Skip to content
Snippets Groups Projects
Commit 2402edbb authored by zabiulla.ahmadi's avatar zabiulla.ahmadi
Browse files

EDEA finished

parent 554926fe
No related branches found
No related tags found
No related merge requests found
__pycache__
...@@ -133,7 +133,7 @@ def key_to_inverse_table(keytable): ...@@ -133,7 +133,7 @@ def key_to_inverse_table(keytable):
key_inverse_table.append([k4_1, k4_2, k4_3, k4_4, k4_5, k4_6]) key_inverse_table.append([k4_1, k4_2, k4_3, k4_4, k4_5, k4_6])
# round 5 # round 5 (half round)
k5_1 = inverse_mult_modulo(keytable[0][0], (2**4) + 1) k5_1 = inverse_mult_modulo(keytable[0][0], (2**4) + 1)
k5_2 = inverse_add_modulo(keytable[0][1], 2 ** 4) k5_2 = inverse_add_modulo(keytable[0][1], 2 ** 4)
k5_3 = inverse_add_modulo(keytable[0][2], 2 ** 4) k5_3 = inverse_add_modulo(keytable[0][2], 2 ** 4)
......
...@@ -8,7 +8,8 @@ cipher_text = '1011101101001011' ...@@ -8,7 +8,8 @@ cipher_text = '1011101101001011'
keytable = key_to_table(key) keytable = key_to_table(key)
print("Message : ", message)
print("Key : ", key)
encrypted_text = encrpyt(message, keytable) encrypted_text = encrpyt(message, keytable)
if cipher_text == encrypted_text: if cipher_text == encrypted_text:
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment