




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、信息安全工程課程實驗報告編程實現(xiàn)AES算法的加密解密過程課程名稱:信息安全工程學生姓名:學生學號:專業(yè)班級:任課教師:蔡忠閩 目錄1 背景與意義32 實驗要求33.系統(tǒng)設(shè)計43.1系統(tǒng)主要目標43.2主要軟件需求(運行環(huán)境)44 AES算法加密和解密原理分析44.1加密過程基本變換64.2解密過程基本變換64.3密鑰擴展算法75.系統(tǒng)功能程序設(shè)計76. 測試報告176.1 加密176.2 解密197 實驗總結(jié)211 背景與意義科技的發(fā)展使計算機深入到了我們生活的的方方面面,計算機在帶來方便和提高了工作效率的同時卻也帶來了各種各樣的新問題,其中信息安全問題最為突出,隨著計算機信息安全要求的不斷提
2、高, 計算機保密系統(tǒng)已變得越來越重要,所以我們需要一種較為可靠的加密算法來保護我們信息的安全。由于DES已經(jīng)無法滿足高保密性的要求,美國于1997年1月開始征集新一代數(shù)據(jù)加密標準(即高級數(shù)據(jù)加密標準,Advanced Encryption Standard,AES)。2000年10月2日,正式宣布選擇比利時密碼學家所開發(fā)的Rijndael算法成為AES的最終算法。AES(The Advanced Encryption Standard)是美國國家標準與技術(shù)研究所用于加密電子數(shù)據(jù)的規(guī)范。它被預(yù)期能成為人們公認的加密包括金融、電信和政府數(shù)字信息的方法。AES 是一個新的可以用于保護電子數(shù)據(jù)的加密算
3、法。明確地說,AES 是一個迭代的、對稱密鑰分組的密碼,它可以使用128、192 和 256 位密鑰,并且用 128 位(16字節(jié))分組加密和解密數(shù)據(jù)。與公共密鑰密碼使用密鑰對不同,對稱密鑰密碼使用相同的密鑰加密和解密數(shù)據(jù)。通過分組密碼返回的加密數(shù)據(jù)的位數(shù)與輸入 數(shù)據(jù)相同。迭代加密使用一個循環(huán)結(jié)構(gòu),在該循環(huán)中重復(fù)置換和替換輸入數(shù)據(jù)。該算法為比利時密碼學家Joan Daemen和Vincent Rijmen所設(shè)計,結(jié)合兩位作者的名字,以Rijndael之命名之,投稿高級加密標準的甄選流程。(Rijdael的發(fā)音近于 "Rhine doll"。)AES在軟體及硬件上都能快速地加
4、解密,相對來說較易于實作,且只需要很少的記憶體。作為一個新的加密標準,目前正被部署應(yīng)用到更廣大的范圍.2 實驗要求(1)一人一組 (2)AES算法加密和解密原理分析 (3)提交完整的源程序(使用網(wǎng)絡(luò)上的現(xiàn)成程序一定要注明出處) (4)提交程序的設(shè)計,說明文檔 (5)用ECB和分組鏈模式CBC,對給定內(nèi)容進行加密和解密,提交解密結(jié)果,并提交實驗心得,著重闡述對實驗的理解(6)程序調(diào)試成功后,處理以下內(nèi)容:A、AES 加密明文:各自的姓名+郵箱秘鑰:各自的手機號B、AES解密密文:郵箱附件給出秘鑰:(給出秘鑰為ASCII碼形式,請將ASCII碼轉(zhuǎn)為二進制,不滿128位在其后補零):13072981
5、0633.系統(tǒng)設(shè)計3.1系統(tǒng)主要目標1在深入理解AES加密/解密算法理論的基礎(chǔ)上,設(shè)計一個AES加密/解密軟件系統(tǒng);2完成一個明文分組的加解密,明文和密鑰是十六進制,輸入明文和密鑰,輸出密文,進行加密后,能夠進行正確的解密;3. 按要求提供所設(shè)計系統(tǒng)的報告及完整的軟件。3.2主要軟件需求(運行環(huán)境)本軟件適用VC語言編寫,編譯成功后的EXE文件可以在裝有windows系統(tǒng)的任何計算機上使用。測試平臺:Windows 8使用軟件:Visual Studio 2012/C+4 AES算法加密和解密原理分析AES是一個迭代的、對稱密鑰分組的密碼,它可以使用128、192和256位密鑰長度,并且用12
6、8位分組長度加密和解密數(shù)據(jù)2。該算法輸入分組、輸出分組、狀態(tài)長度均為128比特。對于AES算法的運算是在一個稱為狀態(tài)的二維字節(jié)數(shù)組上進行。一個狀態(tài)由四行組成,每一行包括Nb個字節(jié),Nb等于分組長度除以32,AES分組長度為128位,因此,Nb=4,該值反應(yīng)了狀態(tài)中32-bit字的個數(shù)(列數(shù));密鑰長度128、192和256位可分別表示為Nk=4、6或8,反應(yīng)了密鑰中32-bit字的個數(shù)(列數(shù))。而AES算法的輪數(shù)Nr僅依賴于密鑰長度Nk,輪數(shù)和密鑰長度的關(guān)系可以表示為:Nr=6+Nk。密鑰長度分組長度輪數(shù)的關(guān)系如表1所示。表1 Key-Block-Round關(guān)系密鑰長度(Nk words)分組
7、長度(Nb words)輪數(shù)(Nr)441064128414對于加密和解密變換,AES算法使用的輪函數(shù)由4個不同的以字節(jié)為基本單位的變換復(fù)合而成,該過程由四個不同的階段組成3:(1)S盒變換,用一個S盒完成分組中的按字節(jié)代替;(2)行移位變換,一個簡單的置換;(3)列混淆變換,一個利用在域GF(28) 上的算術(shù)性的代替;(4)輪密鑰加變換,一個利用當前分組和擴展密鑰的一個部分進行按位異或。AES對數(shù)據(jù)的加密過程是通過把輸入的明文和密鑰由輪函數(shù)經(jīng)Nr輪迭代來實現(xiàn)的,結(jié)尾輪與前Nr-1輪不同。前Nr-1輪依次進行S盒變換、行移位變換、列混淆變換和輪密鑰加變換;結(jié)尾輪與前Nr-1輪相比去掉了列混淆變
8、換。而解密過程與加密過程相反,通過把輸入的密文和密鑰由輪函數(shù)經(jīng)Nr輪迭代來實現(xiàn)的,結(jié)尾輪與前Nr-1輪不同。前Nr-1輪依次進行逆行移位變換、逆S盒變換、輪密鑰加變換和逆列混淆變換;結(jié)尾輪與前Nr-1輪相比去掉了逆列混淆變換。AES算法的加密解密過程如圖1所示:圖1 AES加密解密流程4.1加密過程基本變換(1) S盒變換S盒變換是一個基于S盒的非線性置換,它用于輸入或中間態(tài)的每一個字節(jié)通過一個簡單的查表操作,將其映射為另一個字節(jié)。映射方法是:把輸入字節(jié)的高4位作為S盒的行值,低4位作為列值,然后取出S盒中對應(yīng)行和列的元素作為輸出。例如,輸入為“89”(十六進制)的值所對應(yīng)的S盒的行值為“8”
9、,列值為“9”,S盒中相應(yīng)位置的值為“a7”,就說明“89”被映射為“87”。 (2) 列混淆變換列混淆變換實現(xiàn)逐列混淆,其方法是: 其中,內(nèi)的數(shù)表示是字節(jié)。用矩陣表示為(3) 行移位變換行移位變換完成基于行的循環(huán)移位操作,即行移位變換的作用在中間態(tài)的行上,第0行不動,第1行循環(huán)左移1個字節(jié),第2行循環(huán)左移2個字節(jié),第3行循環(huán)左移3個字節(jié)。(4) 輪密鑰加變換輪密鑰加變換用于將輸入或中間態(tài)S的每一列與一個密鑰字Wi進行按位異或,其中, 由原始密鑰通過密鑰擴展算法產(chǎn)生。4.2解密過程基本變換解密過程是加密的逆過程,S盒變換、行移位變換、列混淆變換都要進行求逆變換,即逆S盒變換、逆行移位變換、逆列
10、混淆變換。而輪密鑰加變換與加密過程相同。(1) 逆S盒變換與S盒變換類似,逆S盒變換是基于逆S盒實現(xiàn)的。(2) 逆行移位變換與行移位變換相反,逆行移位變換將態(tài)State的后三行按相反的方向進行移位操作,即第0行保持不變,第1行向右移1個字節(jié),第2行向右移2個字節(jié),第3行向右移3個字節(jié)。(3) 逆列混淆變換逆列混淆變換的處理方法與列混淆變換類似,每一列都通過與一個固定的多項相乘進行變換。寫為矩陣乘法的形式,逆列混淆變換按以下方式對列進行變換:4.3密鑰擴展算法AES加密解密過程中,每一輪都需要一個與輸入分組具有相同長度的擴展密鑰Wi的參與。由于外部輸入的加密密鑰長度有限,所以在算法中要用一個密鑰
11、擴展程序把外部密鑰擴展成更長的比特串,以生成各輪的加密和解密密鑰。通過生成器產(chǎn)生Nr+1輪輪密鑰,每個輪密鑰由Nb個字組成,共有Nb(Nr+1)個字Wi,i=0,1,Nb(Nr+1)-1。5.系統(tǒng)功能程序設(shè)計(代碼參考自CSDN論壇)#include "StdAfx.h"#include "(AES加解密).h"#include<stdio.h>#include<stdlib.h>#include<string.h>byte in4Nb; /in數(shù)組用于讀入需要或解密的數(shù)據(jù)byte key4Nk; /key數(shù)組用于讀入
12、初始密鑰 byte wNr+1Nk4; /w數(shù)組用于保存所有擴展后的密鑰 /S盒byte S_box256=0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0,0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15,0x04,0
13、xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75,0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84,0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf,0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0
14、x3c,0x9f,0xa8,0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,0xcd,0x0c,0x13,0xec,0x5f,0x97,0x44,0x17,0xc4,0xa7,0x7e,0x3d,0x64,0x5d,0x19,0x73,0x60,0x81,0x4f,0xdc,0x22,0x2a,0x90,0x88,0x46,0xee,0xb8,0x14,0xde,0x5e,0x0b,0xdb,0xe0,0x32,0x3a,0x0a,0x49,0x06,0x24,0x5c,0xc2,0
15、xd3,0xac,0x62,0x91,0x95,0xe4,0x79,0xe7,0xc8,0x37,0x6d,0x8d,0xd5,0x4e,0xa9,0x6c,0x56,0xf4,0xea,0x65,0x7a,0xae,0x08,0xba,0x78,0x25,0x2e,0x1c,0xa6,0xb4,0xc6,0xe8,0xdd,0x74,0x1f,0x4b,0xbd,0x8b,0x8a,0x70,0x3e,0xb5,0x66,0x48,0x03,0xf6,0x0e,0x61,0x35,0x57,0xb9,0x86,0xc1,0x1d,0x9e,0xe1,0xf8,0x98,0x11,0x69,0
16、xd9,0x8e,0x94,0x9b,0x1e,0x87,0xe9,0xce,0x55,0x28,0xdf,0x8c,0xa1,0x89,0x0d,0xbf,0xe6,0x42,0x68,0x41,0x99,0x2d,0x0f,0xb0,0x54,0xbb,0x16;/逆S盒byte InvS_box256 =0x52,0x09,0x6a,0xd5,0x30,0x36,0xa5,0x38,0xbf,0x40,0xa3,0x9e,0x81,0xf3,0xd7,0xfb,0x7c,0xe3,0x39,0x82,0x9b,0x2f,0xff,0x87,0x34,0x8e,0x43,0x44,0xc4
17、,0xde,0xe9,0xcb,0x54,0x7b,0x94,0x32,0xa6,0xc2,0x23,0x3d,0xee,0x4c,0x95,0x0b,0x42,0xfa,0xc3,0x4e,0x08,0x2e,0xa1,0x66,0x28,0xd9,0x24,0xb2,0x76,0x5b,0xa2,0x49,0x6d,0x8b,0xd1,0x25,0x72,0xf8,0xf6,0x64,0x86,0x68,0x98,0x16,0xd4,0xa4,0x5c,0xcc,0x5d,0x65,0xb6,0x92,0x6c,0x70,0x48,0x50,0xfd,0xed,0xb9,0xda,0x5e
18、,0x15,0x46,0x57,0xa7,0x8d,0x9d,0x84,0x90,0xd8,0xab,0x00,0x8c,0xbc,0xd3,0x0a,0xf7,0xe4,0x58,0x05,0xb8,0xb3,0x45,0x06,0xd0,0x2c,0x1e,0x8f,0xca,0x3f,0x0f,0x02,0xc1,0xaf,0xbd,0x03,0x01,0x13,0x8a,0x6b,0x3a,0x91,0x11,0x41,0x4f,0x67,0xdc,0xea,0x97,0xf2,0xcf,0xce,0xf0,0xb4,0xe6,0x73,0x96,0xac,0x74,0x22,0xe7
19、,0xad,0x35,0x85,0xe2,0xf9,0x37,0xe8,0x1c,0x75,0xdf,0x6e,0x47,0xf1,0x1a,0x71,0x1d,0x29,0xc5,0x89,0x6f,0xb7,0x62,0x0e,0xaa,0x18,0xbe,0x1b,0xfc,0x56,0x3e,0x4b,0xc6,0xd2,0x79,0x20,0x9a,0xdb,0xc0,0xfe,0x78,0xcd,0x5a,0xf4,0x1f,0xdd,0xa8,0x33,0x88,0x07,0xc7,0x31,0xb1,0x12,0x10,0x59,0x27,0x80,0xec,0x5f,0x60
20、,0x51,0x7f,0xa9,0x19,0xb5,0x4a,0x0d,0x2d,0xe5,0x7a,0x9f,0x93,0xc9,0x9c,0xef,0xa0,0xe0,0x3b,0x4d,0xae,0x2a,0xf5,0xb0,0xc8,0xeb,0xbb,0x3c,0x83,0x53,0x99,0x61,0x17,0x2b,0x04,0x7e,0xba,0x77,0xd6,0x26,0xe1,0x69,0x14,0x63,0x55,0x21,0x0c,0x7d;/表alog256是生成元表示到多項式的映射表。使用的生成元為x+1byte alog256 =0x01,0x03,0x05,0
21、x0f,0x11,0x33,0x55,0xff,0x1a,0x2e,0x72,0x96,0xa1,0xf8,0x13,0x35,0x5f,0xe1,0x38,0x48,0xd8,0x73,0x95,0xa4,0xf7,0x02,0x06,0x0a,0x1e,0x22,0x66,0xaa,0xe5,0x34,0x5c,0xe4,0x37,0x59,0xeb,0x26,0x6a,0xbe,0xd9,0x70,0x90,0xab,0xe6,0x31,0x53,0xf5,0x04,0x0c,0x14,0x3c,0x44,0xcc,0x4f,0xd1,0x68,0xb8,0xd3,0x6e,0xb2,0
22、xcd,0x4c,0xd4,0x67,0xa9,0xe0,0x3b,0x4d,0xd7,0x62,0xa6,0xf1,0x08,0x18,0x28,0x78,0x88,0x83,0x9e,0xb9,0xd0,0x6b,0xbd,0xdc,0x7f,0x81,0x98,0xb3,0xce,0x49,0xdb,0x76,0x9a,0xb5,0xc4,0x57,0xf9,0x10,0x30,0x50,0xf0,0x0b,0x1d,0x27,0x69,0xbb,0xd6,0x61,0xa3,0xfe,0x19,0x2b,0x7d,0x87,0x92,0xad,0xec,0x2f,0x71,0x93,0
23、xae,0xe9,0x20,0x60,0xa0,0xfb,0x16,0x3a,0x4e,0xd2,0x6d,0xb7,0xc2,0x5d,0xe7,0x32,0x56,0xfa,0x15,0x3f,0x41,0xc3,0x5e,0xe2,0x3d,0x47,0xc9,0x40,0xc0,0x5b,0xed,0x2c,0x74,0x9c,0xbf,0xda,0x75,0x9f,0xba,0xd5,0x64,0xac,0xef,0x2a,0x7e,0x82,0x9d,0xbc,0xdf,0x7a,0x8e,0x89,0x80,0x9b,0xb6,0xc1,0x58,0xe8,0x23,0x65,0
24、xaf,0xea,0x25,0x6f,0xb1,0xc8,0x43,0xc5,0x54,0xfc,0x1f,0x21,0x63,0xa5,0xf4,0x07,0x09,0x1b,0x2d,0x77,0x99,0xb0,0xcb,0x46,0xca,0x45,0xcf,0x4a,0xde,0x79,0x8b,0x86,0x91,0xa8,0xe3,0x3e,0x42,0xc6,0x51,0xf3,0x0e,0x12,0x36,0x5a,0xee,0x29,0x7b,0x8d,0x8c,0x8f,0x8a,0x85,0x94,0xa7,0xf2,0x0d,0x17,0x39,0x4b,0xdd,0
25、x7c,0x84,0x97,0xa2,0xfd,0x1c,0x24,0x6c,0xb4,0xc7,0x52,0xf6,0x01;/log256是多項式表示到生成元的映射表。使用的生成元為x+1byte log256 = 0x00,0x00,0x19,0x01,0x32,0x02,0x1a,0xc6,0x4b,0xc7,0x1b,0x68,0x33,0xee,0xdf,0x03,0x64,0x04,0xe0,0x0e,0x34,0x8d,0x81,0xef,0x4c,0x71,0x08,0xc8,0xf8,0x69,0x1c,0xc1,0x7d,0xc2,0x1d,0xb5,0xf9,0xb9,
26、0x27,0x6a,0x4d,0xe4,0xa6,0x72,0x9a,0xc9,0x09,0x78,0x65,0x2f,0x8a,0x05,0x21,0x0f,0xe1,0x24,0x12,0xf0,0x82,0x45,0x35,0x93,0xda,0x8e,0x96,0x8f,0xdb,0xbd,0x36,0xd0,0xce,0x94,0x13,0x5c,0xd2,0xf1,0x40,0x46,0x83,0x38,0x66,0xdd,0xfd,0x30,0xbf,0x06,0x8b,0x62,0xb3,0x25,0xe2,0x98,0x22,0x88,0x91,0x10,0x7e,0x6e,
27、0x48,0xc3,0xa3,0xb6,0x1e,0x42,0x3a,0x6b,0x28,0x54,0xfa,0x85,0x3d,0xba,0x2b,0x79,0x0a,0x15,0x9b,0x9f,0x5e,0xca,0x4e,0xd4,0xac,0xe5,0xf3,0x73,0xa7,0x57,0xaf,0x58,0xa8,0x50,0xf4,0xea,0xd6,0x74,0x4f,0xae,0xe9,0xd5,0xe7,0xe6,0xad,0xe8,0x2c,0xd7,0x75,0x7a,0xeb,0x16,0x0b,0xf5,0x59,0xcb,0x5f,0xb0,0x9c,0xa9,
28、0x51,0xa0,0x7f,0x0c,0xf6,0x6f,0x17,0xc4,0x49,0xec,0xd8,0x43,0x1f,0x2d,0xa4,0x76,0x7b,0xb7,0xcc,0xbb,0x3e,0x5a,0xfb,0x60,0xb1,0x86,0x3b,0x52,0xa1,0x6c,0xaa,0x55,0x29,0x9d,0x97,0xb2,0x87,0x90,0x61,0xbe,0xdc,0xfc,0xbc,0x95,0xcf,0xcd,0x37,0x3f,0x5b,0xd1,0x53,0x39,0x84,0x3c,0x41,0xa2,0x6d,0x47,0x14,0x2a,
29、0x9e,0x5d,0x56,0xf2,0xd3,0xab,0x44,0x11,0x92,0xd9,0x23,0x20,0x2e,0x89,0xb4,0x7c,0xb8,0x26,0x77,0x99,0xe3,0xa5,0x67,0x4a,0xed,0xde,0xc5,0x31,0xfe,0x18,0x0d,0x63,0x8c,0x80,0xc0,0xf7,0x70,0x07;/密鑰擴展中使用的異或輪常數(shù)byte Rcon104=0x01,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0x08,0x00,0x00,0x00,0x1
30、0,0x00,0x00,0x00,0x20,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x80,0x00,0x00,0x00,0x1b,0x00,0x00,0x00,0x36,0x00,0x00,0x00;/輪密鑰加void AddRoundKey(byte state4Nb,byte p4Nb)int i, j;for(i = 0; i < 4; i+)for(j = 0; j < Nb; j+)stateij = stateijpij;/狀態(tài)數(shù)組與每一輪子密鑰異或/字節(jié)替換void SubBytes(byte state4Nb)int i, j;fo
31、r(i = 0; i < 4; i+)for(j = 0; j < Nb; j+)stateij = S_boxstateij;/行移位void ShiftRows(byte state4Nb) /void memcpy(void *destin,void *source,unsigned n) 操作為從source復(fù)制一個n個字節(jié)的塊到destinbyte temp4;int time; /向左循環(huán)移位的位數(shù)for(time = 1; time < 4; time+) memcpy(temp, statetime, time);/先存儲需要左移的位到temp中memcpy(
32、statetime, statetime+time, 4-time);/將余下的塊左移memcpy(statetime+4-time, temp, time);/將事先存于temp中的位放到狀態(tài)數(shù)組中 /列混合中使用的mul函數(shù)byte mul(byte a, byte b)if(a != 0 && b != 0)return alog(loga + logb) % 255;/參考代碼,不太懂else return 0;/列混合void MixColumns(byte state4Nb)byte temp4Nb;int i, j;/將state函數(shù)存入temp中for(i =
33、0; i < 4; i+)for(j = 0; j < Nb; j+)tempij = stateij;/按列做調(diào)用mul函數(shù)做列混合,以狀態(tài)的每一列作為輸入與混合每一列的數(shù)據(jù)得到新的列for(i = 0; i < 4; i+)state0i = mul(0x02, temp0i) mul(0x03, temp1i) temp2i temp3i;state1i = mul(0x02, temp1i) mul(0x03, temp2i) temp0i temp3i; state2i = mul(0x02, temp2i) mul(0x03, temp3i) temp1i tem
34、p0i;state3i = mul(0x02, temp3i) mul(0x03, temp0i) temp2i temp1i;/字節(jié)變換 密鑰擴展中使用void SubWords(byte aNk)int i;for(i = 0; i < Nk; i+)ai = S_boxai;/左循環(huán)移位(只移一位) 密鑰擴展中使用void RotWord(byte tempNb)byte temp1;int i;temp1 = temp0;for(i = 1; i < Nb; i+)tempi-1 = tempi;tempNb-1 = temp1;/密鑰擴展void KeyExpansion
35、(byte key4Nk,byte wNr+1Nk4)byte kNb * (Nr + 1)4; /計算是用二維數(shù)組(便于計算),最后存于三維數(shù)組w中byte tempNk;byte b 44;int i,j,l; /存儲初始密鑰for(i = 0; i < 4; i+)for(j = 0; j < Nk; j+)kij = keyij;/計算擴展密鑰for(i = Nk; i < Nb * (Nr + 1); i+)for(j = 0; j < 4; j+)tempj = ki - 1j;if(i%Nk = 0)RotWord(temp);SubWords(temp)
36、;for(j = 0; j < 4 ; j+)tempj = tempjRconi/Nk-1j;for(j = 0; j < 4; j+) kij = ki-Nkjtempj;printf("%x ", kij);printf("n");for (i = 0; i < Nr + 1; i+)for (j = 0; j < Nk; j+)for (l = 0; l < 4; l+)wijl = k4 * i + jl;for (j = 0; j < Nk; j+)for (l = 0; l < 4; l+)bjl
37、= wilj;for (j = 0; j < Nk; j+)for (l = 0; l < 4; l+)wijl = bjl;/加密模塊void Cipher(char file164, char file264)byte state4Nb;int i, j, k;int round = 0;byte wNr+1Nk4;byte out4Nb;FILE *fp;OpenFile(file1, file2); /從文件中讀取初始密鑰和明文 KeyExpansion(key,w); /調(diào)用密鑰擴展函數(shù)將所有的擴展密鑰存于w數(shù)組中/將讀入的明文進行轉(zhuǎn)秩for(i = 0; i <
38、4; i+)for(j = 0; j < Nb; j+)stateji = inij; /將初始明文和初始密鑰存于文件中并在程序中輸出 if (fp = fopen("加密要求輸出結(jié)果.txt", "w") = NULL)AfxMessageBox("打開文件錯誤!");exit(0);fprintf(fp,"初始明文:n");for(i = 0; i < 4; i+)fprintf(fp,"n");for(j = 0; j < Nb; j+)fprintf(fp,"
39、%0x ",stateij);fprintf(fp, "nn初始密鑰:n");for(i = 0; i < 4; i+)fprintf(fp,"n");for(j = 0; j < Nb; j+)fprintf(fp,"%0x ",w0ji);AddRoundKey(state,wround); /初始輪密鑰加 /開始循環(huán)Nr輪 for(round = 1; round < Nr; round+)SubBytes(state);ShiftRows(state);MixColumns(state);AddRo
40、undKey(state, wround);if (round = 8)fprintf(fp, "nn第九輪輪密鑰:n");for (j = 0; j < 4; j+)fprintf(fp, "nw%d= ", (round+1)*4+j);for (k = 0; k < 4; k+)fprintf(fp, "%x ", wround+1kj);fprintf(fp, "nn明文加密到第九輪:n");for (j = 0; j < 4; j+)fprintf(fp, "n");
41、for (k = 0; k < 4; k+)fprintf(fp, "%x ", statejk); SubBytes(state); ShiftRows(state); AddRoundKey(state, wround); fprintf(fp, "nn第十輪輪密鑰:n");for (j = 0; j < 4; j+) fprintf(fp, "nw%d= ",round*4+j);for (k = 0; k < 4; k+)fprintf(fp, "%x ", wroundkj);fprin
42、tf(fp, "nn加密完成后輸出:n");for (j = 0; j < 4; j+)fprintf(fp, "n");for (k = 0; k < 4; k+)fprintf(fp, "%x ", statejk);fclose(fp);if (fp = fopen("CipherMessage.txt", "w") = NULL)AfxMessageBox("打開文件錯誤!");exit(0); for(i = 0; i < 4; i+)for(j
43、= 0; j < Nb; j+)outji = stateij;for(i = 0; i < 4; i+)for(j = 0; j < Nb; j+)fprintf(fp, "%c", outij); /此處的密文輸出是以列優(yōu)先fclose(fp);/逆行移位void InvShiftRows(byte state4Nb) /void memcpy(void *destin,void *source,unsigned n) 操作為從source復(fù)制一個n個字節(jié)的塊到destinbyte temp4;int time,position; /向左循環(huán)移位的位數(shù)
44、(向右移一位同向左移三位)position用于記錄所移的是第幾行for(time = 3, position = 1; time > 0, position < 4; time-, position+)memcpy(temp, stateposition, time);memcpy(stateposition, stateposition+time, 4-time);memcpy(stateposition+4-time, temp, time);/逆字節(jié)替代void InvSubBytes(byte state4Nb)int i, j;for(i = 0; i < 4; i
45、+)for(j = 0; j < Nb; j+)stateij = InvS_boxstateij;/逆列混合void InvMixColumns(byte state4Nb) byte temp4Nb;int i, j;for(i = 0; i < 4; i+)for(j = 0; j < Nb; j+)tempij = stateij;for(i = 0; i < 4; i+)state0i = mul(0x0e, temp0i) mul(0x0b, temp1i) mul(0x0d, temp2i) mul(0x09, temp3i);state1i = mul(
46、0x0e, temp1i) mul(0x0b, temp2i) mul(0x09, temp0i) mul(0x0d, temp3i); state2i = mul(0x0e, temp2i) mul(0x0b, temp3i) mul(0x09, temp1i) mul(0x0d, temp0i);state3i = mul(0x0e, temp3i) mul(0x0b, temp0i) mul(0x09, temp2i) mul(0x0d, temp1i);/解密模塊void InvCipher(char file164, char file264)byte state4Nb;byte w
47、Nr+1Nk4;byte out4Nb;int i, j, k;FILE *fp;int round = 10;OpenFile(file1, file2);KeyExpansion(key,w);for(i = 0; i < 4; i+)for(j = 0; j < Nb; j+)stateji = inij;/將初始密文和初始密鑰存入文件中并在程序中輸出 if (fp = fopen("解密要求輸出結(jié)果.txt", "w") = NULL)AfxMessageBox("打開文件錯誤!");exit(0);fprintf
48、(fp,"初始密文:n");for(i = 0; i < 4; i+)fprintf(fp,"n");for(j = 0; j < Nb; j+)fprintf(fp,"%0x ",stateij);fprintf(fp, "nn初始密鑰:n");for(i = 0; i < 4; i+)fprintf(fp,"n");for(j = 0; j < Nb; j+)fprintf(fp,"%0x ",w0ji);AddRoundKey(state,wro
49、und);for(round = Nr - 1; round > 0; round-)printf("第%d輪n", round);InvShiftRows(state);InvSubBytes(state);AddRoundKey(state, wround);InvMixColumns(state);if (round = 2)fprintf(fp, "nn第九輪輪密鑰:n");for (j = 0; j < 4; j+)fprintf(fp, "nw%d= ", (round-1)*4+j);for (k = 0; k < 4; k+
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 南京技術(shù)合同范本
- 信息服務(wù) 招標合同范本
- 2025年遼寧省建筑安全員-C證(專職安全員)考試題庫
- 債務(wù)合同范本 法院
- 債務(wù)加入合同范本
- 小學音樂綜合性課堂的構(gòu)建方法
- 2025上海市安全員-C證考試(專職安全員)題庫附答案
- 勞務(wù)合同范本文檔
- 腸道菌群檢測的學習路徑預(yù)測?
- 勞務(wù)合同范本 英語
- 《勞動法常識(第3版)》中職全套教學課件
- 2025年勞動合同延期補充協(xié)議模板
- 2025年日歷表(含農(nóng)歷、節(jié)假日、記事、A4打印版)
- 北京體育職業(yè)學院《機器人操作系統(tǒng)》2023-2024學年第二學期期末試卷
- 2025安徽雙鶴藥業(yè)限責任公司招聘30人易考易錯模擬試題(共500題)試卷后附參考答案
- 《反家庭暴力》課件
- 二零二五年度房地產(chǎn)預(yù)售合同協(xié)議4篇
- 2022年RDPAC認證考試備考題庫700題(含答案)
- 2025-2030年中國天線行業(yè)市場需求狀況規(guī)劃研究報告
- 2024年南京旅游職業(yè)學院高職單招職業(yè)技能測驗歷年參考題庫(頻考版)含答案解析
- 2025年春新外研版(三起)英語三年級下冊課件 Unit2第2課時Speedup
評論
0/150
提交評論