Click here to Skip to main content
Click here to Skip to main content

Fast Simple Secure Encryption Routine

By , 28 Jul 2002
Rate this:
Please Sign up or sign in to vote.
<!-- Add the rest of your HTML here -->

Introduction

This Crypt routine uses an algorithm created by Rodney Thayer. This algorithm can use keys of various sizes. With a 40-bit key (5 characters) it can be freely exported from the U.S. The cipher is considered robust with 128 bits of key material but can use up to 2048 bits. It is compatible with RSA’s RC4 algorithm.

void Crypt(TCHAR *inp, DWORD inplen, TCHAR* key = "", DWORD keylen = 0)
{
    //we will consider size of sbox 256 bytes
    //(extra byte are only to prevent any mishep just in case)
    TCHAR Sbox[257], Sbox2[257];
    unsigned long i, j, t, x;

    //this unsecured key is to be used only when there is no input key from user
    static const TCHAR  OurUnSecuredKey[] = "www.systweak.com" ;
    static const int OurKeyLen = _tcslen(OurUnSecuredKey);    
    TCHAR temp , k;
    i = j = k = t =  x = 0;
    temp = 0;

    //always initialize the arrays with zero
    ZeroMemory(Sbox, sizeof(Sbox));
    ZeroMemory(Sbox2, sizeof(Sbox2));

    //initialize sbox i
    for(i = 0; i < 256U; i++)
    {
        Sbox[i] = (TCHAR)i;
    }

    j = 0;
    //whether user has sent any inpur key
    if(keylen)
    {
        //initialize the sbox2 with user key
        for(i = 0; i < 256U ; i++)
        {
            if(j == keylen)
            {
                j = 0;
            }
            Sbox2[i] = key[j++];
        }    
    }
    else
    {
        //initialize the sbox2 with our key
        for(i = 0; i < 256U ; i++)
        {
            if(j == OurKeyLen)
            {
                j = 0;
            }
            Sbox2[i] = OurUnSecuredKey[j++];
        }
    }

    j = 0 ; //Initialize j
    //scramble sbox1 with sbox2
    for(i = 0; i < 256; i++)
    {
        j = (j + (unsigned long) Sbox[i] + (unsigned long) Sbox2[i]) % 256U ;
        temp =  Sbox[i];                    
        Sbox[i] = Sbox[j];
        Sbox[j] =  temp;
    }

    i = j = 0;
    for(x = 0; x < inplen; x++)
    {
        //increment i
        i = (i + 1U) % 256U;
        //increment j
        j = (j + (unsigned long) Sbox[i]) % 256U;

        //Scramble SBox #1 further so encryption routine will
        //will repeat itself at great interval
        temp = Sbox[i];
        Sbox[i] = Sbox[j] ;
        Sbox[j] = temp;

        //Get ready to create pseudo random  byte for encryption key
        t = ((unsigned long) Sbox[i] + (unsigned long) Sbox[j]) %  256U ;

        //get the random byte
        k = Sbox[t];

        //xor with the data and done
        inp[x] = (inp[x] ^ k);
    }    
}

The only moral here is that we are generating a 256 bit key given from the user. To encrypt we always pick a random byte from the key and encrypt the text with that key. If we have a large pattern of repeating text with this algorithm the key repeat interval (distance between n repetitions) will be approximately of 21700 (2 to the 1700th power).

For very good security I recommend using 128 bits (16 characters) of key material. If you want optimal security you could use 2048 bits (256 characters) of key material (but this is usually considered an overkill).

This routine is constructed from a draft taken from Internet Engineering Task Force (IETF) at http://www.ietf.cnri.reston.va.us/home.htm

I have tested the routine on a 27 MB file to test that it produce valid decrypted output from input and get the valid results.

Using this routine it is fairly simple.

//to encrypt a text
TCHAR HelloCrypt[] = "Hello Crypt";

//we do not enter the key so we will be using default key provide by the crypt 
//routine
Crypt(HelloCrypt, _tcslen(HelloCrypt));

//now to decrypt
Crypt(HelloCrypt, _tcslen(HelloCrypt));

////////////////////////////////////////////////////////////////////////////////
//if we have to supply a key we have to use crypt as follows
TCHAR Data[] = "abcdefghijklmnopqrstuvwxyz"
TCHAR Key[] = "Strong key";

//Encrypt
Crypt(Data, _tcslen(Data), Key, _tcslen(Data));

//Decrypt
Crypt(Data, _tcslen(Data), Key, _tcslen(Data));
/////////////////////////////////////////////////////////////////////////////

//thats all

Please visit My Web Site for more tutorials, tweaks, reference.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

About the Author

Shrishail Rana

United States United States
No Biography provided

Comments and Discussions

 
QuestionHere a C# version PinmemberAticAtac17-Jun-13 2:45 
Questionelliptical cryptography encryption and decryption process Pinmemberbaludegala30-Sep-11 3:05 
Generalimplementation of RSA algorithm in c/c++ PinmemberAnuradha Sehgal11-Mar-07 22:35 
Questionit combine symmetric,asymmetric and hash encryption techniquesneed RSA algorithm in java PinmemberMember #369036712-Jan-07 21:06 
GeneralElliptical Curve Cryptography PinmemberVPNampoothiri19-Mar-06 19:45 
GeneralNeed help PinmemberZDurrani30-Jun-05 22:03 
GeneralImplementation of RSA algorithm in C/C++ Pinmembersyedmfaisal30-Dec-03 20:56 
GeneralProblem with code PinmemberAl Newton27-Nov-02 12:21 
GeneralRe: Problem with code PinsussAnonymous23-Dec-02 18:58 
GeneralRe: Problem with code PinsussPeter, The Pumpkin Eater24-Dec-02 7:33 
GeneralRe: Problem with code PinsussFiffi_27-Feb-04 11:30 
GeneralRe: Problem with code PinmemberPeter, The Pumpkin Eater1-Mar-04 8:44 
GeneralRe: Problem with code PinmembershankarR9-Sep-04 10:18 
GeneralRe: Problem with code PinsussAnonymous8-Oct-04 20:37 
GeneralRe: Problem with code PinmembershankarR11-Oct-04 3:18 
GeneralRe: Problem with code PinmemberAndy Medi4-Jun-11 7:55 
GeneralSlightly Confused PinsussAnonymous31-Oct-02 12:21 
GeneralRe: Slightly Confused Pinmembercodermallu27-Mar-03 2:28 
Generalhow Pinmembershotgun14-Sep-02 5:45 
Generalsimpler.... PinsussAnonymous24-Aug-02 19:08 
GeneralSmall bug in example code PinsussAnonymous8-Aug-02 9:45 
GeneralRC4 is not a good choice PinmemberCarl Berg30-Jul-02 4:52 
GeneralRe: RC4 is not a good choice PinmemberSwinefeaster5-Aug-02 13:13 
GeneralRe: RC4 is not a good choice PinmemberDaniel Madden5-Aug-02 21:27 
GeneralRe: RC4 is not a good choice PinmemberCarl Berg6-Aug-02 1:15 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.

| Advertise | Privacy | Mobile
Web03 | 2.8.140415.2 | Last Updated 29 Jul 2002
Article Copyright 2002 by Shrishail Rana
Everything else Copyright © CodeProject, 1999-2014
Terms of Use
Layout: fixed | fluid