-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathmain_rsa.c
51 lines (31 loc) · 3.94 KB
/
main_rsa.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
#include <8051.h>
#include "lib.h"
void main() {
volatile __xdata __at(0x000) unsigned char x[SIZE] =
{0xBC,0x3B,0xB4,0xAB,0xDE,0xE3,0x81,0x1E,0xF5,0xC5,0x9F,0x33,0x6C,0x3D,0x67,0xCF,0xBE,0x44,0x57,0x7D,0xDA,0xA3,0xBF,0xCD,0x88,0xD5,0x2D,0xA6,0x8C,0x68,0xEF,0xFE,0xDF,0xB1,0xD5,0x57,0x86,0x90,0xC1,0xF6,0x3F,0x44,0xC5,0xE9,0x9D,0x17,0xE2,0x5B,0xBD,0x83,0xD1,0x52,0xD8,0xC8,0xA4,0x83,0xA9,0x83,0x8C,0x74,0x0E,0xE0,0x17,0x0E,0xC6,0x3D,0x94,0xFC,0xD2,0x18,0x7F,0x23,0xFB,0x70,0x5D,0xFA,0x0E,0x63,0x35,0x55,0xCE,0x5F,0x57,0x19,0xA5,0xF8,0xE0,0x39,0x59,0x26,0x68,0x90,0xFA,0x4D,0x15,0xE9,0x60,0x37,0xE8,0x3F,0xF1,0x3C,0xA8,0x17,0x26,0x1F,0xDD,0x4B,0xAB,0xD7,0xF3,0x46,0x77,0x46,0x6B,0xFA,0xFB,0xFC,0x4E,0x6E,0xF2,0x38,0x76,0x71,0xFE,0xC9,0x5A,0x44};
volatile __xdata __at(0x080) unsigned char n[SIZE] =
{0xC7,0xB8,0xD9,0x70,0x10,0x98,0x42,0x1B,0xA3,0xC4,0xEF,0xD7,0x3F,0x8F,0x25,0x7E,0x20,0xB9,0x49,0x0C,0x5A,0x8A,0x0B,0x88,0xC1,0x55,0x6C,0x37,0xAC,0x63,0x81,0x0F,0x02,0x1F,0x76,0x62,0xD7,0x35,0x53,0x77,0x2E,0x11,0x07,0xC8,0x69,0x99,0x9C,0xB1,0x74,0xB0,0xC6,0x92,0x41,0xD8,0xD9,0xB2,0xA6,0x6A,0x3E,0xF4,0xF1,0xFB,0x99,0xED,0x8D,0x2E,0x0C,0xE1,0x44,0x20,0x63,0x62,0xD1,0x9A,0x19,0x8A,0xC6,0x69,0xE0,0x5F,0x30,0x8D,0x20,0x76,0xCF,0x11,0x7E,0x6D,0x14,0x47,0x5B,0x4F,0xD1,0xF4,0xCD,0xAA,0xD2,0x7C,0xAC,0xE8,0xD4,0x00,0xB0,0x70,0x3B,0x0E,0xB6,0xC2,0xD7,0x26,0x02,0xAF,0x39,0x70,0xA3,0x5A,0x6F,0xCC,0x7C,0xB9,0xE9,0xBC,0x73,0xDF,0xD1,0xFD,0xFD,0x9B};
volatile __xdata __at(0x100) unsigned char R_2[SIZE] =
{0x94,0x6F,0x3D,0x2A,0x05,0x39,0x1B,0x68,0x3A,0x23,0xD2,0x1B,0x11,0x39,0xC3,0x3B,0xDF,0x1E,0x63,0x07,0xAB,0x71,0x22,0x10,0x17,0xD0,0xDF,0xC9,0x8B,0xFA,0x79,0xED,0x9D,0x2B,0x88,0x4F,0x23,0x9C,0xC1,0xA2,0x32,0x93,0x21,0x7E,0x46,0x35,0x0B,0x09,0xBD,0xDD,0xB6,0xFA,0xB2,0x9C,0xE5,0x7B,0xE7,0x7D,0x77,0x8A,0x38,0xC0,0x3D,0xE1,0x8E,0x61,0xEF,0xBA,0xBE,0xCB,0x15,0x4A,0xB9,0x9C,0xB0,0x76,0x26,0x52,0x4E,0x23,0x72,0xF5,0x00,0x6B,0x3F,0xA9,0x12,0xB5,0xD1,0x97,0x4E,0xBA,0x65,0xA6,0x02,0xEA,0xA4,0x24,0x8E,0x7A,0x9B,0x28,0x6F,0x3F,0xEF,0x80,0x91,0xD0,0x38,0x25,0x87,0x17,0x49,0x3C,0xD5,0x78,0xC3,0x3D,0xD4,0xC8,0x77,0x07,0x9E,0x27,0x08,0x63,0x7C,0x41};
volatile __xdata __at(0x180) unsigned char R[SIZE] =
{0x38,0x47,0x26,0x8F,0xEF,0x67,0xBD,0xE4,0x5C,0x3B,0x10,0x28,0xC0,0x70,0xDA,0x81,0xDF,0x46,0xB6,0xF3,0xA5,0x75,0xF4,0x77,0x3E,0xAA,0x93,0xC8,0x53,0x9C,0x7E,0xF0,0xFD,0xE0,0x89,0x9D,0x28,0xCA,0xAC,0x88,0xD1,0xEE,0xF8,0x37,0x96,0x66,0x63,0x4E,0x8B,0x4F,0x39,0x6D,0xBE,0x27,0x26,0x4D,0x59,0x95,0xC1,0x0B,0x0E,0x04,0x66,0x12,0x72,0xD1,0xF3,0x1E,0xBB,0xDF,0x9C,0x9D,0x2E,0x65,0xE6,0x75,0x39,0x96,0x1F,0xA0,0xCF,0x72,0xDF,0x89,0x30,0xEE,0x81,0x92,0xEB,0xB8,0xA4,0xB0,0x2E,0x0B,0x32,0x55,0x2D,0x83,0x53,0x17,0x2B,0xFF,0x4F,0x8F,0xC4,0xF1,0x49,0x3D,0x28,0xD9,0xFD,0x50,0xC6,0x8F,0x5C,0xA5,0x90,0x33,0x83,0x46,0x16,0x43,0x8C,0x20,0x2E,0x02,0x02,0x65};
volatile __xdata __at(0x200) unsigned char one[SIZE] = {0};
volatile __xdata __at(0x280) unsigned char yt[SIZE] = {0};
volatile __xdata __at(0x300) unsigned char e[SIZE] = {0};
volatile __xdata __at(0x380) unsigned char d[SIZE] =
{0x76,0xE6,0x93,0x60,0x99,0x51,0xAD,0xD4,0xB0,0x30,0x82,0xD4,0xD0,0x2C,0x61,0x07,0x5A,0x34,0x88,0x20,0x41,0xDA,0xA6,0x3E,0x7D,0x0E,0xFE,0xAE,0x97,0x70,0x08,0x19,0xDE,0x66,0x67,0x59,0xB8,0xE5,0xF8,0xE9,0x51,0x36,0xF6,0xB0,0x17,0x05,0xC8,0xDD,0x31,0x8C,0x1A,0x92,0xD6,0x84,0x16,0x05,0xBF,0xB5,0xC9,0xD6,0x8E,0x11,0x4D,0xB0,0x39,0x42,0x64,0x8C,0x82,0xF4,0xBC,0x49,0xC0,0x3B,0xB8,0x7C,0x63,0x2C,0x43,0x1E,0xB2,0x2D,0x45,0x26,0x31,0x5D,0xCC,0x97,0xAB,0x2F,0x33,0x74,0xD1,0x1A,0x5D,0x10,0x5B,0x11,0xD3,0xF1,0x9A,0x18,0x8F,0x5A,0xA1,0xFA,0x8A,0x49,0x3F,0x0F,0x8E,0x8B,0x9A,0x85,0xE3,0xAD,0x6E,0xCC,0x9B,0xAB,0x55,0x1B,0xA8,0x34,0x19,0x64,0x9D,0x11};
e[SIZE-1] = 0x01;
e[SIZE-2] = 0x01;
one[SIZE-1] = 1;
/* encryption */
montpro(x, R_2, yt, n);
modexp(yt, e, yt, R);
montpro(yt, one, yt, n);
display_result();
/* decryption */
montpro(yt, R_2, yt, n);
modexp(yt, d, yt, R);
montpro(yt, one, yt, n);
display_result();
P3 = 0x55;
}