1、信息安全技术DES加密算法#ifndef _DES_H#define _DES_H#include #define SUCCESS 0#define FAIL 1#define DESENCRY 0#define DESDECRY 1#ifdef _cplusplusextern C#endifINT32 des(BYTE *data, BYTE *key,INT32 readlen);INT32 Ddes(BYTE *data,BYTE *key,INT32 readlen);INT32 des3(BYTE *data, BYTE *key,ULONG32 n ,ULONG32 readle
2、n);INT32 Ddes3(BYTE *data,BYTE *key,ULONG32 n ,ULONG32 readlen);INT32 DdesN(BYTE *data, BYTE *key, ULONG32 n_key,ULONG32 readlen);INT32 desN(BYTE *data, BYTE *key, ULONG32 n_key,ULONG32 readlen);INT32 handle_data(ULONG32 *left , INT choice);INT32 makedata(ULONG32 *left ,ULONG32 *right ,ULONG32 numbe
3、r);INT32 makefirstkey( ULONG32 *keyP );INT32 makekey( ULONG32 *keyleft,ULONG32 *keyright ,ULONG32 number);#ifdef _cplusplus;#endif#endif第二个文件main.c#include #include des.hint main(int argc, char* argv)BYTE data64;BYTE key64;int len;int i;memset(data, 0, sizeof(data);memset(key, 0, sizeof(key);printf(
4、Please input a string:n);gets(data);len = strlen(data);printf(Please input a key:n);gets(key);printf(Original data: %sn, data);des(data, key, len);printf(Encrypted data: );for (i = 0; i 0 ; i-) Ddes(data,keyi-1,readlen);return SUCCESS;INT32 desN(BYTE *data, BYTE *key, ULONG32 n_key,ULONG32 readlen)U
5、LONG32 i = 0;for ( i = 0 ; i n_key ; i+) des(data,keyi,readlen);return SUCCESS;INT32 des3(BYTE *data, BYTE *key,ULONG32 n ,ULONG32 readlen)ULONG32 i = 0 , j = 0 ;makefirstkey(ULONG32*)key) ; /*产生密钥*/for ( i = 0 ; i n ; i+) for ( j = 0 ; j readlen ; j += 8) handle_data( (ULONG32*)&dataj, DESENCRY );
6、return SUCCESS;INT32 Ddes3(BYTE *data,BYTE *key,ULONG32 n ,ULONG32 readlen)ULONG32 i = 0 , j = 0 ;makefirstkey(ULONG32*)key) ; /*产生密钥*/for ( i = 0 ; i n ; i+) for ( j = 0 ; j readlen ; j += 8) handle_data( (ULONG32*)&dataj, DESDECRY ); return SUCCESS;INT32 des(BYTE *data, BYTE *key,INT32 readlen)INT
7、32 i = 0; makefirstkey(ULONG32*)key) ; /*产生密钥*/for ( i = 0 ; i readlen ; i += 8) handle_data( (ULONG32*)&datai, DESENCRY );return SUCCESS;INT32 Ddes(BYTE *data,BYTE *key,INT32 readlen)INT32 i = 0;makefirstkey(ULONG32*)key) ; for ( i = 0 ; i readlen ; i += 8) handle_data( (ULONG32*)&datai ,DESDECRY);
8、return SUCCESS;INT32 handle_data(ULONG32 *left , INT choice)INT32 number = 0 ,j = 0; ULONG32 *right = &left1 ;ULONG32 tmp = 0; ULONG32 tmpbuf2 = 0 ; /*第一次调整wz_pc164*/for ( j = 0 ; j 64 ; j+) if (j 32) /*属于right*/ if ( *right&wz_pc2wz_pc1j-1 ) tmpbuf0 |= wz_pc2j ; else if ( *left&wz_pc2wz_pc1j-1 ) tm
9、pbuf0 |= wz_pc2j ; else if ( wz_pc1j 32) /*属于right*/ if ( *right&wz_pc2wz_pc1j-1 ) tmpbuf1 |= wz_pc2j ; else if ( *left&wz_pc2wz_pc1j-1 ) tmpbuf1 |= wz_pc2j ; *left = tmpbuf0 ;*right = tmpbuf1;tmpbuf0 = 0 ;tmpbuf1 = 0 ; switch( choice )case DESENCRY: for ( number = 0 ; number = 0 ; number-) makedata
10、( left , right ,(ULONG32)number) ; break;default: break;/*最后一轮操作不交换左右值*/tmp = *left ;*left = *right ;*right = tmp ; /*最后一次调整wz_pc464*/for ( j = 0 ; j 64 ; j+) if (j 32) /*属于right*/ if ( *right&wz_pc2wz_pc4j-1 ) tmpbuf0 |= wz_pc2j ; else if ( *left&wz_pc2wz_pc4j-1 ) tmpbuf0 |= wz_pc2j ; else if ( wz_
11、pc4j 32) /*属于right*/ if ( *right&wz_pc2wz_pc4j-1 ) tmpbuf1 |= wz_pc2j ; else if ( *left&wz_pc2wz_pc4j-1 ) tmpbuf1 |= wz_pc2j ; *left = tmpbuf0 ;*right = tmpbuf1;return SUCCESS;INT32 makedata(ULONG32 *left ,ULONG32 *right ,ULONG32 number) INT32 j; ULONG32 oldright = *right; BYTE rexpbuf8 = 0 ;ULONG32
12、 datatmp = 0; ULONG32 exp2 = 0 ; /由32扩充至48位for ( j = 0 ; j 48 ; j+) /*两个32位,每个存放24位*/ if ( j 24 ) if ( *right&wz_pc2exptab3j-1 ) exp0 |= wz_pc2j ; else if ( *right&wz_pc2exptab3j-1 ) exp1 |= wz_pc2j-24 ; for ( j = 0 ; j 32*/ exp1 = 8 ;rexpbuf7 = (BYTE) (exp1&0x0000003fL) ;exp1 = 6 ;rexpbuf6 = (BYTE) (exp1&0x0000003fL) ;exp1 = 6 ;rexpbuf5 = (BYTE) (exp1&0x0000003fL) ;exp1 = 6 ;rexpbuf4 = (BYTE) (exp1&0x0000003fL) ;exp0 = 8 ;rexpbuf3 = (BYTE) (exp0&0x0000003fL) ; exp0 = 6 ;rexpbuf2 = (BYTE) (exp0&0x0000003fL) ;exp0 = 6 ;rexpbuf1 = (BYTE) (exp0&0x0000003fL) ;exp0 = 6 ;rexpbuf0
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1