实验3 对称密码算法DES文档格式.docx

上传人:b****5 文档编号:18526271 上传时间:2022-12-19 格式:DOCX 页数:20 大小:114.81KB
下载 相关 举报
实验3 对称密码算法DES文档格式.docx_第1页
第1页 / 共20页
实验3 对称密码算法DES文档格式.docx_第2页
第2页 / 共20页
实验3 对称密码算法DES文档格式.docx_第3页
第3页 / 共20页
实验3 对称密码算法DES文档格式.docx_第4页
第4页 / 共20页
实验3 对称密码算法DES文档格式.docx_第5页
第5页 / 共20页
点击查看更多>>
下载资源
资源描述

实验3 对称密码算法DES文档格式.docx

《实验3 对称密码算法DES文档格式.docx》由会员分享,可在线阅读,更多相关《实验3 对称密码算法DES文档格式.docx(20页珍藏版)》请在冰豆网上搜索。

实验3 对称密码算法DES文档格式.docx

#definePLAIN_FILE_OPEN_ERROR-1

#defineKEY_FILE_OPEN_ERROR-2

#defineCIPHER_FILE_OPEN_ERROR-3

#defineOK1

typedefcharElemType;

//初始置换表IP

intIP_Table[64]={57,49,41,33,25,17,9,1,

59,51,43,35,27,19,11,3,

61,53,45,37,29,21,13,5,

63,55,47,39,31,23,15,7,

56,48,40,32,24,16,8,0,

58,50,42,34,26,18,10,2,

60,52,44,36,28,20,12,4,

62,54,46,38,30,22,14,6};

//逆初始置换表IP^-1

intIP_1_Table[64]={39,7,47,15,55,23,63,31,

38,6,46,14,54,22,62,30,

37,5,45,13,53,21,61,29,

36,4,44,12,52,20,60,28,

35,3,43,11,51,19,59,27,

34,2,42,10,50,18,58,26,

33,1,41,9,49,17,57,25,

32,0,40,8,48,16,56,24};

//扩充置换表E32--->

48

intE_Table[48]={31,0,1,2,3,4,

3,4,5,6,7,8,

7,8,9,10,11,12,

11,12,13,14,15,16,

15,16,17,18,19,20,

19,20,21,22,23,24,

23,24,25,26,27,28,

27,28,29,30,31,0};

//置换函数P

intP_Table[32]={15,6,19,20,28,11,27,16,

0,14,22,25,4,17,30,9,

1,7,23,13,31,26,2,8,

18,12,29,5,21,10,3,24};

//S盒

intS[8][4][16]=//S1

{{{14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7},

{0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8},

{4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0},

{15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13}},

//S2

{{15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10},

{3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5},

{0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15},

{13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9}},

//S3

{{10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8},

{13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1},

{13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7},

{1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12}},

//S4

{{7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15},

{13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9},

{10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4},

{3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14}},

//S5

{{2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9},

{14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6},

{4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14},

{11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3}},

//S6

{{12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11},

{10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8},

{9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6},

{4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13}},

//S7

{{4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1},

{13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6},

{1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2},

{6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12}},

//S8

{{13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7},

{1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2},

{7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8},

{2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11}}};

//置换选择1

intPC_1[56]={56,48,40,32,24,16,8,

0,57,49,41,33,25,17,

9,1,58,50,42,34,26,

18,10,2,59,51,43,35,

62,54,46,38,30,22,14,

6,61,53,45,37,29,21,

13,5,60,52,44,36,28,

20,12,4,27,19,11,3};

//置换选择2

intPC_2[48]={13,16,10,23,0,4,2,27,

14,5,20,9,22,18,11,3,

25,7,15,6,26,19,12,1,

40,51,30,36,46,54,29,39,

50,44,32,46,43,48,38,55,

33,52,45,41,49,35,28,31};

//对左移次数的规定

intMOVE_TIMES[16]={1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,1};

intByteToBit(ElemTypech,ElemTypebit[8]);

intBitToByte(ElemTypebit[8],ElemType*ch);

intChar8ToBit64(ElemTypech[8],ElemTypebit[64]);

intBit64ToChar8(ElemTypebit[64],ElemTypech[8]);

intDES_MakeSubKeys(ElemTypekey[64],ElemTypesubKeys[16][48]);

intDES_PC1_Transform(ElemTypekey[64],ElemTypetempbts[56]);

intDES_PC2_Transform(ElemTypekey[56],ElemTypetempbts[48]);

intDES_ROL(ElemTypedata[56],inttime);

intDES_IP_Transform(ElemTypedata[64]);

intDES_IP_1_Transform(ElemTypedata[64]);

intDES_E_Transform(ElemTypedata[48]);

intDES_P_Transform(ElemTypedata[32]);

intDES_SBOX(ElemTypedata[48]);

intDES_XOR(ElemTypeR[48],ElemTypeL[48],intcount);

//异或操作

intDES_Swap(ElemTypeleft[32],ElemTyperight[32]);

//交换L分组与R分组交换.

intDES_EncryptBlock(ElemTypeplainBlock[8],ElemTypesubKeys[16][48],ElemTypecipherBlock[8]);

intDES_DecryptBlock(ElemTypecipherBlock[8],ElemTypesubKeys[16][48],ElemTypeplainBlock[8]);

intDES_Encrypt(char*plainFile,char*keyStr,char*cipherFile);

intDES_Decrypt(char*cipherFile,char*keyStr,char*plainFile);

//字节转换成二进制

intByteToBit(ElemTypech,ElemTypebit[8]){

intcnt;

for(cnt=0;

cnt<

8;

cnt++){

*(bit+cnt)=(ch>

>

cnt)&

1;

//右移cnt位,与1相与.将字节装入8位二进制数组中.倒序装入

}//7=00000111,bit={11100000}

//printf("

%s"

bit);

return0;

}

//二进制转换成字节

intBitToByte(ElemTypebit[8],ElemType*ch){

*ch|=*(bit+cnt)<

<

cnt;

//为*

(1)+*(10)+*(100)+0000+00000+0000000...=7

}

//将长度为8的字符串转为二进制位串

intChar8ToBit64(ElemTypech[8],ElemTypebit[64]){

cnt<

ByteToBit(*(ch+cnt),bit+(cnt<

3));

//cnt<

3即为cnt*8

//将二进制位串转为长度为8的字符串

intBit64ToChar8(ElemTypebit[64],ElemTypech[8]){

memset(ch,0,8);

//以ch为起点的8位空间数组置0.

BitToByte(bit+(cnt<

3),ch+cnt);

//IP置换

intDES_IP_Transform(ElemTypedata[64]){

ElemTypetemp[64];

64;

temp[cnt]=data[IP_Table[cnt]];

memcpy(data,temp,64);

//由temp所指内存区域复制64个字节到data所指内存区域,与strcpy同.

//IP逆置换

intDES_IP_1_Transform(ElemTypedata[64]){

temp[cnt]=data[IP_1_Table[cnt]];

//由temp所指内存区域复制64个字节到data所指内存区域,与strcpy同

}

//密钥置换1pc-1

intDES_PC1_Transform(ElemTypekey[64],ElemTypetempbts[56]){

56;

tempbts[cnt]=key[PC_1[cnt]];

//密钥置换2pc-2

intDES_PC2_Transform(ElemTypekey[56],ElemTypetempbts[48]){

48;

tempbts[cnt]=key[PC_2[cnt]];

//E扩展置换

intDES_E_Transform(ElemTypedata[48]){//这里data两种用处,故为48位极人臣

ElemTypetemp[48];

temp[cnt]=data[E_Table[cnt]];

//这里data下标最高为32.

memcpy(data,temp,48);

//P置换

intDES_P_Transform(ElemTypedata[32]){

ElemTypetemp[32];

32;

temp[cnt]=data[P_Table[cnt]];

memcpy(data,temp,32);

//循环左移

//左右两边同时循环左移相同的位数.

//10010循环左移1位为00101,左移2位为01010

intDES_ROL(ElemTypedata[56],inttimes){

ElemTypetemp[56];

//temp只保存将要循环到右边的位.

//保存将要循环移动到右边的位

memcpy(temp,data,times);

//保存前28位的移位

memcpy(temp+times,data+28,times);

//保存后28位的移位极人臣

//前28位移动

memcpy(data,data+times,28-times);

//一般移位

memcpy(data+28-times,temp,times);

//循环位移动

//后28位移动

memcpy(data+28,data+28+times,28-times);

memcpy(data+56-times,temp+times,times);

//生成子密钥

intDES_MakeSubKeys(ElemTypekey[64],ElemTypesubKeys[16][48]){

DES_PC1_Transform(key,temp);

//PC1置换

16;

cnt++){//16轮跌代,产生16个子密钥

DES_ROL(temp,MOVE_TIMES[cnt]);

//CiDi左右两边,循环左移

DES_PC2_Transform(temp,subKeys[cnt]);

//PC2置换,产生子密钥

//异或

intDES_XOR(ElemTypeR[48],ElemTypeL[48],intcount){

count;

R[cnt]^=L[cnt];

//异或即为模2加法

//S盒置换48=8*632=8*4

intDES_SBOX(ElemTypedata[48]){

intline,row,output;

intcur1,cur2;

cur1=cnt*6;

cur2=cnt<

2;

//计算在S盒中的行与列b1b2b3b4b5b6b1b2//b3b4b5b6

line=(data[cur1]<

1)+data[cur1+5];

row=(data[cur1+1]<

3)+(data[cur1+2]<

2)

+(data[cur1+3]<

1)+data[cur1+4];

output=S[cnt][line][row];

//化为2进制

data[cur2]=(output&

0X08)>

3;

//取得output二进制倒数第4位为0还是1

data[cur2+1]=(output&

0X04)>

//output=7=0111oxo4=0100

data[cur2+2]=(output&

0X02)>

//相&

得到0100右移2位得到1

data[cur2+3]=output&

0x01;

//交换L分组与R分组交换.

intDES_Swap(ElemTypeleft[32],ElemTyperight[32]){

memcpy(temp,left,32);

memcpy(left,right,32);

memcpy(right,temp,32);

//加密单个分组

intDES_EncryptBlock(ElemTypeplainBlock[8],ElemTypesubKeys[16][48],ElemTypecipherBlock[8]){

ElemTypeplainBits[64];

//明文比特

ElemTypecopyRight[48];

Char8ToBit64(plainBlock,plainBits);

//初始置换(IP置换)

DES_IP_Transform(plainBits);

//16轮迭代

//将右半部分拷贝到数组中.

memcpy(copyRight,plainBits+32,32);

//将右半部分进行扩展置换,从32位扩展到48位

DES_E_Transform(copyRight);

//将右半部分与子密钥进行异或操作

DES_XOR(copyRight,subKeys[cnt],48);

//异或结果进入S盒,输出32位结果

DES_SBOX(copyRight);

//P置换

DES_P_Transform(copyRight);

//将明文左半部分与右半部分进行异或

DES_XOR(plainBits,copyRight,32);

if(cnt!

=15){

//最终完成左右部的交换

DES_Swap(plainBits,plainBits+32);

//逆初始置换(IP^1置换)

DES_IP_1_Transform(plainBits);

Bit64ToChar8(plainBits,cipherBlock);

//解密单个分组

intDES_DecryptBlock(ElemTypecipherBlock[8],ElemTypesubKeys[16][48],ElemTypeplainBlock[8]){

ElemTypecipherBits[64];

Char8ToBit64(cipherBlock,cipherBits);

DES_IP_Transform(cipherBits);

for(cnt=15;

cnt>

=0;

cnt--){

memcpy(copyRight,cipherBits+32,32);

//这里为什么还是右半部分?

//将右半部分与子密钥进

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 医药卫生 > 临床医学

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1