|
RT:
原来的DES加密是64位的,网上找不到32位的,于是根据那个64位的改了个32位的。
程序为32位密钥加解密32位明文。
//密钥去除校验位位移表
uint8_t PC_1[28] = {
24,16,8,0,25,17,9,
1,26,18,10,2,27,19,
30,22,14,6,29,21,13,
5,28,20,12,4,11,3
};
uint8_t MOVE_TIMES[8] = {1,1,2,2,1,2,2,1};
//密钥28位转24位位移表
uint8_t PC_2[24] = {
7,16,5,12,0,9,
14,3,24,13,20,27,
1,22,25,2,21,11,
23,15,6,19,8,18
};
//数据明文位移表
uint8_t IP_Table[32] = {
25,17,9,1,
27,19,11,3,
29,21,13,5,
31,23,15,7,
24,16,8,0,
26,18,10,2,
28,20,12,4,
30,22,14,6
};
//数据扩充表
uint8_t E_Table[24] = {
15,0,1,2,3,4,
3,4,5,6,7,8,
7,8,9,10,11,12,
11,12,13,14,15,0
};
//S迭代盒
uint8_t S[4][4][16] =
// S1
{{{14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7},
{0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8},
{4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0},
{15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13}},
// S2
{{15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10},
{3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5},
{0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15},
{13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9}},
//S3
{{10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8},
{13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1},
{13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7},
{1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12}},
// S4
{{7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15},
{13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9},
{10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4},
{3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14}}
};
//置换函数P
uint8_t P_Table[16] = {
8,3,10,11,
14,4,13,6,
15,12,0,2,
9,7,1,5
};
//逆初始置换表
uint8_t IP_1_Table[32] = {
19,3,23,7,27,11,31,15,
18,2,22,6,26,10,30,14,
17,1,21,5,25,9,29,13,
16,0,20,4,24,8,28,12
};
//字节转换成二进制
uint8_t ByteToBit(uint8_t ch, uint8_t bit[8])
{
uint8_t cnt;
for(cnt = 0;cnt < 8; cnt++)
{
*(bit+cnt) = (ch>>cnt)&1;
}
return 0;
}
// 二进制转换成字节
uint8_t BitToByte(uint8_t bit[8],uint8_t *ch)
{
uint8_t cnt;
for(cnt = 0;cnt < 8; cnt++)
{
*ch |= *(bit + cnt)<<cnt;
}
return 0;
}
// 将长度为8的字符串转为二进制位串
uint8_t Char8ToBit64(uint8_t ch[8],uint8_t bit[32])
{
uint8_t cnt;
for(cnt = 0; cnt < 4; cnt++)
{
ByteToBit(*(ch+cnt),bit+(cnt<<3));
}
return 0;
}
// 将二进制位串转为长度为8的字符串
uint8_t Bit64ToChar8(uint8_t bit[32],uint8_t ch[8])
{
uint8_t cnt;
memset(ch,0,8);
for(cnt = 0; cnt < 4; cnt++)
{
BitToByte(bit+(cnt<<3),ch+cnt);
}
return 0;
}
// 密钥置换1
uint8_t DES_PC1_Transform(uint8_t key[32], uint8_t tempbts[28])
{
uint8_t cnt;
for(cnt = 0; cnt < 28; cnt++)
{
tempbts[cnt] = key[PC_1[cnt]];
}
return 0;
}
//密钥置换2
uint8_t DES_PC2_Transform(uint8_t key[28], uint8_t tempbts[24])
{
uint8_t cnt;
for(cnt = 0; cnt < 24; cnt++)
{
tempbts[cnt] = key[PC_2[cnt]];
}
return 0;
}
//循环左移
uint8_t DES_ROL(uint8_t data[28], uint8_t time)
{
uint8_t temp[28];
//保存将要循环移动到右边的位
memcpy(temp,data,time);
memcpy(temp+time,data+14,time);
//前28位移动
memcpy(data,data+time,14-time);
memcpy(data+14-time,temp,time);
//后28位移动
memcpy(data+14,data+14+time,14-time);
memcpy(data+28-time,temp+time,time);
return 0;
}
//IP置换
uint8_t DES_IP_Transform(uint8_t data[32])
{
uint8_t cnt;
uint8_t temp[32];
for(cnt = 0; cnt < 32; cnt++)
{
temp[cnt] = data[IP_Table[cnt]];
}
memcpy(data,temp,32);
return 0;
}
// IP逆置换
uint8_t DES_IP_1_Transform(uint8_t data[32])
{
uint8_t cnt;
uint8_t temp[32];
for(cnt = 0; cnt < 32; cnt++)
{
temp[cnt] = data[IP_1_Table[cnt]];
}
memcpy(data,temp,32);
return 0;
}
//扩展置换
uint8_t DES_E_Transform(uint8_t data[24])
{
uint8_t cnt;
uint8_t temp[24];
for(cnt = 0; cnt < 24; cnt++)
{
temp[cnt] = data[E_Table[cnt]];
}
memcpy(data,temp,24);
return 0;
}
//P置换
uint8_t DES_P_Transform(uint8_t data[16])
{
uint8_t cnt;
uint8_t temp[16];
for(cnt = 0; cnt < 16; cnt++)
{
temp[cnt] = data[P_Table[cnt]];
}
memcpy(data,temp,16);
return 0;
}
// 异或
uint8_t DES_XOR(uint8_t R[24], uint8_t L[24] ,uint8_t count)
{
uint8_t cnt;
for(cnt = 0; cnt < count; cnt++)
{
R[cnt] ^= L[cnt];
}
return 0;
}
// S盒置换
uint8_t DES_SBOX(uint8_t data[24])
{
uint8_t cnt;
uint8_t line,row,output;
uint8_t cur1,cur2;
for(cnt = 0; cnt < 4; cnt++)
{
cur1 = cnt*6;
cur2 = cnt<<2;
// 计算在S盒中的行与列
line = (data[cur1]<<1) + data[cur1+5];
row = (data[cur1+1]<<3) + (data[cur1+2]<<2)
+ (data[cur1+3]<<1) + data[cur1+4];
output = S[cnt][line][row];
// 化为2进制
data[cur2] = (output&0X08)>>3;
data[cur2+1] = (output&0X04)>>2;
data[cur2+2] = (output&0X02)>>1;
data[cur2+3] = output&0x01;
}
return 0;
}
//交换
uint8_t DES_Swap(uint8_t left[16], uint8_t right[16])
{
uint8_t temp[16];
memcpy(temp,left,16);
memcpy(left,right,16);
memcpy(right,temp,16);
return 0;
}
//生成子密钥
uint8_t DES_MakeSubKeys(uint8_t key[32],uint8_t subKeys[8][24])
{
uint8_t temp[28];
uint8_t cnt;
DES_PC1_Transform(key,temp);// PC1置换
for(cnt = 0; cnt < 8; cnt++) //16轮跌代,产生16个子密钥
{
DES_ROL(temp,MOVE_TIMES[cnt]);// 循环左移
DES_PC2_Transform(temp,subKeys[cnt]);//PC2置换,产生子密钥
}
return 0;
}
//加密单个分组
uint8_t DES_EncryptBlock(uint8_t plainBlock[4], uint8_t subKeys[8][24], uint8_t cipherBlock[4])
{
uint8_t plainBits[32];
uint8_t copyRight[24];
uint8_t cnt;
Char8ToBit64(plainBlock,plainBits);
//初始置换(IP置换)
DES_IP_Transform(plainBits);
// 16轮迭代
for(cnt = 0; cnt < 8; cnt++)
{
memcpy(copyRight,plainBits+16,16);
DES_E_Transform(copyRight); // 将右半部分进行扩展置换,从32位扩展到48位
DES_XOR(copyRight,subKeys[cnt],24); // 将右半部分与子密钥进行异或操作
DES_SBOX(copyRight); // 异或结果进入S盒,输出32位结果
DES_P_Transform(copyRight); // P置换
DES_XOR(plainBits,copyRight,16); //将明文左半部分与右半部分进行异或
if(cnt != 7)
{
DES_Swap(plainBits,plainBits+16);//最终完成左右部的交换
}
}
DES_IP_1_Transform(plainBits); //逆初始置换(IP^1置换)
Bit64ToChar8(plainBits,cipherBlock);
return 0;
}
// 解密单个分组
uint8_t DES_DecryptBlock(uint8_t cipherBlock[4], uint8_t subKeys[8][24],uint8_t plainBlock[4])
{
uint8_t cipherBits[32];
uint8_t copyRight[24];
int8_t cnt;
Char8ToBit64(cipherBlock,cipherBits);
//初始置换(IP置换)
DES_IP_Transform(cipherBits);
// 16轮迭代
for(cnt = 7; cnt >= 0; cnt--)
{
memcpy(copyRight,cipherBits+16,16);
//将右半部分进行扩展置换,从32位扩展到48位
DES_E_Transform(copyRight);
// 将右半部分与子密钥进行异或操作
DES_XOR(copyRight,subKeys[cnt],24);
//异或结果进入S盒,输出32位结果
DES_SBOX(copyRight);
// P置换
DES_P_Transform(copyRight);
//将明文左半部分与右半部分进行异或
DES_XOR(cipherBits,copyRight,16);
if(cnt != 0)
{
// 最终完成左右部的交换
DES_Swap(cipherBits,cipherBits+16);
}
}
// 逆初始置换(IP^1置换)
DES_IP_1_Transform(cipherBits);
Bit64ToChar8(cipherBits,plainBlock);
return 0;
}
//加密文件
uint8_t DES_Encrypt(uint8_t *plainFile, uint8_t *keyStr,uint8_t *cipherFile)
{
uint8_t keyBlock[4],bKey[32],subKeys[8][24];
memcpy(keyBlock,keyStr,4); // 设置密钥
Char8ToBit64(keyBlock,bKey); // 将密钥转换为二进制流
DES_MakeSubKeys(bKey,subKeys); //生成子密钥
DES_EncryptBlock(plainFile,subKeys,cipherFile);
return OK;
}
//解密文件
uint8_t DES_Decrypt(uint8_t *cipherFile, uint8_t *keyStr,uint8_t *plainFile)
{
// uint8_t plainBlock[8],cipherBlock[8],
uint8_t bKey[32],keyBlock[4],subKeys[8][24];
memcpy(keyBlock,keyStr,4); //设置密钥
Char8ToBit64(keyBlock,bKey); //将密钥转换为二进制流
DES_MakeSubKeys(bKey,subKeys); //生成子密钥
DES_DecryptBlock(cipherFile,subKeys,plainFile);
return OK;
}
下面两个函数为内存拷贝相关的库函数,已修改过,只需引用即可。
void *memcpy( void *dest, const void *src, uint8_t count )
{
uint8_t *temp_dest = (uint8_t *)dest;
uint8_t *temp_src = (uint8_t *)src;
while(count--) // 不对是否存在重叠区域进行判断
{
*temp_dest++ = *temp_src++;
}
return dest;
}
uint8_t *memset(uint8_t *dst,uint8_t value,uint8_t count)
{
uint8_t *start = dst;
while (count--)
*dst++ = value;
return(start);
}
main(void)
{
uint8_t mingwen[4] = "TIZY";
uint8_t miyao[4] = "!@#$";
uint8_t miwen[4],jiemi[4];
DES_Encrypt(mingwen, miyao,miwen);
DES_Decrypt(miwen, miyao,jiemi);
}
另附上64位的加解密程序文件
加解密主文件,调用与32位的一样。ourdev_702153RU0T3B.txt(文件大小:10K) (原文件名:des.txt)
内存拷贝库文件ourdev_702154DVX2KZ.txt(文件大小:515字节) (原文件名:memcpy.txt) |
阿莫论坛20周年了!感谢大家的支持与爱护!!
知道什么是神吗?其实神本来也是人,只不过神做了人做不到的事情 所以才成了神。 (头文字D, 杜汶泽)
|