Block Cipher "Magma" (GOST R 34.12-2015, former GOST 28147-89)

crates.io docs build & test MIT

Supported Cipher Modes

Implemented and tested according to specifications

Tests are implemented using: crypto_vectors

Tested on platforms

  1. Linux Ubuntu 22.04 LTS / Intel® Core™ i7
  2. MacOS Ventura 13.4 / Apple Macbook Pro M1

Usage

Please look at magma_samples

Block encryption sample: encrypt_block.rs

```rust use cipher_magma::Magma;

let key: [u32; 8] = [ 0xffeeddcc, 0xbbaa9988, 0x77665544, 0x33221100, 0xf0f1f2f3, 0xf4f5f6f7, 0xf8f9fafb, 0xfcfdfeff, ]; println!("Key:\n{:x?}\n", key); let magma = Magma::with_key(key);

let source = 0xfedcba9876543210_u64; println!("Source:\n{:x}\n", source);

let encrypted = magma.encrypt(source); println!("Encrypted:\n{:x}\n", encrypted);

let decrypted = magma.decrypt(encrypted); println!("Decrypted:\n{:x}", decrypted);

assert_eq!(decrypted, source);

```

Text encryption sample: encrypt_text.rs

```rust use cipher_magma::{CipherMode, CipherOperation, Magma};

let cipher_mode = CipherMode::CFB;

let key = [0xab; 32]; println!("Key:\n{:x?}\n", key); let mut magma = Magma::with_key(key);

let source = b"Lorem ipsum dolor sit amet, consectetur adipiscing elit. \ Aenean ac sem leo. Morbi pretium neque eget felis finibus convallis. \ Praesent tristique rutrum odio at rhoncus. Duis non ligula ut diam tristique commodo. \ Phasellus vel ex nec leo pretium efficitur. Aliquam malesuada vestibulum magna. \ Quisque iaculis est et est volutpat posuere.";

println!("Source:\n{}\n", String::fromutf8(source.tovec()).unwrap());

let encrypted = magma.cipher(source, &CipherOperation::Encrypt, &cipher_mode); println!("Encrypted:\n{:02x?}\n", encrypted);

let mut decrypted = magma.cipher(&encrypted, &CipherOperation::Decrypt, &cipher_mode);

if ciphermode.haspadding() { // remove padding bytes decrypted.truncate(source.len()); }

asserteq!(decrypted, source); println!("Decrypted:\n{}\n", String::fromutf8(decrypted).unwrap()); ```

Message Authentication Code (MAC) sample: calculate_mac.rs

```rust use cipher_magma::{mac, Magma};

let key: [u8; 32] = [ 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, ]; println!("Key:\n{:x?}\n", key); let mut magma = Magma::with_key(key);

let message = [ 0x92, 0xde, 0xf0, 0x6b, 0x3c, 0x13, 0x0a, 0x59, 0xdb, 0x54, 0xc7, 0x04, 0xf8, 0x18, 0x9d, 0x20, 0x4a, 0x98, 0xfb, 0x2e, 0x67, 0xa8, 0x02, 0x4c, 0x89, 0x12, 0x40, 0x9b, 0x17, 0xb5, 0x7e, 0x41, ]; println!("Message:\n{:02x?}\n", message);

// update the context for chunk in message.chunks(8) { mac::update(&mut magma, &chunk); }

// finalize and get result let mac = mac::finalize(&mut magma); println!("Calculated MAC:\n{:x}\n", mac);

assert_eq!(mac, 0x154e7210); ```

File encryption sample: encrypt_file.rs

```rust use cipher_magma::{CipherMode, CipherOperation, Magma}; use std::io::{Read, Seek, Write};

let cipher_mode = CipherMode::CBC;

let key = [0xab; 32]; let mut magma = Magma::with_key(key);

// opening file let sourcefilename = "README.md"; println!("Opening source file: {}", sourcefilename);

let mut sourcefile = std::fs::File::open(sourcefilename).expect("Could not open file."); let sourcelen = sourcefile.metadata().unwrap().len();

let tempdir = std::env::tempdir();

// creating file for encrypted data let encryptedfilename = format!("{}.encrypted", sourcefilename); let encryptedfilepath = tempdir.join(encryptedfilename); println!("Creating encrypted file: {:?}", encryptedfilepath);

let mut encryptedfile = std::fs::File::options() .write(true) .read(true) .create(true) .open(encryptedfilepath) .expect("Could not create encrypted file.");

println!("Encrypting ...");

// ensure buf size % 8 bytes let mut buf = [0u8; 1024];

loop { let readcount = sourcefile .read(&mut buf) .expect("Could not read source file");

if read_count == 0 {
    break;
}

let ciphertext = magma.cipher(&buf[0..read_count], &CipherOperation::Encrypt, &cipher_mode);

encrypted_file
    .write_all(&ciphertext)
    .expect("Could not write into encrypted file");

} encrypted_file .flush() .expect("Could not flush the encrypted file");

println!("Encryption completed.");

let decryptedfilename = format!("{}.decrypted", sourcefilename); let decryptedfilepath = tempdir.join(decrypted_filename);

println!("Creating decrypted file: {:?}", decrypted_filepath);

let mut decryptedfile = std::fs::File::create(decryptedfilepath).expect("Could not create decrypted file.");

println!("Decrypting ...");

// rewind the file position to the begining encrypted_file .rewind() .expect("Could not rewind encrypted file");

loop { let readcount = encryptedfile .read(&mut buf) .expect("Could not read encrypted file");

if read_count == 0 {
    break;
}

let plaintext = magma.cipher(&buf[0..read_count], &CipherOperation::Decrypt, &cipher_mode);

decrypted_file
    .write_all(&plaintext)
    .expect("Could not write into decrypted file");

} decrypted_file .flush() .expect("Could not flush the decrypted file");

if ciphermode.haspadding() { // remove padding bytes decryptedfile .setlen(source_len) .expect("Could not remove padding bytes from decrypted file"); }

println!("Decryption completed."); ```