zoukankan      html  css  js  c++  java
  • AES Block Cipher Implementation in C

    #include <cstdio>
    #include <cstring>
    
    typedef unsigned char BYTE;
    typedef unsigned short WORD;
    typedef unsigned long DWORD;
    
    #define GETU32(pt) (((DWORD)(pt)[0] << 24) ^ ((DWORD)(pt)[1] << 16) ^ ((DWORD)(pt)[2] <<  8) ^ ((DWORD)(pt)[3]))
    #define PUTU32(ct, st) { (ct)[0] = (BYTE)((st) >> 24); (ct)[1] = (BYTE)((st) >> 16); (ct)[2] = (BYTE)((st) >>  8); (ct)[3] = (BYTE)(st); }
    
    BYTE enc_sbox[]={
    0x63,0x7C,0x77,0x7B,0xF2,0x6B,0x6F,0xC5,0x30,0x01,0x67,0x2B,0xFE,0xD7,0xAB,0x76,
    0xCA,0x82,0xC9,0x7D,0xFA,0x59,0x47,0xF0,0xAD,0xD4,0xA2,0xAF,0x9C,0xA4,0x72,0xC0,
    0xB7,0xFD,0x93,0x26,0x36,0x3F,0xF7,0xCC,0x34,0xA5,0xE5,0xF1,0x71,0xD8,0x31,0x15,
    0x04,0xC7,0x23,0xC3,0x18,0x96,0x05,0x9A,0x07,0x12,0x80,0xE2,0xEB,0x27,0xB2,0x75,
    0x09,0x83,0x2C,0x1A,0x1B,0x6E,0x5A,0xA0,0x52,0x3B,0xD6,0xB3,0x29,0xE3,0x2F,0x84,
    0x53,0xD1,0x00,0xED,0x20,0xFC,0xB1,0x5B,0x6A,0xCB,0xBE,0x39,0x4A,0x4C,0x58,0xCF,
    0xD0,0xEF,0xAA,0xFB,0x43,0x4D,0x33,0x85,0x45,0xF9,0x02,0x7F,0x50,0x3C,0x9F,0xA8,
    0x51,0xA3,0x40,0x8F,0x92,0x9D,0x38,0xF5,0xBC,0xB6,0xDA,0x21,0x10,0xFF,0xF3,0xD2,
    0xCD,0x0C,0x13,0xEC,0x5F,0x97,0x44,0x17,0xC4,0xA7,0x7E,0x3D,0x64,0x5D,0x19,0x73,
    0x60,0x81,0x4F,0xDC,0x22,0x2A,0x90,0x88,0x46,0xEE,0xB8,0x14,0xDE,0x5E,0x0B,0xDB,
    0xE0,0x32,0x3A,0x0A,0x49,0x06,0x24,0x5C,0xC2,0xD3,0xAC,0x62,0x91,0x95,0xE4,0x79,
    0xE7,0xC8,0x37,0x6D,0x8D,0xD5,0x4E,0xA9,0x6C,0x56,0xF4,0xEA,0x65,0x7A,0xAE,0x08,
    0xBA,0x78,0x25,0x2E,0x1C,0xA6,0xB4,0xC6,0xE8,0xDD,0x74,0x1F,0x4B,0xBD,0x8B,0x8A,
    0x70,0x3E,0xB5,0x66,0x48,0x03,0xF6,0x0E,0x61,0x35,0x57,0xB9,0x86,0xC1,0x1D,0x9E,
    0xE1,0xF8,0x98,0x11,0x69,0xD9,0x8E,0x94,0x9B,0x1E,0x87,0xE9,0xCE,0x55,0x28,0xDF,
    0x8C,0xA1,0x89,0x0D,0xBF,0xE6,0x42,0x68,0x41,0x99,0x2D,0x0F,0xB0,0x54,0xBB,0x16,
    };
    BYTE dec_sbox[]={
    0x52,0x09,0x6A,0xD5,0x30,0x36,0xA5,0x38,0xBF,0x40,0xA3,0x9E,0x81,0xF3,0xD7,0xFB,
    0x7C,0xE3,0x39,0x82,0x9B,0x2F,0xFF,0x87,0x34,0x8E,0x43,0x44,0xC4,0xDE,0xE9,0xCB,
    0x54,0x7B,0x94,0x32,0xA6,0xC2,0x23,0x3D,0xEE,0x4C,0x95,0x0B,0x42,0xFA,0xC3,0x4E,
    0x08,0x2E,0xA1,0x66,0x28,0xD9,0x24,0xB2,0x76,0x5B,0xA2,0x49,0x6D,0x8B,0xD1,0x25,
    0x72,0xF8,0xF6,0x64,0x86,0x68,0x98,0x16,0xD4,0xA4,0x5C,0xCC,0x5D,0x65,0xB6,0x92,
    0x6C,0x70,0x48,0x50,0xFD,0xED,0xB9,0xDA,0x5E,0x15,0x46,0x57,0xA7,0x8D,0x9D,0x84,
    0x90,0xD8,0xAB,0x00,0x8C,0xBC,0xD3,0x0A,0xF7,0xE4,0x58,0x05,0xB8,0xB3,0x45,0x06,
    0xD0,0x2C,0x1E,0x8F,0xCA,0x3F,0x0F,0x02,0xC1,0xAF,0xBD,0x03,0x01,0x13,0x8A,0x6B,
    0x3A,0x91,0x11,0x41,0x4F,0x67,0xDC,0xEA,0x97,0xF2,0xCF,0xCE,0xF0,0xB4,0xE6,0x73,
    0x96,0xAC,0x74,0x22,0xE7,0xAD,0x35,0x85,0xE2,0xF9,0x37,0xE8,0x1C,0x75,0xDF,0x6E,
    0x47,0xF1,0x1A,0x71,0x1D,0x29,0xC5,0x89,0x6F,0xB7,0x62,0x0E,0xAA,0x18,0xBE,0x1B,
    0xFC,0x56,0x3E,0x4B,0xC6,0xD2,0x79,0x20,0x9A,0xDB,0xC0,0xFE,0x78,0xCD,0x5A,0xF4,
    0x1F,0xDD,0xA8,0x33,0x88,0x07,0xC7,0x31,0xB1,0x12,0x10,0x59,0x27,0x80,0xEC,0x5F,
    0x60,0x51,0x7F,0xA9,0x19,0xB5,0x4A,0x0D,0x2D,0xE5,0x7A,0x9F,0x93,0xC9,0x9C,0xEF,
    0xA0,0xE0,0x3B,0x4D,0xAE,0x2A,0xF5,0xB0,0xC8,0xEB,0xBB,0x3C,0x83,0x53,0x99,0x61,
    0x17,0x2B,0x04,0x7E,0xBA,0x77,0xD6,0x26,0xE1,0x69,0x14,0x63,0x55,0x21,0x0C,0x7D,
    };
    DWORD rcon[]={
    0x01000000,0x02000000,0x04000000,0x08000000,0x10000000,
    0x20000000,0x40000000,0x80000000,0x1B000000,0x36000000,
    };
    BYTE enc_lcon[]={2,3,1,1};
    BYTE dec_lcon[]={0xe,0xb,0xd,0x9};
    DWORD rk[44],s[4],t[4];
    BYTE mul(BYTE x,BYTE y){
        BYTE m=0b00011011;
        WORD z=0;
        for (int i=0;i<8;i++) if (y&(1<<i)) z^=x<<i;
        for (int i=0;i<8;i++) if (z&(0x0100<<i)) z^=m<<i;
        return (BYTE)z;
    }
    void aes_encrypt(BYTE *key,BYTE *in,BYTE* out){
        rk[0] = GETU32(key+0);
        rk[1] = GETU32(key+4);
        rk[2] = GETU32(key+8);
        rk[3] = GETU32(key+12);
        for (int i=1;i<11;i++){
            rk[i*4+0] = 0;
            for (int j=0;j<4;j++)
                rk[i*4+0] = rk[i*4+0] << 8 | enc_sbox[(rk[i*4-1] >> ((6-j)%4*8)) & 0xff];
            rk[i*4+0] ^= rk[i*4-4] ^ rcon[i-1];
            rk[i*4+1] = rk[i*4-3] ^ rk[i*4+0];
            rk[i*4+2] = rk[i*4-2] ^ rk[i*4+1];
            rk[i*4+3] = rk[i*4-1] ^ rk[i*4+2];
        }
        for (int i=0;i<4;i++)
            s[i] = GETU32(in+i*4) ^ rk[i];
        for (int i=1;i<11;i++){
            for (int j=0;j<4;j++){
                t[j] = 0;
                for (int k=0;k<4;k++)
                    t[j] = t[j] << 8 | enc_sbox[(s[(j+k)%4] >> ((7-k)%4*8)) & 0xff];
            }
            for (int j=0;j<4;j++){
                if (i==10){
                    s[j] = t[j];
                }else{
                    s[j] = 0;
                    for (int k=0;k<4;k++){
                        s[j] = s[j] << 8;
                        for (int l=0;l<4;l++)
                            s[j] ^= mul((t[j] >> ((7-l)%4*8) & 0xff),enc_lcon[(4-k+l)%4]);
                    }
                }
                s[j] ^= rk[i*4+j];
            }
        }
        PUTU32(out+0,s[0]);
        PUTU32(out+4,s[1]);
        PUTU32(out+8,s[2]);
        PUTU32(out+12,s[3]);
    }
    void aes_decrypt(BYTE *key,BYTE *in,BYTE* out){
        rk[0] = GETU32(key+0);
        rk[1] = GETU32(key+4);
        rk[2] = GETU32(key+8);
        rk[3] = GETU32(key+12);
        for (int i=1;i<11;i++){
            rk[i*4+0] = 0;
            for (int j=0;j<4;j++)
                rk[i*4+0] = rk[i*4+0] << 8 | enc_sbox[(rk[i*4-1] >> ((6-j)%4*8)) & 0xff];
            rk[i*4+0] ^= rk[i*4-4] ^ rcon[i-1];
            rk[i*4+1] = rk[i*4-3] ^ rk[i*4+0];
            rk[i*4+2] = rk[i*4-2] ^ rk[i*4+1];
            rk[i*4+3] = rk[i*4-1] ^ rk[i*4+2];
        }
        for (int i=0;i<4;i++)
            t[i] = GETU32(in+i*4);
        for (int i=1;i<11;i++){
            for (int j=0;j<4;j++){
                t[j] ^= rk[44-i*4+j];
                if (i==1){
                    s[j] = t[j];
                }else{
                    s[j] = 0;
                    for (int k=0;k<4;k++){
                        s[j] = s[j] << 8;
                        for (int l=0;l<4;l++)
                            s[j] ^= mul((t[j] >> ((7-l)%4*8) & 0xff),dec_lcon[(4-k+l)%4]);
                    }
                }
            }
            for (int j=0;j<4;j++){
                t[j] = 0;
                for (int k=0;k<4;k++)
                    t[j] = t[j] << 8 | dec_sbox[(s[(4+j-k)%4] >> ((7-k)%4*8)) & 0xff];
            }
        }
        for (int i=0;i<4;i++)
            t[i] ^= rk[i];
        PUTU32(out+0,t[0]);
        PUTU32(out+4,t[1]);
        PUTU32(out+8,t[2]);
        PUTU32(out+12,t[3]);
    }
    int main(){
        BYTE key[16],in[16],enc[16],dec[16];
        memcpy(in,"NiceCryptography",16);
        memcpy(key,"PasswordPassword",16);
    
        printf("Message:		%.16s
    			Hex: ",in);
        for (int i=0;i<16;i++) printf("%02x",in[i]);
        printf("
    ");
    
        printf("Key:			%.16s
    			Hex: ",key);
        for (int i=0;i<16;i++) printf("%02x",key[i]);
        printf("
    ");
    
        aes_encrypt(key,in,enc);
        printf("Encrypted Message:	Hex: ");
        for (int i=0;i<16;i++) printf("%02x",enc[i]);
        printf("
    ");
    
        aes_decrypt(key,enc,dec);
        printf("Decrypted Message:	%.16s
    			Hex: ",dec);
        for (int i=0;i<16;i++) printf("%02x",dec[i]);
        printf("
    ");
    }
    
  • 相关阅读:
    VMware安装Ghost版Win10 失败的解决方法
    供销平台能导入不能编辑商品的问题
    bootstrap导航菜单做active判断
    phantomjs读取文件转换数组
    网址收藏
    清理恶意绑定浏览器网址
    sort
    论文等级
    multiThreading
    LZ4压缩算法
  • 原文地址:https://www.cnblogs.com/algonote/p/14847646.html
Copyright © 2011-2022 走看看