AES-128_V10.cpp 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340
  1. /******************************************************************************************
  2. #if defined(USE_IDEETRON_AES)
  3. * Copyright 2015, 2016 Ideetron B.V.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU Lesser General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU Lesser General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU Lesser General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. ******************************************************************************************/
  18. /******************************************************************************************
  19. *
  20. * File: AES-128_V10.cpp
  21. * Author: Gerben den Hartog
  22. * Compagny: Ideetron B.V.
  23. * Website: http://www.ideetron.nl/LoRa
  24. * E-mail: info@ideetron.nl
  25. ******************************************************************************************/
  26. /****************************************************************************************
  27. *
  28. * Created on: 20-10-2015
  29. * Supported Hardware: ID150119-02 Nexus board with RFM95
  30. *
  31. * Firmware Version 1.0
  32. * First version
  33. ****************************************************************************************/
  34. // This file was taken from
  35. // https://github.com/Ideetron/RFM95W_Nexus/tree/master/LoRaWAN_V31 for
  36. // use with LMIC. It was only cosmetically modified:
  37. // - All other functions and variables were made static
  38. // - Tabs were converted to 2 spaces
  39. // - An #include and #if guard was added
  40. // - S_Table is now stored in PROGMEM
  41. /*
  42. ********************************************************************************************
  43. * Global Variables
  44. ********************************************************************************************
  45. */
  46. static unsigned char State[4][4];
  47. //static CONST_TABLE(unsigned char, S_Table)[16][16] = {
  48. unsigned char S_Table[16][16] = {
  49. {0x63,0x7C,0x77,0x7B,0xF2,0x6B,0x6F,0xC5,0x30,0x01,0x67,0x2B,0xFE,0xD7,0xAB,0x76},
  50. {0xCA,0x82,0xC9,0x7D,0xFA,0x59,0x47,0xF0,0xAD,0xD4,0xA2,0xAF,0x9C,0xA4,0x72,0xC0},
  51. {0xB7,0xFD,0x93,0x26,0x36,0x3F,0xF7,0xCC,0x34,0xA5,0xE5,0xF1,0x71,0xD8,0x31,0x15},
  52. {0x04,0xC7,0x23,0xC3,0x18,0x96,0x05,0x9A,0x07,0x12,0x80,0xE2,0xEB,0x27,0xB2,0x75},
  53. {0x09,0x83,0x2C,0x1A,0x1B,0x6E,0x5A,0xA0,0x52,0x3B,0xD6,0xB3,0x29,0xE3,0x2F,0x84},
  54. {0x53,0xD1,0x00,0xED,0x20,0xFC,0xB1,0x5B,0x6A,0xCB,0xBE,0x39,0x4A,0x4C,0x58,0xCF},
  55. {0xD0,0xEF,0xAA,0xFB,0x43,0x4D,0x33,0x85,0x45,0xF9,0x02,0x7F,0x50,0x3C,0x9F,0xA8},
  56. {0x51,0xA3,0x40,0x8F,0x92,0x9D,0x38,0xF5,0xBC,0xB6,0xDA,0x21,0x10,0xFF,0xF3,0xD2},
  57. {0xCD,0x0C,0x13,0xEC,0x5F,0x97,0x44,0x17,0xC4,0xA7,0x7E,0x3D,0x64,0x5D,0x19,0x73},
  58. {0x60,0x81,0x4F,0xDC,0x22,0x2A,0x90,0x88,0x46,0xEE,0xB8,0x14,0xDE,0x5E,0x0B,0xDB},
  59. {0xE0,0x32,0x3A,0x0A,0x49,0x06,0x24,0x5C,0xC2,0xD3,0xAC,0x62,0x91,0x95,0xE4,0x79},
  60. {0xE7,0xC8,0x37,0x6D,0x8D,0xD5,0x4E,0xA9,0x6C,0x56,0xF4,0xEA,0x65,0x7A,0xAE,0x08},
  61. {0xBA,0x78,0x25,0x2E,0x1C,0xA6,0xB4,0xC6,0xE8,0xDD,0x74,0x1F,0x4B,0xBD,0x8B,0x8A},
  62. {0x70,0x3E,0xB5,0x66,0x48,0x03,0xF6,0x0E,0x61,0x35,0x57,0xB9,0x86,0xC1,0x1D,0x9E},
  63. {0xE1,0xF8,0x98,0x11,0x69,0xD9,0x8E,0x94,0x9B,0x1E,0x87,0xE9,0xCE,0x55,0x28,0xDF},
  64. {0x8C,0xA1,0x89,0x0D,0xBF,0xE6,0x42,0x68,0x41,0x99,0x2D,0x0F,0xB0,0x54,0xBB,0x16}
  65. };
  66. //extern "C" void AES_Encrypt(unsigned char *Data, unsigned char *Key);
  67. void AES_Encrypt(unsigned char *Data, unsigned char *Key);
  68. static void AES_Add_Round_Key(unsigned char *Round_Key);
  69. static unsigned char AES_Sub_Byte(unsigned char Byte);
  70. static void AES_Shift_Rows();
  71. static void AES_Mix_Collums();
  72. static void AES_Calculate_Round_Key(unsigned char Round, unsigned char *Round_Key);
  73. static void Send_State();
  74. /*
  75. *****************************************************************************************
  76. * Description : Function for encrypting data using AES-128
  77. *
  78. * Arguments : *Data Data to encrypt is a 16 byte long arry
  79. * *Key Key to encrypt data with is a 16 byte long arry
  80. *****************************************************************************************
  81. */
  82. void AES_Encrypt(unsigned char *Data, unsigned char *Key)
  83. {
  84. unsigned char i;
  85. unsigned char Row,Collum;
  86. unsigned char Round = 0x00;
  87. unsigned char Round_Key[16];
  88. //Copy input to State arry
  89. for(Collum = 0; Collum < 4; Collum++)
  90. {
  91. for(Row = 0; Row < 4; Row++)
  92. {
  93. State[Row][Collum] = Data[Row + (4*Collum)];
  94. }
  95. }
  96. //Copy key to round key
  97. for(i = 0; i < 16; i++)
  98. {
  99. Round_Key[i] = Key[i];
  100. }
  101. //Add round key
  102. AES_Add_Round_Key(Round_Key);
  103. //Preform 9 full rounds
  104. for(Round = 1; Round < 10; Round++)
  105. {
  106. //Preform Byte substitution with S table
  107. for(Collum = 0; Collum < 4; Collum++)
  108. {
  109. for(Row = 0; Row < 4; Row++)
  110. {
  111. State[Row][Collum] = AES_Sub_Byte(State[Row][Collum]);
  112. }
  113. }
  114. //Preform Row Shift
  115. AES_Shift_Rows();
  116. //Mix Collums
  117. AES_Mix_Collums();
  118. //Calculate new round key
  119. AES_Calculate_Round_Key(Round,Round_Key);
  120. //Add round key
  121. AES_Add_Round_Key(Round_Key);
  122. }
  123. //Last round whitout mix collums
  124. //Preform Byte substitution with S table
  125. for(Collum = 0; Collum < 4; Collum++)
  126. {
  127. for(Row = 0; Row < 4; Row++)
  128. {
  129. State[Row][Collum] = AES_Sub_Byte(State[Row][Collum]);
  130. }
  131. }
  132. //Shift rows
  133. AES_Shift_Rows();
  134. //Calculate new round key
  135. AES_Calculate_Round_Key(Round,Round_Key);
  136. //Add round Key
  137. AES_Add_Round_Key(Round_Key);
  138. //Copy the State into the data array
  139. for(Collum = 0; Collum < 4; Collum++)
  140. {
  141. for(Row = 0; Row < 4; Row++)
  142. {
  143. Data[Row + (4*Collum)] = State[Row][Collum];
  144. }
  145. }
  146. }
  147. /*
  148. *****************************************************************************************
  149. * Description : Function that add's the round key for the current round
  150. *
  151. * Arguments : *Round_Key 16 byte long array holding the Round Key
  152. *****************************************************************************************
  153. */
  154. static void AES_Add_Round_Key(unsigned char *Round_Key)
  155. {
  156. unsigned char Row,Collum;
  157. for(Collum = 0; Collum < 4; Collum++)
  158. {
  159. for(Row = 0; Row < 4; Row++)
  160. {
  161. State[Row][Collum] = State[Row][Collum] ^ Round_Key[Row + (4*Collum)];
  162. }
  163. }
  164. }
  165. /*
  166. *****************************************************************************************
  167. * Description : Function that substitutes a byte with a byte from the S_Table
  168. *
  169. * Arguments : Byte The byte that will be substituted
  170. *
  171. * Return : The return is the found byte in the S_Table
  172. *****************************************************************************************
  173. */
  174. static unsigned char AES_Sub_Byte(unsigned char Byte)
  175. {
  176. unsigned char S_Row,S_Collum;
  177. unsigned char S_Byte;
  178. //Split byte up in Row and Collum
  179. S_Row = ((Byte >> 4) & 0x0F);
  180. S_Collum = (Byte & 0x0F);
  181. //Find the correct byte in the S_Table
  182. S_Byte = S_Table[S_Row][S_Collum];
  183. return S_Byte;
  184. }
  185. /*
  186. *****************************************************************************************
  187. * Description : Function that preforms the shift row operation described in the AES standard
  188. *****************************************************************************************
  189. */
  190. static void AES_Shift_Rows()
  191. {
  192. unsigned char Buffer;
  193. //Row 0 doesn't change
  194. //Shift Row 1 one left
  195. //Store firt byte in buffer
  196. Buffer = State[1][0];
  197. //Shift all bytes
  198. State[1][0] = State[1][1];
  199. State[1][1] = State[1][2];
  200. State[1][2] = State[1][3];
  201. State[1][3] = Buffer;
  202. //Shift row 2 two left
  203. Buffer = State[2][0];
  204. State[2][0] = State[2][2];
  205. State[2][2] = Buffer;
  206. Buffer = State[2][1];
  207. State[2][1] = State[2][3];
  208. State[2][3] = Buffer;
  209. //Shift row 3 three left
  210. Buffer = State[3][3];
  211. State[3][3] = State[3][2];
  212. State[3][2] = State[3][1];
  213. State[3][1] = State[3][0];
  214. State[3][0] = Buffer;
  215. }
  216. /*
  217. *****************************************************************************************
  218. * Description : Function that preforms the Mix Collums operation described in the AES standard
  219. *****************************************************************************************
  220. */
  221. static void AES_Mix_Collums()
  222. {
  223. unsigned char Row,Collum;
  224. unsigned char a[4], b[4];
  225. for(Collum = 0; Collum < 4; Collum++)
  226. {
  227. for(Row = 0; Row < 4; Row++)
  228. {
  229. a[Row] = State[Row][Collum];
  230. b[Row] = (State[Row][Collum] << 1);
  231. if((State[Row][Collum] & 0x80) == 0x80)
  232. {
  233. b[Row] = b[Row] ^ 0x1B;
  234. }
  235. }
  236. State[0][Collum] = b[0] ^ a[1] ^ b[1] ^ a[2] ^ a[3];
  237. State[1][Collum] = a[0] ^ b[1] ^ a[2] ^ b[2] ^ a[3];
  238. State[2][Collum] = a[0] ^ a[1] ^ b[2] ^ a[3] ^ b[3];
  239. State[3][Collum] = a[0] ^ b[0] ^ a[1] ^ a[2] ^ b[3];
  240. }
  241. }
  242. /*
  243. *****************************************************************************************
  244. * Description : Function that calculaties the round key for the current round
  245. *
  246. * Arguments : Round Number of current Round
  247. * *Round_Key 16 byte long array holding the Round Key
  248. *****************************************************************************************
  249. */
  250. static void AES_Calculate_Round_Key(unsigned char Round, unsigned char *Round_Key)
  251. {
  252. unsigned char i,j;
  253. unsigned char b;
  254. unsigned char Temp[4];
  255. unsigned char Buffer;
  256. unsigned char Rcon;
  257. //Calculate first Temp
  258. //Copy laste byte from previous key
  259. for(i = 0; i < 4; i++)
  260. {
  261. Temp[i] = Round_Key[i+12];
  262. }
  263. //Rotate Temp
  264. Buffer = Temp[0];
  265. Temp[0] = Temp[1];
  266. Temp[1] = Temp[2];
  267. Temp[2] = Temp[3];
  268. Temp[3] = Buffer;
  269. //Substitute Temp
  270. for(i = 0; i < 4; i++)
  271. {
  272. Temp[i] = AES_Sub_Byte(Temp[i]);
  273. }
  274. //Calculate Rcon
  275. Rcon = 0x01;
  276. while(Round != 1)
  277. {
  278. b = Rcon & 0x80;
  279. Rcon = Rcon << 1;
  280. if(b == 0x80)
  281. {
  282. Rcon = Rcon ^ 0x1b;
  283. }
  284. Round--;
  285. }
  286. //XOR Rcon
  287. Temp[0] = Temp[0] ^ Rcon;
  288. //Calculate new key
  289. for(i = 0; i < 4; i++)
  290. {
  291. for(j = 0; j < 4; j++)
  292. {
  293. Round_Key[j + (4*i)] = Round_Key[j + (4*i)] ^ Temp[j];
  294. Temp[j] = Round_Key[j + (4*i)];
  295. }
  296. }
  297. }