mirror of
https://github.com/TheAlgorithms/Python.git
synced 2024-11-24 05:21:09 +00:00
61f3119467
* f-string update rsa_cipher.py * f-string update rsa_key_generator.py * f-string update burrows_wheeler.py * f-string update non_recursive_segment_tree.py * f-string update red_black_tree.py * f-string update deque_doubly.py * f-string update climbing_stairs.py * f-string update iterating_through_submasks.py * f-string update knn_sklearn.py * f-string update 3n_plus_1.py * f-string update quadratic_equations_complex_numbers.py * f-string update nth_fibonacci_using_matrix_exponentiation.py * f-string update sherman_morrison.py * f-string update levenshtein_distance.py * fix lines that were too long
152 lines
4.7 KiB
Python
152 lines
4.7 KiB
Python
import os
|
|
import sys
|
|
|
|
from . import rsa_key_generator as rkg
|
|
|
|
DEFAULT_BLOCK_SIZE = 128
|
|
BYTE_SIZE = 256
|
|
|
|
|
|
def main():
|
|
filename = "encrypted_file.txt"
|
|
response = input(r"Encrypt\Decrypt [e\d]: ")
|
|
|
|
if response.lower().startswith("e"):
|
|
mode = "encrypt"
|
|
elif response.lower().startswith("d"):
|
|
mode = "decrypt"
|
|
|
|
if mode == "encrypt":
|
|
if not os.path.exists("rsa_pubkey.txt"):
|
|
rkg.makeKeyFiles("rsa", 1024)
|
|
|
|
message = input("\nEnter message: ")
|
|
pubKeyFilename = "rsa_pubkey.txt"
|
|
print("Encrypting and writing to %s..." % (filename))
|
|
encryptedText = encryptAndWriteToFile(filename, pubKeyFilename, message)
|
|
|
|
print("\nEncrypted text:")
|
|
print(encryptedText)
|
|
|
|
elif mode == "decrypt":
|
|
privKeyFilename = "rsa_privkey.txt"
|
|
print("Reading from %s and decrypting..." % (filename))
|
|
decryptedText = readFromFileAndDecrypt(filename, privKeyFilename)
|
|
print("writing decryption to rsa_decryption.txt...")
|
|
with open("rsa_decryption.txt", "w") as dec:
|
|
dec.write(decryptedText)
|
|
|
|
print("\nDecryption:")
|
|
print(decryptedText)
|
|
|
|
|
|
def getBlocksFromText(message: int, blockSize: int = DEFAULT_BLOCK_SIZE) -> [int]:
|
|
messageBytes = message.encode("ascii")
|
|
|
|
blockInts = []
|
|
for blockStart in range(0, len(messageBytes), blockSize):
|
|
blockInt = 0
|
|
for i in range(blockStart, min(blockStart + blockSize, len(messageBytes))):
|
|
blockInt += messageBytes[i] * (BYTE_SIZE ** (i % blockSize))
|
|
blockInts.append(blockInt)
|
|
return blockInts
|
|
|
|
|
|
def getTextFromBlocks(
|
|
blockInts: [int], messageLength: int, blockSize: int = DEFAULT_BLOCK_SIZE
|
|
) -> str:
|
|
message = []
|
|
for blockInt in blockInts:
|
|
blockMessage = []
|
|
for i in range(blockSize - 1, -1, -1):
|
|
if len(message) + i < messageLength:
|
|
asciiNumber = blockInt // (BYTE_SIZE ** i)
|
|
blockInt = blockInt % (BYTE_SIZE ** i)
|
|
blockMessage.insert(0, chr(asciiNumber))
|
|
message.extend(blockMessage)
|
|
return "".join(message)
|
|
|
|
|
|
def encryptMessage(
|
|
message: str, key: (int, int), blockSize: int = DEFAULT_BLOCK_SIZE
|
|
) -> [int]:
|
|
encryptedBlocks = []
|
|
n, e = key
|
|
|
|
for block in getBlocksFromText(message, blockSize):
|
|
encryptedBlocks.append(pow(block, e, n))
|
|
return encryptedBlocks
|
|
|
|
|
|
def decryptMessage(
|
|
encryptedBlocks: [int],
|
|
messageLength: int,
|
|
key: (int, int),
|
|
blockSize: int = DEFAULT_BLOCK_SIZE,
|
|
) -> str:
|
|
decryptedBlocks = []
|
|
n, d = key
|
|
for block in encryptedBlocks:
|
|
decryptedBlocks.append(pow(block, d, n))
|
|
return getTextFromBlocks(decryptedBlocks, messageLength, blockSize)
|
|
|
|
|
|
def readKeyFile(keyFilename: str) -> (int, int, int):
|
|
with open(keyFilename) as fo:
|
|
content = fo.read()
|
|
keySize, n, EorD = content.split(",")
|
|
return (int(keySize), int(n), int(EorD))
|
|
|
|
|
|
def encryptAndWriteToFile(
|
|
messageFilename: str,
|
|
keyFilename: str,
|
|
message: str,
|
|
blockSize: int = DEFAULT_BLOCK_SIZE,
|
|
) -> str:
|
|
keySize, n, e = readKeyFile(keyFilename)
|
|
if keySize < blockSize * 8:
|
|
sys.exit(
|
|
"ERROR: Block size is %s bits and key size is %s bits. The RSA cipher "
|
|
"requires the block size to be equal to or greater than the key size. "
|
|
"Either decrease the block size or use different keys."
|
|
% (blockSize * 8, keySize)
|
|
)
|
|
|
|
encryptedBlocks = encryptMessage(message, (n, e), blockSize)
|
|
|
|
for i in range(len(encryptedBlocks)):
|
|
encryptedBlocks[i] = str(encryptedBlocks[i])
|
|
encryptedContent = ",".join(encryptedBlocks)
|
|
encryptedContent = f"{len(message)}_{blockSize}_{encryptedContent}"
|
|
with open(messageFilename, "w") as fo:
|
|
fo.write(encryptedContent)
|
|
return encryptedContent
|
|
|
|
|
|
def readFromFileAndDecrypt(messageFilename: str, keyFilename: str) -> str:
|
|
keySize, n, d = readKeyFile(keyFilename)
|
|
with open(messageFilename) as fo:
|
|
content = fo.read()
|
|
messageLength, blockSize, encryptedMessage = content.split("_")
|
|
messageLength = int(messageLength)
|
|
blockSize = int(blockSize)
|
|
|
|
if keySize < blockSize * 8:
|
|
sys.exit(
|
|
"ERROR: Block size is %s bits and key size is %s bits. The RSA cipher "
|
|
"requires the block size to be equal to or greater than the key size. "
|
|
"Did you specify the correct key file and encrypted file?"
|
|
% (blockSize * 8, keySize)
|
|
)
|
|
|
|
encryptedBlocks = []
|
|
for block in encryptedMessage.split(","):
|
|
encryptedBlocks.append(int(block))
|
|
|
|
return decryptMessage(encryptedBlocks, messageLength, (n, d), blockSize)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|