Please look at magma_samples
let mut magma = Magma::new();
let cipher_key: [u32;8] = [
0xffeeddcc, 0xbbaa9988, 0x77665544, 0x33221100, 0xf0f1f2f3, 0xf4f5f6f7, 0xf8f9fafb, 0xfcfdfeff
];
magma.set_key(&cipher_key);
let source = 0xfedcba9876543210_u64;
println!("Source block: {:x}", source);
let encrypted = magma.encrypt(source);
println!("Encrypted ciphertext: {:x}", encrypted);
let decrypted = magma.decrypt(encrypted);
println!("Decrypted block: {:x}", decrypted);
assert_eq!(decrypted, source);
Output:
Source block: fedcba9876543210
Encrypted ciphertext: 4ee901e5c2d8ca3d
Decrypted block: fedcba9876543210
let cipher_mode = CipherMode::CFB;
let source_text = "Lorem ipsum dolor sit amet, consectetur adipiscing elit. \
Aenean ac sem leo. Morbi pretium neque eget felis finibus convallis. \
Praesent tristique rutrum odio at rhoncus. Duis non ligula ut diam tristique commodo. \
Phasellus vel ex nec leo pretium efficitur. Aliquam malesuada vestibulum magna. \
Quisque iaculis est et est volutpat posuere.";
println!("Source text:\n{}\n", source_text);
let source_bytes = source_text.as_bytes();
let cipher_key: [u32;8] = [
0xffeeddcc, 0xbbaa9988, 0x77665544, 0x33221100, 0xf0f1f2f3, 0xf4f5f6f7, 0xf8f9fafb, 0xfcfdfeff
];
let mut magma = Magma::with_key(&cipher_key);
let initialization_vector = [0x1234567890abcdef_u64, 0x234567890abcdef1_u64];
magma.set_iv(&initialization_vector);
let encrypted = magma.cipher(source_bytes, &CipherOperation::Encrypt, &cipher_mode);
println!("Encrypted ciphertext:\n{:x?}\n", encrypted);
let mut decrypted = magma.cipher(&encrypted, &CipherOperation::Decrypt, &cipher_mode);
if Magma::require_padding(&cipher_mode)
{
// remove padding bytes
decrypted.truncate(source_bytes.len());
}
let decrypted_text = String::from_utf8(decrypted).unwrap();
println!("Decrypted text:\n{}\n", decrypted_text);
assert_eq!(decrypted_text, source_text);
Output:
Source text:
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean ac sem leo. Morbi pretium neque eget felis finibus convallis. Praesent tristique rutrum odio at rhoncus. Duis non ligula ut diam tristique commodo. Phasellus vel ex nec leo pretium efficitur. Aliquam malesuada vestibulum magna. Quisque iaculis est et est volutpat posuere.
Encrypted ciphertext:
[5, 86, 62, ec, 37, a3, 5f, aa, a5, 67, ce, 68, 83, ed, f9, d3, de, 9a, bd, 97, b0, f7, 8b, af, b8, cd, 3, 7f, 4c, ed, 4b, fe, d5, c0, a9, 65, 55, de, ca, 6c, 1c, 28, 38, fb, a4, 93, d0, 24, 86, d0, 7f, dd, ea, d4, 36, 16, 3d, c0, 9, da, 65, a, ec, 2, 3c, 1b, 1b, c6, f8, dc, 5c, 93, 23, e5, 33, 8c, 5c, 1e, dd, 59, b0, 6e, 8c, c, 8, d2, a1, 38, f5, 7c, 93, ff, d8, c2, f8, 1d, 5d, 30, 69, 22, a2, 2c, 1d, 26, 36, e7, 1f, f4, 6, b5, b, ef, 18, 13, 69, b1, e2, 12, c0, 20, e1, d7, 45, 28, a6, c, 46, 67, 9f, 27, dd, 7c, bd, 3b, 19, 8, 16, 3c, 1a, 13, 11, f2, c0, 44, 66, 5d, a1, 24, c1, ca, f9, d, 70, 3e, ea, ac, 8f, a7, 65, e3, bb, 8d, 80, 2f, fd, fa, be, 36, 90, e2, c, b0, 5f, 74, 4b, 38, 7c, bb, 9c, 58, 6d, 15, fc, 80, 16, 4d, b5, 4a, 37, 32, 6, d6, a2, 6c, 44, 69, 64, 83, b8, 31, 31, 9, 16, 68, f3, 7a, f5, 97, 99, c9, 38, e6, 5d, f0, d7, 18, 91, e5, b1, 71, d4, 23, 68, 9e, 2d, d0, d7, f7, f0, 89, c7, dc, 87, 72, fd, e8, e0, 40, d, 1b, 68, 7b, 13, 0, 8a, 52, af, 25, f3, ce, e4, cc, e3, 75, 70, 9a, 67, 41, 83, 37, d9, a, 5e, cb, b9, a7, 4a, 3, 27, b6, a, 70, 91, 26, d7, 1c, 15, 98, 75, 49, 32, d7, 30, 1c, 8d, 6d, 95, a1, e8, b2, b1, 7, 3e, 76, f0, b3, c4, 45, 65, 7b, ee, c4, 7b, ed, a9, f7, af, 97, 5e, a9, 27, c, 4a, 51, ce, e8, b9, 1a, 8c, ce, 36, d2, e6, e7, 57, bc, cf, 5d, 68, f, cb, f3, 92, e5, 23, 7e]
Decrypted text:
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean ac sem leo. Morbi pretium neque eget felis finibus convallis. Praesent tristique rutrum odio at rhoncus. Duis non ligula ut diam tristique commodo. Phasellus vel ex nec leo pretium efficitur. Aliquam malesuada vestibulum magna. Quisque iaculis est et est volutpat posuere.
let security_key: [u32;8] = [
0xffeeddcc, 0xbbaa9988, 0x77665544, 0x33221100, 0xf0f1f2f3, 0xf4f5f6f7, 0xf8f9fafb, 0xfcfdfeff
];
println!("Security key:\n{:x?}\n", security_key);
let message = [
0x92, 0xde, 0xf0, 0x6b, 0x3c, 0x13, 0x0a, 0x59,
0xdb, 0x54, 0xc7, 0x04, 0xf8, 0x18, 0x9d, 0x20,
0x4a, 0x98, 0xfb, 0x2e, 0x67, 0xa8, 0x02, 0x4c,
0x89, 0x12, 0x40, 0x9b, 0x17, 0xb5, 0x7e, 0x41
];
println!("Message:\n{:x?}\n", message);
let mut magma = Magma::with_key(&security_key);
let mac = magma.cipher_mac(&message);
println!("Generated MAC:\n{:x}\n", mac);
Output:
Security key:
[ffeeddcc, bbaa9988, 77665544, 33221100, f0f1f2f3, f4f5f6f7, f8f9fafb, fcfdfeff]
Message:
[92, de, f0, 6b, 3c, 13, a, 59, db, 54, c7, 4, f8, 18, 9d, 20, 4a, 98, fb, 2e, 67, a8, 2, 4c, 89, 12, 40, 9b, 17, b5, 7e, 41]
Generated MAC:
154e7210