|
| 1 | +from os import urandom |
| 2 | +from binascii import hexlify |
| 3 | +from hashlib import sha256 |
| 4 | + |
| 5 | +# RFC 3526 - More Modular Exponential (MODP) Diffie-Hellman groups for |
| 6 | +# Internet Key Exchange (IKE) https://tools.ietf.org/html/rfc3526 |
| 7 | + |
| 8 | +primes = { |
| 9 | + # 1536-bit |
| 10 | + 5: { |
| 11 | + "prime": 0xFFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF, |
| 12 | + "generator": 2, |
| 13 | + }, |
| 14 | + # 2048-bit |
| 15 | + 14: { |
| 16 | + "prime": 0x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|
| 17 | + "generator": 2, |
| 18 | + }, |
| 19 | + # 3072-bit |
| 20 | + 15: { |
| 21 | + "prime": 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|
| 22 | + "generator": 2, |
| 23 | + }, |
| 24 | + # 4096-bit |
| 25 | + 16: { |
| 26 | + "prime": 0xFFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199FFFFFFFFFFFFFFFF, |
| 27 | + "generator": 2, |
| 28 | + }, |
| 29 | + # 6144-bit |
| 30 | + 17: { |
| 31 | + "prime": 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|
| 32 | + "generator": 2, |
| 33 | + }, |
| 34 | + # 8192-bit |
| 35 | + 18: { |
| 36 | + "prime": 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|
| 37 | + "generator": 2, |
| 38 | + }, |
| 39 | +} |
| 40 | + |
| 41 | + |
| 42 | +class DiffieHellman: |
| 43 | + """ |
| 44 | + Class to represent the Diffie-Hellman key exchange protocol |
| 45 | +
|
| 46 | + |
| 47 | + >>> alice = DiffieHellman() |
| 48 | + >>> bob = DiffieHellman() |
| 49 | +
|
| 50 | + >>> alice_private = alice.get_private_key() |
| 51 | + >>> alice_public = alice.generate_public_key() |
| 52 | +
|
| 53 | + >>> bob_private = bob.get_private_key() |
| 54 | + >>> bob_public = bob.generate_public_key() |
| 55 | +
|
| 56 | + >>> # generating shared key using the DH object |
| 57 | + >>> alice_shared = alice.generate_shared_key(bob_public) |
| 58 | + >>> bob_shared = bob.generate_shared_key(alice_public) |
| 59 | +
|
| 60 | + >>> assert alice_shared == bob_shared |
| 61 | +
|
| 62 | + >>> # generating shared key using static methods |
| 63 | + >>> alice_shared = DiffieHellman.generate_shared_key_static(alice_private, bob_public) |
| 64 | + >>> bob_shared = DiffieHellman.generate_shared_key_static(bob_private, alice_public) |
| 65 | +
|
| 66 | + >>> assert alice_shared == bob_shared |
| 67 | + """ |
| 68 | + |
| 69 | + # Current minimum recommendation is 2048 bit (group 14) |
| 70 | + def __init__(self, group: int = 14) -> None: |
| 71 | + if group not in primes: |
| 72 | + raise ValueError("Unsupported Group") |
| 73 | + self.prime = primes[group]["prime"] |
| 74 | + self.generator = primes[group]["generator"] |
| 75 | + |
| 76 | + self.__private_key = int(hexlify(urandom(32)), base=16) |
| 77 | + |
| 78 | + def get_private_key(self) -> str: |
| 79 | + return hex(self.__private_key)[2:] |
| 80 | + |
| 81 | + def generate_public_key(self) -> str: |
| 82 | + public_key = pow(self.generator, self.__private_key, self.prime) |
| 83 | + return hex(public_key)[2:] |
| 84 | + |
| 85 | + def is_valid_public_key(self, key: int) -> bool: |
| 86 | + # check if the other public key is valid based on NIST SP800-56 |
| 87 | + if 2 <= key and key <= self.prime - 2: |
| 88 | + if pow(key, (self.prime - 1) // 2, self.prime) == 1: |
| 89 | + return True |
| 90 | + return False |
| 91 | + |
| 92 | + def generate_shared_key(self, other_key_str: str) -> str: |
| 93 | + other_key = int(other_key_str, base=16) |
| 94 | + if not self.is_valid_public_key(other_key): |
| 95 | + raise ValueError("Invalid public key") |
| 96 | + shared_key = pow(other_key, self.__private_key, self.prime) |
| 97 | + return sha256(str(shared_key).encode()).hexdigest() |
| 98 | + |
| 99 | + @staticmethod |
| 100 | + def is_valid_public_key_static( |
| 101 | + local_private_key_str: str, remote_public_key_str: str, prime: int |
| 102 | + ) -> bool: |
| 103 | + # check if the other public key is valid based on NIST SP800-56 |
| 104 | + if 2 <= remote_public_key_str and remote_public_key_str <= prime - 2: |
| 105 | + if pow(remote_public_key_str, (prime - 1) // 2, prime) == 1: |
| 106 | + return True |
| 107 | + return False |
| 108 | + |
| 109 | + @staticmethod |
| 110 | + def generate_shared_key_static( |
| 111 | + local_private_key_str: str, remote_public_key_str: str, group: int = 14 |
| 112 | + ) -> str: |
| 113 | + local_private_key = int(local_private_key_str, base=16) |
| 114 | + remote_public_key = int(remote_public_key_str, base=16) |
| 115 | + prime = primes[group]["prime"] |
| 116 | + if not DiffieHellman.is_valid_public_key_static( |
| 117 | + local_private_key, remote_public_key, prime |
| 118 | + ): |
| 119 | + raise ValueError("Invalid public key") |
| 120 | + shared_key = pow(remote_public_key, local_private_key, prime) |
| 121 | + return sha256(str(shared_key).encode()).hexdigest() |
| 122 | + |
| 123 | + |
| 124 | +if __name__ == "__main__": |
| 125 | + import doctest |
| 126 | + |
| 127 | + doctest.testmod() |
0 commit comments