DES加密完整16轮Word文件下载.docx
《DES加密完整16轮Word文件下载.docx》由会员分享,可在线阅读,更多相关《DES加密完整16轮Word文件下载.docx(32页珍藏版)》请在冰豆网上搜索。
if(fp==NULL)
{
printf("
明文读取失败!
\n"
}
else
fscanf(fp,"
%s"
s);
fclose(fp);
voidTo2Bin(charp[8],intb[64])//将字节转换成二进制流
inti,k=0;
for(i=0;
i<
8;
i++)
intj=0x80;
for(;
j;
j>
>
=1)
{
if(j&
p[i])
{
b[k++]=1;
}
else
b[k++]=0;
}
}
intIP_Table[64]=//初始置换(IP)
{
57,49,41,33,25,17,9,1,
59,51,43,35,27,19,11,3,
61,53,45,37,29,21,13,5,
63,55,47,39,31,23,15,7,
56,48,40,32,24,16,8,0,
58,50,42,34,26,18,10,2,
60,52,44,36,28,20,12,4,
62,54,46,38,30,22,14,6
};
intE_Table[]={//扩展变换E
31,0,1,2,3,4,
3,4,5,6,7,8,
7,8,9,10,11,12,
11,12,13,14,15,16,
15,16,17,18,19,20,
19,20,21,22,23,24,
23,24,25,26,27,28,
27,28,29,30,31,0
intS_Box[8][4][16]={//8个s盒
{
{14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7},
{0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8},
{4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0},
{15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13}
},
{15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10},
{3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5},
{0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15},
{13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9}
{10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8},
{13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1},
{13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7},
{1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12}
{7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15},
{13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9},
{10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4},
{3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14}
{2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9},
{14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6},
{4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14},
{11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3}
{12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11},
{10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8},
{9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6},
{4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13}
{4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1},
{13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6},
{1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2},
{6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12}
{13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7},
{1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2},
{7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8},
{2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11}
}
};
intIP_1_Table[64]=//逆初始置换IP^-1
39,7,47,15,55,23,63,31,
38,6,46,14,54,22,62,30,
37,5,45,13,53,21,61,29,
36,4,44,12,52,20,60,28,
35,3,43,11,51,19,59,27,
34,2,42,10,50,18,58,26,
33,1,41,9,49,17,57,25,
32,0,40,8,48,16,56,24
intP_Table[32]=//置换运算P
15,6,19,20,
28,11,27,16,
0,14,22,25,
4,17,30,9,
1,7,23,13,
31,26,2,8,
18,12,29,5,
21,10,3,24
intPC_1[56]=
56,48,40,32,24,16,8,//密钥置换PC_1
0,57,49,41,33,25,17,
9,1,58,50,42,34,26,
18,10,2,59,51,43,35,
62,54,46,38,30,22,14,
6,61,53,45,37,29,21,
13,5,60,52,44,36,28,
20,12,4,27,19,11,3
intPC_2[48]=//密钥置换PC_2
13,16,10,23,0,4,
2,27,14,5,20,9,
22,18,11,3,25,7,
15,6,26,19,12,1,
40,51,30,36,46,54,
29,39,50,44,32,47,
43,48,38,55,33,52,
45,41,49,35,28,31
voidReplacement(intarry1[],intarry2[],intarry3[],intnum)//置换函数(初始IP,逆初始IP,
inti,tmp;
num;
i++)
tmp=arry2[i];
arry3[i]=arry1[tmp];
intmove_times[16]={1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,1};
//对左移位的规定
voidlif_move(intarry1[],intarry2[],intn)//左移位实现函数
inti;
28;
arry2[i]=arry1[(n+i)%28];
intK[16][48];
//存放16轮子密钥
intc[64];
//存放明文或密文
intL[17][32],R[17][32];
//存放加密过程中左右部分
voidSubKey(intK0[64])//子密钥产生函数
intK1[56],K2[56];
intC[17][28],D[17][28];
Replacement(K0,PC_1,K1,56);
//密钥置换PC_1
i++)//将PC_1输出的56比特分为左右两部分
C[0][i]=K1[i];
D[0][i]=K1[i+28];
i=0;
while(i<
16)
intj;
lif_move(C[i],C[i+1],move_times[i]);
lif_move(D[i],D[i+1],move_times[i]);
for(j=0;
j<
j++)
K2[j]=C[i+1][j];
K2[j+28]=D[i+1][j];
Replacement(K2,PC_2,K[i],48);
//密钥置换PC_2
i++;
/*printf("
\n子密钥生成过程中,左边生成的值:
17;
\nC[%d]:
i);
if(j%7==0)
printf("
"
printf("
%d"
C[i][j]);
\n子密钥生成过程中,右边生成的值:
\nD[%d]:
D[i][j]);
}*/
voidS_compress(intarry[],intshc[])//S盒压缩变换,其中数组shc存放经过s盒的结果
inth,l;
//行,列
intsha[8];
//存放经过s盒的十进制结果
inti,j;
inttemp[4];
i++)//s盒压缩变换
h=arry[(1+(i*6))-1]*2+arry[(6+(i*6))-1];
l=arry[(2+(i*6))-1]*8+arry[(3+(i*6))-1]*4+arry[(4+(i*6))-1]*2+arry[(5+(i*6))-1];
sha[i]=S_Box[i][h][l];
for(j=3;
=0;
j--)
temp[j]=sha[i]%2;
sha[i]=sha[i]/2;
for(j=0;
4;
shc[4*i+j]=temp[j];
\n第%d次s盒的输出:
m++);
32;
if(i%8==0)
shc[i]);
voidTo10(inta[],intb[],intn)//二进制转十进制
inttemp;
intarry[16][4];
n/4;
arry[i][j]=a[4*i+j];
for(i=0;
temp=arry[i][0]*8+arry[i][1]*4+arry[i][2]*2+arry[i][3]*1;
/*for(j=3;
if(arry[i][j]==1)
t=1;
for(k=0;
k<
3-j;
k++)
{
t=t*2;
}
temp+=t;
}*/
b[i]=temp;
voidTo102(inta[],intb[],intn)//二进制转十进制
intarry[8][8];
intt=1,k;
n/8;
arry[i][j]=a[8*i+j];
temp=0;
for(j=7;
7-j;
voidF_Function(inta[32],intb[32],intn)//F函数
inttmp[48];
inttep[32];
Replacement(a,E_Table,tmp,48);
//扩展变换E
\n第%d轮E盒扩展结果:
n);
48;
tmp[i]);
i++)//与子密钥异或
tmp[i]^=K[n][i];
\n进入S盒的48比特:
if(i%6==0)
S_compress(tmp,tep);
//压缩变换S
Replacement(tep,P_Table,b,32);
//置换运算P
\n第%d次P置盒输出:
l++);
b[i]);
\nf[%d]的输出结果:
voidEncryption(intm0[64],intc1[64])
inti,k;
intarry[32];
intc0[64],m1[64];
Replacement(m0,IP_Table,m1,64);
//初始置换IP
\n初始置换:
64;
m1[i]);
L[0][i]=m1[i];
R[0][i]=m1[i+32];
k=1;
while(k<
17)
F_Function(R[k-1],arry,k-1);
for(i=0;
L[k][i]=R[k-1][i];
R[k][i]=L[k-1][i]^arry[i];
k++;
c0[i]=R[16][i];
c0[i+32]=L[16][i];
Replacement(c0,IP_1_Table,c1,64);
//逆初始置换
voidchangeKey(inta[16][48])
inttmp[16][48];
16;
tmp[i][j]=a[i][j];
K[i][j]=tmp[15-i][j];
voidDecryption(intc1[],intm[])
intc0[64],t[64];
changeKey(K);
\n交换后的密钥:
if(j%8==0)
}
K[i][j]);
Replacement(c1,IP_Table,c0,64);
//初始IP
i++