0x45, 0x3a,
hudakz 0:7a702d2d6b54 64 0xaf, 0xee, 0x68, 0xd4, 0x71, 0x5d, 0x92, 0x90, 0x36, 0x0d, 0x21, 0x14, 0x46, 0xbc, 0x09, 0xb2,
hudakz 0:7a702d2d6b54 65 0xef, 0x8d, 0xba, 0x8c, 0xac, 0xdd, 0x01, 0xd8, 0xda, 0xcf, 0xff, 0xfc, 0xf6, 0x48, 0xf2, 0xb9,
hudakz 0:7a702d2d6b54 66 0x95, 0x59, 0xc4, 0x76, 0xb6, 0xca, 0x58, 0x2c, 0x07, 0xec, 0x2a, 0x47, 0x99, 0x8a, 0x31, 0x20,
hudakz 0:7a702d2d6b54 67 0xe2, 0x7f, 0x30, 0xbd, 0x8e, 0xb5, 0x70, 0x0b, 0x18, 0x37, 0x75, 0xb1, 0x94, 0xc7, 0x06, 0x00,
hudakz 0:7a702d2d6b54 68 0x73, 0xc8, 0xcc, 0x9e, 0xe9, 0x2d, 0x1d, 0x44, 0x98, 0x1f, 0x93, 0xfb, 0x41, 0x50, 0xad, 0x32,
hudakz 0:7a702d2d6b54 69 0x61, 0xbb, 0xf1, 0xfe, 0x24, 0xce, 0xb4, 0xab, 0x72, 0xea, 0x25, 0x67, 0xcd, 0x53, 0x26, 0x7a,
hudakz 0:7a702d2d6b54 70 0x77, 0xa8, 0x23, 0x19, 0x79, 0xd1, 0x9c, 0x5f, 0xf5, 0xc0, 0x1c, 0x5b, 0xe3, 0xc6, 0x6e, 0xd5,
hudakz 0:7a702d2d6b54 71 0xe0, 0x10, 0x3d, 0x66, 0x7d, 0x33, 0x51, 0x6c, 0x82, 0xd6, 0x84, 0x40, 0xdb, 0xe8, 0xc9, 0x62,
hudakz 0:7a702d2d6b54 72 0xf3, 0x5c, 0xd3, 0x60, 0x4d, 0x96, 0x08, 0x8b, 0xfa, 0xd0, 0xb7, 0x7e, 0xc2, 0x55, 0xb8, 0x63,
hudakz 0:7a702d2d6b54 73 0x86, 0x2f, 0x97, 0xa9, 0xa6, 0x3e, 0x34, 0xcb, 0x0e, 0x38, 0x6d, 0xbf, 0xf7, 0x11, 0x6b, 0x0a,
hudakz 0:7a702d2d6b54 74 0xeb, 0xf0, 0x15, 0x0c, 0xb3, 0x12, 0x88, 0xa4, 0x69, 0xd2, 0x9f, 0xa1, 0x9a, 0x39, 0x27, 0x2b,
hudakz 0:7a702d2d6b54 75 0x4f, 0x03, 0x91, 0xa5, 0x3b, 0xde, 0xf9, 0x4b, 0x28, 0x9b, 0x1e, 0x17, 0xe7, 0x6f, 0xdf, 0x16,
hudakz 0:7a702d2d6b54 76 0x43, 0xf4, 0xdc, 0x7c, 0x87, 0x54, 0xe4, 0xa3, 0x52, 0x0f, 0xe5, 0x49, 0xed, 0x56, 0xfd, 0xe1,
hudakz 0:7a702d2d6b54 77 0x13, 0x22, 0x85, 0x9d, 0x4c, 0xd9, 0x65, 0x3c, 0x6a, 0x5e, 0xb0, 0xa0, 0x29, 0x2e, 0x42, 0x35,
hudakz 0:7a702d2d6b54 78 0xae, 0x5a, 0x4e, 0xa7, 0xc3, 0x7b, 0xa2, 0x83, 0x64, 0x74, 0xf8, 0xd7, 0x80, 0x3f, 0xc5, 0x57
hudakz 0:7a702d2d6b54 79 };
hudakz 0:7a702d2d6b54 80
hudakz 0:7a702d2d6b54 81 const uint8_t Enigma::ROTOR_V[256] = {
hudakz 0:7a702d2d6b54 82 0xfe, 0xc8, 0x49, 0x21, 0xa5, 0x5a, 0xf4, 0xa8, 0xc3, 0x1b, 0x9a, 0x5e, 0x22, 0xae, 0x7f, 0xea,
hudakz 0:7a702d2d6b54 83 0x8f, 0xf1, 0x15, 0x73, 0xe3, 0xce, 0x05, 0x3c, 0x08, 0x07, 0xeb, 0x96, 0xcf, 0x98, 0x29, 0xbd,
hudakz 0:7a702d2d6b54 84 0x03, 0xad, 0x9e, 0x32, 0x0e, 0xc1, 0xb9, 0xd2, 0x83, 0xd6, 0x4d, 0x14, 0x1c, 0x68, 0x9d, 0x31,
hudakz 0:7a702d2d6b54 85 0xa2, 0x97, 0x01, 0x7e, 0xe5, 0xf6, 0x2d, 0x27, 0xe8, 0xf5, 0xf9, 0xb2, 0x10, 0x82, 0xd8, 0x66,
hudakz 0:7a702d2d6b54 86 0x76, 0x8e, 0x19, 0xfd, 0xa3, 0xa6, 0x8a, 0xd0, 0x2f, 0xc9, 0xb4, 0x9c, 0xd7, 0x38, 0xdf, 0x99,
hudakz 0:7a702d2d6b54 87 0xef, 0xc4, 0x09, 0xb1, 0x13, 0x3a, 0x6d, 0xbc, 0x58, 0x7c, 0x4c, 0x11, 0x7d, 0xe2, 0x30, 0xc7,
hudakz 0:7a702d2d6b54 88 0x2b, 0x6b, 0xab, 0x6e, 0x63, 0x7b, 0xff, 0x9b, 0x57, 0xd4, 0x61, 0x51, 0x26, 0x37, 0x4a, 0xed,
hudakz 0:7a702d2d6b54 89 0xb6, 0xac, 0xc5, 0x92, 0x89, 0x91, 0xcc, 0x1f, 0x0c, 0xa0, 0x6f, 0x94, 0xec, 0xa4, 0xdc, 0x4f,
hudakz 0:7a702d2d6b54 90 0x8b, 0xdb, 0x6c, 0x40, 0xc6, 0x48, 0x54, 0x45, 0x16, 0xe9, 0x6a, 0x20, 0x52, 0x67, 0x55, 0x34,
hudakz 0:7a702d2d6b54 91 0x90, 0x79, 0xf0, 0x33, 0x9f, 0xda, 0x87, 0xf2, 0x85, 0xf3, 0x00, 0xf7, 0xbf, 0x69, 0xa9, 0x50,
hudakz 0:7a702d2d6b54 92 0x59, 0x36, 0xe0, 0x3d, 0x06, 0x0f, 0x46, 0x44, 0xb5, 0x56, 0xe7, 0x77, 0x3b, 0x5c, 0x0b, 0xe4,
hudakz 0:7a702d2d6b54 93 0x35, 0xc2, 0x72, 0x41, 0x2e, 0x0d, 0xaf, 0xf8, 0xc0, 0x0a, 0x17, 0x24, 0x95, 0x81, 0xee, 0x1d,
hudakz 0:7a702d2d6b54 94 0x2a, 0xa7, 0xcb, 0xd1, 0x12, 0x02, 0xb7, 0x42, 0x84, 0x4e, 0x28, 0x78, 0x8c, 0x1a, 0xb0, 0x5b,
hudakz 0:7a702d2d6b54 95 0x7a, 0xfa, 0xde, 0xbb, 0x93, 0x88, 0xcd, 0xe1, 0xfc, 0x04, 0x1e, 0x43, 0x8d, 0x74, 0x80, 0x25,
hudakz 0:7a702d2d6b54 96 0x47, 0xa1, 0xaa, 0x39, 0xdd, 0xb3, 0xd5, 0x3f, 0x65, 0x5d, 0xba, 0x18, 0x71, 0x60, 0x75, 0x62,
hudakz 0:7a702d2d6b54 97 0x2c, 0x4b, 0x53, 0xca, 0x64, 0xe6, 0x23, 0x5f, 0x3e, 0x86, 0x70, 0xfb, 0xd3, 0xd9, 0xbe, 0xb8
hudakz 0:7a702d2d6b54 98 };
hudakz 0:7a702d2d6b54 99
hudakz 0:7a702d2d6b54 100 // Internal wiring of the reflector
hudakz 0:7a702d2d6b54 101 const uint8_t Enigma::REFLECTOR[256] = {
hudakz 0:7a702d2d6b54 102 0x31, 0x74, 0x9c, 0xc4, 0x2a, 0x7e, 0xc6, 0x69, 0x19, 0xa3, 0x5d, 0x91, 0xe7, 0x15, 0x2f, 0xa1,
hudakz 0:7a702d2d6b54 103 0x29, 0x7c, 0xd1, 0x80, 0x9e, 0x0d, 0xf0, 0xda, 0xff, 0x08, 0xd5, 0xfc, 0xdf, 0xa0, 0x58, 0xaf,
hudakz 0:7a702d2d6b54 104 0x4d, 0xc3, 0x8f, 0x46, 0x97, 0x70, 0xcd, 0x48, 0xea, 0x10, 0x04, 0xd3, 0x44, 0xd6, 0x51, 0x0e,
hudakz 0:7a702d2d6b54 105 0xfe, 0x00, 0xa2, 0x9d, 0x59, 0x50, 0x98, 0x6c, 0x53, 0x8c, 0xd8, 0x92, 0xa8, 0x87, 0x84, 0x6f,
hudakz 0:7a702d2d6b54 106 0x6d, 0xb6, 0x9a, 0xe3, 0x2c, 0x79, 0x23, 0xa7, 0x27, 0xa9, 0x66, 0xdb, 0xb5, 0x20, 0x68, 0x5b,
hudakz 0:7a702d2d6b54 107 0x35, 0x2e, 0xb1, 0x38, 0x89, 0xc7, 0xf1, 0x96, 0x1e, 0x34, 0xcb, 0x4f, 0x83, 0x0a, 0xf9, 0xfb,
hudakz 0:7a702d2d6b54 108 0x6b, 0xe2, 0xd0, 0x93, 0x71, 0x75, 0x4a, 0x8d, 0x4e, 0x07, 0x86, 0x60, 0x37, 0x40, 0xcc, 0x3f,
hudakz 0:7a702d2d6b54 109 0x25, 0x64, 0xe4, 0xc1, 0x01, 0x65, 0xfa, 0xb4, 0xf4, 0x45, 0xb2, 0xa5, 0x11, 0x7f, 0x05, 0x7d,
hudakz 0:7a702d2d6b54 110 0x13, 0xc8, 0xdd, 0x5c, 0x3e, 0x99, 0x6a, 0x3d, 0xf7, 0x54, 0xad, 0xc9, 0x39, 0x67, 0xe8, 0x22,
hudakz 0:7a702d2d6b54 111 0xef, 0x0b, 0x3b, 0x63, 0xf2, 0xd4, 0x57, 0x24, 0x36, 0x85, 0x42, 0xab, 0x02, 0x33, 0x14, 0xed,
hudakz 0:7a702d2d6b54 112 0x1d, 0x0f, 0x32, 0x09, 0xd7, 0x7b, 0xb0, 0x47, 0x3c, 0x49, 0xfd, 0x9b, 0xe6, 0x8a, 0xe0, 0x1f,
hudakz 0:7a702d2d6b54 113 0xa6, 0x52, 0x7a, 0xbd, 0x77, 0x4c, 0x41, 0xbf, 0xf6, 0xbb, 0xd9, 0xb9, 0xdc, 0xb3, 0xc0, 0xb7,
hudakz 0:7a702d2d6b54 114 0xbe, 0x73, 0xd2, 0x21, 0x03, 0xce, 0x06, 0x55, 0x81, 0x8b, 0xe5, 0x5a, 0x6e, 0x26, 0xc5, 0xee,
hudakz 0:7a702d2d6b54 115 0x62, 0x12, 0xc2, 0x2b, 0x95, 0x1a, 0x2d, 0xa4, 0x3a, 0xba, 0x17, 0x4b, 0xbc, 0x82, 0xec, 0x1c,
hudakz 0:7a702d2d6b54 116 0xae, 0xf5, 0x61, 0x43, 0x72, 0xca, 0xac, 0x0c, 0x8e, 0xf3, 0x28, 0xf8, 0xde, 0x9f, 0xcf, 0x90,
hudakz 0:7a702d2d6b54 117 0x16, 0x56, 0x94, 0xe9, 0x78, 0xe1, 0xb8, 0x88, 0xeb, 0x5e, 0x76, 0x5f, 0x1b, 0xaa, 0x30, 0x18
hudakz 0:7a702d2d6b54 118 };
hudakz 0:7a702d2d6b54 119 /*$on*/
hudakz 0:7a702d2d6b54 120
hudakz 0:7a702d2d6b54 121 /**
hudakz 0:7a702d2d6b54 122 * @brief Constructor
hudakz 0:7a702d2d6b54 123 * @note Selects which rotors are going to be used and sets their intial position.
hudakz 2:ee55abc2b6a2 124 * @note Also connects pairs of plugs on the plugboard with cords.
hudakz 0:7a702d2d6b54 125 * @param
hudakz 0:7a702d2d6b54 126 * @retval
hudakz 0:7a702d2d6b54 127 */
hudakz 0:7a702d2d6b54 128 Enigma::Enigma
hudakz 0:7a702d2d6b54 129 (
hudakz 0:7a702d2d6b54 130 const uint8_t* leftRotorSel,
hudakz 0:7a702d2d6b54 131 const uint8_t* middleRotorSel,
hudakz 0:7a702d2d6b54 132 const uint8_t* rightRotorSel,
hudakz 0:7a702d2d6b54 133 uint8_t leftRotorPos,
hudakz 0:7a702d2d6b54 134 uint8_t middleRotorPos,
hudakz 2:ee55abc2b6a2 135 uint8_t rightRotorPos,
hudakz 2:ee55abc2b6a2 136 uint8_t (*plugboard)[2],
hudakz 2:ee55abc2b6a2 137 uint8_t cords
hudakz 0:7a702d2d6b54 138 ) :
hudakz 0:7a702d2d6b54 139 _len(256),
hudakz 0:7a702d2d6b54 140 _leftRotorPos(leftRotorPos),
hudakz 0:7a702d2d6b54 141 _middleRotorPos(middleRotorPos),
hudakz 2:ee55abc2b6a2 142 _rightRotorPos(rightRotorPos),
hudakz 2:ee55abc2b6a2 143 _cords(cords)
hudakz 0:7a702d2d6b54 144 {
hudakz 0:7a702d2d6b54 145 // Initialize entry wheel.
hudakz 0:7a702d2d6b54 146 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 147 _entryWheel[i] = i;
hudakz 0:7a702d2d6b54 148 }
hudakz 0:7a702d2d6b54 149
hudakz 1:a21920e248d3 150 // Select three rotors out of fives.
hudakz 0:7a702d2d6b54 151 _leftRotor = const_cast<uint8_t*>(leftRotorSel);
hudakz 0:7a702d2d6b54 152 _middleRotor = const_cast<uint8_t*>(middleRotorSel);
hudakz 0:7a702d2d6b54 153 _rightRotor = const_cast<uint8_t*>(rightRotorSel);
hudakz 0:7a702d2d6b54 154
hudakz 1:a21920e248d3 155 // Initialize reflector.
hudakz 0:7a702d2d6b54 156 _reflector = const_cast<uint8_t*>(REFLECTOR);
hudakz 2:ee55abc2b6a2 157
hudakz 2:ee55abc2b6a2 158 _plugboard = new uint8_t[cords][2];
hudakz 2:ee55abc2b6a2 159 for (size_t i = 0; i < cords; i++) {
hudakz 2:ee55abc2b6a2 160 for (size_t j = 0; j < 2; j++) {
hudakz 2:ee55abc2b6a2 161 _plugboard[i][j] = plugboard[i][j];
hudakz 2:ee55abc2b6a2 162 }
hudakz 2:ee55abc2b6a2 163 }
hudakz 0:7a702d2d6b54 164 }
hudakz 0:7a702d2d6b54 165
hudakz 0:7a702d2d6b54 166 /**
hudakz 1:a21920e248d3 167 * @brief Encrypts a byte array.
hudakz 2:ee55abc2b6a2 168 * @note Encryption capability is extended from 26 upper case letters to any byte.
hudakz 1:a21920e248d3 169 * @retval out Pointer to a byte array to store the encrypted bytes in.
hudakz 1:a21920e248d3 170 * @param in Pointer to a byte array to be encrypted.
hudakz 1:a21920e248d3 171 * @param len Length of the byte array.
hudakz 0:7a702d2d6b54 172 */
hudakz 1:a21920e248d3 173 uint8_t* Enigma::encrypt(uint8_t* out, const uint8_t* in, size_t len)
hudakz 0:7a702d2d6b54 174 {
hudakz 2:ee55abc2b6a2 175 bool found;
hudakz 2:ee55abc2b6a2 176
hudakz 0:7a702d2d6b54 177 // Sets initial permutation
hudakz 0:7a702d2d6b54 178 int leftRotorPos = _leftRotorPos;
hudakz 0:7a702d2d6b54 179 int middleRotorPos = _middleRotorPos;
hudakz 0:7a702d2d6b54 180 int rightRotorPos = _rightRotorPos;
hudakz 0:7a702d2d6b54 181
hudakz 0:7a702d2d6b54 182 for (size_t i = 0; i < len; i++) {
hudakz 1:a21920e248d3 183 uint8_t byte = in[i];
hudakz 0:7a702d2d6b54 184
hudakz 2:ee55abc2b6a2 185 // Swap bytes connected with cords
hudakz 2:ee55abc2b6a2 186 found = false;
hudakz 2:ee55abc2b6a2 187 for (size_t j = 0; j < _cords; j++) {
hudakz 2:ee55abc2b6a2 188 for (size_t k = 0; k < 2; k++) {
hudakz 2:ee55abc2b6a2 189 if (_plugboard[j][k] == byte) {
hudakz 2:ee55abc2b6a2 190 byte = k == 0 ? _plugboard[j][1] : _plugboard[j][0];
hudakz 2:ee55abc2b6a2 191 found = true;
hudakz 2:ee55abc2b6a2 192 break;
hudakz 2:ee55abc2b6a2 193 }
hudakz 2:ee55abc2b6a2 194 }
hudakz 2:ee55abc2b6a2 195 if (found) {
hudakz 2:ee55abc2b6a2 196 break;
hudakz 2:ee55abc2b6a2 197 }
hudakz 2:ee55abc2b6a2 198 }
hudakz 2:ee55abc2b6a2 199
hudakz 1:a21920e248d3 200 // Advance right rotor on every byte entry
hudakz 0:7a702d2d6b54 201 rightRotorPos = _mod(rightRotorPos + 1);
hudakz 0:7a702d2d6b54 202
hudakz 1:a21920e248d3 203 // Avance mid rotor using a notch located at position #13
hudakz 0:7a702d2d6b54 204 if ((rightRotorPos % 13) == 0) {
hudakz 0:7a702d2d6b54 205 middleRotorPos = _mod(middleRotorPos + 2);
hudakz 0:7a702d2d6b54 206 }
hudakz 0:7a702d2d6b54 207
hudakz 2:ee55abc2b6a2 208 // Advance left rotor using a notch located at position #201
hudakz 2:ee55abc2b6a2 209 if ((middleRotorPos % 201) == 0) {
hudakz 0:7a702d2d6b54 210 leftRotorPos = _mod(leftRotorPos + 1);
hudakz 0:7a702d2d6b54 211 }
hudakz 0:7a702d2d6b54 212
hudakz 0:7a702d2d6b54 213 // Pass through rotors
hudakz 1:a21920e248d3 214 byte = _rightRotor[_mod(byte + rightRotorPos)];
hudakz 1:a21920e248d3 215 byte = _middleRotor[_mod(byte + middleRotorPos - rightRotorPos)];
hudakz 1:a21920e248d3 216 byte = _leftRotor[_mod(byte + leftRotorPos - middleRotorPos)];
hudakz 0:7a702d2d6b54 217
hudakz 0:7a702d2d6b54 218 // Pass through reflector
hudakz 1:a21920e248d3 219 byte = _reflector[_mod(byte - leftRotorPos)];
hudakz 1:a21920e248d3 220 byte = _entryWheel[_mod(byte + leftRotorPos)];
hudakz 0:7a702d2d6b54 221
hudakz 0:7a702d2d6b54 222 // Inverse pass trough rotors
hudakz 1:a21920e248d3 223 byte = _entryWheel[_mod(_find(byte, _leftRotor) - leftRotorPos + middleRotorPos)];
hudakz 1:a21920e248d3 224 byte = _entryWheel[_mod(_find(byte, _middleRotor) - middleRotorPos + rightRotorPos)];
hudakz 1:a21920e248d3 225 byte = _entryWheel[_mod(_find(byte, _rightRotor) - rightRotorPos)];
hudakz 0:7a702d2d6b54 226
hudakz 2:ee55abc2b6a2 227 // Swap bytes connected with cords
hudakz 2:ee55abc2b6a2 228 found = false;
hudakz 2:ee55abc2b6a2 229 for (size_t j = 0; j < _cords; j++) {
hudakz 2:ee55abc2b6a2 230 for (size_t k = 0; k < 2; k++) {
hudakz 2:ee55abc2b6a2 231 if (_plugboard[j][k] == byte) {
hudakz 2:ee55abc2b6a2 232 byte = k == 0 ? _plugboard[j][1] : _plugboard[j][0];
hudakz 2:ee55abc2b6a2 233 found = true;
hudakz 2:ee55abc2b6a2 234 break;
hudakz 2:ee55abc2b6a2 235 }
hudakz 2:ee55abc2b6a2 236 }
hudakz 2:ee55abc2b6a2 237 if (found) {
hudakz 2:ee55abc2b6a2 238 break;
hudakz 2:ee55abc2b6a2 239 }
hudakz 2:ee55abc2b6a2 240 }
hudakz 2:ee55abc2b6a2 241
hudakz 1:a21920e248d3 242 out[i] = byte;
hudakz 0:7a702d2d6b54 243 }
hudakz 0:7a702d2d6b54 244
hudakz 0:7a702d2d6b54 245 return out;
hudakz 0:7a702d2d6b54 246 }
hudakz 0:7a702d2d6b54 247
hudakz 0:7a702d2d6b54 248 /**
hudakz 1:a21920e248d3 249 * @brief Decrypts a byte array.
hudakz 1:a21920e248d3 250 * @note Decryption capability is extended from 26 chars to all 256 bytes.
hudakz 1:a21920e248d3 251 * @retval out Pointer to a byte array to store the decrypted bytes in.
hudakz 1:a21920e248d3 252 * @param in Pointer to a byte array to be decrypted.
hudakz 1:a21920e248d3 253 * @param len Length of the byte array.
hudakz 0:7a702d2d6b54 254 */
hudakz 1:a21920e248d3 255 uint8_t* Enigma::decrypt(uint8_t* out, const uint8_t* in, size_t len)
hudakz 0:7a702d2d6b54 256 {
hudakz 0:7a702d2d6b54 257 return encrypt(out, in, len);
hudakz 0:7a702d2d6b54 258 }
hudakz 0:7a702d2d6b54 259
hudakz 0:7a702d2d6b54 260 /**
hudakz 0:7a702d2d6b54 261 * @brief Generates a new rotor wiring.
hudakz 1:a21920e248d3 262 * @note Prints to the serial terminal. The generated byte array
hudakz 1:a21920e248d3 263 * shall be then copy & pasted to his source code and recompiled.
hudakz 0:7a702d2d6b54 264 * @param name Rotor's name. Should be "I", "II", "III", "IV" or "V"
hudakz 0:7a702d2d6b54 265 * @param seed A number to seed the pseudo-ramdom generator with.
hudakz 0:7a702d2d6b54 266 * @retval
hudakz 0:7a702d2d6b54 267 */
hudakz 0:7a702d2d6b54 268 void Enigma::genRotorWiring(const char* name, unsigned seed)
hudakz 0:7a702d2d6b54 269 {
hudakz 0:7a702d2d6b54 270 uint8_t* rotor = new uint8_t[_len];
hudakz 0:7a702d2d6b54 271 srand(seed);
hudakz 0:7a702d2d6b54 272 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 273 rotor[i] = i;
hudakz 0:7a702d2d6b54 274 }
hudakz 0:7a702d2d6b54 275 for (int j = 0; j < (rand() % 1000 + 1000); j++) {
hudakz 0:7a702d2d6b54 276 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 277 uint8_t byte = rotor[i];
hudakz 0:7a702d2d6b54 278 int k = rand() % _len;
hudakz 0:7a702d2d6b54 279 rotor[i] = rotor[k];
hudakz 0:7a702d2d6b54 280 rotor[k] = byte;
hudakz 0:7a702d2d6b54 281 }
hudakz 0:7a702d2d6b54 282 }
hudakz 0:7a702d2d6b54 283
hudakz 0:7a702d2d6b54 284 printf("const uint8_t Enigma::ROTOR_%s[256] = {\r\n", name);
hudakz 0:7a702d2d6b54 285 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 286 if (i == 255) {
hudakz 0:7a702d2d6b54 287 printf("0x%.2x\n", rotor[i]);
hudakz 0:7a702d2d6b54 288 }
hudakz 0:7a702d2d6b54 289 else {
hudakz 0:7a702d2d6b54 290 switch (i % 16) {
hudakz 0:7a702d2d6b54 291 case 0:
hudakz 0:7a702d2d6b54 292 printf(" 0x%.2x, ", rotor[i]);
hudakz 0:7a702d2d6b54 293 break;
hudakz 0:7a702d2d6b54 294
hudakz 0:7a702d2d6b54 295 case 15:
hudakz 0:7a702d2d6b54 296 printf("0x%.2x,\n", rotor[i]);
hudakz 0:7a702d2d6b54 297 break;
hudakz 0:7a702d2d6b54 298
hudakz 0:7a702d2d6b54 299 default:
hudakz 0:7a702d2d6b54 300 printf("0x%.2x, ", rotor[i]);
hudakz 0:7a702d2d6b54 301 }
hudakz 0:7a702d2d6b54 302 }
hudakz 0:7a702d2d6b54 303 }
hudakz 0:7a702d2d6b54 304
hudakz 0:7a702d2d6b54 305 printf("};\r\n\r\n");
hudakz 0:7a702d2d6b54 306
hudakz 0:7a702d2d6b54 307 delete[] rotor;
hudakz 0:7a702d2d6b54 308 }
hudakz 0:7a702d2d6b54 309
hudakz 0:7a702d2d6b54 310 /**
hudakz 0:7a702d2d6b54 311 * @brief Generates a reflector wiring.
hudakz 1:a21920e248d3 312 * @note Prints to the serial terminal. The generated byte array
hudakz 1:a21920e248d3 313 * shall be then copy & pasted to his source code and recompiled.
hudakz 0:7a702d2d6b54 314 * @param seed A number to seed the pseudo-ramdom generator with.
hudakz 0:7a702d2d6b54 315 * @retval
hudakz 0:7a702d2d6b54 316 */
hudakz 0:7a702d2d6b54 317 void Enigma::genReflectorWiring(unsigned seed)
hudakz 0:7a702d2d6b54 318 {
hudakz 0:7a702d2d6b54 319 uint8_t* reflector = new uint8_t[_len];
hudakz 0:7a702d2d6b54 320 uint8_t* modified = new uint8_t[_len];
hudakz 0:7a702d2d6b54 321 size_t k;
hudakz 0:7a702d2d6b54 322
hudakz 0:7a702d2d6b54 323 srand(seed);
hudakz 0:7a702d2d6b54 324 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 325 reflector[i] = i;
hudakz 0:7a702d2d6b54 326 }
hudakz 0:7a702d2d6b54 327
hudakz 0:7a702d2d6b54 328 memset(modified, 0, _len);
hudakz 0:7a702d2d6b54 329
hudakz 0:7a702d2d6b54 330 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 331 if (modified[i] != 0) {
hudakz 0:7a702d2d6b54 332 continue;
hudakz 0:7a702d2d6b54 333 }
hudakz 0:7a702d2d6b54 334
hudakz 0:7a702d2d6b54 335 do {
hudakz 0:7a702d2d6b54 336 k = i + 1 + rand() % (_len - i - 1);
hudakz 0:7a702d2d6b54 337 } while (modified[k]);
hudakz 0:7a702d2d6b54 338
hudakz 0:7a702d2d6b54 339 uint8_t byte = reflector[k];
hudakz 0:7a702d2d6b54 340 reflector[k] = reflector[i];
hudakz 0:7a702d2d6b54 341 reflector[i] = byte;
hudakz 0:7a702d2d6b54 342 modified[i] = 1;
hudakz 0:7a702d2d6b54 343 modified[k] = 1;
hudakz 0:7a702d2d6b54 344 }
hudakz 0:7a702d2d6b54 345
hudakz 0:7a702d2d6b54 346 delete[] modified;
hudakz 0:7a702d2d6b54 347
hudakz 0:7a702d2d6b54 348 printf("const uint8_t Enigma::REFLECTOR[256] = {\r\n");
hudakz 0:7a702d2d6b54 349 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 350 if (i == 255) {
hudakz 0:7a702d2d6b54 351 printf("0x%.2x\n", reflector[i]);
hudakz 0:7a702d2d6b54 352 }
hudakz 0:7a702d2d6b54 353 else {
hudakz 0:7a702d2d6b54 354 switch (i % 16) {
hudakz 0:7a702d2d6b54 355 case 0:
hudakz 0:7a702d2d6b54 356 printf(" 0x%.2x, ", reflector[i]);
hudakz 0:7a702d2d6b54 357 break;
hudakz 0:7a702d2d6b54 358
hudakz 0:7a702d2d6b54 359 case 15:
hudakz 0:7a702d2d6b54 360 printf("0x%.2x,\n", reflector[i]);
hudakz 0:7a702d2d6b54 361 break;
hudakz 0:7a702d2d6b54 362
hudakz 0:7a702d2d6b54 363 default:
hudakz 0:7a702d2d6b54 364 printf("0x%.2x, ", reflector[i]);
hudakz 0:7a702d2d6b54 365 }
hudakz 0:7a702d2d6b54 366 }
hudakz 0:7a702d2d6b54 367 }
hudakz 0:7a702d2d6b54 368
hudakz 0:7a702d2d6b54 369 printf("};\r\n\r\n");
hudakz 0:7a702d2d6b54 370
hudakz 0:7a702d2d6b54 371 delete[] reflector;
hudakz 0:7a702d2d6b54 372 }
hudakz 0:7a702d2d6b54 373
hudakz 0:7a702d2d6b54 374 /**
hudakz 0:7a702d2d6b54 375 * @brief
hudakz 0:7a702d2d6b54 376 * @note
hudakz 0:7a702d2d6b54 377 * @param
hudakz 0:7a702d2d6b54 378 * @retval
hudakz 0:7a702d2d6b54 379 */
hudakz 0:7a702d2d6b54 380 size_t Enigma::_mod(long i)
hudakz 0:7a702d2d6b54 381 {
hudakz 0:7a702d2d6b54 382 return((i % _len + _len) % _len);
hudakz 0:7a702d2d6b54 383 }
hudakz 0:7a702d2d6b54 384
hudakz 0:7a702d2d6b54 385 /**
hudakz 0:7a702d2d6b54 386 * @brief
hudakz 0:7a702d2d6b54 387 * @note
hudakz 0:7a702d2d6b54 388 * @param
hudakz 0:7a702d2d6b54 389 * @retval
hudakz 0:7a702d2d6b54 390 */
hudakz 0:7a702d2d6b54 391 int Enigma::_find(uint8_t byte, uint8_t* array)
hudakz 0:7a702d2d6b54 392 {
hudakz 0:7a702d2d6b54 393 for (size_t i = 0; i < _len; i++) {
hudakz 0:7a702d2d6b54 394 if (array[i] == byte) {
hudakz 0:7a702d2d6b54 395 return i;
hudakz 0:7a702d2d6b54 396 }
hudakz 0:7a702d2d6b54 397 }
hudakz 0:7a702d2d6b54 398
hudakz 0:7a702d2d6b54 399 return -1;
hudakz 0:7a702d2d6b54 400 }