1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70
| import struct
def chacha20_quarter_round(a, b, c, d): """ChaCha20四分之一轮实现""" a = (a + b) & 0xFFFFFFFF d ^= a d = ((d << 16) | (d >> 16)) & 0xFFFFFFFF c = (c + d) & 0xFFFFFFFF b ^= c b = ((b << 12) | (b >> 20)) & 0xFFFFFFFF a = (a + b) & 0xFFFFFFFF d ^= a d = ((d << 8) | (d >> 24)) & 0xFFFFFFFF c = (c + d) & 0xFFFFFFFF b ^= c b = ((b << 7) | (b >> 25)) & 0xFFFFFFFF return a, b, c, d
def chacha20_block(key, counter, nonce): """生成64字节密钥流(修正状态矩阵)""" constants = [0x61707865, 0x3320646e, 0x79622d32, 0x6b206574] key_words = list(struct.unpack('<8I', key))
state = [ constants[0], constants[1], constants[2], constants[3], *key_words[:4], *key_words[4:8], counter, nonce[0], nonce[1], nonce[2] ]
initial_state = state.copy()
for _ in range(10): state[0], state[4], state[8], state[12] = chacha20_quarter_round(state[0], state[4], state[8], state[12]) state[1], state[5], state[9], state[13] = chacha20_quarter_round(state[1], state[5], state[9], state[13]) state[2], state[6], state[10], state[14] = chacha20_quarter_round(state[2], state[6], state[10], state[14]) state[3], state[7], state[11], state[15] = chacha20_quarter_round(state[3], state[7], state[11], state[15]) state[0], state[5], state[10], state[15] = chacha20_quarter_round(state[0], state[5], state[10], state[15]) state[1], state[6], state[11], state[12] = chacha20_quarter_round(state[1], state[6], state[11], state[12]) state[2], state[7], state[8], state[13] = chacha20_quarter_round(state[2], state[7], state[8], state[13]) state[3], state[4], state[9], state[14] = chacha20_quarter_round(state[3], state[4], state[9], state[14])
block = [(state[i] + initial_state[i]) & 0xFFFFFFFF for i in range(16)] return struct.pack('<16I', *block)
def decrypt_file(enc_path, password): """解密主函数(修正Nonce)""" key = password.encode().ljust(32, b'\x00')[:32] counter = 0 nonce = (0, 0, 0)
with open(enc_path, 'rb') as fin: while True: key_stream = chacha20_block(key, counter, nonce) counter += 1 chunk = fin.read(64) if not chunk: break decrypted = bytes( ((c - 1) % 0x100) ^ key_stream[i] for i, c in enumerate(chunk) ) print(decrypted)
if __name__ == '__main__': decrypt_file('flag.enc', 'qewuri')
|