AES加密算法源代码_第1页
AES加密算法源代码_第2页
AES加密算法源代码_第3页
AES加密算法源代码_第4页
AES加密算法源代码_第5页
已阅读5页,还剩8页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

/AES.h#define decrypt TRUE#define encrypt FALSE#define TYPE BOOLtypedef struct _AESint Nb;int Nr;int Nk;unsigned long *Word;unsigned long *State;AES;/*加密数据,这个函数和下面的InvCipher用于演示用的,只作了一次加密或解密。要进行大数据量加解密只需对这两个函数稍作修改就可以了。byte *input 明文byte *inSize 明文长byte *out 密文存放的地方byte *key 密钥keybyte *keySize 密钥长*/void Cipher(unsigned char* input, int inSize, unsigned char* out, unsigned char* key, int keySize);/*解密数据byte *input 密文int *inSize 密文长byte *out 明文存放的地方byte *key 密钥keyint *keySize 密钥长*/void InvCipher(unsigned char* input, int inSize, unsigned char* out, unsigned char* key, int keySize);/*生成加密用的参数AES结构int inSize 块大小byte* 密钥int 密钥长unsigned long 属性(标实类型)返回AES结构指针*/AES *InitAES(AES *aes,int inSize, unsigned char* key, int keySize, TYPE type);/*生成加密用的参数AES结构int inSize 块大小byte* 密钥int 密钥长返回AES结构指针*/AES *InitAES(int inSize, unsigned char* key, int keySize, BOOL );/*加密时进行Nr轮运算AES * aes 运行时参数*/void CipherLoop(AES *aes);/*解密时进行Nr轮逆运算AES * aes 运行时参数*/void InvCipherLoop(AES *aes);/*释放AES结构和State和密钥库word*/void freeAES(AES *aes);/AES.cpp#include stdafx.h#include #include #include AES.hunsigned char* SubWord(unsigned char* word);unsigned long* keyExpansion(unsigned char* key, int Nk, int Nr,int);/*加密数据byte *input 明文byte *inSize 明文长byte *out 密文存放的地方byte *key 密钥keybyte *keySize 密钥长*/void Cipher(unsigned char* input, int inSize, unsigned char* out, unsigned char* key, int keySize)AES aes ;InitAES(&aes,inSize,key,keySize,encrypt);/while(.)memcpy(aes.State,input,inSize);CipherLoop(&aes);memcpy(out,aes.State,inSize);/*解密数据byte *input 密文int *inSize 密文长byte *out 明文存放的地方byte *key 密钥keyint *keySize 密钥长*/void InvCipher(unsigned char* input, int inSize, unsigned char* out, unsigned char* key, int keySize)AES aes;InitAES(&aes,inSize,key,keySize,decrypt);memcpy(aes.State,input,inSize);InvCipherLoop(&aes);memcpy(aes.State,out,inSize);/*生成加密用的参数AES结构int inSize 块大小byte* 密钥int 密钥长返回AES结构指针*/AES *InitAES(AES *aes,int inSize, unsigned char *key, int keySize, TYPE type)int Nb = inSize 2,Nk = keySize 2,Nr = Nb Nb = Nb;aes-Nk = Nk;aes-Nr = Nr;aes-Word = keyExpansion(key,Nb,Nr,Nk);aes-State = new unsigned longNb+3;if(type)aes-State += 3;return aes;/*生成加密用的参数AES结构int inSize 块大小byte* 密钥int 密钥长返回AES结构指针*/AES *InitAES(int inSize, unsigned char* key, int keySize,unsigned long type)return InitAES(new AES(),inSize,key,keySize,type);/*/void CipherLoop(AES *aes)unsigned char temp4;unsigned long *word8 = aes-Word,*State = aes-State;int Nb = aes-Nb,Nr = aes-Nr;int r;for (r = 0; r Nb; +r)Stater = word8r;for (int round =1; round Nr; +round)word8 += Nb;/*假设Nb=4;-| s0 | s1 | s2 | s3 |-| s4 | s5 | s6 | s7 |-| s8 | s9 | sa | sb |-| sc | sd | se | sf |-| | | | |-| | | | |-| | | | |-*/memcpy(State+Nb,State,12);/*Nb=4;-| s0 | | | | -| s4 | s5 | | | - | s8 | s9 | sa | | -| sc | sd | se | sf | -| | s1 | s2 | s3 | - | | | s6 | s7 | -| | | | sb |-*/for(r =0; rNb; r+)/*temp = Sboxs0,Sboxs5,Sboxsa,Sboxsf;*/temp0 = Sbox*(unsigned char*)State);temp1 = Sbox*(unsigned char*)(State+1)+1);temp2 = Sbox*(unsigned char*)(State+2)+2);temp3 = Sbox*(unsigned char*)(State+3)+3);*(unsigned char*)State) = Log_02temp0 Log_03temp1 temp2 temp3;*(unsigned char*)State+1) = Log_02temp1 Log_03temp2 temp3 temp0;*(unsigned char*)State+2) = Log_02temp2 Log_03temp3 temp0 temp1;*(unsigned char*)State+3) = Log_02temp3 Log_03temp0 temp1 temp2;*State = word8r;State+;State -= Nb;memcpy(State+Nb,State,12);word8 += Nb;for(r =0; rWord,*State = aes-State;int Nb = aes-Nb,Nr = aes-Nr;unsigned char temp4;int r =0;Word += Nb*Nr;for (r = 0; r 0; -round)/*假设Nb=4;- | | | | | - | | | | | - | | | | | - | s0 | s1 | s2 | s3 | - | s4 | s5 | s6 | s7 | - | s8 | s9 | sa | sb | - | sc | sd | se | sf | - */memcpy(State,State+Nb,12);/*Nb=4;-| | | | s7 |-| | | sa | sb |- | | sd | se | sf |-| s0 | s1 | s2 | s3 |-| s4 | s5 | s6 | | - | s8 | s9 | | |-| sc | | | |-*/Word -= Nb;State += Nb+2;for(r = Nb-1; r = 0; r-)/*temp = iSboxs0,iSboxsd,iSboxsa,iSboxs7;*/temp0 = iSbox*(byte*)State;temp1 = iSbox*(byte*)(State-1)+1);temp2 = iSbox*(byte*)(State-2)+2);temp3 = iSbox*(byte*)(State-3)+3);*(unsigned long*)temp = Wordr;*(unsigned char*)State = Log_0etemp0 Log_0btemp1 Log_0dtemp2 Log_09temp3;*(unsigned char*)State+1) = Log_0etemp1 Log_0btemp2 Log_0dtemp3 Log_09temp0;*(unsigned char*)State+2) = Log_0etemp2 Log_0btemp3 Log_0dtemp0 Log_09temp1;*(unsigned char*)State+3) = Log_0etemp3 Log_0btemp0 Log_0dtemp1 Log_09temp2;State -;State -= 2;Word -= Nb;memcpy(State,State+Nb,12);State += Nb+2;for(r = Nb-1; r = 0; r-)*(unsigned char*)State = iSbox*(unsigned char*)State;*(unsigned char*)State+1) = iSbox*(unsigned char*)(State-1)+1);*(unsigned char*)State+2) = iSbox*(unsigned char*)(State-2)+2);*(unsigned char*)State+3) = iSbox*(unsigned char*)(State-3)+3);*State = Wordr;State -;/*-*|k0|k1|k2|k3|k4|k5|k6|k7|k8|k9|.|Nk*4|*-*Nr轮密钥库*每个密钥列长度为Nb*-*| k0 | k1 | k2 | k3 |*-*| k4 | k5 | k6 | k7 |*-*| k8 | k9 | ka | kb |*-*| kc | kd | ke | kf |*-*/unsigned long* keyExpansion(byte* key, int Nb, int Nr, int Nk)unsigned long *w =new unsigned longNb * (Nr+1); / 4 columns of bytes corresponds to a wordmemcpy(w,key,Nk2);unsigned long temp;for (int c = Nk; c Nb * (Nr+1); +c)/把上一轮的最后一行放入temptemp = wc-1;/判断是不是每一轮密钥的第一行if (c % Nk = 0) /左旋8位temp = (temp24);/查Sbox表SubWord(byte*)&temp);temp = Rconc/Nk;else if ( Nk 6 & (c % Nk = 4) ) SubWord(byte*)&temp);/wc-Nk 为上一轮密钥的第一行wc = wc-Nk temp;return

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论