天天看點

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

作者:信安傳遞

目前,python實作的國密算法庫主要是python-gmssl庫和snowland-smx(pysmx)庫,二者都對SM2(僅公鑰加解密和數字簽名)、SM3、SM4進行了細緻而優雅的實作。

GMSSL. https://github.com/duanhongyi/gmssl

snowland-smx. https://gitee.com/snowlandltd/ snowland-smx-python

PyCryptodome. https://www.pycryptodome.org

最近用python做加密系統開發時發現,上述兩個庫的SM4加解密效率比國外更成熟的AES庫相差1-3個數量級!下圖是ECB模式下SM4(gmssl庫)與AES(PyCryptodome庫)的加解密耗時對比:

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

上圖中,短封包是28位元組,長封包是253位元組,實驗資料取20次執行的平均值。gmssl庫的SM4比pysmx庫快一些,後者的耗時再乘1.5左右。

當我想進入Crypto.Cipher.AES一探究竟,竟找不到加密的源代碼,順着函數調用一路找,看到:

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

基本上明白了,人家的加解密核心算法不是python代碼,而是已經編譯好的連結庫。python作為解釋型語言,效率跟C這樣的編譯後執行的機器代碼自然沒法比。咱自己的python國密SM4加解密短封包也不超過1ms,偶爾加密個短指令問題不大,但互動長資料或加解密大檔案的時候,速率會嚴重不足(按之前的測試結果,算出加解密速率為150KB/s)。雖然其他程式設計語言實作的SM4與AES效率差别沒有那麼大,但畢竟目前用python的小夥伴越來越多,這對于國密算法的推廣使用可不是什麼好事!是以着手實作一份更高效的國密SM4的python代碼。如下:

from array import array

from struct import pack, unpack

_SM4_FK = array('L', [0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc])

_SM4_CK = array('L', [

0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269, 0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9,

0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249, 0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9,

0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229, 0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,

0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209, 0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279])

_SM4_S_BOX = bytes([

0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7, 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05,

0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3, 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99,

0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62,

0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95, 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6,

0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba, 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8,

0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b, 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35,

0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87,

0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52, 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e,

0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5, 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1,

0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55, 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3,

0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60, 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f,

0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f, 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51,

0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f, 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8,

0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd, 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0,

0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e, 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84,

0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20, 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48])

_SM4_S_BOX_FAST = array('H')

for byte1 in _SM4_S_BOX: # 構造兩位元組的S盒變換表

byte1 <<= 8

_SM4_S_BOX_FAST.extend(byte1 | byte2 for byte2 in _SM4_S_BOX)

def _T_key(ka): # 用于生成圈密鑰的T'變換

B = _SM4_S_BOX_FAST[ka >> 16] << 16 | _SM4_S_BOX_FAST[ka & 0xffff] # S盒變換

return (B ^ (B << 13 | B >> 19) ^ (B << 23 | B >> 9)) & 0xffffffff # L線性變換

def _T(x): # T變換

B = _SM4_S_BOX_FAST[x >> 16] << 16 | _SM4_S_BOX_FAST[x & 0xffff] # S盒變換

return (B ^ (B << 2 | B >> 30) ^ (B << 10 | B >> 22) ^ (B << 18 | B >> 14)

^ (B << 24 | B >> 8)) & 0xffffffff # L線性變換

def _one_round(rK, X): # T變換

X0, X1, X2, X3 = X

for rk in rK:

X0, X1, X2, X3 = X1, X2, X3, X0 ^ _T(X1 ^ X2 ^ X3 ^ rk)

return [X3, X2, X1, X0]

def _ecb_base(rK, X):

for i in range(0, len(X), 4): # 4個字為一組

X[i:i + 4] = _one_round(rK, X[i:i + 4])

return X

def _cbc_enc(rK, iv, X):

for i in range(0, len(X), 4):

iv = X[i:i + 4] = _one_round(rK, [X[i + j] ^ iv[j] for j in range(4)])

return X

def _cbc_dec(rK, iv, X):

for i in range(0, len(X), 4):

next_iv = X[i:i + 4]

X[i:i + 4], iv = list(map(lambda x, y: x ^ y, _one_round(rK, X[i:i + 4]), iv)), next_iv

return X

# bytes轉數組(4個位元組為一字)

def byte2array(data):

return list(unpack('>%dI' % (len(data) >> 2), data))

# 數組轉bytes

def array2byte(data):

return pack('>%dI' % (len(data)), *data)

class SM4:

def __init__(self, key):

self.set_key(key)

def set_key(self, key):

MK = unpack('>4I', key)

K = array('L', (MK[i] ^ _SM4_FK[i] for i in range(4)))

K.extend(K[i] ^ _T_key(K[i + 1] ^ K[i + 2] ^ K[i + 3] ^ _SM4_CK[i]) for i in range(32))

self.e_rk, self.d_rk = K[4:], array('L', reversed(K[4:]))

def ecb_enc(self, data):

return array2byte(_ecb_base(self.e_rk, byte2array(data)))

def ecb_dec(self, data):

return array2byte(_ecb_base(self.d_rk, byte2array(data)))

def cbc_enc(self, iv, data):

return array2byte(_cbc_enc(self.e_rk, byte2array(iv), byte2array(data)))

def cbc_dec(self, iv, data):

return array2byte(_cbc_dec(self.d_rk, byte2array(iv), byte2array(data)))

from Crypto.Cipher import AES

from pysmx.SM4 import Sm4, ENCRYPT, DECRYPT

from gmssl.sm4 import CryptSM4, SM4_ENCRYPT, SM4_DECRYPT

from Crypto.Hash import MD5

from pysmx.SM3 import digest as SM3_pysmx

from gmssl.sm3 import sm3_hash as SM3_gmssl

import time, os

# 填充成16位元組倍數bytes

def pad(s: bytes) -> bytes:

n = 16 - (len(s) & 0xf)

return s + bytes([n] * n)

# 将填充後的bytes還原

def unpad(s: bytes) -> bytes:

return s[0:-s[-1]]

# Crypto - AES-128加密器

class AES_Cipher:

def __init__(self, key):

self._key = MD5.new(key).digest()

self._ecb = AES.new(self._key, AES.MODE_ECB)

# AES加密(ECB模式)

def enc(self, data):

return self._ecb.encrypt(pad(data))

# AES解密(ECB模式)

def dec(self, data):

assert len(data) & 0xf == 0

return unpad(self._ecb.decrypt(data))

# AES加密(CBC模式)

def enc_cbc(self, iv, data):

assert len(iv) == 16

return AES.new(self._key, AES.MODE_CBC, iv).encrypt(pad(data))

# AES解密(CBC模式)

def dec_cbc(self, iv, data):

assert len(iv) == 16

assert len(data) & 0xf == 0

return unpad(AES.new(self._key, AES.MODE_CBC, iv).decrypt(data))

# pysmx - SM4加密器

class SM4_pysmx:

def __init__(self, raw_key):

key = SM3_pysmx(raw_key)

self._enc = Sm4()

self._enc.sm4_setkey(key, ENCRYPT)

self._dec = Sm4()

self._dec.sm4_setkey(key, DECRYPT)

# SM4加密(ECB模式)

def enc(self, data):

return bytes(self._enc.sm4_crypt_ecb(pad(data)))

# SM4解密(ECB模式)

def dec(self, data):

assert len(data) & 0xf == 0

return unpad(bytes(self._dec.sm4_crypt_ecb(data)))

# SM4加密(CBC模式)

def enc_cbc(self, iv, data):

assert len(iv) == 16

return bytes(self._enc.sm4_crypt_cbc(iv, pad(data)))

# SM4解密(CBC模式)

def dec_cbc(self, iv, data):

assert len(iv) == 16

assert len(data) & 0xf == 0

return unpad(bytes(self._dec.sm4_crypt_cbc(iv, data)))

# gmssl - SM4加密器

class SM4_gmssl:

def __init__(self, raw_key):

key = SM3_pysmx(raw_key)

self._enc = CryptSM4()

self._enc.set_key(key, SM4_ENCRYPT)

self._dec = CryptSM4()

self._dec.set_key(key, SM4_DECRYPT)

# SM4加密(ECB模式)

def enc(self, data):

return self._enc.crypt_ecb(data)

# SM4解密(ECB模式)

def dec(self, data):

assert len(data) & 0xf == 0

return self._dec.crypt_ecb(data)

# SM4加密(CBC模式)

def enc_cbc(self, iv, data):

assert len(iv) == 16

return self._enc.crypt_cbc(iv, data)

# SM4解密(CBC模式)

def dec_cbc(self, iv, data):

assert len(iv) == 16

assert len(data) & 0xf == 0

return self._dec.crypt_cbc(iv, data)

# my - SM4加密器

class SM4_my:

def __init__(self, key):

self.sm4 = SM4(SM3_pysmx(key)[:16])

# SM4加密(ECB模式)

def enc(self, data):

return self.sm4.ecb_enc(pad(data))

# SM4解密(ECB模式)

def dec(self, data):

assert len(data) & 0xf == 0

return unpad(self.sm4.ecb_dec(data))

# SM4加密(CBC模式)

def enc_cbc(self, iv, data):

assert len(iv) == 16

return self.sm4.cbc_enc(iv, pad(data))

# SM4解密(CBC模式)

def dec_cbc(self, iv, data):

assert len(iv) == 16

assert len(data) & 0xf == 0

return unpad(self.sm4.cbc_dec(iv, data))

def prof_test():

def prof_func():

enc_data = sm4_my.enc(long_data)

dec_data = sm4_my.dec(enc_data)

assert dec_data == long_data

enc_data = sm4_my.enc_cbc(iv, long_data)

dec_data = sm4_my.dec_cbc(iv, enc_data)

assert dec_data == long_data

from cProfile import Profile

long_data = os.urandom(5000000)

KA = os.urandom(16)

iv = os.urandom(16)

sm4_my = SM4_my(KA)

prof = Profile()

prof.runcall(prof_func)

prof.print_stats(1)

# prof.dump_stats('test.prof')

def compare_test():

# 随機生成128位的密鑰

KA = os.urandom(16)

# 建立各加密器

time_1 = time.perf_counter()

aes = AES_Cipher(KA)

print('Crypto - AES-128 初始化耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

time_1 = time.perf_counter()

sm4_smx = SM4_pysmx(KA)

print('pysmx - SM4 初始化耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

time_1 = time.perf_counter()

sm4_ssl = SM4_gmssl(KA)

print('gmssl - SM4 初始化耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

time_1 = time.perf_counter()

sm4_my = SM4_my(KA)

print('my - SM4 初始化耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

# 以下第一次執行很慢

# time_1 = time.perf_counter()

# aes.enc(os.urandom(128))

# print('Crypto - AES-128 第一次加密耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

# time_1 = time.perf_counter()

# aes.enc(os.urandom(128))

# print('Crypto - AES-128 第二次加密耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

# time_1 = time.perf_counter()

# sm4_my.enc(os.urandom(128))

# print('my - SM4 第一次加密耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

# time_1 = time.perf_counter()

# sm4_my.enc(os.urandom(128))

# print('my - SM4 第二次加密耗時:%d us' % ((time.perf_counter() - time_1) * 1000000))

test_num = 50 # 測試次數

# 随機生成消息

short_data = [os.urandom(28) for i in range(test_num)] # 短消息清單

long_data = [os.urandom(1128) for i in range(test_num)] # 長消息清單

enc_data = [b''] * 50

enc_data1 = [b''] * 50

enc_data2 = [b''] * 50

enc_data3 = [b''] * 50

dec_data1 = [b''] * 50

dec_data2 = [b''] * 50

print('——————————————————————加解密測試——————————————————————')

print('短消息長度:%dB 長消息長度:%dB 測試次數:%d 機關:ms' % (len(short_data[0]), len(long_data[0]), test_num))

print('\nECB模式:\n算法庫名\t\t加密短消息\t解密短消息\t加密長消息\t解密長消息')

# Crypto - AES-128

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = aes.enc(short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = aes.dec(enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data[i] = aes.enc(long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = aes.dec(enc_data[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('Crypto-AES\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

# pysmx - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_smx.enc(short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_smx.dec(enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data1[i] = sm4_smx.enc(long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_smx.dec(enc_data1[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('pysmx-SM4\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_aim1 = time_5 - time_1

# gmssl - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_ssl.enc(short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_ssl.dec(enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data2[i] = sm4_ssl.enc(long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_ssl.dec(enc_data2[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('gmssl-SM4\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_aim2 = time_5 - time_1

# my - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_my.enc(short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_my.dec(enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data3[i] = sm4_my.enc(long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_my.dec(enc_data3[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('my-SM4\t\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_my = time_5 - time_1

print('總耗時為gmssl的%.2f%%、pysmx的%.2f%%' % (time_my / time_aim2 * 100, time_my / time_aim1 * 100))

assert enc_data1 == enc_data2 == enc_data3

print('\nCBC模式:\n算法庫名\t\t加密短消息\t解密短消息\t加密長消息\t解密長消息')

iv = os.urandom(16)

# Crypto - AES-128

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = aes.enc_cbc(iv, short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = aes.dec_cbc(iv, enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data[i] = aes.enc_cbc(iv, long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = aes.dec_cbc(iv, enc_data[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('Crypto-AES\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

# pysmx - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_smx.enc_cbc(iv, short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_smx.dec_cbc(iv, enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data1[i] = sm4_smx.enc_cbc(iv, long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_smx.dec_cbc(iv, enc_data1[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('pysmx-SM4\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_aim1 = time_5 - time_1

# gmssl - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_ssl.enc_cbc(iv, short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_ssl.dec_cbc(iv, enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data2[i] = sm4_ssl.enc_cbc(iv, long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_ssl.dec_cbc(iv, enc_data2[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('gmssl-SM4\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_aim2 = time_5 - time_1

# my - SM4

time_1 = time.perf_counter()

for i in range(test_num):

enc_data[i] = sm4_my.enc_cbc(iv, short_data[i]) # 加密短消息

time_2 = time.perf_counter()

for i in range(test_num):

dec_data1[i] = sm4_my.dec_cbc(iv, enc_data[i]) # 解密短消息

time_3 = time.perf_counter()

for i in range(test_num):

enc_data3[i] = sm4_my.enc_cbc(iv, long_data[i]) # 加密長消息

time_4 = time.perf_counter()

for i in range(test_num):

dec_data2[i] = sm4_my.dec_cbc(iv, enc_data3[i]) # 解密長消息

time_5 = time.perf_counter()

assert dec_data1 == short_data

assert dec_data2 == long_data

print('my-SM4\t\t%.2f\t\t%.2f\t\t%.2f\t\t%.2f' %

((time_2 - time_1) * 1000, (time_3 - time_2) * 1000, (time_4 - time_3) * 1000, (time_5 - time_4) * 1000))

time_my = time_5 - time_1

print('總耗時為gmssl的%.2f%%、pysmx的%.2f%%' % (time_my / time_aim2 * 100, time_my / time_aim1 * 100))

assert enc_data1 == enc_data2 == enc_data3

if __name__ == "__main__":

# prof_test()

compare_test()

SM4的核心代碼是前100行,後面是測試用的。關于本SM4代碼的用法,跟着測試代碼學就行。上述代碼保證可以運作,前提是先安裝好依賴的庫。

測試代碼構造了四個密碼算法(Crypto-AES、pysmx-SM4、gmssl-SM4和my-SM4)加密器,并比較四者初始化、ECB和CBC兩種模式下加解密的耗時,執行結果詳見下圖(表中的結果數值不是平均值,是50次執行的總耗時):

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

不同的計算機配置下結果可能有細微差别,我的配置是:

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

可見,本SM4代碼的加解密效率比另兩個國密算法庫高了不少(耗時約為其1/3 ~ 1/4),我做了哪些改進呢?

1.構造S盒快表。S盒轉換是高頻操作,傳統做法是用256位元組的S盒表逐個位元組轉換,我構造了一個S盒快表(見代碼27-30行),兩位元組合并轉換,使得S盒查表操作少了一半,配套的“移位”和“按位與”運算也減少一半多。S盒快表大小為65536×2=131072B=128KB,構造的速度也很快,這種以空間換時間的做法是很合算的。

2.減少函數調用。代碼複用減少了代碼量,看起來更清爽,但調用頻次過高的代碼不宜寫成函數,因為函數調用也是有開銷的。當函數調用的開銷和函數本身的計算耗時相差無幾的時候,調用就成了負擔,而且合并以後,發現有些計算是備援的。這主要展現在L線性變換,把循環移位的函數去掉,效率提升不少。

3.減少類型轉換。在前兩個庫的SM4代碼中,各函數間傳遞的資料類型在bytes和清單之間反複轉換,其實沒有必要。函數的中間值統一用一種資料類型,我嘗試統一成bytes或int,經過反複對比測試,int比較快且實作簡單一點(我想吐槽一下python的bytes類型不支援位運算!(¬︿̫̿¬☆))。

上述三點針對所有程式設計語言都是适用的。還有很多針對python的優化,比如用array代替list、用生成器代替清單推導、能改原數組就不要生成新數組等等。Profile庫是個不錯的調優工具,可得知每個中間操作的運作時間,以找到最耗時的操作并集中精力去攻克它,以免錯把精力放在沒有多少油水可壓榨的地方(我就做了很多這樣的無用功/(ㄒoㄒ)/~~)。

這回真切地體會到先把書讀厚再讀薄的感覺,各種實作方式的測試代碼寫了又改,增了又删,可能不下2000行,最後濃縮成這100行自認為在目前python下較為接近最優解的代碼(*^_^*)!

但是,處理短消息耗時離AES還差一個數量級,長消息差更多!畢竟機器碼在python面前是降維打擊。是以下一步将使用numpy+numba對上述代碼進行改寫。numba庫用來把最耗時的操作(主要是循環)先編譯成機器碼再執行(代碼受到諸多限制,不能再像Pythonic 那麼天馬行空,需配套使用numpy),引入多線程并行,以達到甚至部分超越PyCryptodome庫的AES!

奮戰數日,有些疲憊,下次分享加入numba的SM4代碼,效果先看圖:

「網絡攻防」國密算法 SM4 對稱加密 分組密碼 python實作完整代碼

可見,這樣的效率硬剛AES已經不吃虧了。

自主創新等不來、買不來、要不來,隻能腳踏實地一點一滴創造出來。支援國密,研究國密,使用國密,将網絡資訊安全牢牢掌握在自己手中!

————————————————

版權聲明:本文為CSDN部落客「qq_43339242」的原創文章,遵循CC 4.0 BY-SA版權協定,轉載請附上原文出處連結及本聲明。

原文連結:https://blog.csdn.net/qq_43339242/article/details/123607119