| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Crypt::Camellia; |
|
2
|
|
|
|
|
|
|
|
|
3
|
4
|
|
|
4
|
|
108901
|
use 5.008001; |
|
|
4
|
|
|
|
|
15
|
|
|
|
4
|
|
|
|
|
149
|
|
|
4
|
4
|
|
|
4
|
|
20
|
use strict; |
|
|
4
|
|
|
|
|
11
|
|
|
|
4
|
|
|
|
|
147
|
|
|
5
|
4
|
|
|
4
|
|
20
|
use warnings; |
|
|
4
|
|
|
|
|
14
|
|
|
|
4
|
|
|
|
|
106
|
|
|
6
|
4
|
|
|
4
|
|
21
|
use Carp; |
|
|
4
|
|
|
|
|
6
|
|
|
|
4
|
|
|
|
|
2224
|
|
|
7
|
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
our $VERSION = '2.02'; |
|
9
|
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
require XSLoader; |
|
11
|
|
|
|
|
|
|
XSLoader::load('Crypt::Camellia', $VERSION); |
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
# Preloaded methods go here. |
|
14
|
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
sub usage { |
|
16
|
0
|
|
|
0
|
0
|
0
|
my ($package, $filename, $line, $subr) = caller(1); |
|
17
|
0
|
|
|
|
|
0
|
$Carp::CarpLevel = 2; |
|
18
|
0
|
|
|
|
|
0
|
croak "Usage: $subr(@_)"; |
|
19
|
|
|
|
|
|
|
} |
|
20
|
|
|
|
|
|
|
|
|
21
|
7855
|
|
|
7855
|
1
|
17897
|
sub blocksize { 16 } |
|
22
|
1
|
|
|
1
|
0
|
26
|
sub keysize { 32 } |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
sub new{ |
|
25
|
3908
|
50
|
|
3908
|
1
|
1559638
|
usage("new Camellia key") unless @_ == 2; |
|
26
|
3908
|
|
|
|
|
6219
|
my ($type, $key) = @_; |
|
27
|
3908
|
|
|
|
|
11750
|
my $self = { keysize => length($key) }; |
|
28
|
3908
|
|
|
|
|
8289
|
bless $self, $type; |
|
29
|
3908
|
50
|
100
|
|
|
20220
|
if ($self->{keysize} != 16 && $self->{keysize} != 24 && $self->{keysize} != 32) { |
|
|
|
|
66
|
|
|
|
|
|
30
|
0
|
|
|
|
|
0
|
croak "wrong key length: key must be 128, 192 or 256 bits long"; |
|
31
|
|
|
|
|
|
|
} |
|
32
|
3908
|
|
|
|
|
22391
|
$self->{keytable} = Crypt::Camellia::keygen($key, $self->{keysize}*8); |
|
33
|
3908
|
|
|
|
|
11255
|
return $self; |
|
34
|
|
|
|
|
|
|
} |
|
35
|
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
sub encrypt{ |
|
37
|
3928
|
50
|
|
3928
|
1
|
22412
|
usage("encrypt data[16 bytes]") unless @_ == 2; |
|
38
|
3928
|
|
|
|
|
5453
|
my ($self,$data) = @_; |
|
39
|
3928
|
50
|
|
|
|
7975
|
if (length $data != blocksize()) { |
|
40
|
0
|
|
|
|
|
0
|
croak "datasize not multiple of blocksize (16 bytes)"; |
|
41
|
|
|
|
|
|
|
} |
|
42
|
3928
|
|
|
|
|
26838
|
return Crypt::Camellia::crypt($data, $self->{keytable}, $self->{keysize}*8, 1); |
|
43
|
|
|
|
|
|
|
} |
|
44
|
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
sub decrypt { |
|
46
|
3926
|
50
|
|
3926
|
1
|
18387
|
usage("decrypt data[16 bytes]") unless @_ == 2; |
|
47
|
3926
|
|
|
|
|
5531
|
my ($self,$data) = @_; |
|
48
|
3926
|
50
|
|
|
|
6843
|
if (length $data != blocksize()) { |
|
49
|
0
|
|
|
|
|
0
|
croak "datasize not multiple of blocksize (16 bytes)"; |
|
50
|
|
|
|
|
|
|
} |
|
51
|
3926
|
|
|
|
|
24603
|
return Crypt::Camellia::crypt($data, $self->{keytable}, $self->{keysize}*8, 0); |
|
52
|
|
|
|
|
|
|
} |
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
1; |
|
56
|
|
|
|
|
|
|
__END__ |
|
57
|
|
|
|
|
|
|
# Below is stub documentation for your module. You'd better edit it! |
|
58
|
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
=head1 NAME |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
Crypt::Camellia - Perl Camellia encryption module |
|
62
|
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
64
|
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
use Crypt::Camellia; |
|
66
|
|
|
|
|
|
|
my $cipher = Crypt::Camellia->new($key); |
|
67
|
|
|
|
|
|
|
my $ciphertext = $cipher->encrypt($plaintext); |
|
68
|
|
|
|
|
|
|
my $plaintext = $cipher->decrypt($ciphertext); |
|
69
|
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
# more likely |
|
71
|
|
|
|
|
|
|
use Crypt::CBC; |
|
72
|
|
|
|
|
|
|
$cipher = Crypt::CBC->new( -key => 'my secret key', |
|
73
|
|
|
|
|
|
|
-cipher => 'Camellia' |
|
74
|
|
|
|
|
|
|
); |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
77
|
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
This module implements Camelia 128-bit Block Cipher for perl. |
|
79
|
|
|
|
|
|
|
For Camellia. Check L<https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>. Here is an exerpt of that page. |
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
=over 2 |
|
82
|
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
Camellia is a symmetric key block cipher developed jointly in 2000 by |
|
84
|
|
|
|
|
|
|
world top class encryption researchers at NTT and Mitsubishi Electric |
|
85
|
|
|
|
|
|
|
Corporation. Technologically speaking, Camellia naturally has not only |
|
86
|
|
|
|
|
|
|
a high level of security, but also excellent efficiency and practical |
|
87
|
|
|
|
|
|
|
characteristics. It can be implemented at high performance by software |
|
88
|
|
|
|
|
|
|
on various platforms. In regard to hardware implementation, compact |
|
89
|
|
|
|
|
|
|
and low-power consumption type implementation as well as high-speed |
|
90
|
|
|
|
|
|
|
implementation is possible. |
|
91
|
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
Based on these technological advantages, Camellia has been |
|
93
|
|
|
|
|
|
|
internationally recognized, for example the selection project on the |
|
94
|
|
|
|
|
|
|
European recommendation of strong cryptographic primitives, NESSIE, |
|
95
|
|
|
|
|
|
|
evaluated Camellia to have "many similarities to the AES, so much of |
|
96
|
|
|
|
|
|
|
the analysis for the AES is also applicable to Camellia." Currently, |
|
97
|
|
|
|
|
|
|
Camellia is the only cipher internationally recognized which has the |
|
98
|
|
|
|
|
|
|
same level of security and performance as AES, and is selected for |
|
99
|
|
|
|
|
|
|
many international standard/recommended ciphers. In particular, as |
|
100
|
|
|
|
|
|
|
Japanese domestic ciphers, this is the first case to be approved as |
|
101
|
|
|
|
|
|
|
IETF standard ciphers (Proposed Standard RFC) . |
|
102
|
|
|
|
|
|
|
|
|
103
|
|
|
|
|
|
|
=back |
|
104
|
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
Crypt::Camellia has the following methods: |
|
106
|
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
=over 2 |
|
108
|
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
blocksize() |
|
110
|
|
|
|
|
|
|
keysize() |
|
111
|
|
|
|
|
|
|
encrypt() |
|
112
|
|
|
|
|
|
|
decrypt() |
|
113
|
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
=back |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
Like many Crypt:: modules like L<Crypt::Blowfish> and L<Crypt::DES>, |
|
117
|
|
|
|
|
|
|
this module works as a backend of L<Crypt::CBC>. |
|
118
|
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
=head1 FUNCTIONS |
|
120
|
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
=over 2 |
|
122
|
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
=item blocksize |
|
124
|
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
Returns the size (in bytes) of the block cipher. Currently this is a |
|
126
|
|
|
|
|
|
|
fixed value of 16. |
|
127
|
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
=item new |
|
129
|
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
my $cipher = Crypt::Camellia-E<gt>new($key); |
|
131
|
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
This creates a new Crypt::Camellia BlockCipher object, using $key, |
|
133
|
|
|
|
|
|
|
where $key is a key of C<keysize()> bytes (minimum of eight bytes). |
|
134
|
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
=item encrypt |
|
136
|
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
my $ciphertext = $cipher-E<gt>encrypt($plaintext); |
|
138
|
|
|
|
|
|
|
|
|
139
|
|
|
|
|
|
|
This function encrypts $plaintext and returns the $ciphertext |
|
140
|
|
|
|
|
|
|
where $plaintext and $ciphertext must be of C<blocksize()> bytes. |
|
141
|
|
|
|
|
|
|
(hint: Camellia is an 16 byte block cipher) |
|
142
|
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
=item decrypt |
|
144
|
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
my $plaintext = $cipher-E<gt>decrypt($ciphertext); |
|
146
|
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
This function decrypts $ciphertext and returns the $plaintext |
|
148
|
|
|
|
|
|
|
where $plaintext and $ciphertext must be of C<blocksize()> bytes. |
|
149
|
|
|
|
|
|
|
(hint: see previous hint) |
|
150
|
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
=back |
|
152
|
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
=head1 EXAMPLE |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
my $key = pack("H16", "0123456789ABCDEF"); # min. 8 bytes |
|
156
|
|
|
|
|
|
|
my $cipher = Crypt::Camellia->new($key); |
|
157
|
|
|
|
|
|
|
my $ciphertext = $cipher->encrypt("plaintex");# SEE NOTES |
|
158
|
|
|
|
|
|
|
print unpack("H16", $ciphertext), "\n"; |
|
159
|
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
=head1 NOTES |
|
161
|
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
For practical uses use this module via L<Crypt::CBC> rather than directly. |
|
163
|
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
=head1 SEE ALSO |
|
165
|
|
|
|
|
|
|
|
|
166
|
|
|
|
|
|
|
L<Crypt::CBC>, |
|
167
|
|
|
|
|
|
|
L<Crypt::Rijndael>, |
|
168
|
|
|
|
|
|
|
L<Crypt::DES>, |
|
169
|
|
|
|
|
|
|
L<Crypt::IDEA> |
|
170
|
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
=head1 AUTHOR |
|
172
|
|
|
|
|
|
|
|
|
173
|
|
|
|
|
|
|
Dan Kogai, E<lt>dankogai@dan.co.jpE<gt> |
|
174
|
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
Current maintainer is Hiroyuki OYAMA E<lt>oyama@module.jpE<gt>. |
|
176
|
|
|
|
|
|
|
|
|
177
|
|
|
|
|
|
|
And |
|
178
|
|
|
|
|
|
|
|
|
179
|
|
|
|
|
|
|
NTT L<http://info.isl.ntt.co.jp/crypt/camellia/index.html> |
|
180
|
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE |
|
182
|
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
Copyright (C) 2006 by Dan Kogai |
|
184
|
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
This library is free software; you can redistribute it and/or modify |
|
186
|
|
|
|
|
|
|
it under the same terms as Perl itself, either Perl version 5.8.8 or, |
|
187
|
|
|
|
|
|
|
at your option, any later version of Perl 5 you may have available. |
|
188
|
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
Except for anything under camellia/ directory which is licensed as follows: |
|
190
|
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
Copyright (c) 2006 |
|
192
|
|
|
|
|
|
|
NTT (Nippon Telegraph and Telephone Corporation) . All rights reserved. |
|
193
|
|
|
|
|
|
|
|
|
194
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without |
|
195
|
|
|
|
|
|
|
modification, are permitted provided that the following conditions |
|
196
|
|
|
|
|
|
|
are met: |
|
197
|
|
|
|
|
|
|
1. Redistributions of source code must retain the above copyright |
|
198
|
|
|
|
|
|
|
notice, this list of conditions and the following disclaimer as |
|
199
|
|
|
|
|
|
|
the first lines of this file unmodified. |
|
200
|
|
|
|
|
|
|
2. Redistributions in binary form must reproduce the above copyright |
|
201
|
|
|
|
|
|
|
notice, this list of conditions and the following disclaimer in the |
|
202
|
|
|
|
|
|
|
documentation and/or other materials provided with the distribution. |
|
203
|
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY NTT ``AS IS'' AND ANY EXPRESS OR IMPLIED |
|
205
|
|
|
|
|
|
|
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
|
206
|
|
|
|
|
|
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
|
207
|
|
|
|
|
|
|
IN NO EVENT SHALL NTT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
208
|
|
|
|
|
|
|
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
209
|
|
|
|
|
|
|
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
210
|
|
|
|
|
|
|
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
211
|
|
|
|
|
|
|
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
212
|
|
|
|
|
|
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
213
|
|
|
|
|
|
|
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
214
|
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
=cut |