zoukankan      html  css  js  c++  java
  • Security and Cryptography in Python

    Security and Cryptography in Python - One Time Pad

    XOR Example
    def xor(x, s):
        print(x, 'xor', s, '=', x^s)
    
    def xorb(x, s):
        print(bin(x), 'xor', bin(s), '=', bin(x^s))
    
    xor(4, 8)
    xorb(4, 8)
    xor(4, 4)
    xorb(4, 4)
    xor(255, 1)
    xorb(255, 1)
    xor(255, 128)
    xorb(255, 128)
    

    Running Result:

    image-20210206110628193

    What is One Time Pad?

    Encryption: message^key(random) = cipher

    Decryption: cipher^key(random) = message

    import random
    
    def generate_key_stream(n):
        return bytes(random.randrange(0, 256) for i in range(n))
    
    def xor_bytes(key_stream, message):
        length = min(len(key_stream), len(message))
        return bytes([key_stream[i]^ message[i] for i in range(length)])
    
    message = "YOU ARE AWESOME"
    message = message.encode()
    key_stream = generate_key_stream(len(message))
    cipher = xor_bytes(key_stream, message)
    print(key_stream)
    print(cipher)
    print(xor_bytes(key_stream, cipher))
    

    Running Result:

    image-20210206122447248

    One Time Pad - Security

    The One Time Pad is unbreakable

    Requirements:

    • Key stream only used once
    • Key stream only know by sender and receiver
    • Key stream is generated by true randomness

    Why can't One Time Pad be Broken?

    You can decrypted to any plaintext available in the universe with that length.

    import random
    
    def generate_key_stream(n):
        return bytes(random.randrange(0, 256) for i in range(n))
    
    def xor_bytes(key_stream, message):
        length = min(len(key_stream), len(message))
        return bytes([key_stream[i]^ message[i] for i in range(length)])
    
    # this is done by your enemy
    message = "DO ATTACK"
    message = message.encode()
    key_stream = generate_key_stream(len(message))
    cipher = xor_bytes(key_stream, message)
    
    # this is us trying to break it
    print(cipher)
    message = "NO ATTACK"
    message = message.encode()
    guess_key_stream = xor_bytes(message, cipher)
    print(xor_bytes(guess_key_stream, cipher))
    

    Running Result:

    image-20210206124345742

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    课程作业03-1
    课程作业02
    课程作业01:模仿JavaAppArguments.java示例,编写一个程序,此程序从命令行接收多个数字,求和之后输出结果。
    《大道至简》第一章读后感,伪代码
    《美国教授写给被开除中国留学生的信》阅读笔记
    《大道至简》读后感
    《需求工程——软件建模与分析》阅读笔记02
    《需求工程——软件建模与分析》阅读笔记01
    微信小游戏开发笔记03
    微信小游戏开发笔记02
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/14381187.html
Copyright © 2011-2022 走看看