DES-EBC以及3DES加密VC成功运行.doc_第1页
DES-EBC以及3DES加密VC成功运行.doc_第2页
DES-EBC以及3DES加密VC成功运行.doc_第3页
DES-EBC以及3DES加密VC成功运行.doc_第4页
DES-EBC以及3DES加密VC成功运行.doc_第5页
已阅读5页,还剩10页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

无需修改,VC+6.0上直接运行。3DES的部分运行结果图如下:(3个子密钥,第一和第三密钥相同)输入:abcd1234注意:这里的键盘输入,一个数就是一个字节。DES-EBC的部分在程序里用#if 0 #endif屏蔽掉了。如果想运行这部分的内容,请将0改为1。/#include #include#define uint unsigned int/#define uchar unsigned char/加密时/解密时,初始换位表unsigned char Ip64 = 58,50,42,34,26,18,10,2, 60,52,44,36,28,20,12,4, 62,54,46,38,30,22,14,6, 64,56,48,40,32,24,16,8, 57,49,41,33,25,17,9,1, 59,51,43,35,27,19,11,3, 61,53,45,37,29,21,13,5, 63,55,47,39,31,23,15,7; /加密完成后/解密完成后,最后换位表unsigned char Ipr64 = 40,8,48,16,56,24,64,32, 39,7,47,15,55,23,63,31, 38,6,46,14,54,22,62,30, 37,5,45,13,53,21,61,29, 36,4,44,12,52,20,60,28, 35,3,43,11,51,19,59,27, 34,2,42,10,50,18,58,26, 33,1,41,9,49,17,57,25; /密钥的压缩型换位表1unsigned char Pc_156 = 57,49,41,33,25,17,9, 1,58,50,42,34,26,18, 10,2,59,51,43,35,27, 19,11,3,60,52,44,36, 63,55,47,39,31,23,15, 7,62,54,46,38,30,22, 14,6,61,53,45,37,29, 21,13,5,28,20,12,4; /密钥的压缩型换位表2unsigned char Pc_248 = 14,17,11,24,1,5, 3,28,15,6,21,10, 23,19,12,4,26,8, 16,7,27,20,13,2, 41,52,31,37,47,55, 30,40,51,45,33,48, 44,49,39,56,34,53, 46,42,50,36,29,32; /扩展型换位表unsigned char Ex48 = 32,1,2,3,4,5, 4,5,6,7,8,9, 8,9,10,11,12,13, 12,13,14,15,16,17, 16,17,18,19,20,21, 20,21,22,23,24,25, 24,25,26,27,28,29, 28,29,30,31,32,1; /换位表Punsigned char Px32 = 16,7,20,21, 29,12,28,17, 1,15,23,26, 5,18,31,10, 2,8,24,14, 32,27,3,9, 19,13,30,6, 22,11,4,25; /各层移位次数unsigned char ShTb16 = 1,1,2,2,2,2,2,2, 1,2,2,2,2,2,2,1; /S盒代替表unsigned char Sbox3216 = 14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7, 0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8, 4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0, 15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13, 15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10, 3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5, 0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15, 13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9, 10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8, 13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1, 13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7, 1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12, 7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15, 13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9, 10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4, 3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14, 2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9, 14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6, 4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14, 11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3, 12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11, 10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8, 9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6, 4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13, 4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1, 13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6, 1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2, 6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12, 13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7, 1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2, 7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8, 2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11;/unsigned char g_ucPreKey8; / = 0x68,0xc1,0x23,0x97,0xae,0x94,0x1c,0x1c; /密钥unsigned char Key168; /存放子密钥-3des时是3组Key,Keyz,Keyunsigned char Keyz168;unsigned char ShRf8 = 0x80,0x40,0x20,0x10,0x08,0x04,0x02,0x01;struct para unsigned char *input; unsigned char *ip; unsigned char row; unsigned char col; unsigned char *buf; /=/ 换位,input:输入,ip:换位表,len:换位表长度,buf:输出/=void Exchange(unsigned char *input,unsigned char *ip,unsigned char row,unsigned char col,unsigned char *buf) unsigned char i,j,k,row1,col1,tmp; for(i=0; irow; i+) bufi = 0; k=0; for(j=0; jrow; j+) for(i=0; icol; i+) tmp = ipk - 1; row1 = tmp/8; col1 = tmp%8; if(ShRfcol1 & inputrow1) bufj |= ShRfi; k+; void Exchange1(struct para pm) unsigned char i,j,k,row1,col1,tmp; for(i=0; ipm.row; i+) pm.bufi = 0; k=0; for(j=0; jpm.row; j+) for(i=0; ipm.col; i+) tmp = pm.ipk - 1; row1 = tmp/8; col1 = tmp%8; if(ShRfcol1 & pm.inputrow1) pm.bufj |= ShRfi; k+; /=/ 56位数的前28位和后28位各循环左移一位/ 输入:input,56位数;输出:input,移位后的56位数/=void Shift(unsigned char input7) char i; unsigned char tmp=0; if(input0 & 0x80) tmp = 0x01; input0 = 1; for(i=1; i7; i+) if(inputi & 0x80) inputi-1 |= 0x01; inputi = 1; if(input3 & 0x10) input6 |= 0x01; if(tmp) input3 |= 0x10; else input3 &= 0xef;/=/ 产生16个子密钥,输入:PreKey,密钥;输出:Key,16个子密钥/=void GenerateKey(unsigned char Keyseed8) unsigned char output7,i,j; struct para pm; pm.input = Keyseed; pm.ip = Pc_1; pm.row = 7; pm.col = 8; pm.buf = output; Exchange1(pm); /压缩型换位 for(i=0; i16; i+) for(j=0; jShTbi; j+) Shift(output); pm.input = output; pm.ip = Pc_2; pm.row = 8; pm.col = 6; pm.buf = Keyi; Exchange1(pm); /压缩型换位 /=/产生第二个16子密钥,输入:PreKey,自定义密钥;输出:Keyz,16子密钥/=void GenerateKeyZ(unsigned char Keyseed8) unsigned char output7,i,j; struct para pmz; pmz.input = Keyseed; pmz.ip = Pc_1; pmz.row = 7; pmz.col = 8; pmz.buf = output; Exchange1(pmz); /压缩型换位 for(i=0; i16; i+) for(j=0; jShTbi; j+) Shift(output); pmz.input = output; pmz.ip = Pc_2; pmz.row = 8; pmz.col = 6; pmz.buf = Keyzi; Exchange1(pmz); /压缩型换位 /=/异或/=void Xor(unsigned char in1,unsigned char in2,unsigned char len) unsigned char i; for(i=0; ilen; i+) in1i = in2i;/=/ 计算f(r,k),rx:输入,key:密钥,output:输出/=void FunRK(unsigned char rx4,unsigned char *key,unsigned char output4) unsigned char rx18,i,j,row,col,ch,tmp,out4; for(i=0; i4; i+) outi = 0; /Exch_E(rx,rx1); for(i=0; i1; if(rxj & 0x01) rx1row |= 0x80; rx1row+1 = rxi3; if(rx(j+2)%4 & 0x80) rx1row+1 |= 0x04; Xor(rx1,key,8); for(i=0; i3; ch = Sboxi*4+rowcol; if(!(i%2) ch = 4; outi/2 |= ch; /Exchange(out,Px,4,8,output); for(i=0; i4; i+) outputi = 0; ch=0; for(j=0; j4; j+) for(i=0; icol) & outrow) outputj |= (0x80i); ch+; /=/ 第一、三次加密,输入:input,64位明文;输出:input,64位密文/=void Des(unsigned char input8) unsigned char output8, unsigned char rxtmp4,i,j; unsigned char rx4,lx4; Exchange(input,Ip,8,8,output); for(i=0; i4; i+) lxi = outputi; rxi = output4+i; for(i=0; i16; i+) FunRK(rx,Keyi,rxtmp); Xor(rxtmp,lx,4); for(j=0; j4; j+) lxj = rxj; rxj = rxtmpj; for(i=0; i4; i+) output4+i = lxi; outputi = rxi; Exchange(output,Ipr,8,8,input);/=/ 第二次加密,输入:input,64位明文;输出:input,64位密文/=void Desz(unsigned char input8) unsigned char output8, unsigned char rxtmp4,i,j; unsigned char rx4,lx4; Exchange(input,Ip,8,8,output); for(i=0; i4; i+) lxi = outputi; rxi = output4+i; for(i=0; i16; i+) FunRK(rx,Keyzi,rxtmp); Xor(rxtmp,lx,4); for(j=0; j4; j+) lxj = rxj; rxj = rxtmpj; for(i=0; i4; i+) output4+i = lxi; outputi = rxi; Exchange(output,Ipr,8,8,input);/=/ 第一、三次解密,输入:input,64位密文;输出:input,64位明文/=void Desr(unsigned char input8) unsigned char output8, unsigned char lx4,rx4,rxtmp4,i,j; Exchange(input,Ip,8,8,output); for(i=0; i4; i+) rxi = outputi; lxi = output4+i; for(i=0; i16; i+) FunRK(lx,Key15-i,rxtmp); Xor(rxtmp,rx,4); for(j=0; j4; j+) rxj = lxj; lxj = rxtmpj; for(i=0; i4; i+) output4+i = rxi; outputi = lxi; Exchange(output,Ipr,8,8,input);/=/ 第二次解密,输入:input,64位密文;输出:input,64位明文/=void Desrz(unsigned char input8) unsigned char output8, unsigned char lx4,rx4,rxtmp4,i,j; Exchange(input,Ip,8,8,output); for(i=0; i4; i+) rxi = outputi; lxi = output4+i; for(i=0; i16; i+) FunRK(lx,Keyz15-i,rxtmp); Xor(rxtmp,rx,4); for(j=0; j4; j+) rxj = lxj; lxj = rxtmpj; for(i=0; i4; i+) output4+i = rxi; outputi = lxi; Exchange(output,Ipr,8,8,input);void main()int i;unsigned char key8,keyz8,ch,min_data8,mi_data8,jiemi_data8;key0=0x5A;keyz0=0x7C;key1=0x4B;keyz1=0x6B;key2=0x3C;keyz2=0x5D;key3=0x2D;keyz3=0x4A;key4=0x1E;keyz4=0x33;key5=0x0F;keyz5=0x1E;key6=0x1A;keyz6=0xAF;key7=0x2B;keyz7=0x0B;GenerateKey(key);GenerateKey(keyz);printf(Attention that the secret K1 are:n);for(i=0;i8;i+)printf(%X,keyi);printf(nnAttention that the secret K2 are:n);for(i=0;i8;i+)printf(%X,keyzi);printf(nnPlease input 8 byte data:n);i=0;while(ch=getchar()!=n)mi_datai=min_datai=ch;i+;/printf(Your HEX data :n);for(i=0;i8;i+)printf(%X,min_datai);printf(nn);/=/以下是3DES加密解密/=#if 1Des(mi_data);/Ek1(p)printf(The First

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论