GCrypt/readme.md

131 lines
6.7 KiB
Markdown
Raw Normal View History

2021-12-06 03:20:02 +01:00
# Ghettocrypt
*because frankly i have no idea what the fuck i'm doing*
<sub>*Please don't use this for anything critical*</sub>
## What the hell is this?
An educational project on implementing a block cipher using a feistel network.
2022-02-07 01:50:00 +01:00
This block cipher employs a few modes of operation. Read more about them [here](#modes-of-operation).
2021-12-06 03:20:02 +01:00
## Features
2021-12-13 15:12:05 +01:00
* It has very easy syntax
2021-12-06 03:20:02 +01:00
* It's slow
2022-02-07 01:50:00 +01:00
* It absolutely tanks your ram when working with files
* Even leaves some key fragments in there✨
2021-12-06 03:20:02 +01:00
* It's probably super insecure
2021-12-06 10:16:29 +01:00
* 512-bit keys <sup>\*</sup>
2022-02-07 01:50:00 +01:00
* But the syntax is pythonlike easy🙇
2021-12-06 03:23:36 +01:00
2021-12-06 03:20:02 +01:00
It's pretty ghetto, you know?
## What are the actual advantages?
2021-12-06 10:06:14 +01:00
* It's two files to import into your project
2021-12-06 03:20:02 +01:00
* 1 Line to use
* 100% cross plattform
2021-12-06 10:06:14 +01:00
## What could I use it for?
2021-12-06 03:20:02 +01:00
* For data obfuscation
* If your only other option would be no encryption at all
2021-12-13 15:11:22 +01:00
### I am not kidding, don't use this for critical stuff! Homebrew ciphers tend to be shit!
2022-02-07 23:51:09 +01:00
Especially mine!🗡️
Even assumed it's a good cipher, it's implementation leaves a lot to be desired in terms of being cryptographically secure. The whole leaving partial keys in ram- thingy...
2021-12-06 03:36:38 +01:00
2021-12-06 10:06:14 +01:00
## How do I use this?
2022-01-21 20:57:17 +01:00
### *"I don't care about the library. Just let me use it from the command line!"*
There is a CLI version availabile [here](https://github.com/Leonetienne/GhettoCrypt/tree/master/GhettoCryptCLI).
2022-01-21 20:56:12 +01:00
### Installation as a library
2021-12-13 15:11:22 +01:00
Download the `.h` and `.cpp` file from [INCLUDE/](https://github.com/Leonetienne/GhettoCrypt/tree/master/INCLUDE) and add them to your projects files. *Single-header-magic*.
2021-12-06 03:42:39 +01:00
2022-01-21 20:56:12 +01:00
### Working with strings
```c++
using namespace GhettoCipher;
// Get some string
const std::string input = "I am a super secret message!";
std::cout << input << std::endl;
// Encrypt
const std::string encrypted = GhettoCryptWrapper::EncryptString(input, "password1");
std::cout << encrypted << std::endl;
// Decrypt
const std::string decrypted = GhettoCryptWrapper::DecryptString(encrypted, "password1");
std::cout << decrypted << std::endl;
```
2022-01-21 20:56:12 +01:00
### Working with files
```c++
using namespace GhettoCipher;
// Encrypt
GhettoCryptWrapper::EncryptFile("main.cpp", "main.cpp.crypt", "password1");
// Decrypt
GhettoCryptWrapper::DecryptFile("main.cpp.crypt", "main.cpp.clear", "password1");
```
2021-12-06 03:39:35 +01:00
If you want to do more complex stuff, use the cipher-class [`GhettoCipher::Cipher`](https://github.com/Leonetienne/GhettoCrypt/blob/master/GhettoCrypt/Cipher.h) aswell as the conversion methods in [Util.h](https://github.com/Leonetienne/GhettoCrypt/blob/master/GhettoCrypt/Util.h). This way you can cipher on bitlevel. Examples on how to do this are in [GhettoCryptWrapper.cpp](https://github.com/Leonetienne/GhettoCrypt/blob/master/GhettoCrypt/GhettoCryptWrapper.cpp).
2021-12-06 03:34:47 +01:00
This way you could, for example, decrypt an ecrypted file directly into memory. Or use a full-length key instead of a password.
Without saying, this is more advanced and not as-easy as the methods supplied in the wrapper.
2021-12-06 10:06:14 +01:00
---
2021-12-06 10:18:09 +01:00
<sup>\*</sup> A key is always of size `BLOCK_SIZE`. The default block size is 512 (bit), but you can easily change it in [Config.h](https://github.com/Leonetienne/GhettoCrypt/blob/master/GhettoCrypt/Config.h) or wherever it'll be put in the INCLUDE/*.cpp. `BLOCK_SIZE` is also the minimal output length!
2021-12-06 03:20:02 +01:00
2022-02-07 01:50:00 +01:00
## The deets 🍝
### Modes of operation
* [CBC] This block cipher makes use of cipher block chaining. Nothing special.
2022-02-08 01:17:56 +01:00
* [IV] The initialization vector is indeed a bit of special sauce, as it depends on your key instead of being static. It is generated by running the feistel network on *E(m=seed, k=seed)*, which is a one-way function, because *m=k*.
2022-02-08 01:19:53 +01:00
* [RRKM] Never heard of a mode like this, so i've named it **R**olling**R**ound**K**ey**M**ode. This basically means that the round key extrapolation is carried out continously over EVERY round on EVERY block. So in addition to *M<sub>i</sub>* being dependent on *E(M<sub>i-1</sub>,K<sub>i-1,0</sub>)* due to CBC, so is now *K<sub>i</sub>* dependent on *K<sub>i-1,r</sub>* with *r* being the maximum number of extrapolated keys within a call of *E()*. This is handled within the feistel network class, as an instance lifecycle sees all blocks. Just in case you want to take a peek.
2022-02-07 01:50:00 +01:00
### Password to key
How does *GC* transform a password to a key?
First up, we have to establish what requirements this transformation must fulfill:
* A full key. Not just *len(passwd)\*8* bits and the rest zero-padded.
2022-02-08 01:17:56 +01:00
* Even if *len(passwd)\*8 > KEY_SIZE*, every bit of the password should affect the key
2022-02-08 01:23:15 +01:00
* Diffusion
2022-02-07 01:50:00 +01:00
* Ideally good collision resistance
2022-02-08 01:17:56 +01:00
Let's be honest, I'm not a cryptographer, I have no idea how collision resistant this is.
2022-02-07 01:50:00 +01:00
This means, it has to be considered *insecure*!
I have tried a few passwords brute-forcibly, experimentally (about 1mil) and have not been able to produce a collision.
2022-02-07 23:51:09 +01:00
Obviously there have to be collisions, since *|P|, len\(p\) &#8712; &#8501; &#8811; |C|*.
2022-02-07 01:50:00 +01:00
How does it work? Basically, what happens is your password gets recoded to binary. It is then split into blocks of
size KEY_SIZE, they are &xoplus; together, and this single block is then encrypted with itself as a key.
The end result is the key corresponding to your password.
This is a one-way operation. Since the key used for this operation is the cleartext itself, you cannot undo it without already
knowing the password(=cleartext) to begin with. *You could make a hashfunction out of this.*
2021-12-06 03:20:02 +01:00
## LICENSE
```
BSD 2-Clause License
Copyright (c) 2021, Leon Etienne
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
```