DES加密VC运行成功.docx

上传人:b****3 文档编号:4736663 上传时间:2023-05-07 格式:DOCX 页数:17 大小:78.78KB
下载 相关 举报
DES加密VC运行成功.docx_第1页
第1页 / 共17页
DES加密VC运行成功.docx_第2页
第2页 / 共17页
DES加密VC运行成功.docx_第3页
第3页 / 共17页
DES加密VC运行成功.docx_第4页
第4页 / 共17页
DES加密VC运行成功.docx_第5页
第5页 / 共17页
DES加密VC运行成功.docx_第6页
第6页 / 共17页
DES加密VC运行成功.docx_第7页
第7页 / 共17页
DES加密VC运行成功.docx_第8页
第8页 / 共17页
DES加密VC运行成功.docx_第9页
第9页 / 共17页
DES加密VC运行成功.docx_第10页
第10页 / 共17页
DES加密VC运行成功.docx_第11页
第11页 / 共17页
DES加密VC运行成功.docx_第12页
第12页 / 共17页
DES加密VC运行成功.docx_第13页
第13页 / 共17页
DES加密VC运行成功.docx_第14页
第14页 / 共17页
DES加密VC运行成功.docx_第15页
第15页 / 共17页
DES加密VC运行成功.docx_第16页
第16页 / 共17页
DES加密VC运行成功.docx_第17页
第17页 / 共17页
亲,该文档总共17页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

DES加密VC运行成功.docx

《DES加密VC运行成功.docx》由会员分享,可在线阅读,更多相关《DES加密VC运行成功.docx(17页珍藏版)》请在冰点文库上搜索。

DES加密VC运行成功.docx

DES加密VC运行成功

本程序能在VC++6.0上运行成功。

以下是运行界面和程序:

键盘输入:

12586945回车

注意:

这里的每一位数通过键盘进入程序后都是ASCII码,所以一位数表示1个字节。

回车后显示加密解密结果:

#include

#defineuintunsignedint

//初始换位表

unsignedcharIp[64]={58,50,42,34,26,18,10,2,

60,52,44,36,28,20,12,4,

62,54,46,38,30,22,14,6,

64,56,48,40,32,24,16,8,

57,49,41,33,25,17,9,1,

59,51,43,35,27,19,11,3,

61,53,45,37,29,21,13,5,

63,55,47,39,31,23,15,7};

//最后换位表

unsignedcharIpr[64]={40,8,48,16,56,24,64,32,

39,7,47,15,55,23,63,31,

38,6,46,14,54,22,62,30,

37,5,45,13,53,21,61,29,

36,4,44,12,52,20,60,28,

35,3,43,11,51,19,59,27,

34,2,42,10,50,18,58,26,

33,1,41,9,49,17,57,25};

//密钥的压缩型换位表1

unsignedcharPc_1[56]={57,49,41,33,25,17,9,

1,58,50,42,34,26,18,

10,2,59,51,43,35,27,

19,11,3,60,52,44,36,

63,55,47,39,31,23,15,

7,62,54,46,38,30,22,

14,6,61,53,45,37,29,

21,13,5,28,20,12,4};

//密钥的压缩型换位表2

unsignedcharPc_2[48]={14,17,11,24,1,5,

3,28,15,6,21,10,

23,19,12,4,26,8,

16,7,27,20,13,2,

41,52,31,37,47,55,

30,40,51,45,33,48,

44,49,39,56,34,53,

46,42,50,36,29,32};

//扩展型换位表

unsignedcharEx[48]={32,1,2,3,4,5,

4,5,6,7,8,9,

8,9,10,11,12,13,

12,13,14,15,16,17,

16,17,18,19,20,21,

20,21,22,23,24,25,

24,25,26,27,28,29,

28,29,30,31,32,1};

//换位表P

unsignedcharPx[32]={16,7,20,21,

29,12,28,17,

1,15,23,26,

5,18,31,10,

2,8,24,14,

32,27,3,9,

19,13,30,6,

22,11,4,25};

//各层移位次数

unsignedcharShTb[16]={1,1,2,2,2,2,2,2,

1,2,2,2,2,2,2,1};

//S盒代替表

unsignedcharSbox[32][16]={{14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7},

{0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8},

{4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0},

{15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13},

{15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10},

{3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5},

{0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15},

{13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9},

{10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8},

{13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1},

{13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7},

{1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12},

{7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15},

{13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9},

{10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4},

{3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14},

{2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9},

{14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6},

{4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14},

{11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3},

{12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11},

{10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8},

{9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6},

{4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13},

{4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1},

{13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6},

{1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2},

{6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12},

{13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7},

{1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2},

{7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8},

{2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11}};

//unsignedcharg_ucPreKey[8];//={0x68,0xc1,0x23,0x97,0xae,0x94,0x1c,0x1c};//密钥

unsignedcharKey[16][8];//存放子密钥

unsignedcharShRf[8]={0x80,0x40,0x20,0x10,0x08,0x04,0x02,0x01};

structpara

{

unsignedchar*input;

unsignedchar*ip;

unsignedcharrow;

unsignedcharcol;

unsignedchar*buf;

};

//=============================================================

//换位,input:

输入,ip:

换位表,len:

换位表长度,buf:

输出

//=============================================================

voidExchange(unsignedchar*input,unsignedchar*ip,unsignedcharrow,unsignedcharcol,unsignedchar*buf)

{

unsignedchari,j,k,row1,col1,tmp;

for(i=0;i

buf[i]=0;

k=0;

for(j=0;j

{

for(i=0;i

{

tmp=ip[k]-1;

row1=tmp/8;

col1=tmp%8;

if(ShRf[col1]&input[row1])

{

buf[j]|=ShRf[i];

}

k++;

}

}

}

voidExchange1(structparapm)

{

unsignedchari,j,k,row1,col1,tmp;

for(i=0;i

pm.buf[i]=0;

k=0;

for(j=0;j

{

for(i=0;i

{

tmp=pm.ip[k]-1;

row1=tmp/8;

col1=tmp%8;

if(ShRf[col1]&pm.input[row1])

{

pm.buf[j]|=ShRf[i];

}

k++;

}

}

}

//================================================================

//56位数的前28位和后28位各循环左移一位

//输入:

input,56位数;输出:

input,移位后的56位数

//================================================================

voidShift(unsignedcharinput[7])

{

chari;

unsignedchartmp=0;

if(input[0]&0x80)

tmp=0x01;

input[0]<<=1;

for(i=1;i<7;i++)

{

if(input[i]&0x80)

input[i-1]|=0x01;

input[i]<<=1;

}

if(input[3]&0x10)

input[6]|=0x01;

if(tmp)

input[3]|=0x10;

else

input[3]&=0xef;

}

//======================================================================

//产生16个子密钥,输入:

PreKey,密钥;输出:

Key,16个子密钥

//======================================================================

voidGenerateKey(unsignedcharKeyseed[8])

{

unsignedcharoutput[7],i,j;

structparapm;

pm.input=Keyseed;

pm.ip=Pc_1;

pm.row=7;

pm.col=8;

pm.buf=output;

Exchange1(pm);//压缩型换位

for(i=0;i<16;i++)

{

for(j=0;j

Shift(output);

pm.input=output;

pm.ip=Pc_2;

pm.row=8;

pm.col=6;

pm.buf=Key[i];

Exchange1(pm);//压缩型换位

}

}

//异或

voidXor(unsignedcharin1[],unsignedcharin2[],unsignedcharlen)

{

unsignedchari;

for(i=0;i

in1[i]^=in2[i];

}

//==================================================================

//计算f(r,k),rx:

输入,key:

密钥,output:

输出

//==================================================================

voidFunRK(unsignedcharrx[4],unsignedchar*key,unsignedcharoutput[4])

{

unsignedcharrx1[8],i,j,row,col,ch,tmp,out[4];

for(i=0;i<4;i++)

out[i]=0;

//Exch_E(rx,rx1);

for(i=0;i<4;i++)

{

j=(i+3)%4;

row=i*2;

rx1[row]=rx[i]>>1;

if(rx[j]&0x01)

rx1[row]|=0x80;

rx1[row+1]=rx[i]<<3;

if(rx[(j+2)%4]&0x80)

rx1[row+1]|=0x04;

}

Xor(rx1,key,8);

for(i=0;i<8;i++)

{

row=0;

col=0;

if(rx1[i]&0x04)

row|=0x01;

if(rx1[i]&0x80)

row|=0x02;

col=(rx1[i]&0x78)>>3;

ch=Sbox[i*4+row][col];

if(!

(i%2))

ch<<=4;

out[i/2]|=ch;

}

//Exchange(out,Px,4,8,output);

for(i=0;i<4;i++)

output[i]=0;

ch=0;

for(j=0;j<4;j++)

{

for(i=0;i<8;i++)

{

tmp=Px[ch]-1;

row=tmp/8;

col=tmp%8;

if((0x80>>col)&out[row])

{

output[j]|=(0x80>>i);

}

ch++;

}

}

}

//====================================================================

//加密,输入:

input,64位明文;输出:

input,64位密文

//====================================================================

voidDes(unsignedcharinput[8])

{

unsignedcharoutput[8],

unsignedcharrxtmp[4],i,j;

unsignedcharrx[4],lx[4];

Exchange(input,Ip,8,8,output);

for(i=0;i<4;i++)

{

lx[i]=output[i];

rx[i]=output[4+i];

}

for(i=0;i<16;i++)

{

FunRK(rx,Key[i],rxtmp);

Xor(rxtmp,lx,4);

for(j=0;j<4;j++)

{

lx[j]=rx[j];

rx[j]=rxtmp[j];

}

}

for(i=0;i<4;i++)

{

output[4+i]=lx[i];

output[i]=rx[i];

}

Exchange(output,Ipr,8,8,input);

}

//==================================================================

//解密,输入:

input,64位密文;输出:

input,64位明文

//==================================================================

voidDesr(unsignedcharinput[8])

{

unsignedcharoutput[8],

unsignedcharlx[4],rx[4],rxtmp[4],i,j;

Exchange(input,Ip,8,8,output);

for(i=0;i<4;i++)

{

rx[i]=output[i];

lx[i]=output[4+i];

}

for(i=0;i<16;i++)

{

FunRK(lx,Key[15-i],rxtmp);

Xor(rxtmp,rx,4);

for(j=0;j<4;j++)

{

rx[j]=lx[j];

lx[j]=rxtmp[j];

}

}

for(i=0;i<4;i++)

{

output[4+i]=rx[i];

output[i]=lx[i];

}

Exchange(output,Ipr,8,8,input);

}

voidmain()

{

inti;

unsignedcharkey[8],ch,min_data[8],mi_data[8],jiemi_data[8];

key[0]=0x5A;

key[1]=0x4B;

key[2]=0x3C;

key[3]=0x2D;

key[4]=0x1E;

key[5]=0x0F;

key[6]=0x1A;

key[7]=0x2B;

GenerateKey(key);

printf("Attentionthatthesecretkeysare:

\n");

for(i=0;i<8;i++)

{

printf("%X",key[i]);

}

printf("\n\nPleaseinput8bytedata:

\n");

i=0;

while((ch=getchar())!

='\n')

{

mi_data[i]=min_data[i]=ch;

i++;

}

//////////////////////////////////

printf("YourHEXdata:

\n");

for(i=0;i<8;i++)

{

printf("%X",min_data[i]);

}

printf("\n\n");

//////////////////////////////////

Des(mi_data);

printf("EncodeasHEX:

\n");

for(i=0;i<8;i++)

{

printf("%X",mi_data[i]);

}

printf("\n\n");

//////////////////////////////////

Desr(mi_data);

for(i=0;i<8;i++)

{

jiemi_data[i]=mi_data[i];

}

printf("DecodeasHEX:

\n");

for(i=0;i<8;i++)

{

printf("%X",jiemi_data[i]);

}

printf("\n\n");

/////////////////////////////////

printf("DecodeasDEC:

\n");

for(i=0;i<8;i++)

{

printf("%c",jiemi_data[i]);

}

while

(1);

}

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > PPT模板 > 商务科技

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2