Bit rotational encryption with steganography
Bitmasher - private key crypto algorithm based on bit buffer rotation and steganography
Bitmasher is based on three encryption ideas combined in three passes of encryption.
- XOR encryption of the data with rotational key
- Mixing XOR encrypted block of data with a random data
- Bit-rotation ROR/ROL (ROR/ROL for decryption), based on two random keys: one defining the depth of the rotation, other - directionality of the rotation.
So, in order to break encrypted block of data, you actually need to figure out two keys, and second stage mixing preventing statistical analysis. If you are interested to learn more about algorithm itself, please take a look at this slides. Buffer bit-rotating cryptography with steganography
"Hello World" of the Bitmasher
>>> from Bitmasher import * >>> n = init() >>> d = encrypt(n, "This is a BIG secret") >>> print(decrypt(n, *d)) b'This is a BIG secret' >>>
- First, we have to import Bitmasher functions. Python 3.6 or newer is required.
- Next, we initializing namespace for a crypto operations.
- We are encrypting. Note, first parameter to a
encryptfunction is a reference to a namespace. You can pass any Python values, supported by
- Next, we decrypting. Please note, you have to pass namespace as first parameter.
This is all very simple
Where is my keys !!!!
Bitmasher does not trust you with keys generation. It maintain a "codebook" internally by generating keys on demand. First 1024 keys are generating while calling init(). Each block of data encrypting with uniq key. Key consisting of two parts:
- Private key. serves as modulo for the XOR operation during the first pass and number of rotation at third pass.
- Masher. Dataset defining directionality of the rotations at third pass.
encrypt returning the list of the tuples, where first element of the tuple is key ID and second element is encrypted data. In order to decrypt, you are expecting to load a "used pages" from codebook, that you received by secure means inside Bitmasher namespace.
How to export pages from a codebook which were used during encryption ?
>>> from Bitmasher import * >>> n = init() >>> d = encrypt(n, "This is a BIG secret") >>> book = cryptobook_save(n) >>> len(book) 21085 >>> book[:32] b'\x82\xda\x00$1ba990f9-6b43-4a9d-9bc1-a820'
Yep, it is a msgpack data. And it is contains all your keys.
How to load pages from a codebook to use for decryption
>>> from Bitmasher import * >>> n = init() >>> d = encrypt(n, "This is a BIG secret") .... saving and transferring cryptobook image >>> n = cryptobook_load(n, book) >>> print(decrypt(n, *d)) b'This is a BIG secret'
Let's say, you have to transmit your secret message, encrypted with Bitmasher to your secret correspondent over a radio waves. LEGAL NOTE: this type of the operations is expressly prohibited by FCC rules and I am not responsible for the troubles you will get yourself into, if you will actually try this. So, do not do this for real. Dust off your straight key or paddle and get your telegram formatted.
>>> d = encrypt(n, "This is a BIG secret") >>> d [('cd34242a-c174-4769-b945-23f805d684cf', b'\x16\xb.....
After you get your encryption done ...
>>> tlg = telegram(d) >>> print(tlg) 022 186 243 218 120 121 196 018 089 191 101 201 184 042 085 108 100 047 091 015 226 152 003 093 111 121 108 086 182 134 061 035 225 037 182 083 247 230 122 123 044 072 100 097 135 029 090 080 238 024 225 141 016 247 075 009 ...
Breath deep and use your HAM radio skills for a something good.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size Bitmasher-0.0.6-py3-none-any.whl (14.2 kB)||File type Wheel||Python version py3||Upload date||Hashes View hashes|
|Filename, size Bitmasher-0.0.6.tar.gz (6.2 kB)||File type Source||Python version None||Upload date||Hashes View hashes|
Hashes for Bitmasher-0.0.6-py3-none-any.whl