updated IS codes

This commit is contained in:
sherlock 2025-09-09 04:16:24 +05:30
parent a5c9c120ff
commit 13bcfbbafd
7 changed files with 356 additions and 1 deletions

63
IS/Lab/Lab6/dh_basic.py Normal file
View file

@ -0,0 +1,63 @@
from typing import Tuple
from Crypto.Hash import SHA256
from Crypto.Protocol.KDF import HKDF
def rfc3526_group14() -> Tuple[int, int]:
p_hex = (
"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"
"29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"
"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"
"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB9ED529077096966D"
"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"
"DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
"15728E5A8AACAA68FFFFFFFFFFFFFFFF"
)
return int(p_hex, 16), 2
def int_to_fixed_length_bytes(value: int, length_bits: int) -> bytes:
length_bytes = (length_bits + 7) // 8
return value.to_bytes(length_bytes, byteorder="big")
def dh_keypair(p: int, g: int, private_bits: int = 256) -> Tuple[int, int]:
from Crypto.Util import number
a = 0
while a < 2:
a = number.getRandomNBitInteger(private_bits)
A = pow(g, a, p)
return a, A
def main() -> None:
p, g = rfc3526_group14()
a_priv, a_pub = dh_keypair(p, g)
b_priv, b_pub = dh_keypair(p, g)
a_shared = pow(b_pub, a_priv, p)
b_shared = pow(a_pub, b_priv, p)
same = (a_shared == b_shared)
print("Lab6: Basic Diffie-Hellman (no symmetric cipher)")
print(f"- Group: p({p.bit_length()} bits), g={g}")
print(f"- A public: {hex(a_pub)[:18]}...")
print(f"- B public: {hex(b_pub)[:18]}...")
print(f"- Shared equal: {same}")
# Optionally derive a fixed-length key material to show post-processing (not used to encrypt)
shared_bytes = int_to_fixed_length_bytes(a_shared, p.bit_length())
key_material = HKDF(shared_bytes, 32, salt=None, hashmod=SHA256, context=b"demo")
print(f"- Derived key material (SHA256/HKDF) prefix: {key_material.hex()[:16]}...")
if __name__ == "__main__":
main()

View file

@ -0,0 +1,104 @@
import os
import random
from typing import Tuple
from Crypto.Hash import SHA256
from Crypto.Util.number import getPrime
def elgamal_keygen(bits: int = 512) -> Tuple[Tuple[int, int, int], int]:
p = getPrime(bits)
g = random.randrange(2, p - 1)
x = random.randrange(1, p - 1)
h = pow(g, x, p)
return (p, g, h), x
def elgamal_encrypt(message: bytes, pub_key: Tuple[int, int, int]) -> Tuple[int, int]:
p, g, h = pub_key
m = int.from_bytes(message, "big")
if m >= p:
raise ValueError("Message too large for key size")
k = random.randrange(1, p - 1)
c1 = pow(g, k, p)
s = pow(h, k, p)
c2 = (m * s) % p
return c1, c2
def elgamal_decrypt(ciphertext: Tuple[int, int], priv_key: int, pub_key: Tuple[int, int, int]) -> bytes:
c1, c2 = ciphertext
p, _, _ = pub_key
s = pow(c1, priv_key, p)
s_inv = pow(s, p - 2, p)
m = (c2 * s_inv) % p
if m == 0:
return b""
m_len = (m.bit_length() + 7) // 8
return m.to_bytes(m_len, "big")
def schnorr_keygen(bits: int = 512) -> Tuple[Tuple[int, int, int], int]:
# Use same style group as ElGamal demo for simplicity
p = getPrime(bits)
g = random.randrange(2, p - 1)
x = random.randrange(1, p - 1)
y = pow(g, x, p)
return (p, g, y), x
def schnorr_sign(message: bytes, priv_key: int, params: Tuple[int, int, int]) -> Tuple[int, int]:
p, g, _ = params
k = random.randrange(1, p - 1)
r = pow(g, k, p)
h = SHA256.new()
h.update(r.to_bytes((r.bit_length() + 7) // 8 or 1, "big") + message)
e = int.from_bytes(h.digest(), "big") % (p - 1)
s = (k + e * priv_key) % (p - 1)
return e, s
def schnorr_verify(message: bytes, signature: Tuple[int, int], params: Tuple[int, int, int]) -> bool:
p, g, y = params
e, s = signature
# Compute r' = g^s * y^{-e} mod p
y_inv_e = pow(y, (p - 1 - e) % (p - 1), p)
r_prime = (pow(g, s, p) * y_inv_e) % p
h = SHA256.new()
h.update(r_prime.to_bytes((r_prime.bit_length() + 7) // 8 or 1, "big") + message)
e_prime = int.from_bytes(h.digest(), "big") % (p - 1)
return e_prime == e
def demo() -> None:
print("Lab6: ElGamal (encrypt/decrypt) and Schnorr (sign/verify) demo")
default_msg = os.environ.get("LAB6_MESSAGE", "Test message for Lab6")
try:
user_msg = input(f"Enter plaintext [{default_msg}]: ").strip()
except EOFError:
user_msg = ""
message = (user_msg or default_msg).encode()
# ElGamal
pub_e, priv_e = elgamal_keygen(512)
c1, c2 = elgamal_encrypt(message, pub_e)
recovered = elgamal_decrypt((c1, c2), priv_e, pub_e)
print("\nElGamal:")
print(f"- Public: p({pub_e[0].bit_length()} bits), g, h")
print(f"- Ciphertext c1={hex(c1)[:18]}..., c2={hex(c2)[:18]}...")
print(f"- Decrypt OK: {recovered == message}")
# Schnorr
pub_s, priv_s = schnorr_keygen(512)
sig = schnorr_sign(message, priv_s, pub_s)
ok = schnorr_verify(message, sig, pub_s)
print("\nSchnorr:")
print(f"- Public: p({pub_s[0].bit_length()} bits), g, y")
print(f"- Signature e={sig[0]}, s={sig[1]}")
print(f"- Verify OK: {ok}")
if __name__ == "__main__":
demo()

View file

@ -0,0 +1,49 @@
import os
import socket
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_OAEP
def recv_exact(conn: socket.socket, n: int) -> bytes:
buf = b""
while len(buf) < n:
chunk = conn.recv(n - len(buf))
if not chunk:
raise ConnectionError("connection closed")
buf += chunk
return buf
def main() -> None:
host = "127.0.0.1"
port = 5003
default_msg = os.environ.get("LAB6_MESSAGE", "rsa hello")
try:
user_msg = input(f"Enter plaintext [{default_msg}]: ").strip()
except EOFError:
user_msg = ""
message = (user_msg or default_msg).encode()
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as c:
c.connect((host, port))
# Receive server public key
klen = int.from_bytes(recv_exact(c, 4), "big")
kbytes = recv_exact(c, klen)
server_pub = RSA.import_key(kbytes)
# Encrypt message to server
cipher = PKCS1_OAEP.new(server_pub)
ctext = cipher.encrypt(message)
c.sendall(len(ctext).to_bytes(4, "big") + ctext)
# Receive acknowledgement
rlen = int.from_bytes(recv_exact(c, 4), "big")
reply = recv_exact(c, rlen)
print("server reply:", reply.decode(errors="ignore"))
if __name__ == "__main__":
main()

View file

@ -0,0 +1,43 @@
import socket
from typing import Tuple
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_OAEP
def generate_rsa(bits: int = 2048) -> Tuple[RSA.RsaKey, RSA.RsaKey]:
key = RSA.generate(bits)
return key.publickey(), key
def main() -> None:
host = "127.0.0.1"
port = 5003
pub, priv = generate_rsa(2048)
pub_pem = pub.export_key()
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as srv:
srv.bind((host, port))
srv.listen(1)
conn, _ = srv.accept()
with conn:
# Send server public key
conn.sendall(len(pub_pem).to_bytes(4, "big") + pub_pem)
# Receive client's encrypted message
clen = int.from_bytes(conn.recv(4), "big")
ctext = conn.recv(clen)
cipher = PKCS1_OAEP.new(priv)
msg = cipher.decrypt(ctext)
# Respond: encrypt reply with same public (client will not be able to decrypt without its private),
# so just echo plaintext length as acknowledgement for demo.
reply = f"received:{len(msg)}".encode()
conn.sendall(len(reply).to_bytes(4, "big") + reply)
if __name__ == "__main__":
main()