aboutsummaryrefslogtreecommitdiff
path: root/works/life/information-security-experiment
diff options
context:
space:
mode:
Diffstat (limited to 'works/life/information-security-experiment')
-rw-r--r--works/life/information-security-experiment/.gitignore2
-rw-r--r--works/life/information-security-experiment/CMakeLists.txt19
-rw-r--r--works/life/information-security-experiment/des.cpp80
-rw-r--r--works/life/information-security-experiment/md5.cpp25
-rw-r--r--works/life/information-security-experiment/rsa.cpp65
5 files changed, 0 insertions, 191 deletions
diff --git a/works/life/information-security-experiment/.gitignore b/works/life/information-security-experiment/.gitignore
deleted file mode 100644
index 7194ea7..0000000
--- a/works/life/information-security-experiment/.gitignore
+++ /dev/null
@@ -1,2 +0,0 @@
-.cache
-build
diff --git a/works/life/information-security-experiment/CMakeLists.txt b/works/life/information-security-experiment/CMakeLists.txt
deleted file mode 100644
index f44e2f1..0000000
--- a/works/life/information-security-experiment/CMakeLists.txt
+++ /dev/null
@@ -1,19 +0,0 @@
-cmake_minimum_required(VERSION 3.20)
-
-set(CMAKE_TOOLCHAIN_FILE $ENV{VCPKG_INSTALLATION_ROOT}/scripts/buildsystems/vcpkg.cmake
- CACHE STRING "Vcpkg toolchain file")
-
-project(information-security-experiment)
-
-set(CMAKE_CXX_STANDARD 20)
-
-find_package(OpenSSL REQUIRED)
-
-add_executable(des des.cpp)
-target_link_libraries(des PRIVATE OpenSSL::Crypto)
-
-add_executable(md5 md5.cpp)
-target_link_libraries(md5 PRIVATE OpenSSL::Crypto)
-
-add_executable(rsa rsa.cpp)
-target_link_libraries(rsa PRIVATE OpenSSL::Crypto)
diff --git a/works/life/information-security-experiment/des.cpp b/works/life/information-security-experiment/des.cpp
deleted file mode 100644
index 93a6ea3..0000000
--- a/works/life/information-security-experiment/des.cpp
+++ /dev/null
@@ -1,80 +0,0 @@
-#include <openssl/des.h>
-#include <openssl/evp.h>
-
-#include <cstdlib>
-#include <iomanip>
-#include <iostream>
-
-void PrintCblock(const DES_cblock &b, bool end_line = true) {
- std::cout << std::hex << std::right << std::setfill('0');
-
- for (auto c : b) {
- std::cout << std::setw(2) << static_cast<int>(c);
- }
-
- if (end_line) {
- std::cout << std::endl;
- }
-}
-
-int main() {
- auto cipher = EVP_des_cfb();
-
- std::cout << "Selected cipher: des_cfb" << std::endl;
-
- auto key_length = EVP_CIPHER_key_length(cipher);
- std::cout << "Key length: " << key_length << std::endl;
-
- auto iv_length = EVP_CIPHER_iv_length(cipher);
- std::cout << "IV length: " << iv_length << std::endl;
-
- auto block_length = EVP_CIPHER_block_size(cipher);
- std::cout << "Block length: " << block_length << std::endl;
-
- DES_cblock key;
-
- std::srand(std::time(nullptr));
-
- std::cout << std::hex << std::setfill('0');
-
- if (DES_random_key(&key) == 0) {
- std::cerr << "Failed to generate key." << std::endl;
- return 1;
- } else {
- std::cout << "Succeeded to generate key." << std::endl;
- std::cout << "Key: ";
- PrintCblock(key);
- }
-
- DES_key_schedule key_schedule;
-
- {
- auto result = DES_set_key_checked(&key, &key_schedule);
-
- if (result == -1) {
- std::cerr << "Parity is wrong." << std::endl;
- return 1;
- } else if (result == -2) {
- std::cerr << "Key is too weak." << std::endl;
- }
- }
-
- DES_cblock clear_text = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08};
-
- std::cout << "Clear text: " << std::hex;
- PrintCblock(clear_text);
-
- DES_cblock cipher_text;
-
- DES_ecb_encrypt(&clear_text, &cipher_text, &key_schedule, 1);
-
- std::cout << "Cipher text after encrypted: " << std::hex;
- PrintCblock(cipher_text);
-
- DES_ecb_encrypt(&cipher_text, &clear_text, &key_schedule, 0);
-
- std::cout << "Clear text after decrypted: " << std::hex;
- PrintCblock(clear_text);
-
- return 0;
-}
diff --git a/works/life/information-security-experiment/md5.cpp b/works/life/information-security-experiment/md5.cpp
deleted file mode 100644
index 9714127..0000000
--- a/works/life/information-security-experiment/md5.cpp
+++ /dev/null
@@ -1,25 +0,0 @@
-#include <openssl/evp.h>
-
-#include <iomanip>
-#include <iostream>
-
-int main() {
- EVP_MD_CTX *ctx = EVP_MD_CTX_create();
- EVP_DigestInit_ex(ctx, EVP_md5(), NULL);
-
- EVP_DigestUpdate(ctx, "abc", 3);
-
- unsigned char digest[EVP_MAX_MD_SIZE];
- unsigned int digest_size;
- EVP_DigestFinal_ex(ctx, digest, &digest_size);
-
- EVP_MD_CTX_destroy(ctx);
-
- std::cout << "MD5 digest of 'abc' is: " << std::hex << std::setfill('0');
- for (unsigned int i = 0; i < digest_size; i++) {
- std::cout << std::setw(2) << (int)digest[i];
- }
- std::cout << std::endl;
-
- return 0;
-}
diff --git a/works/life/information-security-experiment/rsa.cpp b/works/life/information-security-experiment/rsa.cpp
deleted file mode 100644
index 5b88284..0000000
--- a/works/life/information-security-experiment/rsa.cpp
+++ /dev/null
@@ -1,65 +0,0 @@
-#include <openssl/evp.h>
-#include <openssl/rsa.h>
-
-#include <iomanip>
-#include <iostream>
-#include <vector>
-
-int main() {
-
- auto ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr);
- EVP_PKEY *pkey = NULL;
- EVP_PKEY_keygen_init(ctx);
- EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 2048);
- EVP_PKEY_keygen(ctx, &pkey);
- EVP_PKEY_CTX_free(ctx);
- ctx = nullptr;
-
- unsigned char cleartext[] = "abc";
- int cleartext_size = sizeof(cleartext) / sizeof(cleartext[0]);
-
- EVP_MD_CTX *md_ctx = EVP_MD_CTX_create();
- EVP_DigestInit_ex(md_ctx, EVP_sha256(), NULL);
- EVP_DigestUpdate(md_ctx, cleartext, cleartext_size);
- unsigned char digest[EVP_MAX_MD_SIZE];
- unsigned int digest_size;
- EVP_DigestFinal_ex(md_ctx, digest, &digest_size);
- EVP_MD_CTX_destroy(md_ctx);
- md_ctx = nullptr;
- std::cout << "SHA256 digest of 'abc' is: " << std::hex << std::setfill('0');
- for (unsigned int i = 0; i < digest_size; i++) {
- std::cout << std::setw(2) << (int)digest[i];
- }
- std::cout << std::endl;
-
- std::vector<unsigned char> sig;
- size_t sig_len;
-
- ctx = EVP_PKEY_CTX_new(pkey, nullptr);
- EVP_PKEY_sign_init(ctx);
- EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING);
- EVP_PKEY_sign(ctx, nullptr, &sig_len, digest, digest_size);
- sig.resize(sig_len);
- EVP_PKEY_sign(ctx, sig.data(), &sig_len, digest, digest_size);
- EVP_PKEY_CTX_free(ctx);
-
- std::cout << "Signature: " << std::hex << std::setfill('0');
- for (auto c : sig) {
- std::cout << std::setw(2) << static_cast<int>(c);
- }
- std::cout << std::endl;
-
- ctx = EVP_PKEY_CTX_new(pkey, nullptr);
- EVP_PKEY_verify_init(ctx);
- EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING);
- auto result = EVP_PKEY_verify(ctx, sig.data(), sig_len, digest, digest_size);
- if (result == 1) {
- std::cout << "Verification succeeded." << std::endl;
- } else if (result == 0) {
- std::cout << "Verification failed." << std::endl;
- } else {
- std::cerr << "Verification error." << std::endl;
- }
-
- return 0;
-} \ No newline at end of file