A pure-Python Feistel Network Block Cipher Implementation.
** Documentation**: For a comprehensive analysis of the mathematical foundations, memory model, and architectural decisions, please consult the PyFeistel Design Document.
Warning
Educational Use Only: This library is designed for educational purposes to demonstrate cryptographic principles. While it produces statistically random output, it has not undergone formal cryptanalysis and is likely vulnerable to advanced attacks (e.g., linear/differential cryptanalysis). Do not use this for protecting sensitive production data.
- Custom Feistel Network: 16-round architecture with non-linear Key Schedule.
- Modes of Operation: CBC (Cipher Block Chaining) and CTR (Counter) modes.
- Educational Design: Pure Python implementation using
bytearrayfor clarity andsecretsfor security. - Visualization: Tools to visualize cryptographic properties like the Avalanche Effect.
pip install .Or
pip install pyfeistelimport secrets
from pyfeistel import FeistelCipher, CBCMode, pad, unpad
# 1. Setup Cipher
key = secrets.token_bytes(32) # 256-bit key
cipher = FeistelCipher(key)
cbc = CBCMode(cipher)
# 2. Prepare Data
plaintext = b"Hello, PyFeistel! This is a secret message."
padded_data = pad(plaintext)
iv = secrets.token_bytes(16) # 128-bit IV
# 3. Encrypt
ciphertext = cbc.encrypt(padded_data, key, iv)
print(f"Ciphertext (Hex): {ciphertext.hex()}")
# 4. Decrypt
# (Note: CBC decryption extracts IV automatically if prepended,
# but here we pass the IV explicitly if handled separately,
# or rely on the implementation's handling).
# Our implementation prepends IV to ciphertext in 'encrypt'.
decrypted_padded = cbc.decrypt(ciphertext, key)
decrypted = unpad(decrypted_padded)
print(f"Decrypted: {decrypted.decode()}")
assert decrypted == plaintextThe library includes a robust test suite to verify both correctness and cryptographic properties.
Verifies correct round-trip encryption/decryption for all modes (CBC, CTR) and padding logic.
- Command:
pytest tests/test_core.py tests/test_modes.py - Result: ✅ Passed (Correctness verified)
Verifies that flipping 1 bit in the plaintext flips approximately 50% of bits in the ciphertext.
- Command:
pytest tests/test_avalanche.py - Result: ✅ Passed (Average Hamming Distance ~64 bits)
Integrated with the NIST SP 800-22 test suite (via nistrng) to check for statistical randomness.
- Command:
python tests/test_nist_stats.py - Scope: Checked 160,000 bits of CTR-mode output.
- Results: Verified basic randomness properties.
- Monobit (Frequency): ✅ PASS (p=0.50) - Output has equal 0s/1s.
- Runs Test: ✅ PASS - Bit transition frequency is random.
- Spectral/Complexity:
⚠️ Mixed (Sample size limitation vs educational scope).
A complete command-line tool for encrypting and decrypting files using PyFeistel in CBC mode.
Location: examples/secure_file_tool.py
Usage:
# Encrypt
python examples/secure_file_tool.py encrypt secret.txt secret.enc
# Decrypt
python examples/secure_file_tool.py decrypt secret.enc secret_restored.txtPyFeistel includes a visualization tool to demonstrate the Avalanche Effect.
You can run the visualization script:
python examples/visualize_avalanche.pyThis script generates a heatmap tracing the bit differences through all 16 rounds of the cipher.
Figure: Heatmap showing bit diffusion. Dark pixels represent bit differences between two encrypted blocks differing by only 1 bit in the plaintext. Note how the differences spread (diffuse) rapidly after the first few rounds.
This project is licensed under the MIT License.
