import matplotlib.pyplot as pyplot
import numpy as np
from scipy.stats import pearsonr
import random
from operator import xor
# Fast implementation of the Hamming weight for 64 bit values
# See book: A Hacker's delight
# not sure if the hamming weight model w0rks for Speck
def popcount(x):
x -= (x >> 1) & 0x5555555555555555
x = (x & 0x3333333333333333) + ((x >> 2) & 0x3333333333333333)
x = (x + (x >> 4)) & 0x0f0f0f0f0f0f0f0f
return ((x * 0x0101010101010101) & 0xffffffffffffffff ) >> 56
import math
NUM_ROUNDS = 22
BLOCK_SIZE = 32
KEY_SIZE = 64
WORD_SIZE = 16
# SHIFTs for SPECK
ALPHA = 7
BETA = 2
mod_mask = (2 ** WORD_SIZE) -1
mod_mask_sub = (2 ** WORD_SIZE)
'''
Converts a bytestring `0xdeadbeef` to a array of 16-byte integers (len: 4)
'''
def bytesToWords16(b):
return [(b >> (x * WORD_SIZE)) & mod_mask for x in
range(0, math.ceil(KEY_SIZE // WORD_SIZE))]
'''
The 16bit Speck roundfunction, this is where the magic happens
'''
def ER16(x, y, k):
rs_x = ((x << (16 - ALPHA)) + (x >> ALPHA)) & mod_mask
add_sxy = (rs_x + y) & mod_mask
new_x = k ^ add_sxy
ls_y = ((y >> (16 - BETA)) + (y << BETA)) & mod_mask
new_y = new_x ^ ls_y
return new_x, new_y
key = 0x0102030405060708
Key = bytesToWords16(key)
'''
The 16 bit python key schedule
void Speck128256KeySchedule(u64 K[],u64 rk[])
{
u64 i,D=K[3],C=K[2],B=K[1],A=K[0];
for(i=0;i<33;){
rk[i]=A; ER64(B,A,i++);
rk[i]=A; ER64(C,A,i++);
rk[i]=A; ER64(D,A,i++);
}
rk[i]=A;
}
'''
def key_schedule(k):
D=k[3]
C=k[2]
B=k[1]
A=k[0]
out = []
i = 0
while i < 21:
out.append(A)
B, A = ER16(B, A, i)
i += 1
out.append(A)
C, A = ER16(C, A, i)
i+= 1
out.append(A)
D, A = ER16(D, A, i)
i+= 1
out.append(A)
return out
'''
Simple encryption for speck (only the encryption part, without key scheduling)
void Speck128256Encrypt(u64 Pt[],u64 Ct[],u64 rk[])
{
u64 i;
Ct[0]=Pt[0]; Ct[1]=Pt[1];
for(i=0;i<34;) ER64(Ct[1],Ct[0],rk[i++]);
}
'''
def simple_speck(plaintext, key):
Ct_0 = plaintext[0]
Ct_1 = plaintext[1]
for i in range(34):
Ct_1, Ct_0 = ER16(Ct_1, Ct_0, key) # fixed 16 bit key of 0x55
return (Ct_1 << WORD_SIZE) + Ct_0
assert key_schedule(Key) == [0x708,0xf32, 0x2bf1,0x8035,0xa48e,0x8482, 0x74ee, 0xf589, 0xb396, 0xb231, 0xdab2, 0x57bc, 0x704e,0x9947,0xe2d2, 0xea6a, 0x4ebe, 0xdd24, 0x6b64, 0x3ab1, 0x1c57, 0x7bde]
ciphertext = simple_speck([0xdead, 0xbeef], 0x55)
# over simplified Speck encryption (no key schedule)
print(hex(ciphertext))
0x6c1a1f2f
num_traces = 1000
key_space = 256
traces = np.empty(num_traces)
hw_traces = np.empty((key_space, num_traces))
for i in range(0,num_traces):
plaintext = [(i**2) % 0xFFFF, i % 0xFFFF]
traces[i] = popcount(simple_speck(plaintext, 0x69))
for key in range(0, key_space):
hw_traces[key][i] = simple_speck(plaintext, key)
corr = np.empty(key_space)
#compute pearson correlation for each key
for key in range(0, key_space):
corr[key],p = pearsonr(hw_traces[key], traces)
pyplot.plot(corr)
pyplot.show()
print("Correct 8-bit key is: " + hex(np.argmax(corr)))
Correct 8-bit key is: 0x69