zoukankan      html  css  js  c++  java
  • DES 算法的 Javascript、PHP 及 Perl 的源代码

    下面这些源代码统统来自 tero.co.uk 网站。其中 包含了 JavaScript 实现按位工作的 DES (数据加密标准)加密算法。它支持 ECB(电子密码本(Electronic Code Book))和 CBC(密码块链接(Cipher Block Chaining)),并且包含了 3DES 算法。它不需要任何附加库,并且同时提供了 PHP 和 Perl 的实现。

    使用:

    des(stringkey, stringmessage, booleanencrypt, [integermode, stringiv])

    des 函数接受一个 8 字节字符串作为普通 DES 算法的密钥(也就是 64 位,但是算法只使用 56 位),或者接受一个 24 字节字符串作为 3DES 算法的密钥;第二个参数是要加密或解密的信息字符串;第三个布尔值参数用来说明信息是加密还是解密;接下来的可选参数 mode 如果是 0 表示 ECB 模式,1 表示 CBC 模式,默认是 ECB 模式;最后一个可选项是一个 8 字节的输入向量字符串(在 ECB 模式下不使用)。返回的密文是字符串。

    下面是一些如何使用的例子。

    // 使用 DES 算法(使用 8 字节的密钥)以 CBC 模式使用给出的输入向量加密信息
    des("8bytekey", "This is the message.", 1, 1, "inputvec");
    // 使用 3DES 算法(使用 24 字节的密钥) 以 ECB 模式加密信息
    des("this is a 24 byte key !!", "This is the message.", 1);
    //使用 ECB 模式的 DES 算法解密信息
    des("8bytekey", "2384lf&*£90LSdsf", 0);

    源码:

    des.js
    1. //Javascript version
    2. //Paul Tero, July 2001
    3. //http://www.tero.co.uk/des/
    4. //
    5. //Optimised for performance with large blocks by Michael Hayworth, November 2001
    6. //http://www.netdealing.com
    7. //
    8. //THIS SOFTWARE IS PROVIDED "AS IS" AND
    9. //ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    10. //IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    11. //ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    12. //FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    13. //DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    14. //OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    15. //HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    16. //LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    17. //OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    18. //SUCH DAMAGE.
    19.  
    20. //des
    21. //this takes the key, the message, and whether to encrypt or decrypt
    22. function des(key, message, encrypt, mode, iv){
    23.   //declaring this locally speeds things up a bit
    24.   var spfunction1 = newArray(0x1010400,0,0x10000,0x1010404,0x1010004,0x10404,0x4,0x10000,0x400,0x1010400,0x1010404,0x400,0x1000404,0x1010004,0x1000000,0x4,0x404,0x1000400,0x1000400,0x10400,0x10400,0x1010000,0x1010000,0x1000404,0x10004,0x1000004,0x1000004,0x10004,0,0x404,0x10404,0x1000000,0x10000,0x1010404,0x4,0x1010000,0x1010400,0x1000000,0x1000000,0x400,0x1010004,0x10000,0x10400,0x1000004,0x400,0x4,0x1000404,0x10404,0x1010404,0x10004,0x1010000,0x1000404,0x1000004,0x404,0x10404,0x1010400,0x404,0x1000400,0x1000400,0,0x10004,0x10400,0,0x1010004);
    25.   var spfunction2 = newArray(-0x7fef7fe0,-0x7fff8000,0x8000,0x108020,0x100000,0x20,-0x7fefffe0,-0x7fff7fe0,-0x7fffffe0,-0x7fef7fe0,-0x7fef8000,-0x80000000,-0x7fff8000,0x100000,0x20,-0x7fefffe0,0x108000,0x100020,-0x7fff7fe0,0,-0x80000000,0x8000,0x108020,-0x7ff00000,0x100020,-0x7fffffe0,0,0x108000,0x8020,-0x7fef8000,-0x7ff00000,0x8020,0,0x108020,-0x7fefffe0,0x100000,-0x7fff7fe0,-0x7ff00000,-0x7fef8000,0x8000,-0x7ff00000,-0x7fff8000,0x20,-0x7fef7fe0,0x108020,0x20,0x8000,-0x80000000,0x8020,-0x7fef8000,0x100000,-0x7fffffe0,0x100020,-0x7fff7fe0,-0x7fffffe0,0x100020,0x108000,0,-0x7fff8000,0x8020,-0x80000000,-0x7fefffe0,-0x7fef7fe0,0x108000);
    26.   var spfunction3 = newArray(0x208,0x8020200,0,0x8020008,0x8000200,0,0x20208,0x8000200,0x20008,0x8000008,0x8000008,0x20000,0x8020208,0x20008,0x8020000,0x208,0x8000000,0x8,0x8020200,0x200,0x20200,0x8020000,0x8020008,0x20208,0x8000208,0x20200,0x20000,0x8000208,0x8,0x8020208,0x200,0x8000000,0x8020200,0x8000000,0x20008,0x208,0x20000,0x8020200,0x8000200,0,0x200,0x20008,0x8020208,0x8000200,0x8000008,0x200,0,0x8020008,0x8000208,0x20000,0x8000000,0x8020208,0x8,0x20208,0x20200,0x8000008,0x8020000,0x8000208,0x208,0x8020000,0x20208,0x8,0x8020008,0x20200);
    27.   var spfunction4 = newArray(0x802001,0x2081,0x2081,0x80,0x802080,0x800081,0x800001,0x2001,0,0x802000,0x802000,0x802081,0x81,0,0x800080,0x800001,0x1,0x2000,0x800000,0x802001,0x80,0x800000,0x2001,0x2080,0x800081,0x1,0x2080,0x800080,0x2000,0x802080,0x802081,0x81,0x800080,0x800001,0x802000,0x802081,0x81,0,0,0x802000,0x2080,0x800080,0x800081,0x1,0x802001,0x2081,0x2081,0x80,0x802081,0x81,0x1,0x2000,0x800001,0x2001,0x802080,0x800081,0x2001,0x2080,0x800000,0x802001,0x80,0x800000,0x2000,0x802080);
    28.   var spfunction5 = newArray(0x100,0x2080100,0x2080000,0x42000100,0x80000,0x100,0x40000000,0x2080000,0x40080100,0x80000,0x2000100,0x40080100,0x42000100,0x42080000,0x80100,0x40000000,0x2000000,0x40080000,0x40080000,0,0x40000100,0x42080100,0x42080100,0x2000100,0x42080000,0x40000100,0,0x42000000,0x2080100,0x2000000,0x42000000,0x80100,0x80000,0x42000100,0x100,0x2000000,0x40000000,0x2080000,0x42000100,0x40080100,0x2000100,0x40000000,0x42080000,0x2080100,0x40080100,0x100,0x2000000,0x42080000,0x42080100,0x80100,0x42000000,0x42080100,0x2080000,0,0x40080000,0x42000000,0x80100,0x2000100,0x40000100,0x80000,0,0x40080000,0x2080100,0x40000100);
    29.   var spfunction6 = newArray(0x20000010,0x20400000,0x4000,0x20404010,0x20400000,0x10,0x20404010,0x400000,0x20004000,0x404010,0x400000,0x20000010,0x400010,0x20004000,0x20000000,0x4010,0,0x400010,0x20004010,0x4000,0x404000,0x20004010,0x10,0x20400010,0x20400010,0,0x404010,0x20404000,0x4010,0x404000,0x20404000,0x20000000,0x20004000,0x10,0x20400010,0x404000,0x20404010,0x400000,0x4010,0x20000010,0x400000,0x20004000,0x20000000,0x4010,0x20000010,0x20404010,0x404000,0x20400000,0x404010,0x20404000,0,0x20400010,0x10,0x4000,0x20400000,0x404010,0x4000,0x400010,0x20004010,0,0x20404000,0x20000000,0x400010,0x20004010);
    30.   var spfunction7 = newArray(0x200000,0x4200002,0x4000802,0,0x800,0x4000802,0x200802,0x4200800,0x4200802,0x200000,0,0x4000002,0x2,0x4000000,0x4200002,0x802,0x4000800,0x200802,0x200002,0x4000800,0x4000002,0x4200000,0x4200800,0x200002,0x4200000,0x800,0x802,0x4200802,0x200800,0x2,0x4000000,0x200800,0x4000000,0x200800,0x200000,0x4000802,0x4000802,0x4200002,0x4200002,0x2,0x200002,0x4000000,0x4000800,0x200000,0x4200800,0x802,0x200802,0x4200800,0x802,0x4000002,0x4200802,0x4200000,0x200800,0,0x2,0x4200802,0,0x200802,0x4200000,0x800,0x4000002,0x4000800,0x800,0x200002);
    31.   var spfunction8 = newArray(0x10001040,0x1000,0x40000,0x10041040,0x10000000,0x10001040,0x40,0x10000000,0x40040,0x10040000,0x10041040,0x41000,0x10041000,0x41040,0x1000,0x40,0x10040000,0x10000040,0x10001000,0x1040,0x41000,0x40040,0x10040040,0x10041000,0x1040,0,0,0x10040040,0x10000040,0x10001000,0x41040,0x40000,0x41040,0x40000,0x10041000,0x1000,0x40,0x10040040,0x1000,0x41040,0x10001000,0x40,0x10000040,0x10040000,0x10040040,0x10000000,0x40000,0x10001040,0,0x10041040,0x40040,0x10000040,0x10040000,0x10001000,0x10001040,0,0x10041040,0x41000,0x41000,0x1040,0x1040,0x40040,0x10000000,0x10041000);
    32.  
    33.   //create the 16 or 48 subkeys we will need
    34.   var keys = des_createKeys(key);
    35.   var m=0, i, j, temp, temp2, right1, right2, left, right, looping;
    36.   var cbcleft, cbcleft2, cbcright, cbcright2
    37.   var endloop, loopinc;
    38.   var len = message.length;
    39.   var chunk = 0;
    40.   //set up the loops for single and triple des
    41.   var iterations = keys.length == 32 ? 3 : 9; //single or triple des
    42.   if (iterations == 3){looping = encrypt ? newArray(0, 32, 2) : newArray(30, -2, -2);}
    43.   else {looping = encrypt ? newArray(0, 32, 2, 62, 30, -2, 64, 96, 2) : newArray(94, 62, -2, 32, 64, 2, 30, -2, -2);}
    44.  
    45.   message += "\0\0\0\0\0\0\0\0"; //pad the message out with null bytes
    46.   //store the result here
    47.   result = "";
    48.   tempresult = "";
    49.  
    50.   if (mode == 1){//CBC mode
    51.     cbcleft = (iv.charCodeAt(m++) << 24) | (iv.charCodeAt(m++) << 16) | (iv.charCodeAt(m++) << 8) | iv.charCodeAt(m++);
    52.     cbcright = (iv.charCodeAt(m++) << 24) | (iv.charCodeAt(m++) << 16) | (iv.charCodeAt(m++) << 8) | iv.charCodeAt(m++);
    53.     m=0;
    54.   }
    55.  
    56.   //loop through each 64 bit chunk of the message
    57.   while (m < len){
    58.     left = (message.charCodeAt(m++) << 24) | (message.charCodeAt(m++) << 16) | (message.charCodeAt(m++) << 8) | message.charCodeAt(m++);
    59.     right = (message.charCodeAt(m++) << 24) | (message.charCodeAt(m++) << 16) | (message.charCodeAt(m++) << 8) | message.charCodeAt(m++);
    60.  
    61.     //for Cipher Block Chaining mode, xor the message with the previous result
    62.     if (mode == 1){if(encrypt){left ^= cbcleft; right ^= cbcright;}else{cbcleft2 = cbcleft; cbcright2 = cbcright; cbcleft = left; cbcright = right;}}
    63.  
    64.     //first each 64 but chunk of the message must be permuted according to IP
    65.     temp = ((left >>> 4) ^ right) & 0x0f0f0f0f; right ^= temp; left ^= (temp << 4);
    66.     temp = ((left >>> 16) ^ right) & 0x0000ffff; right ^= temp; left ^= (temp << 16);
    67.     temp = ((right >>> 2) ^ left) & 0x33333333; left ^= temp; right ^= (temp << 2);
    68.     temp = ((right >>> 8) ^ left) & 0x00ff00ff; left ^= temp; right ^= (temp << 8);
    69.     temp = ((left >>> 1) ^ right) & 0x55555555; right ^= temp; left ^= (temp << 1);
    70.  
    71.     left = ((left << 1) | (left >>> 31));
    72.     right = ((right << 1) | (right >>> 31));
    73.  
    74.     //do this either 1 or 3 times for each chunk of the message
    75.     for (j=0; j<iterations; j+=3){
    76.       endloop = looping[j+1];
    77.       loopinc = looping[j+2];
    78.       //now go through and perform the encryption or decryption 
    79.       for (i=looping[j]; i!=endloop; i+=loopinc){//for efficiency
    80.         right1 = right ^ keys[i];
    81.         right2 = ((right >>> 4) | (right << 28)) ^ keys[i+1];
    82.         //the result is attained by passing these bytes through the S selection functions
    83.         temp = left;
    84.         left = right;
    85.         right = temp ^ (spfunction2[(right1 >>> 24) & 0x3f] | spfunction4[(right1 >>> 16) & 0x3f]
    86.               | spfunction6[(right1 >>>  8) & 0x3f] | spfunction8[right1 & 0x3f]
    87.               | spfunction1[(right2 >>> 24) & 0x3f] | spfunction3[(right2 >>> 16) & 0x3f]
    88.               | spfunction5[(right2 >>>  8) & 0x3f] | spfunction7[right2 & 0x3f]);
    89.       }
    90.       temp = left; left = right; right = temp; //unreverse left and right
    91.     } //for either 1 or 3 iterations
    92.  
    93.     //move then each one bit to the right
    94.     left = ((left >>> 1) | (left << 31));
    95.     right = ((right >>> 1) | (right << 31));
    96.  
    97.     //now perform IP-1, which is IP in the opposite direction
    98.     temp = ((left >>> 1) ^ right) & 0x55555555; right ^= temp; left ^= (temp << 1);
    99.     temp = ((right >>> 8) ^ left) & 0x00ff00ff; left ^= temp; right ^= (temp << 8);
    100.     temp = ((right >>> 2) ^ left) & 0x33333333; left ^= temp; right ^= (temp << 2);
    101.     temp = ((left >>> 16) ^ right) & 0x0000ffff; right ^= temp; left ^= (temp << 16);
    102.     temp = ((left >>> 4) ^ right) & 0x0f0f0f0f; right ^= temp; left ^= (temp << 4);
    103.  
    104.     //for Cipher Block Chaining mode, xor the message with the previous result
    105.     if (mode == 1){if(encrypt){cbcleft = left; cbcright = right;}else{left ^= cbcleft2; right ^= cbcright2;}}
    106.     tempresult += String.fromCharCode ((left>>>24), ((left>>>16) & 0xff), ((left>>>8) & 0xff), (left & 0xff), (right>>>24), ((right>>>16) & 0xff), ((right>>>8) & 0xff), (right & 0xff));
    107.  
    108.     chunk += 8;
    109.     if (chunk == 512){result += tempresult; tempresult = ""; chunk = 0;}
    110.   } //for every 8 characters, or 64 bits in the message
    111.  
    112.   //return the result as an array
    113.   return result + tempresult;
    114. } //end of des
    115.  
    116.  
    117.  
    118. //des_createKeys
    119. //this takes as input a 64 bit key (even though only 56 bits are used)
    120. //as an array of 2 integers, and returns 16 48 bit keys
    121. function des_createKeys(key){
    122.   //declaring this locally speeds things up a bit
    123.   pc2bytes0  = new Array(0,0x4,0x20000000,0x20000004,0x10000,0x10004,0x20010000,0x20010004,0x200,0x204,0x20000200,0x20000204,0x10200,0x10204,0x20010200,0x20010204);
    124.   pc2bytes1  = new Array(0,0x1,0x100000,0x100001,0x4000000,0x4000001,0x4100000,0x4100001,0x100,0x101,0x100100,0x100101,0x4000100,0x4000101,0x4100100,0x4100101);
    125.   pc2bytes2  = new Array(0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808,0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808);
    126.   pc2bytes3  = new Array(0,0x200000,0x8000000,0x8200000,0x2000,0x202000,0x8002000,0x8202000,0x20000,0x220000,0x8020000,0x8220000,0x22000,0x222000,0x8022000,0x8222000);
    127.   pc2bytes4  = new Array(0,0x40000,0x10,0x40010,0,0x40000,0x10,0x40010,0x1000,0x41000,0x1010,0x41010,0x1000,0x41000,0x1010,0x41010);
    128.   pc2bytes5  = new Array(0,0x400,0x20,0x420,0,0x400,0x20,0x420,0x2000000,0x2000400,0x2000020,0x2000420,0x2000000,0x2000400,0x2000020,0x2000420);
    129.   pc2bytes6  = new Array(0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002,0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002);
    130.   pc2bytes7  = new Array(0,0x10000,0x800,0x10800,0x20000000,0x20010000,0x20000800,0x20010800,0x20000,0x30000,0x20800,0x30800,0x20020000,0x20030000,0x20020800,0x20030800);
    131.   pc2bytes8  = new Array(0,0x40000,0,0x40000,0x2,0x40002,0x2,0x40002,0x2000000,0x2040000,0x2000000,0x2040000,0x2000002,0x2040002,0x2000002,0x2040002);
    132.   pc2bytes9  = new Array(0,0x10000000,0x8,0x10000008,0,0x10000000,0x8,0x10000008,0x400,0x10000400,0x408,0x10000408,0x400,0x10000400,0x408,0x10000408);
    133.   pc2bytes10 = new Array(0,0x20,0,0x20,0x100000,0x100020,0x100000,0x100020,0x2000,0x2020,0x2000,0x2020,0x102000,0x102020,0x102000,0x102020);
    134.   pc2bytes11 = new Array(0,0x1000000,0x200,0x1000200,0x200000,0x1200000,0x200200,0x1200200,0x4000000,0x5000000,0x4000200,0x5000200,0x4200000,0x5200000,0x4200200,0x5200200);
    135.   pc2bytes12 = new Array(0,0x1000,0x8000000,0x8001000,0x80000,0x81000,0x8080000,0x8081000,0x10,0x1010,0x8000010,0x8001010,0x80010,0x81010,0x8080010,0x8081010);
    136.   pc2bytes13 = new Array(0,0x4,0x100,0x104,0,0x4,0x100,0x104,0x1,0x5,0x101,0x105,0x1,0x5,0x101,0x105);
    137.  
    138.   //how many iterations (1 for des, 3 for triple des)
    139.   var iterations = key.length >= 24 ? 3 : 1;
    140.   //stores the return keys
    141.   var keys = newArray(32 * iterations);
    142.   //now define the left shifts which need to be done
    143.   var shifts = newArray(0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0);
    144.   //other variables
    145.   var lefttemp, righttemp, m=0, n=0, temp;
    146.  
    147.   for (varj=0; j<iterations; j++){//either 1 or 3 iterations
    148.     left = (key.charCodeAt(m++) << 24) | (key.charCodeAt(m++) << 16) | (key.charCodeAt(m++) << 8) | key.charCodeAt(m++);
    149.     right = (key.charCodeAt(m++) << 24) | (key.charCodeAt(m++) << 16) | (key.charCodeAt(m++) << 8) | key.charCodeAt(m++);
    150.  
    151.     temp = ((left >>> 4) ^ right) & 0x0f0f0f0f; right ^= temp; left ^= (temp << 4);
    152.     temp = ((right >>> -16) ^ left) & 0x0000ffff; left ^= temp; right ^= (temp << -16);
    153.     temp = ((left >>> 2) ^ right) & 0x33333333; right ^= temp; left ^= (temp << 2);
    154.     temp = ((right >>> -16) ^ left) & 0x0000ffff; left ^= temp; right ^= (temp << -16);
    155.     temp = ((left >>> 1) ^ right) & 0x55555555; right ^= temp; left ^= (temp << 1);
    156.     temp = ((right >>> 8) ^ left) & 0x00ff00ff; left ^= temp; right ^= (temp << 8);
    157.     temp = ((left >>> 1) ^ right) & 0x55555555; right ^= temp; left ^= (temp << 1);
    158.  
    159.     //the right side needs to be shifted and to get the last four bits of the left side
    160.     temp = (left << 8) | ((right >>> 20) & 0x000000f0);
    161.     //left needs to be put upside down
    162.     left = (right << 24) | ((right << 8) & 0xff0000) | ((right >>> 8) & 0xff00) | ((right >>> 24) & 0xf0);
    163.     right = temp;
    164.  
    165.     //now go through and perform these shifts on the left and right keys
    166.     for (i=0; i < shifts.length; i++){
    167.       //shift the keys either one or two bits to the left
    168.       if (shifts[i]){left = (left << 2) | (left >>> 26); right = (right << 2) | (right >>> 26);}
    169.       else {left = (left << 1) | (left >>> 27); right = (right << 1) | (right >>> 27);}
    170.       left &= -0xf; right &= -0xf;
    171.  
    172.       //now apply PC-2, in such a way that E is easier when encrypting or decrypting
    173.       //this conversion will look like PC-2 except only the last 6 bits of each byte are used
    174.       //rather than 48 consecutive bits and the order of lines will be according to
    175.       //how the S selection functions will be applied: S2, S4, S6, S8, S1, S3, S5, S7
    176.       lefttemp = pc2bytes0[left >>> 28] | pc2bytes1[(left >>> 24) & 0xf]
    177.               | pc2bytes2[(left >>> 20) & 0xf] | pc2bytes3[(left >>> 16) & 0xf]
    178.               | pc2bytes4[(left >>> 12) & 0xf] | pc2bytes5[(left >>> 8) & 0xf]
    179.               | pc2bytes6[(left >>> 4) & 0xf];
    180.       righttemp = pc2bytes7[right >>> 28] | pc2bytes8[(right >>> 24) & 0xf]
    181.                 | pc2bytes9[(right >>> 20) & 0xf] | pc2bytes10[(right >>> 16) & 0xf]
    182.                 | pc2bytes11[(right >>> 12) & 0xf] | pc2bytes12[(right >>> 8) & 0xf]
    183.                 | pc2bytes13[(right >>> 4) & 0xf];
    184.       temp = ((righttemp >>> 16) ^ lefttemp) & 0x0000ffff;
    185.       keys[n++] = lefttemp ^ temp; keys[n++] = righttemp ^ (temp << 16);
    186.     }
    187.   } //for each iterations
    188.   //return the keys we've created
    189.   return keys;
    190. } //end of des_createKeys
    191.  
    192.  
    193. ////////////////////////////// TEST //////////////////////////////
    194. function stringToHex(s){
    195.   var r = "0x";
    196.   var hexes = newArray("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
    197.   for (vari=0; i<s.length; i++){r += hexes[s.charCodeAt(i) >> 4] + hexes[s.charCodeAt(i) & 0xf];}
    198.   return r;
    199. }
    200.  
    201. var key = "this is a 24 byte key !!";
    202. var message = "This is a test message";
    203. var ciphertext = des(key, message, 1, 0);
    204. document.writeln ("DES Test: " + stringToHex(ciphertext));
    des.php
    1. <?php
    2. //PHP version
    3. //Paul Tero, July 2001
    4. //http://www.tero.co.uk/des/
    5. //
    6. //Optimised for performance with large blocks by Michael Hayworth, November 2001
    7. //http://www.netdealing.com
    8. //
    9. //Converted from JavaScript to PHP by Jim Gibbs, June 2004
    10. //
    11. //THIS SOFTWARE IS PROVIDED "AS IS" AND
    12. //ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    13. //IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    14. //ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    15. //FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    16. //DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    17. //OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    18. //HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    19. //LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    20. //OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    21. //SUCH DAMAGE.
    22.  
    23. //des
    24. //this takes the key, the message, and whether to encrypt or decrypt
    25. function des($key, $message, $encrypt, $mode, $iv){
    26.   //declaring this locally speeds things up a bit
    27.   $spfunction1 = array (0x1010400,0,0x10000,0x1010404,0x1010004,0x10404,0x4,0x10000,0x400,0x1010400,0x1010404,0x400,0x1000404,0x1010004,0x1000000,0x4,0x404,0x1000400,0x1000400,0x10400,0x10400,0x1010000,0x1010000,0x1000404,0x10004,0x1000004,0x1000004,0x10004,0,0x404,0x10404,0x1000000,0x10000,0x1010404,0x4,0x1010000,0x1010400,0x1000000,0x1000000,0x400,0x1010004,0x10000,0x10400,0x1000004,0x400,0x4,0x1000404,0x10404,0x1010404,0x10004,0x1010000,0x1000404,0x1000004,0x404,0x10404,0x1010400,0x404,0x1000400,0x1000400,0,0x10004,0x10400,0,0x1010004);
    28.   $spfunction2 = array (-0x7fef7fe0,-0x7fff8000,0x8000,0x108020,0x100000,0x20,-0x7fefffe0,-0x7fff7fe0,-0x7fffffe0,-0x7fef7fe0,-0x7fef8000,-0x80000000,-0x7fff8000,0x100000,0x20,-0x7fefffe0,0x108000,0x100020,-0x7fff7fe0,0,-0x80000000,0x8000,0x108020,-0x7ff00000,0x100020,-0x7fffffe0,0,0x108000,0x8020,-0x7fef8000,-0x7ff00000,0x8020,0,0x108020,-0x7fefffe0,0x100000,-0x7fff7fe0,-0x7ff00000,-0x7fef8000,0x8000,-0x7ff00000,-0x7fff8000,0x20,-0x7fef7fe0,0x108020,0x20,0x8000,-0x80000000,0x8020,-0x7fef8000,0x100000,-0x7fffffe0,0x100020,-0x7fff7fe0,-0x7fffffe0,0x100020,0x108000,0,-0x7fff8000,0x8020,-0x80000000,-0x7fefffe0,-0x7fef7fe0,0x108000);
    29.   $spfunction3 = array (0x208,0x8020200,0,0x8020008,0x8000200,0,0x20208,0x8000200,0x20008,0x8000008,0x8000008,0x20000,0x8020208,0x20008,0x8020000,0x208,0x8000000,0x8,0x8020200,0x200,0x20200,0x8020000,0x8020008,0x20208,0x8000208,0x20200,0x20000,0x8000208,0x8,0x8020208,0x200,0x8000000,0x8020200,0x8000000,0x20008,0x208,0x20000,0x8020200,0x8000200,0,0x200,0x20008,0x8020208,0x8000200,0x8000008,0x200,0,0x8020008,0x8000208,0x20000,0x8000000,0x8020208,0x8,0x20208,0x20200,0x8000008,0x8020000,0x8000208,0x208,0x8020000,0x20208,0x8,0x8020008,0x20200);
    30.   $spfunction4 = array (0x802001,0x2081,0x2081,0x80,0x802080,0x800081,0x800001,0x2001,0,0x802000,0x802000,0x802081,0x81,0,0x800080,0x800001,0x1,0x2000,0x800000,0x802001,0x80,0x800000,0x2001,0x2080,0x800081,0x1,0x2080,0x800080,0x2000,0x802080,0x802081,0x81,0x800080,0x800001,0x802000,0x802081,0x81,0,0,0x802000,0x2080,0x800080,0x800081,0x1,0x802001,0x2081,0x2081,0x80,0x802081,0x81,0x1,0x2000,0x800001,0x2001,0x802080,0x800081,0x2001,0x2080,0x800000,0x802001,0x80,0x800000,0x2000,0x802080);
    31.   $spfunction5 = array (0x100,0x2080100,0x2080000,0x42000100,0x80000,0x100,0x40000000,0x2080000,0x40080100,0x80000,0x2000100,0x40080100,0x42000100,0x42080000,0x80100,0x40000000,0x2000000,0x40080000,0x40080000,0,0x40000100,0x42080100,0x42080100,0x2000100,0x42080000,0x40000100,0,0x42000000,0x2080100,0x2000000,0x42000000,0x80100,0x80000,0x42000100,0x100,0x2000000,0x40000000,0x2080000,0x42000100,0x40080100,0x2000100,0x40000000,0x42080000,0x2080100,0x40080100,0x100,0x2000000,0x42080000,0x42080100,0x80100,0x42000000,0x42080100,0x2080000,0,0x40080000,0x42000000,0x80100,0x2000100,0x40000100,0x80000,0,0x40080000,0x2080100,0x40000100);
    32.   $spfunction6 = array (0x20000010,0x20400000,0x4000,0x20404010,0x20400000,0x10,0x20404010,0x400000,0x20004000,0x404010,0x400000,0x20000010,0x400010,0x20004000,0x20000000,0x4010,0,0x400010,0x20004010,0x4000,0x404000,0x20004010,0x10,0x20400010,0x20400010,0,0x404010,0x20404000,0x4010,0x404000,0x20404000,0x20000000,0x20004000,0x10,0x20400010,0x404000,0x20404010,0x400000,0x4010,0x20000010,0x400000,0x20004000,0x20000000,0x4010,0x20000010,0x20404010,0x404000,0x20400000,0x404010,0x20404000,0,0x20400010,0x10,0x4000,0x20400000,0x404010,0x4000,0x400010,0x20004010,0,0x20404000,0x20000000,0x400010,0x20004010);
    33.   $spfunction7 = array (0x200000,0x4200002,0x4000802,0,0x800,0x4000802,0x200802,0x4200800,0x4200802,0x200000,0,0x4000002,0x2,0x4000000,0x4200002,0x802,0x4000800,0x200802,0x200002,0x4000800,0x4000002,0x4200000,0x4200800,0x200002,0x4200000,0x800,0x802,0x4200802,0x200800,0x2,0x4000000,0x200800,0x4000000,0x200800,0x200000,0x4000802,0x4000802,0x4200002,0x4200002,0x2,0x200002,0x4000000,0x4000800,0x200000,0x4200800,0x802,0x200802,0x4200800,0x802,0x4000002,0x4200802,0x4200000,0x200800,0,0x2,0x4200802,0,0x200802,0x4200000,0x800,0x4000002,0x4000800,0x800,0x200002);
    34.   $spfunction8 = array (0x10001040,0x1000,0x40000,0x10041040,0x10000000,0x10001040,0x40,0x10000000,0x40040,0x10040000,0x10041040,0x41000,0x10041000,0x41040,0x1000,0x40,0x10040000,0x10000040,0x10001000,0x1040,0x41000,0x40040,0x10040040,0x10041000,0x1040,0,0,0x10040040,0x10000040,0x10001000,0x41040,0x40000,0x41040,0x40000,0x10041000,0x1000,0x40,0x10040040,0x1000,0x41040,0x10001000,0x40,0x10000040,0x10040000,0x10040040,0x10000000,0x40000,0x10001040,0,0x10041040,0x40040,0x10000040,0x10040000,0x10001000,0x10001040,0,0x10041040,0x41000,0x41000,0x1040,0x1040,0x40040,0x10000000,0x10041000);
    35.   $masks = array (4294967295,2147483647,1073741823,536870911,268435455,134217727,67108863,33554431,16777215,8388607,4194303,2097151,1048575,524287,262143,131071,65535,32767,16383,8191,4095,2047,1023,511,255,127,63,31,15,7,3,1,0);
    36.  
    37.   //create the 16 or 48 subkeys we will need
    38.   $keys = des_createKeys ($key);
    39.   $m=0;
    40.   $len = strlen($message);
    41.   $chunk = 0;
    42.   //set up the loops for single and triple des
    43.   $iterations = ((count($keys) == 32) ? 3 : 9); //single or triple des
    44.   if ($iterations == 3){$looping = (($encrypt) ? array(0, 32, 2) : array(30, -2, -2));}
    45.   else {$looping = (($encrypt) ? array(0, 32, 2, 62, 30, -2, 64, 96, 2) : array(94, 62, -2, 32, 64, 2, 30, -2, -2));}
    46.  
    47.   $message .= (chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0)); //pad the message out with null bytes
    48.   //store the result here
    49.   $result = "";
    50.   $tempresult = "";
    51.  
    52.   if ($mode == 1){//CBC mode
    53.     $cbcleft = (ord($iv{$m++}) << 24) | (ord($iv{$m++}) << 16) | (ord($iv{$m++}) << 8) | ord($iv{$m++});
    54.     $cbcright = (ord($iv{$m++}) << 24) | (ord($iv{$m++}) << 16) | (ord($iv{$m++}) << 8) | ord($iv{$m++});
    55.     $m=0;
    56.   }
    57.  
    58.   //loop through each 64 bit chunk of the message
    59.   while ($m < $len){
    60.     $left = (ord($message{$m++}) << 24) | (ord($message{$m++}) << 16) | (ord($message{$m++}) << 8) | ord($message{$m++});
    61.     $right = (ord($message{$m++}) << 24) | (ord($message{$m++}) << 16) | (ord($message{$m++}) << 8) | ord($message{$m++});
    62.  
    63.     //for Cipher Block Chaining mode, xor the message with the previous result
    64.     if ($mode == 1){if($encrypt){$left ^= $cbcleft; $right ^= $cbcright;}else{$cbcleft2 = $cbcleft; $cbcright2 = $cbcright; $cbcleft = $left; $cbcright = $right;}}
    65.  
    66.     //first each 64 but chunk of the message must be permuted according to IP
    67.     $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
    68.     $temp = (($left >> 16 & $masks[16]) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
    69.     $temp = (($right >> 2 & $masks[2]) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
    70.     $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
    71.     $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    72.  
    73.     $left = (($left << 1) | ($left >> 31 & $masks[31]));
    74.     $right = (($right << 1) | ($right >> 31 & $masks[31]));
    75.  
    76.     //do this either 1 or 3 times for each chunk of the message
    77.     for ($j=0; $j<$iterations; $j+=3){
    78.       $endloop = $looping[$j+1];
    79.       $loopinc = $looping[$j+2];
    80.       //now go through and perform the encryption or decryption 
    81.       for ($i=$looping[$j]; $i!=$endloop; $i+=$loopinc){//for efficiency
    82.         $right1 = $right ^ $keys[$i];
    83.         $right2 = (($right >> 4 & $masks[4]) | ($right << 28)) ^ $keys[$i+1];
    84.         //the result is attained by passing these bytes through the S selection functions
    85.         $temp = $left;
    86.         $left = $right;
    87.         $right = $temp ^ ($spfunction2[($right1 >> 24 & $masks[24]) & 0x3f] | $spfunction4[($right1 >> 16 & $masks[16]) & 0x3f]
    88.               | $spfunction6[($right1 >>  8 & $masks[8]) & 0x3f] | $spfunction8[$right1 & 0x3f]
    89.               | $spfunction1[($right2 >> 24 & $masks[24]) & 0x3f] | $spfunction3[($right2 >> 16 & $masks[16]) & 0x3f]
    90.               | $spfunction5[($right2 >>  8 & $masks[8]) & 0x3f] | $spfunction7[$right2 & 0x3f]);
    91.       }
    92.       $temp = $left; $left = $right; $right = $temp; //unreverse left and right
    93.     } //for either 1 or 3 iterations
    94.  
    95.     //move then each one bit to the right
    96.     $left = (($left >> 1 & $masks[1]) | ($left << 31));
    97.     $right = (($right >> 1 & $masks[1]) | ($right << 31));
    98.  
    99.     //now perform IP-1, which is IP in the opposite direction
    100.     $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    101.     $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
    102.     $temp = (($right >> 2 & $masks[2]) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
    103.     $temp = (($left >> 16 & $masks[16]) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
    104.     $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
    105.  
    106.     //for Cipher Block Chaining mode, xor the message with the previous result
    107.     if ($mode == 1){if($encrypt){$cbcleft = $left; $cbcright = $right;}else{$left ^= $cbcleft2; $right ^= $cbcright2;}}
    108.     $tempresult .= (chr($left>>24 & $masks[24]) . chr(($left>>16 & $masks[16]) & 0xff) . chr(($left>>8 & $masks[8]) & 0xff) . chr($left & 0xff) . chr($right>>24 & $masks[24]) . chr(($right>>16 & $masks[16]) & 0xff) . chr(($right>>8 & $masks[8]) & 0xff) . chr($right & 0xff));
    109.  
    110.     $chunk += 8;
    111.     if ($chunk == 512){$result .= $tempresult; $tempresult = ""; $chunk = 0;}
    112.   } //for every 8 characters, or 64 bits in the message
    113.  
    114.   //return the result as an array
    115.   return ($result . $tempresult);
    116. } //end of des
    117.  
    118. //des_createKeys
    119. //this takes as input a 64 bit key (even though only 56 bits are used)
    120. //as an array of 2 integers, and returns 16 48 bit keys
    121. function des_createKeys($key){
    122.   //declaring this locally speeds things up a bit
    123.   $pc2bytes0  = array (0,0x4,0x20000000,0x20000004,0x10000,0x10004,0x20010000,0x20010004,0x200,0x204,0x20000200,0x20000204,0x10200,0x10204,0x20010200,0x20010204);
    124.   $pc2bytes1  = array (0,0x1,0x100000,0x100001,0x4000000,0x4000001,0x4100000,0x4100001,0x100,0x101,0x100100,0x100101,0x4000100,0x4000101,0x4100100,0x4100101);
    125.   $pc2bytes2  = array (0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808,0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808);
    126.   $pc2bytes3  = array (0,0x200000,0x8000000,0x8200000,0x2000,0x202000,0x8002000,0x8202000,0x20000,0x220000,0x8020000,0x8220000,0x22000,0x222000,0x8022000,0x8222000);
    127.   $pc2bytes4  = array (0,0x40000,0x10,0x40010,0,0x40000,0x10,0x40010,0x1000,0x41000,0x1010,0x41010,0x1000,0x41000,0x1010,0x41010);
    128.   $pc2bytes5  = array (0,0x400,0x20,0x420,0,0x400,0x20,0x420,0x2000000,0x2000400,0x2000020,0x2000420,0x2000000,0x2000400,0x2000020,0x2000420);
    129.   $pc2bytes6  = array (0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002,0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002);
    130.   $pc2bytes7  = array (0,0x10000,0x800,0x10800,0x20000000,0x20010000,0x20000800,0x20010800,0x20000,0x30000,0x20800,0x30800,0x20020000,0x20030000,0x20020800,0x20030800);
    131.   $pc2bytes8  = array (0,0x40000,0,0x40000,0x2,0x40002,0x2,0x40002,0x2000000,0x2040000,0x2000000,0x2040000,0x2000002,0x2040002,0x2000002,0x2040002);
    132.   $pc2bytes9  = array (0,0x10000000,0x8,0x10000008,0,0x10000000,0x8,0x10000008,0x400,0x10000400,0x408,0x10000408,0x400,0x10000400,0x408,0x10000408);
    133.   $pc2bytes10 = array (0,0x20,0,0x20,0x100000,0x100020,0x100000,0x100020,0x2000,0x2020,0x2000,0x2020,0x102000,0x102020,0x102000,0x102020);
    134.   $pc2bytes11 = array (0,0x1000000,0x200,0x1000200,0x200000,0x1200000,0x200200,0x1200200,0x4000000,0x5000000,0x4000200,0x5000200,0x4200000,0x5200000,0x4200200,0x5200200);
    135.   $pc2bytes12 = array (0,0x1000,0x8000000,0x8001000,0x80000,0x81000,0x8080000,0x8081000,0x10,0x1010,0x8000010,0x8001010,0x80010,0x81010,0x8080010,0x8081010);
    136.   $pc2bytes13 = array (0,0x4,0x100,0x104,0,0x4,0x100,0x104,0x1,0x5,0x101,0x105,0x1,0x5,0x101,0x105);
    137.   $masks = array (4294967295,2147483647,1073741823,536870911,268435455,134217727,67108863,33554431,16777215,8388607,4194303,2097151,1048575,524287,262143,131071,65535,32767,16383,8191,4095,2047,1023,511,255,127,63,31,15,7,3,1,0);
    138.  
    139.   //how many iterations (1 for des, 3 for triple des)
    140.   $iterations = ((strlen($key) >= 24) ? 3 : 1);
    141.   //stores the return keys
    142.   $keys = array (); // size = 32 * iterations but you don't specify this in php
    143.   //now define the left shifts which need to be done
    144.   $shifts = array (0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0);
    145.   //other variables
    146.   $m=0;
    147.   $n=0;
    148.  
    149.   for ($j=0; $j<$iterations; $j++){//either 1 or 3 iterations
    150.     $left = (ord($key{$m++}) << 24) | (ord($key{$m++}) << 16) | (ord($key{$m++}) << 8) | ord($key{$m++});
    151.     $right = (ord($key{$m++}) << 24) | (ord($key{$m++}) << 16) | (ord($key{$m++}) << 8) | ord($key{$m++});
    152.  
    153.     $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
    154.     $temp = (($right >> 16 & $masks[16]) ^ $left) & 0x0000ffff; $left ^= $temp; $right ^= ($temp << -16);
    155.     $temp = (($left >> 2 & $masks[2]) ^ $right) & 0x33333333; $right ^= $temp; $left ^= ($temp << 2);
    156.     $temp = (($right >> 16 & $masks[16]) ^ $left) & 0x0000ffff; $left ^= $temp; $right ^= ($temp << -16);
    157.     $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    158.     $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
    159.     $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    160.  
    161.     //the right side needs to be shifted and to get the last four bits of the left side
    162.     $temp = ($left << 8) | (($right >> 20 & $masks[20]) & 0x000000f0);
    163.     //left needs to be put upside down
    164.     $left = ($right << 24) | (($right << 8) & 0xff0000) | (($right >> 8 & $masks[8]) & 0xff00) | (($right >> 24 & $masks[24]) & 0xf0);
    165.     $right = $temp;
    166.  
    167.     //now go through and perform these shifts on the left and right keys
    168.     for ($i=0; $i < count($shifts); $i++){
    169.       //shift the keys either one or two bits to the left
    170.       if ($shifts[$i] > 0){
    171.          $left = (($left << 2) | ($left >> 26 & $masks[26]));
    172.          $right = (($right << 2) | ($right >> 26 & $masks[26]));
    173.       } else{
    174.          $left = (($left << 1) | ($left >> 27 & $masks[27]));
    175.          $right = (($right << 1) | ($right >> 27 & $masks[27]));
    176.       }
    177.       $left = $left & -0xf;
    178.       $right = $right & -0xf;
    179.  
    180.       //now apply PC-2, in such a way that E is easier when encrypting or decrypting
    181.       //this conversion will look like PC-2 except only the last 6 bits of each byte are used
    182.       //rather than 48 consecutive bits and the order of lines will be according to
    183.       //how the S selection functions will be applied: S2, S4, S6, S8, S1, S3, S5, S7
    184.       $lefttemp = $pc2bytes0[$left >> 28 & $masks[28]] | $pc2bytes1[($left >> 24 & $masks[24]) & 0xf]
    185.               | $pc2bytes2[($left >> 20 & $masks[20]) & 0xf] | $pc2bytes3[($left >> 16 & $masks[16]) & 0xf]
    186.               | $pc2bytes4[($left >> 12 & $masks[12]) & 0xf] | $pc2bytes5[($left >> 8 & $masks[8]) & 0xf]
    187.               | $pc2bytes6[($left >> 4 & $masks[4]) & 0xf];
    188.       $righttemp = $pc2bytes7[$right >> 28 & $masks[28]] | $pc2bytes8[($right >> 24 & $masks[24]) & 0xf]
    189.                 | $pc2bytes9[($right >> 20 & $masks[20]) & 0xf] | $pc2bytes10[($right >> 16 & $masks[16]) & 0xf]
    190.                 | $pc2bytes11[($right >> 12 & $masks[12]) & 0xf] | $pc2bytes12[($right >> 8 & $masks[8]) & 0xf]
    191.                 | $pc2bytes13[($right >> 4 & $masks[4]) & 0xf];
    192.       $temp = (($righttemp >> 16 & $masks[16]) ^ $lefttemp) & 0x0000ffff;
    193.       $keys[$n++] = $lefttemp ^ $temp; $keys[$n++] = $righttemp ^ ($temp << 16);
    194.     }
    195.   } //for each iterations
    196.   //return the keys we've created
    197.   return $keys;
    198. } //end of des_createKeys
    199.  
    200. ////////////////////////////// TEST //////////////////////////////
    201. function stringToHex($s){
    202.   $r = "0x";
    203.   $hexes = array ("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
    204.   for ($i=0; $i<strlen($s); $i++){$r .= ($hexes[(ord($s{$i}) >> 4)] . $hexes[(ord($s{$i}) & 0xf)]);}
    205.   return $r;
    206. }
    207. echo "<PRE>";
    208. $key = "this is a 24 byte key !!";
    209. $message = "This is a test message";
    210. $ciphertext = des ($key, $message, 1, 0, null);
    211. echo "DES Test Encrypted: " . stringToHex($ciphertext);
    212. $recovered_message = des ($key, $ciphertext, 0, 0, null);
    213. echo "\n";
    214. echo "DES Test Decrypted: " . $recovered_message;
    215. ?>
    des.pl
    1. #!/usr/bin/perl
    2. #Perl version
    3. #Paul Tero, July 2001
    4. #http://www.tero.co.uk/des/
    5. #
    6. #Converted from JavaScript to Perl by Chris Drake, July 2002
    7. #
    8. #Optimised for performance with large blocks by Michael Hayworth, November 2001
    9. #http://www.netdealing.com
    10. #
    11. #THIS SOFTWARE IS PROVIDED "AS IS" AND
    12. #ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    13. #IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    14. #ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    15. #FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    16. #DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    17. #OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    18. #HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    19. #LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    20. #OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    21. #SUCH DAMAGE.
    22.  
    23. use strict;
    24.  
    25. #des
    26. #this takes the key, the message, and whether to encrypt or decrypt
    27. sub TripleDES{
    28.   my($key, $message, $encrypt, $mode, $iv)=@_;
    29.  
    30.   # declaring this locally speeds things up a bit
    31.   my @spfunction1 = (0x1010400,0,0x10000,0x1010404,0x1010004,0x10404,0x4,0x10000,0x400,0x1010400,0x1010404,0x400,0x1000404,0x1010004,0x1000000,0x4,0x404,0x1000400,0x1000400,0x10400,0x10400,0x1010000,0x1010000,0x1000404,0x10004,0x1000004,0x1000004,0x10004,0,0x404,0x10404,0x1000000,0x10000,0x1010404,0x4,0x1010000,0x1010400,0x1000000,0x1000000,0x400,0x1010004,0x10000,0x10400,0x1000004,0x400,0x4,0x1000404,0x10404,0x1010404,0x10004,0x1010000,0x1000404,0x1000004,0x404,0x10404,0x1010400,0x404,0x1000400,0x1000400,0,0x10004,0x10400,0,0x1010004);
    32.   my @spfunction2 = (0x80108020,0x80008000,0x8000,0x108020,0x100000,0x20,0x80100020,0x80008020,0x80000020,0x80108020,0x80108000,0x80000000,0x80008000,0x100000,0x20,0x80100020,0x108000,0x100020,0x80008020,0,0x80000000,0x8000,0x108020,0x80100000,0x100020,0x80000020,0,0x108000,0x8020,0x80108000,0x80100000,0x8020,0,0x108020,0x80100020,0x100000,0x80008020,0x80100000,0x80108000,0x8000,0x80100000,0x80008000,0x20,0x80108020,0x108020,0x20,0x8000,0x80000000,0x8020,0x80108000,0x100000,0x80000020,0x100020,0x80008020,0x80000020,0x100020,0x108000,0,0x80008000,0x8020,0x80000000,0x80100020,0x80108020,0x108000);
    33.   my @spfunction3 = (0x208,0x8020200,0,0x8020008,0x8000200,0,0x20208,0x8000200,0x20008,0x8000008,0x8000008,0x20000,0x8020208,0x20008,0x8020000,0x208,0x8000000,0x8,0x8020200,0x200,0x20200,0x8020000,0x8020008,0x20208,0x8000208,0x20200,0x20000,0x8000208,0x8,0x8020208,0x200,0x8000000,0x8020200,0x8000000,0x20008,0x208,0x20000,0x8020200,0x8000200,0,0x200,0x20008,0x8020208,0x8000200,0x8000008,0x200,0,0x8020008,0x8000208,0x20000,0x8000000,0x8020208,0x8,0x20208,0x20200,0x8000008,0x8020000,0x8000208,0x208,0x8020000,0x20208,0x8,0x8020008,0x20200);
    34.   my @spfunction4 = (0x802001,0x2081,0x2081,0x80,0x802080,0x800081,0x800001,0x2001,0,0x802000,0x802000,0x802081,0x81,0,0x800080,0x800001,0x1,0x2000,0x800000,0x802001,0x80,0x800000,0x2001,0x2080,0x800081,0x1,0x2080,0x800080,0x2000,0x802080,0x802081,0x81,0x800080,0x800001,0x802000,0x802081,0x81,0,0,0x802000,0x2080,0x800080,0x800081,0x1,0x802001,0x2081,0x2081,0x80,0x802081,0x81,0x1,0x2000,0x800001,0x2001,0x802080,0x800081,0x2001,0x2080,0x800000,0x802001,0x80,0x800000,0x2000,0x802080);
    35.   my @spfunction5 = (0x100,0x2080100,0x2080000,0x42000100,0x80000,0x100,0x40000000,0x2080000,0x40080100,0x80000,0x2000100,0x40080100,0x42000100,0x42080000,0x80100,0x40000000,0x2000000,0x40080000,0x40080000,0,0x40000100,0x42080100,0x42080100,0x2000100,0x42080000,0x40000100,0,0x42000000,0x2080100,0x2000000,0x42000000,0x80100,0x80000,0x42000100,0x100,0x2000000,0x40000000,0x2080000,0x42000100,0x40080100,0x2000100,0x40000000,0x42080000,0x2080100,0x40080100,0x100,0x2000000,0x42080000,0x42080100,0x80100,0x42000000,0x42080100,0x2080000,0,0x40080000,0x42000000,0x80100,0x2000100,0x40000100,0x80000,0,0x40080000,0x2080100,0x40000100);
    36.   my @spfunction6 = (0x20000010,0x20400000,0x4000,0x20404010,0x20400000,0x10,0x20404010,0x400000,0x20004000,0x404010,0x400000,0x20000010,0x400010,0x20004000,0x20000000,0x4010,0,0x400010,0x20004010,0x4000,0x404000,0x20004010,0x10,0x20400010,0x20400010,0,0x404010,0x20404000,0x4010,0x404000,0x20404000,0x20000000,0x20004000,0x10,0x20400010,0x404000,0x20404010,0x400000,0x4010,0x20000010,0x400000,0x20004000,0x20000000,0x4010,0x20000010,0x20404010,0x404000,0x20400000,0x404010,0x20404000,0,0x20400010,0x10,0x4000,0x20400000,0x404010,0x4000,0x400010,0x20004010,0,0x20404000,0x20000000,0x400010,0x20004010);
    37.   my @spfunction7 = (0x200000,0x4200002,0x4000802,0,0x800,0x4000802,0x200802,0x4200800,0x4200802,0x200000,0,0x4000002,0x2,0x4000000,0x4200002,0x802,0x4000800,0x200802,0x200002,0x4000800,0x4000002,0x4200000,0x4200800,0x200002,0x4200000,0x800,0x802,0x4200802,0x200800,0x2,0x4000000,0x200800,0x4000000,0x200800,0x200000,0x4000802,0x4000802,0x4200002,0x4200002,0x2,0x200002,0x4000000,0x4000800,0x200000,0x4200800,0x802,0x200802,0x4200800,0x802,0x4000002,0x4200802,0x4200000,0x200800,0,0x2,0x4200802,0,0x200802,0x4200000,0x800,0x4000002,0x4000800,0x800,0x200002);
    38.   my @spfunction8 = (0x10001040,0x1000,0x40000,0x10041040,0x10000000,0x10001040,0x40,0x10000000,0x40040,0x10040000,0x10041040,0x41000,0x10041000,0x41040,0x1000,0x40,0x10040000,0x10000040,0x10001000,0x1040,0x41000,0x40040,0x10040040,0x10041000,0x1040,0,0,0x10040040,0x10000040,0x10001000,0x41040,0x40000,0x41040,0x40000,0x10041000,0x1000,0x40,0x10040040,0x1000,0x41040,0x10001000,0x40,0x10000040,0x10040000,0x10040040,0x10000000,0x40000,0x10001040,0,0x10041040,0x40040,0x10000040,0x10040000,0x10001000,0x10001040,0,0x10041040,0x41000,0x41000,0x1040,0x1040,0x40040,0x10000000,0x10041000);
    39.  
    40.   #create the 16 or 48 subkeys we will need
    41.   my @keys = &des_createKeys($key);
    42.   my ($m, $i, $j, $temp, $temp2, $right1, $right2, $left, $right, @looping)=(0);
    43.   my ($cbcleft, $cbcleft2, $cbcright, $cbcright2);
    44.   my ($endloop, $loopinc, $result, $tempresult);
    45.   my $len = length($message);
    46.   my $chunk = 0;
    47.   #set up the loops for single and triple des
    48.   my $iterations = $#keys == 32 ? 3 : 9; #single or triple des
    49.   if ($iterations == 3){@looping = $encrypt ? (0, 32, 2) : (30, -2, -2);}
    50.   else {@looping = $encrypt ? (0, 32, 2, 62, 30, -2, 64, 96, 2) : (94, 62, -2, 32, 64, 2, 30, -2, -2);}
    51.  
    52.   $message .= "\0\0\0\0\0\0\0\0"; #pad the message out with null bytes
    53.   #store the result here
    54.   $result = "";
    55.   $tempresult = "";
    56.  
    57.   if ($mode == 1){#CBC mode
    58.     $cbcleft = (unpack("C",substr($iv,$m++,1)) << 24) | (unpack("C",substr($iv,$m++,1)) << 16) | (unpack("C",substr($iv,$m++,1)) << 8) | unpack("C",substr($iv,$m++,1));
    59.     $cbcright = (unpack("C",substr($iv,$m++,1)) << 24) | (unpack("C",substr($iv,$m++,1)) << 16) | (unpack("C",substr($iv,$m++,1)) << 8) | unpack("C",substr($iv,$m++,1));
    60.     $m=0;
    61.   }
    62.  
    63.   #loop through each 64 bit chunk of the message
    64.   while ($m < $len){
    65.     $left = (unpack("C",substr($message,$m++,1)) << 24) | (unpack("C",substr($message,$m++,1)) << 16) | (unpack("C",substr($message,$m++,1)) << 8) | unpack("C",substr($message,$m++,1));
    66.     $right = (unpack("C",substr($message,$m++,1)) << 24) | (unpack("C",substr($message,$m++,1)) << 16) | (unpack("C",substr($message,$m++,1)) << 8) | unpack("C",substr($message,$m++,1));
    67.  
    68.     #for Cipher Block Chaining mode, xor the message with the previous result
    69.     if ($mode == 1){if($encrypt){$left ^= $cbcleft; $right ^= $cbcright;}else{$cbcleft2 = $cbcleft; $cbcright2 = $cbcright; $cbcleft = $left; $cbcright = $right;}}
    70.  
    71.     #first each 64 but chunk of the message must be permuted according to IP
    72.     $temp = (($left >> 4) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
    73.     $temp = (($left >> 16) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
    74.     $temp = (($right >> 2) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
    75.     $temp = (($right >> 8) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
    76.     $temp = (($left >> 1) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    77.  
    78.     $left = (($left << 1) | ($left >> 31));
    79.     $right = (($right << 1) | ($right >> 31));
    80.  
    81.     #do this either 1 or 3 times for each chunk of the message
    82.     for ($j=0; $j<$iterations; $j+=3){
    83.       $endloop =$looping[$j+1]; $loopinc =$looping[$j+2]; #now go through and perform the encryption or decryption 
    84.       for ($i=$looping[$j]; $i!=$endloop; $i+=$loopinc){#for efficiency
    85.         $right1 =$right ^ $keys[$i];
    86.         $right2 =(($right >> 4) | ($right << 28)) ^ $keys[$i+1];
    87.         #the result is attained by passing these bytes through the S selection functions
    88.         $temp = $left;
    89.         $left = $right;
    90.         $right = $temp ^ ($spfunction2[($right1 >> 24) & 0x3f] | $spfunction4[($right1 >> 16) & 0x3f]
    91.               | $spfunction6[($right1 >>  8) & 0x3f] | $spfunction8[$right1 & 0x3f]
    92.               | $spfunction1[($right2 >> 24) & 0x3f] | $spfunction3[($right2 >> 16) & 0x3f]
    93.               | $spfunction5[($right2 >>  8) & 0x3f] | $spfunction7[$right2 & 0x3f]);
    94.       }
    95.       $temp = $left; $left = $right; $right = $temp; #unreverse left and right
    96.     } #for either 1 or 3 iterations
    97.  
    98.     #move then each one bit to the right
    99.     $left = (($left >> 1) | ($left << 31));
    100.     $right = (($right >> 1) | ($right << 31));
    101.  
    102.     #now perform IP-1, which is IP in the opposite direction
    103.     $temp = (($left >> 1) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
    104.     $temp = (($right >> 8) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
    105.     $temp = (($right >> 2) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
    106.     $temp = (($left >> 16) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
    107.     $temp = (($left >> 4) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
    108.  
    109.     #for Cipher Block Chaining mode, xor the message with the previous result
    110.     if ($mode == 1){if($encrypt){$cbcleft = $left; $cbcright = $right;}else{$left ^= $cbcleft2; $right ^= $cbcright2;}}
    111.     $tempresult .= pack("C*", (($left>>24), (($left>>16) & 0xff), (($left>>8) & 0xff), ($left & 0xff), ($right>>24), (($right>>16) & 0xff), (($right>>8) & 0xff), ($right & 0xff)));
    112.  
    113.     $chunk += 8;
    114.     if ($chunk == 512){$result .= $tempresult; $tempresult = ""; $chunk = 0;}
    115.   } #for every 8 characters, or 64 bits in the message
    116.  
    117.   #return the result as an array
    118.   return $result . $tempresult;
    119. } #end of des
    120.  
    121.  
    122.  
    123. #des_createKeys
    124. #this takes as input a 64 bit key (even though only 56 bits are used)
    125. #as an array of 2 integers, and returns 16 48 bit keys
    126. sub des_createKeys{
    127.   use integer;
    128.   my($key)=@_;
    129.   #declaring this locally speeds things up a bit
    130.   my @pc2bytes0  = (0,0x4,0x20000000,0x20000004,0x10000,0x10004,0x20010000,0x20010004,0x200,0x204,0x20000200,0x20000204,0x10200,0x10204,0x20010200,0x20010204);
    131.   my @pc2bytes1  = (0,0x1,0x100000,0x100001,0x4000000,0x4000001,0x4100000,0x4100001,0x100,0x101,0x100100,0x100101,0x4000100,0x4000101,0x4100100,0x4100101);
    132.   my @pc2bytes2  = (0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808,0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808);
    133.   my @pc2bytes3  = (0,0x200000,0x8000000,0x8200000,0x2000,0x202000,0x8002000,0x8202000,0x20000,0x220000,0x8020000,0x8220000,0x22000,0x222000,0x8022000,0x8222000);
    134.   my @pc2bytes4  = (0,0x40000,0x10,0x40010,0,0x40000,0x10,0x40010,0x1000,0x41000,0x1010,0x41010,0x1000,0x41000,0x1010,0x41010);
    135.   my @pc2bytes5  = (0,0x400,0x20,0x420,0,0x400,0x20,0x420,0x2000000,0x2000400,0x2000020,0x2000420,0x2000000,0x2000400,0x2000020,0x2000420);
    136.   my @pc2bytes6  = (0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002,0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002);
    137.   my @pc2bytes7  = (0,0x10000,0x800,0x10800,0x20000000,0x20010000,0x20000800,0x20010800,0x20000,0x30000,0x20800,0x30800,0x20020000,0x20030000,0x20020800,0x20030800);
    138.   my @pc2bytes8  = (0,0x40000,0,0x40000,0x2,0x40002,0x2,0x40002,0x2000000,0x2040000,0x2000000,0x2040000,0x2000002,0x2040002,0x2000002,0x2040002);
    139.   my @pc2bytes9  = (0,0x10000000,0x8,0x10000008,0,0x10000000,0x8,0x10000008,0x400,0x10000400,0x408,0x10000408,0x400,0x10000400,0x408,0x10000408);
    140.   my @pc2bytes10 = (0,0x20,0,0x20,0x100000,0x100020,0x100000,0x100020,0x2000,0x2020,0x2000,0x2020,0x102000,0x102020,0x102000,0x102020);
    141.   my @pc2bytes11 = (0,0x1000000,0x200,0x1000200,0x200000,0x1200000,0x200200,0x1200200,0x4000000,0x5000000,0x4000200,0x5000200,0x4200000,0x5200000,0x4200200,0x5200200);
    142.   my @pc2bytes12 = (0,0x1000,0x8000000,0x8001000,0x80000,0x81000,0x8080000,0x8081000,0x10,0x1010,0x8000010,0x8001010,0x80010,0x81010,0x8080010,0x8081010);
    143.   my @pc2bytes13 = (0,0x4,0x100,0x104,0,0x4,0x100,0x104,0x1,0x5,0x101,0x105,0x1,0x5,0x101,0x105);
    144.  
    145.   #how many iterations (1 for des, 3 for triple des)
    146.   my $iterations = length($key) >= 24 ? 3 : 1;
    147.   #stores the return keys
    148.   my @keys; $#keys=(32 * $iterations);
    149.   #now define the left shifts which need to be done
    150.   my @shifts = (0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0);
    151.   #other variables
    152.   my ($m, $n, $lefttemp, $righttemp, $left, $right, $temp)=(0,0);
    153.  
    154.   for (my$j=0; $j<$iterations; $j++){#either 1 or 3 iterations
    155.     $left =(unpack("C",substr($key,$m++,1)) << 24) | (unpack("C",substr($key,$m++,1)) << 16) | (unpack("C",substr($key,$m++,1)) << 8) | unpack("C",substr($key,$m++,1));
    156.     $right = (unpack("C",substr($key,$m++,1)) << 24) | (unpack("C",substr($key,$m++,1)) << 16) | (unpack("C",substr($key,$m++,1)) << 8) | unpack("C",substr($key,$m++,1));
    157.  
    158.     $temp = (($left >> 4)$right) & 0x0f0f0f0f; $right ^= $temp; $left  ^= ($temp << 4);
    159.     $temp = (($right >>  16)^ $left) & 0x0000ffff; $left ^=  $temp; $right ^= ($temp <<  16);
    160.     $temp = (($left >> 2)$right) & 0x33333333; $right ^= $temp; $left  ^= ($temp << 2);
    161.     $temp = (($right >>  16)^ $left) & 0x0000ffff; $left ^=  $temp; $right ^= ($temp <<  16);
    162.     $temp = (($left >> 1)$right) & 0x55555555; $right ^= $temp; $left  ^= ($temp << 1);
    163.     $temp = (($right >> 8)$left) & 0x00ff00ff; $left ^=  $temp; $right ^= ($temp << 8);
    164.     $temp = (($left >> 1)$right) & 0x55555555; $right ^= $temp; $left  ^= ($temp << 1);
    165.  
    166.     #the right side needs to be shifted and to get the last four bits of the left side
    167.     $temp = ($left << 8) | (($right >> 20) & 0x000000f0);
    168.     #left needs to be put upside down
    169.     $left = ($right << 24) | (($right << 8) & 0xff0000) | (($right >> 8) & 0xff00) | (($right >> 24) & 0xf0);
    170.     $right = $temp;
    171.  
    172.     #now go through and perform these shifts on the left and right keys
    173.     for (my$i=0; $i <= $#shifts; $i++){
    174.       #shift the keys either one or two bits to the left
    175.       if ($shifts[$i]){
    176.         no integer;
    177.         $left = ($left << 2) | ($left >> 26);
    178.         $right = ($right << 2) | ($right >> 26);
    179.         use integer;
    180.         $left<<=0;$right<<=0;
    181.       } else{
    182.         no integer;
    183.         $left = ($left << 1) | ($left >> 27);
    184.         $right = ($right << 1) | ($right >> 27);
    185.         use integer;
    186.         $left<<=0;$right<<=0;
    187.       }
    188.       $left &= 0xfffffff0; $right &= 0xfffffff0;
    189.  
    190.       #now apply PC-2, in such a way that E is easier when encrypting or decrypting
    191.       #this conversion will look like PC-2 except only the last 6 bits of each byte are used
    192.       #rather than 48 consecutive bits and the order of lines will be according to
    193.       #how the S selection functions will be applied: S2, S4, S6, S8, S1, S3, S5, S7
    194.       $lefttemp = $pc2bytes0[$left >> 28] | $pc2bytes1[($left >> 24) & 0xf]
    195.               | $pc2bytes2[($left >> 20) & 0xf] | $pc2bytes3[($left >> 16) & 0xf]
    196.               | $pc2bytes4[($left >> 12) & 0xf] | $pc2bytes5[($left >> 8) & 0xf]
    197.               | $pc2bytes6[($left >> 4) & 0xf];
    198.       $righttemp = $pc2bytes7[$right >> 28] | $pc2bytes8[($right >> 24) & 0xf]
    199.                 | $pc2bytes9[($right >> 20) & 0xf] | $pc2bytes10[($right >> 16) & 0xf]
    200.                 | $pc2bytes11[($right >> 12) & 0xf] | $pc2bytes12[($right >> 8) & 0xf]
    201.                 | $pc2bytes13[($right >> 4) & 0xf];
    202.       $temp = (($righttemp >> 16) ^ $lefttemp) & 0x0000ffff;
    203.       $keys[$n++] = $lefttemp ^ $temp; $keys[$n++] = $righttemp ^ ($temp << 16);
    204.  
    205.     }
    206.   } #for each iterations
    207.   #return the keys we've created
    208.   return @keys;
    209. } #end of des_createKeys
    210.  
    211.  
    212.  
    213. #//////////////////////////// TEST //////////////////////////////
    214. #printHexArray
    215. sub printHex{
    216.   my($s)=@_;
    217.   my $r = "0x";
    218.   my @hexes=("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
    219.   for (my$i=0; $i<length($s); $i++){$r.=$hexes[unpack("C",substr($s,$i,1)) >> 4] . $hexes[unpack("C",substr($s,$i,1)) & 0xf];}
    220.   return $r;
    221. }
    222.  
    223.  
    224.  
    225. print "3DES in perl\n";
    226.  
    227. my $K="this is a 24 byte key !!";
    228. my $msg="This is a test message";
    229. my $ciphertext=&TripleDES($K,$msg,1,0);
    230. print "DES Test: " . &printHex($ciphertext) . "\n";
    231. my $plaintext=&TripleDES($K,$ciphertext,0,0);
    232. print "DES Test: " . $plaintext . "\n";
    233.  
    234. exit(0);
  • 相关阅读:
    C语言 atoi
    C语言 strtok
    C语言 strstr
    Python从菜鸟到高手(6):获取用户输入、函数与注释
    Python从菜鸟到高手(5):数字
    Python从菜鸟到高手(3):声明变量
    Python从菜鸟到高手(2):清空Python控制台
    Python从菜鸟到高手(1):初识Python
    《Python从菜鸟到高手》已经出版,开始连载了,购买送视频课程
    Python从菜鸟到高手(1):数字的奥秘
  • 原文地址:https://www.cnblogs.com/breg/p/2320206.html
Copyright © 2011-2022 走看看