文章介绍了多种加密解密算法的原理和实现,包括HEX、BASE64、XXTEA、AES、BlowFish、SM4、BASE58、SHA1和RC4。涵盖了从简单的字符转义到复杂的分组密码和哈希函数,以及如何使用这些算法进行数据加密和解密。
AI 摘要
HEX
#include "stdio.h" //sprintf () 函数声明所在的头文件
char data[] = "Hello World!!\r\n";
char res[32];
int str_2_hex_str(char *dest, char *src)
{
int len = strlen(src); // 获取接收数据长度
int i,j;
for (i = 0, j = 0; i < len; i++) {
sprintf(&dest[j], "%02X", src[i]);
j+=2; // 每个 16 进制占 2 个长度
}
dest[j] = '\0'; // 添加字符串结束符
return j; // 返回字符串长度
}
int len = str_2_hex_str(res, data);
///////////////////////////////
#include <stdlib.h> // 要使用 strtol () 库函数,需要包含头文件
char data[] = "48656C6C6F20576F726C6421210D0A"; // 假如,我们接收到这样的数据
char res[32]; // 储存转换后的结果
int hex_str_2_str(char *dest, char *src)
{
int len = strlen(src); // 获取接收数据长度
int i,j;
for (i = 0, j = 0; i < len; i+=2) { // 每次取两个字符
char tmp_buf[3]; // 每两个字符组成一个 16 进制字符串,同时结尾需要空字符来告诉编译器我们的是字符串
char *endptr; // 保存已转换数值后的下一个字符
// 以下为取待转换的 16 进制字符串
tmp_buf[0] = src[i];
tmp_buf[1] = src[i + 1];
tmp_buf[2] = '\0'; // 记得添加空字符
// 转换成 16 进制,base 传 16 即可
dest[j++] = strtol(tmp_buf, &endptr, 16);
}
dest[j] = '\0'; // 添加字符串结束符
return j;
}
int len = hex_str_2_str(res, data);
BASE64
//base64 加密
char base64[65] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
void encodeBase64(char* str,int len,char** in){
// 读取 3 个字节 zxc,转换为二进制 01111010 01111000 01100011
// 转换为 4 个 6 位字节,011110 100111 100001 100011
// 不足 8 位在前补 0,变成 00011110 00100111 00100001 00100011
// 若剩余的字节数不足以构成 4 个字节,补等号
int encodeStrLen = 1 + (len/3)*4 ,k=0;
encodeStrLen += len%3 ? 4 : 0;
char* encodeStr = (char*)(malloc(sizeof(char)*encodeStrLen));
for(int i=0;i<len;i++){
if(len - i >= 3){
encodeStr[k++] = base64[(unsigned char)str[i]>>2];
encodeStr[k++] = base64[((unsigned char)str[i]&0x03)<<4 | (unsigned char)str[++i]>>4];
encodeStr[k++] = base64[((unsigned char)str[i]&0x0f)<<2 | (unsigned char)str[++i]>>6];
encodeStr[k++] = base64[(unsigned char)str[i]&0x3f];
}else if(len-i == 2){
encodeStr[k++] = base64[(unsigned char)str[i] >> 2];
encodeStr[k++] = base64[((unsigned char)str[i]&0x03) << 4 | ((unsigned char)str[++i] >> 4)];
encodeStr[k++] = base64[((unsigned char)str[i]&0x0f) << 2];
encodeStr[k++] = '=';
}else{
encodeStr[k++] = base64[(unsigned char)str[i] >> 2];
encodeStr[k++] = base64[((unsigned char)str[i] & 0x03) << 4]; // 末尾补两个等于号
encodeStr[k++] = '=';
encodeStr[k++] = '=';
}
}
encodeStr[k] = '\0';
*in = encodeStr;
}
/**
* 解码既编码的逆过程,先找出编码后的字符在编码之前代表的数字
* 编码中将 3 位个字符变成 4 个字符,得到这 4 个字符的每个字符代表的原本数字
* 因为在编码中间每个字符用 base64 码表进行了替换,所以这里要先换回来
* 在对换回来的数字进行位运算使其还原成 3 个字符
*/
void decodeBase64(char* str,int len,char** in){
char ascill[129];
int k = 0;
for(int i=0;i<64;i++){
ascill[base64[i]] = k++;
}
int decodeStrlen = len / 4 * 3 + 1;
char* decodeStr = (char*)malloc(sizeof(char)*decodeStrlen);
k = 0;
for(int i=0;i<len;i++){
decodeStr[k++] = (ascill[str[i]] << 2) | (ascill[str[++i]] >> 4);
if(str[i+1] == '='){
break;
}
decodeStr[k++] = (ascill[str[i]] << 4) | (ascill[str[++i]] >> 2);
if(str[i+1] == '='){
break;
}
decodeStr[k++] = (ascill[str[i]] << 6) | (ascill[str[++i]]);
}
decodeStr[k] = '\0';
*in = decodeStr;
}
int main(){
char mm[]="UAsFvs3tDyTxFPGb7WbyBYSm05VWrJxgjArj9mx490pfH1LO";
char *mm1;
char *mm2;
encodeBase64(mm,strlen(mm),&mm1);
decodeBase64(mm1,strlen(mm1),&mm2);
puts(mm2);
}
XXTEA
#include <stdint.h>
#define DELTA 0x9e3779b9
#define MX (((z>>5^y<<2) + (y>>3^z<<4)) ^ ((sum^y) + (key[(p&3)^e] ^ z)))
// 容易魔改
void btea(uint32_t * v, int n, uint32_t const key[4]) {
//v 为数据,n 为数据长度 (负时为解密),key 为密钥
uint32_t y, z, sum; unsigned p, rounds, e;
if (n > 1)
/* Coding Part */
{
rounds = 6 + 52 / n;
sum = 0;
z = v[n - 1];
do {
sum += DELTA;
e = (sum >> 2) & 3;
for (p = 0; p < n - 1; p++) {
y = v[p + 1];
z = v[p] += MX;
}
y = v[0];
z = v[n - 1] += MX;
} while (-- rounds );
} else if (n < -1)
/* Decoding Part */
{
n = -n;
rounds = 6 + 52 / n;
sum = rounds * DELTA;
y = v[0];
do {
e = (sum >> 2) & 3;
for (p = n - 1; p > 0; p--) {
z = v[p - 1];
y = v[p] -= MX;
}
z = v[n - 1];
y = v[0] -= MX;
sum -= DELTA;
} while (-- rounds );
}
}
AES
#define _CRT_SECURE_NO_WARNINGS
#include<stdio.h>
void AddRoundKey(unsigned char *plaintext, unsigned char * CipherKey)/* 轮密钥加 */
{
for (int j = 0; j < 16; j++) plaintext[j] = plaintext[j] ^ CipherKey[j];
}
void SubBytes(unsigned char *plaintext, unsigned char *plaintextencrypt, int count)/*S 盒置换 */
{
unsigned int row, column;
unsigned char Sbox[16][16] = {
/* 0 1 2 3 4 5 6 7 8 9 a b c d e f */
/*0*/{ 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76 },
/*1*/{ 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0 },
/*2*/{ 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15 },
/*3*/{ 0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75 },
/*4*/{ 0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84 },
/*5*/{ 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf },
/*6*/{ 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8 },
/*7*/{ 0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2 },
/*8*/{ 0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73 },
/*9*/{ 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb },
/*a*/{ 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79 },
/*b*/{ 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08 },
/*c*/{ 0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a },
/*d*/{ 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e },
/*e*/{ 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf },
/*f*/{ 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16 }
};// 填充 Sbox 矩阵
for (int i = 0; i < count; i++)
{
row = (plaintext[i] & 0xF0) >> 4;
column = plaintext[i] & 0x0F;
plaintextencrypt[i] = Sbox[row][column];
}
}
void SubBytesRe(unsigned char *plaintext, unsigned char *plaintextencrypt, int count)/*S 盒逆置换 */
{
unsigned int row, column;
unsigned char Sbox[16][16] = {
/* 0 1 2 3 4 5 6 7 8 9 a b c d e f */
{0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb},
{0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb},
{0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e},
{0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25},
{0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92},
{0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84},
{0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06},
{0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b},
{0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73},
{0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e},
{0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b},
{0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4},
{0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f},
{0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef},
{0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61},
{0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d}
}; // 填充 Sbox 矩阵
for (int i = 0; i < count; i++)
{
row = (plaintext[i] & 0xF0) >> 4;
column = plaintext[i] & 0x0F;
plaintextencrypt[i] = Sbox[row][column];
}
}
void ShiftRowsRe(unsigned char *plaintextencrypt)/* 行移位的逆 */
{
unsigned char temp = 0;
for (int i = 0; i < 4; i++)// 第 i 行
{
for (int j = 0; j < 4 - i; j++)// 第 j 次左移
{
temp = plaintextencrypt[i];
for (int k = 0; k < 4; k++)
plaintextencrypt[i + 4 * k] = plaintextencrypt[i + 4 * (k + 1)];
plaintextencrypt[i + 12] = temp;
}
}
}
void ShiftRows(unsigned char *plaintextencrypt)/* 行移位 */
{
unsigned char temp = 0;
for (int i = 0; i < 4; i++)// 第 i 行
{
for (int j = 0; j < i; j++)// 第 j 次左移
{
temp = plaintextencrypt[i];
for (int k = 0; k < 4; k++)
plaintextencrypt[i + 4 * k] = plaintextencrypt[i + 4 * (k + 1)];
plaintextencrypt[i + 12] = temp;
}
}
}
unsigned char Mult2(unsigned char num)/* 列混淆 */
{
unsigned char temp = num << 1;
if ((num >> 7) & 0x01)
temp = temp ^ 27;
return temp;
}
unsigned char Mult3(unsigned char num)
{
return Mult2(num) ^ num;
}
void MixColumns(unsigned char *plaintextencrypt, unsigned char *plaintextcrypt)
{
int i;
for (i = 0; i < 4; i++)
plaintextcrypt[4 * i] = Mult2(plaintextencrypt[4 * i]) ^ Mult3(plaintextencrypt[4 * i + 1]) ^ plaintextencrypt[4 * i + 2] ^ plaintextencrypt[4 * i + 3];
for (i = 0; i < 4; i++)
plaintextcrypt[4 * i + 1] = plaintextencrypt[4 * i] ^ Mult2(plaintextencrypt[4 * i + 1]) ^ Mult3(plaintextencrypt[4 * i + 2]) ^ plaintextencrypt[4 * i + 3];
for (i = 0; i < 4; i++)
plaintextcrypt[4 * i + 2] = plaintextencrypt[4 * i] ^ plaintextencrypt[4 * i + 1] ^ Mult2(plaintextencrypt[4 * i + 2]) ^ Mult3(plaintextencrypt[4 * i + 3]);
for (i = 0; i < 4; i++)
plaintextcrypt[4 * i + 3] = Mult3(plaintextencrypt[4 * i]) ^ plaintextencrypt[4 * i + 1] ^ plaintextencrypt[4 * i + 2] ^ Mult2(plaintextencrypt[4 * i + 3]);
}
/* 逆列混淆 */
#define xtime(x) ((x<<1) ^ (((x>>7) & 1) * 0x1b))
#define Multiply(x,y) (((y & 1) * x) ^ ((y>>1 & 1) * xtime(x)) ^ ((y>>2 & 1) * xtime(xtime(x))) ^ ((y>>3 & 1) * xtime(xtime(xtime(x)))) ^ ((y>>4 & 1) * xtime(xtime(xtime(xtime(x))))))
void MixColumnsRe(unsigned char *state)
{
unsigned char a, b, c, d;
for (int i = 0; i < 4; i++)
{
a = state[4*i];
b = state[4*i+1];
c = state[4*i+2];
d = state[4*i+3];
state[4 * i] = Multiply(a, 0x0e) ^ Multiply(b, 0x0b) ^ Multiply(c, 0x0d) ^ Multiply(d, 0x09);
state[4 * i + 1] = Multiply(a, 0x09) ^ Multiply(b, 0x0e) ^ Multiply(c, 0x0b) ^ Multiply(d, 0x0d);
state[4 * i + 2] = Multiply(a, 0x0d) ^ Multiply(b, 0x09) ^ Multiply(c, 0x0e) ^ Multiply(d, 0x0b);
state[4 * i + 3] = Multiply(a, 0x0b) ^ Multiply(b, 0x0d) ^ Multiply(c, 0x09) ^ Multiply(d, 0x0e);
}
}
int CharToWord(unsigned char *character, int first)/* 字节转字 */
{
return (((int)character[first] & 0x000000ff) << 24) | (((int)character[first + 1] & 0x000000ff) << 16) | (((int)character[first + 2] & 0x000000ff) << 8) | ((int)character[first + 3] & 0x000000ff);
}
void WordToChar(unsigned int word, unsigned char *character)/* 字转字节 */
{
for (int i = 0; i < 4; character[i++] = (word >> (8 * (3 - i))) & 0xFF);
}
void ExtendCipherKey(unsigned int *CipherKey_word, int round)/* 密钥扩展 */
{
unsigned char CipherKeyChar[4] = { 0 },CipherKeyCharEncrypt[4] = { 0 };
unsigned int Rcon[10] = { 0x01000000,0x02000000,0x04000000,0x08000000,0x10000000,0x20000000,0x40000000,0x80000000,0x1B000000,0x36000000 }; // 轮常量
for (int i = 4; i < 8; i++)
{
if (!(i % 4))
{
WordToChar((CipherKey_word[i - 1] >> 24) | (CipherKey_word[i - 1] << 8), CipherKeyChar);
SubBytes(CipherKeyChar, CipherKeyCharEncrypt, 4);
CipherKey_word[i] = CipherKey_word[i - 4] ^ CharToWord(CipherKeyCharEncrypt, 0) ^ Rcon[round];
}
else
CipherKey_word[i] = CipherKey_word[i - 4] ^ CipherKey_word[i - 1];
}
}
void main()
{
printf("**************AES加解密***************\n");
int i = 0, k;
unsigned char PlainText[16] = { 0x32,0x43,0xf6,0xa8,0x88,0x5a,0x30,0x8d,0x31,0x31,0x98,0xa2,0xe0,0x37,0x07,0x34 },
CipherKey[16] = { 0x2b,0x7e,0x15,0x16,0x28,0xae,0xd2,0xa6,0xab,0xf7,0x15,0x88,0x09,0xcf,0x4f,0x3c },
CipherKey1[16] = { 0x2b,0x7e,0x15,0x16,0x28,0xae,0xd2,0xa6,0xab,0xf7,0x15,0x88,0x09,0xcf,0x4f,0x3c },
PlainText1[16] = { 0 },
PlainText2[16] = { 0 };
unsigned int CipherKey_word[44] = { 0 };
for (i = 0; i < 4; CipherKey_word[i++] = CharToWord(CipherKey, 4 * i));
printf("密钥:");
for (k = 0; k < 16; k++) printf("%2X ", CipherKey[k]);
printf("\n明文:");
for (k = 0; k < 16; k++) printf("%02X ", PlainText[k]);
printf("\n**************开始加密****************");
AddRoundKey(PlainText, CipherKey);
for (i = 0; i < 9; i++)
{
printf("\n第%d轮循环:\n", i + 1);
SubBytes(PlainText, PlainText1, 16);/*S 盒置换 */
ShiftRows(PlainText1); /* 行移位 */
MixColumns(PlainText1, PlainText2); /* 列混淆 */
ExtendCipherKey(CipherKey_word + 4 * i, i);/* 子密钥生成 */
for (k = 0; k < 4; k++) WordToChar(CipherKey_word[k + 4 * (i + 1)], CipherKey + 4 * k);
printf("此时的子密钥为: ");
for (k = 0; k < 16; k++) printf("%02X ", CipherKey[k]);
AddRoundKey(PlainText2, CipherKey);/* 轮密钥加 */
for (k = 0; k < 16; k++) PlainText[k] = PlainText2[k];
printf("\n当前明文加密之后为:");
for (k = 0; k < 16; k++) printf("%02X ", PlainText2[k]);
printf("\n");
}
printf("\n最后一次循环:\n");
SubBytes(PlainText, PlainText1, 16);
ShiftRows(PlainText1);
ExtendCipherKey(CipherKey_word + 4 * i, i);
for (k = 0; k < 4;WordToChar(CipherKey_word[k + 4 * (i + 1)], CipherKey + 4 * k), k++);
printf("此时的子密钥为: ");
for (k = 0; k < 16; k++) printf("%02X ", CipherKey[k]);
AddRoundKey(PlainText1, CipherKey);
printf("\n\n最终AES加密后的密文为:");
for (i = 0; i < 16; i++) printf("%02X ", PlainText1[i]);
printf("\n\n**************开始解密***************");
AddRoundKey(PlainText1, CipherKey);
for (i = 0; i < 9; i++)
{
printf("\n第%d次循环:", i + 1);
SubBytesRe(PlainText1, PlainText, 16);/*S 盒置换 */
for (k = 0; k < 4; WordToChar(CipherKey_word[k + 40 - 4 * (i + 1)], CipherKey + 4 * k),k++);/* 子密钥生成 */
ShiftRowsRe(PlainText);/* 行移位逆 */
AddRoundKey(PlainText, CipherKey);/* 轮密钥加 */
MixColumnsRe(PlainText);/* 列混淆逆运算 */
for (k = 0; k < 16;PlainText1[k] = PlainText[k],k++);
printf("\n当前密文解密之后为:");
for (k = 0; k < 16; k++)printf("%02X ", PlainText[k]);
printf("\n");
}
printf("\n最后一次循环:");
ShiftRowsRe(PlainText);/* 行移位逆 */
SubBytesRe(PlainText, PlainText1, 16);/*S 盒置换 */
AddRoundKey(PlainText1, CipherKey1);
printf("\n最终AES解密后的明文为:");
for (i = 0; i < 16; i++) printf("%02X ", PlainText1[i]);
printf("\n");
system("pause");
}
BlowFish
// 轮函数
DWORD Feistel(DWORD x)
{
DWORD h = S[0][x >> 24] + S[1][x >> 16 & 0xff];
return (h ^ S[2][x >> 8 & 0xff]) + S[3][x & 0xff];
}
void encrypt(DWORD& XL, DWORD& XR)
{
for (int i = 0; i < 16; i += 2)
{
XL ^= P[i];
XR ^= Feistel(XL);
XR ^= P[i + 1];
XL ^= Feistel(XR);
}
XL ^= P[16];
XR ^= P[17];
swap(XL, XR);
}
void decrypt(DWORD& XL, DWORD& XR)
{
for (int i = 16; i > 0; i -= 2)
{
XL ^= P[i + 1];
XR ^= Feistel(XL);
XR ^= P[i];
XL ^= Feistel(XR);
}
XL ^= P[1];
XR ^= P[0];
swap(XL, XR);
}
from Crypto.Cipher import Blowfish
import codecs
class BlowfishCipher:
def __init__(self):
pass
def encrypt(self, plaintext, key):
key = key.encode("utf-8")
cipher = Blowfish.new(key, Blowfish.MODE_ECB)
# 将明文填充到 8 字节的倍数
plaintext = plaintext.ljust((len(plaintext) + 7) // 8 * 8)
ciphertext = cipher.encrypt(plaintext.encode('utf-8'))
hex_encode = codecs.encode(ciphertext, 'hex_codec').decode('utf-8')
return hex_encode
def decrypt(self, ciphertext, key):
key = key.encode("utf-8")
cipher = Blowfish.new(key, Blowfish.MODE_ECB)
ciphertext = codecs.decode(ciphertext, 'hex_codec')
decrypted_text = cipher.decrypt(ciphertext).decode('utf-8').rstrip()
return decrypted_text
if __name__ == '__main__':
plaintext = ''
key = 'UzBtZTBuZV9EMGcz'
blowfish_cipher = BlowfishCipher()
encrypted_text='11a51f049550e2508f17e16cf1632b47'
decrypted_text = blowfish_cipher.decrypt(encrypted_text, key)
print(f"加密: {encrypted_text}, 解密: {decrypted_text}")
SM4
#include<stdio.h>
#define u8 unsigned char
#define u32 unsigned long
// S 盒
const u8 Sbox[256] = {
0xd6,0x90,0xe9,0xfe,0xcc,0xe1,0x3d,0xb7,0x16,0xb6,0x14,0xc2,0x28,0xfb,0x2c,0x05,
0x2b,0x67,0x9a,0x76,0x2a,0xbe,0x04,0xc3,0xaa,0x44,0x13,0x26,0x49,0x86,0x06,0x99,
0x9c,0x42,0x50,0xf4,0x91,0xef,0x98,0x7a,0x33,0x54,0x0b,0x43,0xed,0xcf,0xac,0x62,
0xe4,0xb3,0x1c,0xa9,0xc9,0x08,0xe8,0x95,0x80,0xdf,0x94,0xfa,0x75,0x8f,0x3f,0xa6,
0x47,0x07,0xa7,0xfc,0xf3,0x73,0x17,0xba,0x83,0x59,0x3c,0x19,0xe6,0x85,0x4f,0xa8,
0x68,0x6b,0x81,0xb2,0x71,0x64,0xda,0x8b,0xf8,0xeb,0x0f,0x4b,0x70,0x56,0x9d,0x35,
0x1e,0x24,0x0e,0x5e,0x63,0x58,0xd1,0xa2,0x25,0x22,0x7c,0x3b,0x01,0x21,0x78,0x87,
0xd4,0x00,0x46,0x57,0x9f,0xd3,0x27,0x52,0x4c,0x36,0x02,0xe7,0xa0,0xc4,0xc8,0x9e,
0xea,0xbf,0x8a,0xd2,0x40,0xc7,0x38,0xb5,0xa3,0xf7,0xf2,0xce,0xf9,0x61,0x15,0xa1,
0xe0,0xae,0x5d,0xa4,0x9b,0x34,0x1a,0x55,0xad,0x93,0x32,0x30,0xf5,0x8c,0xb1,0xe3,
0x1d,0xf6,0xe2,0x2e,0x82,0x66,0xca,0x60,0xc0,0x29,0x23,0xab,0x0d,0x53,0x4e,0x6f,
0xd5,0xdb,0x37,0x45,0xde,0xfd,0x8e,0x2f,0x03,0xff,0x6a,0x72,0x6d,0x6c,0x5b,0x51,
0x8d,0x1b,0xaf,0x92,0xbb,0xdd,0xbc,0x7f,0x11,0xd9,0x5c,0x41,0x1f,0x10,0x5a,0xd8,
0x0a,0xc1,0x31,0x88,0xa5,0xcd,0x7b,0xbd,0x2d,0x74,0xd0,0x12,0xb8,0xe5,0xb4,0xb0,
0x89,0x69,0x97,0x4a,0x0c,0x96,0x77,0x7e,0x65,0xb9,0xf1,0x09,0xc5,0x6e,0xc6,0x84,
0x18,0xf0,0x7d,0xec,0x3a,0xdc,0x4d,0x20,0x79,0xee,0x5f,0x3e,0xd7,0xcb,0x39,0x48
};
// 密钥扩展算法的常数 FK
const u32 FK[4] = {
0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc
};
// 密钥扩展算法的固定参数 CK
const u32 CK[32] = {
0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269,
0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9,
0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249,
0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9,
0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229,
0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,
0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209,
0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279
};
u32 functionB(u32 b); // 查 S 盒的函数 B
u32 loopLeft(u32 a, short length); // 循环左移函数
u32 functionL1(u32 a); // 线性变换 L
u32 functionL2(u32 a); // 线性变换 L'
u32 functionT(u32 a, short mode); // 合成变换 T
void extendFirst(u32 MK[], u32 K[]); // 密钥扩展算法第一步
void extendSecond(u32 RK[], u32 K[]); // 密钥扩展算法第二步
void getRK(u32 MK[], u32 K[], u32 RK[]); // 轮密钥获取算法
void iterate32(u32 X[], u32 RK[]); // 迭代算法
void reverse(u32 X[], u32 Y[]); // 反转函数
void encryptSM4(u32 X[], u32 RK[], u32 Y[]); // 加密算法
void decryptSM4(u32 X[], u32 RK[], u32 Y[]); // 解密算法
/*
查 S 盒的函数 B
参数: u32 b
返回值: 查 S 盒的结果 u32 b
*/
u32 functionB(u32 b) {
u8 a[4];
short i;
a[0] = b / 0x1000000;
a[1] = b / 0x10000;
a[2] = b / 0x100;
a[3] = b;
b = Sbox[a[0]] * 0x1000000 + Sbox[a[1]] * 0x10000 + Sbox[a[2]] * 0x100 + Sbox[a[3]];
return b;
}
/*
循环左移算法
参数: u32 a length:循环左移位数
返回值:u32 b
*/
u32 loopLeft(u32 a, short length) {
short i;
for(i = 0; i < length; i++) {
a = a * 2 + a / 0x80000000;
}
return a;
}
/*
密钥线性变换函数 L
参数: u32 a
返回值:线性变换后的 u32 a
*/
u32 functionL1(u32 a) {
return a ^ loopLeft(a, 2) ^ loopLeft(a, 10) ^ loopLeft(a, 18) ^ loopLeft(a, 24);
}
/*
密钥线性变换函数 L'
参数: u32 a
返回值:移位操作后的 u32 a
*/
u32 functionL2(u32 a) {
return a ^ loopLeft(a, 13) ^ loopLeft(a, 23);
}
/*
合成变换 T
参数: u32 a short mode:1 表示明文的 T,调用 L;2 表示密钥的 T,调用 L'
返回值:合成变换后的 u32 a
*/
u32 functionT(u32 a, short mode) {
return mode == 1 ? functionL1(functionB(a)) : functionL2(functionB(a));
}
/*
密钥扩展算法第一步
参数: MK [4]:密钥 K [4]: 中间数据,保存结果 (FK [4]:常数)
返回值:无
*/
void extendFirst(u32 MK[], u32 K[]) {
int i;
for(i = 0; i < 4; i++) {
K[i] = MK[i] ^ FK[i];
}
}
/*
密钥扩展算法第二步
参数: RK [32]:轮密钥,保存结果 K [4]:中间数据 (CK [32]:固定参数)
返回值:无
*/
void extendSecond(u32 RK[], u32 K[]) {
short i;
for(i = 0; i <32; i++) {
K[(i+4)%4] = K[i%4] ^ functionT(K[(i+1)%4] ^ K[(i+2)%4] ^ K[(i+3)%4] ^ CK[i], 2);
RK[i] = K[(i+4)%4];
}
}
/*
密钥扩展算法
参数: MK [4]:密钥 K [4]:中间数据 RK [32]:轮密钥,保存结果
返回值:无
*/
void getRK(u32 MK[], u32 K[], u32 RK[]) {
extendFirst(MK, K);
extendSecond(RK, K);
}
/*
迭代 32 次
参数: u32 X [4]:迭代对象,保存结果 u32 RK [32]:轮密钥
返回值:无
*/
void iterate32(u32 X[], u32 RK[]) {
short i;
for(i = 0; i < 32; i++) {
X[(i+4)%4] = X[i%4] ^ functionT(X[(i+1)%4] ^ X[(i+2)%4] ^ X[(i+3)%4] ^ RK[i], 1);
}
}
/*
反转函数
参数; u32 X [4]:反转对象 u32 Y [4]:反转结果
返回值:无
*/
void reverse(u32 X[], u32 Y[]) {
short i;
for(i = 0; i < 4; i++){
Y[i] = X[4 - 1 - i];
}
}
/*
加密算法
参数: u32 X [4]:明文 u32 RK [32]:轮密钥 u32 Y [4]:密文,保存结果
返回值:无
*/
void encryptSM4(u32 X[], u32 RK[], u32 Y[]) {
iterate32(X, RK);
reverse(X, Y);
}
/*
解密算法
参数: u32 X [4]:密文 u32 RK [32]:轮密钥 u32 Y [4]:明文,保存结果
返回值:无
*/
void decryptSM4(u32 X[], u32 RK[], u32 Y[]) {
short i;
u32 reverseRK[32];
for(i = 0; i < 32; i++) {
reverseRK[i] = RK[32-1-i];
}
iterate32(X, reverseRK);
reverse(X, Y);
}
/*
测试数据:
明文: 01234567 89abcdef fedcba98 76543210
密钥: 01234567 89abcdef fedcba98 76543210
密文: 681edf34 d206965e 86b3e94f 536e4246
*/
int main(void) {
u32 X[4]; // 明文
u32 MK[4]; // 密钥
u32 RK[32]; // 轮密钥
u32 K[4]; // 中间数据
u32 Y[4]; // 密文
short i; // 临时变量
printf("明文:");
scanf("%8x%8x%8x%8x", &X[0], &X[1], &X[2], &X[3]);
printf("密钥:");
scanf("%8x%8x%8x%8x", &MK[0], &MK[1], &MK[2], &MK[3]);
printf("**************生成轮密钥*****************\n");
getRK(MK, K, RK);
for(i = 0; i < 32; i++) {
printf("[%2d]:%08x ", i, RK[i]);
if(i%4 == 3) printf("\n");
}
printf("************** 生成密文 *****************\n");
encryptSM4(X, RK, Y);
printf("%08x %08x %08x %08x\n", Y[0], Y[1], Y[2], Y[3]);
printf("************** 生成明文 *****************\n");
decryptSM4(Y, RK, X);
printf("%08x %08x %08x %08x\n", X[0], X[1], X[2], X[3]);
return 0;
}
DES
#include<stdio.h>
#include<string.h>
#include<stdlib.h>
#include"table.h"// 存储各种数据表的头文件
// 十六轮子密钥
static bool SubKey[16][48] = { 0 };
/*----------------------------- 自定义函数 -----------------------------*/
void SetKey(char My_key[8]); // 生成 16 轮的子密钥
void ByteToBit(bool * Data_out, char * Data_in, int Num); // 字节转换成位
void BitToByte(char My_message[8], bool * Message_in, int Num); // 位转换成字节
void TableReplace(bool *Data_out, bool *Data_in, const char *Table, int Num); // 各种表的置换算法
void Bitcopy(bool * Data_out, bool * Data_in, int Num); // 二进制数组的拷贝
void Loop_bit(bool * Data_out, int movstep, int len); // 左移
void Run_Des(char My_message[8], char CIPhertext[64]);//des 的轮加密算法
void Xor(bool * Message_out, bool * Message_in, int Num); // 执行异或
void S_change(bool * Data_out, bool * Data_in); // S 盒变换
void Run_desDes(char My_message[8], char CIPhertext[64]);// DES 轮解密算法
/*--------------------------*/
/*-------------------------- 主函数 ----------------------------------*/
int main()
1
{
int i = 0, j;
char My_key[8] = { 0 }; // 记录加密密钥
char You_key[8] = { 0 }; // 解密密钥
char My_message[8] = { 0 }; // 明文
char CIPhertext[64] = { 0 };// 密文
printf("请输入你要加密的内容(8 Byte):\n");
scanf("%s", My_message);
printf("请输入你的加密密钥(8 Byte):\n");
scanf("%s", My_key);
i = strlen(My_key);
while (i != 8)// 确保密钥长度为 8byte
{
printf("请输入加密密钥(8 Byte)\n");
scanf("%s", My_key);
i = 0;
i = strlen(My_key);
}
SetKey(My_key); // 生成 16 轮的加密子密钥
Run_Des(My_message, CIPhertext); //des 的轮加密过程
printf("经过加密的密文为(二进制):\n");
printf("%s", CIPhertext);
printf("\n");
Run_desDes(My_message, CIPhertext);// 解密;
printf("解密结果为:\n");
printf("%s", My_message);
printf("\n");
return 0;
}
/*-------------------- 具体函数定义 ----------------------*/
void Bitcopy(bool * Data_out, bool * Data_in, int Num) // 二进制数组拷贝
{
int i = 0;
for (i = 0; i < Num; i++)
Data_out[i] = Data_in[i];
}
void ByteToBit(bool * Data_out, char * Data_in, int Num) // 字节转位,num 为二进制位数
{
int i, j;
for (i = 0; i < Num; i++)
Data_out[i] = (Data_in[i / 8] >> (i % 8)) & 0x01;
}
void BitToByte(char My_message[8], bool * Message_in, int Num) // 位转换成字节,num 为位数
{
int i = 0;
for (i = 0; i < (Num / 8); i++)
My_message[i] = 0;
for (i = 0; i < Num; i++)
My_message[i / 8] |= Message_in[i] << (i % 8);
}
void TableReplace(bool *Data_out, bool * Data_in, const char *Table, int Num) // 置换算法,Num 表示置换表的长度
{
int i = 0;
static bool Temp[256] = { 0 };
for (i = 0; i < Num; i++)
{
Temp[i] = Data_in[Table[i] - 1];// 将输入数据的指定位置作为输出数据的第 i 位
}
Bitcopy(Data_out, Temp, Num);
}
void Loop_bit(bool * Data_out, int movstep, int len)// 左循环移位
{
static bool Temp[256] = { 0 };
Bitcopy(Temp, Data_out, movstep);// 将前 movstep 位数据放入 temp 缓存
Bitcopy(Data_out, Data_out + movstep, len - movstep);// 数据依次向左移位
Bitcopy(Data_out + len - movstep, Temp, movstep);// 将 temp 中缓存的数据放入最后
}
void Xor(bool * Message_out, bool * Message_in, int Num)// 执行异或
{
int i;
for (i = 0; i < Num; i++)
{
Message_out[i] = Message_out[i] ^ Message_in[i];
}
}
void SetKey(char My_key[8])//8 字节的初始密钥
{
int i, j;
static bool Key_bit[64] = { 0 }; //Key 的二进制缓存
static bool *Key_bit_L, *Key_bit_R;
Key_bit_L = &Key_bit[0]; //key 的左边 28 位
Key_bit_R = &Key_bit[28]; //key 的右边 28 位
ByteToBit(Key_bit, My_key, 64);
TableReplace(Key_bit, Key_bit, PC1_Table, 56);//pc-1 置换
for (i = 0; i < 16; i++)// 生成第 i 个子密钥 Subkey [i]
{
Loop_bit(Key_bit_L, Move_Table[i], 28);// 左边 28 位进行左循环移位
Loop_bit(Key_bit_R, Move_Table[i], 28);// 右边 28 位进行左循环移位
TableReplace(SubKey[i], Key_bit, PC2_Table, 48);//pc-2 置换
}
}
void S_change(bool * Data_out, bool * Data_in) //S 盒变换
{
int i;
int r = 0, c = 0;//S 盒的行和列
for (i = 0; i < 8; i++, Data_in = Data_in + 6, Data_out = Data_out + 4) // 每 6bit 输入进行一次代换
{
r = Data_in[0] * 2 + Data_in[5] * 1;// 将 m1m6 转换为十进制数,作为行数
c = Data_in[1] * 8 + Data_in[2] * 4 + Data_in[3] * 2 + Data_in[4] * 1;// 将 m2m3m4m5 转换为十进制数,作为列数
ByteToBit(Data_out, &S_Box[i][r][c], 4);// 取 S 盒数据,将其二进制形式的每一位填到输出的指定位置
}
}
void F_change(bool Data_out[32], bool Data_in[48]) //f 函数
{
int i;
static bool Message_E[48] = { 0 }; // 存放 E 置换的结果
TableReplace(Message_E, Data_out, E_Table, 48);//E 表置换
Xor(Message_E, Data_in, 48);// 与密钥 K [i] 异或
S_change(Data_out, Message_E); // S 盒变换
TableReplace(Data_out, Data_out, P_Table, 32); //P 置换
}
void Run_Des(char My_message[8], char CIPhertext[64])//des 轮加密算法
{
int i;
static bool Message_bit[64] = { 0 };
static bool *Message_bit_L = &Message_bit[0], *Message_bit_R = &Message_bit[32];// 分成左右两部分,每部分 32 位
static bool Temp[32] = { 0 };
ByteToBit(Message_bit, My_message, 64);
TableReplace(Message_bit, Message_bit, IP_Table, 64);// 初始置换
for (i = 0; i < 16; i++)// 每一轮的加密
{
Bitcopy(Temp, Message_bit_R, 32);// 缓存右 32 位
F_change(Message_bit_R, SubKey[i]);// 轮函数 F
Xor(Message_bit_R, Message_bit_L, 32);// 左 32 位与轮函数 F 输出进行异或
Bitcopy(Message_bit_L, Temp, 32);// 右 32 位 R (i-1) 作为下一轮的 Li
}
TableReplace(Message_bit, Message_bit, IPR_Table, 64);// 逆初始置换
for (i = 0; i < 64;i++)
CIPhertext[i] = Message_bit[i]+'0';// 由于是将 bool 型数据赋给字符型数据,因此要 +'0'
CIPhertext[i] = '\0';
}
void Run_desDes(char My_message[8], char CIPhertext[64])// DES 轮解密算法
{
int i = 0;
static bool Message_bit[64] = { 0 };
static bool * Message_bit_L = &Message_bit[0], *Message_bit_R = &Message_bit[32];
static bool Temp[32] = { 0 };
for (i = 0; i < 64; i++)
Message_bit[i] = CIPhertext[i]-'0';
TableReplace(Message_bit, Message_bit, IP_Table, 64);
for (i = 15; i >= 0; i--)// 与加密过程的区别是子密钥使用顺序相反
{
Bitcopy(Temp, Message_bit_L, 32);
F_change(Message_bit_L, SubKey[i]);
Xor(Message_bit_L, Message_bit_R, 32);
Bitcopy(Message_bit_R, Temp, 32); }
TableReplace(Message_bit, Message_bit, IPR_Table, 64);
BitToByte(My_message, Message_bit, 64);
}
}
#pragma once
// IP置换表
const char IP_Table[64] = {
58,50,42,34,26,18,10, 2,60,52,44,36,28,20,12, 4,
62,54,46,38,30,22,14, 6,64,56,48,40,32,24,16, 8,
57,49,41,33,25,17, 9, 1,59,51,43,35,27,19,11, 3,
61,53,45,37,29,21,13, 5,63,55,47,39,31,23,15, 7
};
// IP-1置换表
const char IPR_Table[64] = {
40, 8,48,16,56,24,64,32,39, 7,47,15,55,23,63,31,
38, 6,46,14,54,22,62,30,37, 5,45,13,53,21,61,29,
36, 4,44,12,52,20,60,28,35, 3,43,11,51,19,59,27,
34, 2,42,10,50,18,58,26,33, 1,41, 9,49,17,57,25
};
// E扩展表
static char E_Table[48] = {
32, 1, 2, 3, 4, 5, 4, 5, 6, 7, 8, 9,
8, 9,10,11,12,13,12,13,14,15,16,17,
16,17,18,19,20,21,20,21,22,23,24,25,
24,25,26,27,28,29,28,29,30,31,32, 1
};
// PC1置换表
static char PC1_Table[56] = {
57,49,41,33,25,17, 9, 1,58,50,42,34,26,18,
10, 2,59,51,43,35,27,19,11, 3,60,52,44,36,
63,55,47,39,31,23,15, 7,62,54,46,38,30,22,
14, 6,61,53,45,37,29,21,13, 5,28,20,12, 4
};
// pc2表
static char PC2_Table[48] = {
14,17,11,24, 1, 5, 3,28,15, 6,21,10,
23,19,12, 4,26, 8,16, 7,27,20,13, 2,
41,52,31,37,47,55,30,40,51,45,33,48,
44,49,39,56,34,53,46,42,50,36,29,32
};
// 移位表
static char Move_Table[16] = {
1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1
};
// S盒
static char S_Box[8][4][16] = {
//S1
14, 4,13, 1, 2,15,11, 8, 3,10, 6,12, 5, 9, 0, 7,
0,15, 7, 4,14, 2,13, 1,10, 6,12,11, 9, 5, 3, 8,
4, 1,14, 8,13, 6, 2,11,15,12, 9, 7, 3,10, 5, 0,
15,12, 8, 2, 4, 9, 1, 7, 5,11, 3,14,10, 0, 6,13,
//S2
15, 1, 8,14, 6,11, 3, 4, 9, 7, 2,13,12, 0, 5,10,
3,13, 4, 7,15, 2, 8,14,12, 0, 1,10, 6, 9,11, 5,
0,14, 7,11,10, 4,13, 1, 5, 8,12, 6, 9, 3, 2,15,
13, 8,10, 1, 3,15, 4, 2,11, 6, 7,12, 0, 5,14, 9,
//S3
10, 0, 9,14, 6, 3,15, 5, 1,13,12, 7,11, 4, 2, 8,
13, 7, 0, 9, 3, 4, 6,10, 2, 8, 5,14,12,11,15, 1,
13, 6, 4, 9, 8,15, 3, 0,11, 1, 2,12, 5,10,14, 7,
1,10,13, 0, 6, 9, 8, 7, 4,15,14, 3,11, 5, 2,12,
//S4
7,13,14, 3, 0, 6, 9,10, 1, 2, 8, 5,11,12, 4,15,
13, 8,11, 5, 6,15, 0, 3, 4, 7, 2,12, 1,10,14, 9,
10, 6, 9, 0,12,11, 7,13,15, 1, 3,14, 5, 2, 8, 4,
3,15, 0, 6,10, 1,13, 8, 9, 4, 5,11,12, 7, 2,14,
//S5
2,12, 4, 1, 7,10,11, 6, 8, 5, 3,15,13, 0,14, 9,
14,11, 2,12, 4, 7,13, 1, 5, 0,15,10, 3, 9, 8, 6,
4, 2, 1,11,10,13, 7, 8,15, 9,12, 5, 6, 3, 0,14,
11, 8,12, 7, 1,14, 2,13, 6,15, 0, 9,10, 4, 5, 3,
//S6
12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11,
10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8,
9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6,
4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13,
//S7
4,11, 2,14,15, 0, 8,13, 3,12, 9, 7, 5,10, 6, 1,
13, 0,11, 7, 4, 0, 1,10,14, 3, 5,12, 2,15, 8, 6,
1, 4,11,13,12, 3, 7,14,10,15, 6, 8, 0, 5, 9, 2,
6,11,13, 8, 1, 4,10, 7, 9, 5, 0,15,14, 2, 3,12,
//S8
13, 2, 8, 4, 6,15,11, 1,10, 9, 3,14, 5, 0,12, 7,
1,15,13, 8,10, 3, 7, 4,12, 5, 6,11, 0,14, 9, 2,
7,11, 4, 1, 9,12,14, 2, 0, 6,10,13,15, 3, 5, 8,
2, 1,14, 7, 4,10, 8,13,15,12, 9, 0, 3, 5, 6,11
};
//P置换表
static char P_Table[32] = {
16, 7,20,21,29,12,28,17, 1,15,23,26, 5,18,31,10,
2, 8,24,14,32,27, 3, 9,19,13,30, 6,22,11, 4,25
};
BASE58
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
unsigned char* en_base58(unsigned char* input) // 编码
{
static char* nb58 = (char*)"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz";
size_t len = strlen((char*)input);
size_t rlen = (len / 2 + 1) * 3;
unsigned char* ret = (unsigned char*)malloc(rlen + len);
unsigned char* src = ret + rlen;
unsigned char* rptr = ret + rlen;
unsigned char* ptr, * e = src + len - 1;
size_t i;
memcpy(src, input, len);
while (src <= e)
{
if (*src)
{
unsigned char rest = 0;
ptr = src;
while (ptr <= e)
{
unsigned int c = rest * 256;
rest = (c + *ptr) % 58;
*ptr = (c + *ptr) / 58;
ptr++;
}
--rptr;
*rptr = nb58[rest];
}
else
{
src++;
}
}
for (i = 0; i < ret + rlen - rptr; i++)
ret[i] = rptr[i];
ret[i] = 0;
return ret;
}
bool de_base58(unsigned char* src) // 解码
{
static char b58n[] =
{
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, 0, 1, 2, 3, 4, 5, 6, 7, 8, -1, -1, -1, -1, -1, -1,
-1, 9, 10, 11, 12, 13, 14, 15, 16, -1, 17, 18, 19, 20, 21, -1,
22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, -1, -1, -1, -1, -1,
-1, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, -1, 44, 45, 46,
47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
};
size_t len = strlen((char*)src);
size_t rlen = (len / 4 + 1) * 3;
unsigned char* ret = (unsigned char*)malloc(rlen);
unsigned char* rptr = ret + rlen;
size_t i;
unsigned char* ptr;
for (i = 0; i < len; i++)
{
char rest = b58n[src[i]];
if (rest < 0)
{
free(ret);
return NULL;
}
for (ptr = ret + rlen - 1; ptr >= rptr; ptr--)
{
unsigned int c = rest + *ptr * 58;
*ptr = c % 256;
rest = c / 256;
}
if (rest > 0)
{
rptr--;
if (rptr < ret)
{
free(ret);
return NULL;
}
*rptr = rest;
}
}
for (i = 0; i < ret + rlen - rptr; i++)
ret[i] = rptr[i];
ret[i] = 0;
memcpy(src, ret, strlen((char*)src));
}
int main()
{
char str[] = "9EGJCxbxRGT";
printf("%s\n", en_base58((unsigned char*)"12345678"));
de_base58((unsigned char*)str);
printf("%s", str);
getchar();
return 0;
}
SHA1
#include<stdio.h>
#include<stdlib.h>
#include<string.h>
#define rol(x,y) ((x<<y)|(x>>(32-y))) // 循环左移
// 一次循环过程,str 为填充后的数据或是数据中的一部分
void round(unsigned char str[64],unsigned int h[5]){
unsigned int a, b, c, d, e,tmp,w[80];
unsigned int i;
for(i=0;i<16;i++){
w[i]=((unsigned int)str[i*4]<<24)|(((unsigned int)str[i*4+1])<<16)|
(((unsigned int)str[i*4+2])<<8)|(((unsigned int)str[i*4+3])<<0);
}
for (i=16;i<80;i++ ){
tmp = w[i-3]^w[i-8]^w[i-14]^w[i-16];
w[i]=rol(tmp,1);
}
a=h[0];b=h[1];c=h[2];d=h[3];e=h[4];
for(i=0;i<80;i++){
switch(i/20){
case 0:tmp=rol(a,5)+((b&c)|(d&~b))+e+w[i]+0x5a827999;break;
case 1:tmp=rol(a,5)+(b^c^d)+e+w[i]+0x6ed9eba1;break;
case 2:tmp=rol(a,5)+((b&c)|(b&d)|(c&d))+e+w[i] +0x8f1bbcdc;break;
case 3:tmp=rol(a,5)+(b^c^d)+e+w[i] + 0xca62c1d6;break;
}
e=d;d=c;
c=rol(b,30);
b=a;a=tmp;
}
h[0]+=a;h[1]+=b;h[2]+=c;h[3]+=d;h[4]+=e;
}
//sha-1 算法
void sha1(unsigned char*input,long long len,unsigned char*output){
unsigned char temp[64];
unsigned int h[5]={0x67452301,0xefcdab89,0x98badcfe,0x10325476,0xc3d2e1f0};
unsigned int i,n=len,tmp;
while(n>=64){
memcpy(temp,input+len-n,64);
round(temp,h);
n-=64;
}
if(n>=56){
memset(temp,0,64);
memcpy(temp,input+len-n,n);temp[n]=128;
round(temp,h);
memset(temp,0,64);
for(i=56;i<64;i++)
temp[i]=((len*8)>>(63-i)*8)&0xff;
round(temp,h);
}
else{
memset(temp,0,64);
memcpy(temp,input+len-n,n);temp[n]=128;
for(i=56;i<64;i++)
temp[i]=((len*8)>>(63-i)*8)&0xff;
round(temp,h);
}
for(i=0;i<20;i++){
tmp=(h[i/4]>>((3-i%4)*8))&0xff;
sprintf((char*)output+2*i,"%02x",tmp);
}
}
// 测试
int main(){
unsigned char input[]="this is a test aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",output[40]={0};
sha1(input,strlen((char*)input),output);
printf("%s\n",output);
}
RC4
#include<stdio.h>
#include<stdlib.h>
#include<string.h>
//s 表的长度取 256
#define size 256
unsigned char sbox[257]={0};
// 初始化 s 表
void init_sbox(unsigned char*key){
unsigned int i,j,k;
int tmp;
for(i=0;i<size;i++){
sbox[i]=i;
}
j=k=0;
for(i=0;i<size;i++){
tmp=sbox[i];
j=(j+tmp+key[k])%size;
sbox[i]=sbox[j];
sbox[j]=tmp;
if(++k>=strlen((char*)key))k=0;
}
}
// 加解密函数
void enc_dec(unsigned char*key,unsigned char*data){
int i,j,k,R,tmp;
init_sbox(key);
j=k=0;
for(i=0;i<strlen((char*)data);i++){
j=(j+1)%size;
k=(k+sbox[j])%size;
tmp=sbox[j];
sbox[j]=sbox[k];
sbox[k]=tmp;
R=sbox[(sbox[j]+sbox[k])%size];
data[i]^=R;
}
}
int main(){
unsigned char key[100]={0};
unsigned char data[100]={0};
printf("输入你要加密的字符:");
scanf("%100s",data);
printf("输入密钥:");
scanf("%40s",key);
enc_dec(key,data);
printf("enc: %s\n",data);
enc_dec(key,data);
printf("dec: %s\n",data);
return 0;
}
def rc4(key: bytes, data: bytes) -> bytes:
S = list(range(256))
j = 0
key_length = len(key)
for i in range(256):
j = (j + S[i] + key[i % key_length]) % 256
S[i], S[j] = S[j], S[i]
i = 0
j = 0
out = bytearray()
for byte in data:
i = (i + 1) % 256
j = (j + S[i]) % 256
S[i], S[j] = S[j], S[i]
k = S[(S[i] + S[j]) % 256]
out.append(byte ^ k)
return bytes(out)