加密信息

  BlowFish算法用来加密64Bit长度的字符串。

  BlowFish算法使用两个“盒”——ungignedlongpbox[18]和unsignedlongsbox[4,256]。

  BlowFish算法中,有一个核心加密函数:BF_En(后文详细介绍)。该函数输入64位信息,运算后,以64位密文的形式输出。用BlowFish算法加密信息,需要两个过程:

  1.密钥预处理

  2.信息加密

  分别说明如下:

  密钥预处理:

  BlowFish算法的源密钥——pbox和sbox是固定的。我们要加密一个信息,需要自己选择一个key,用这个key对pbox和sbox进行变换,得到下一步信息加密所要用的key_pbox和key_sbox。具体的变化算法如下:

  1)用sbox填充key_sbox

  2)用自己选择的key8个一组地去异或pbox,用异或的结果填充key_pbox。key可以循环使用。

  比如说:选的key是"abcdefghijklmn"。则异或过程为:

  key_pbox[0]=pbox[0]^abcdefgh

  key_pbox[1]=pbox[1]^ijklmnab

  …………

  …………

  如此循环,直到key_box填充完毕。

  3)用BF_En加密一个全0的64位信息,用输出的结果替换key_pbox[0]和key_pbox[1]。i=0

  4)用BF_En加密替换后的key_pbox,key_pbox[i+1],用输出替代key_pbox[i+2]和key_pbox[i+3]

  5)i+2,继续第4步,直到key_pbox全部被替换

  6)用key_pbox[16]和key_pbox[17]做首次输入(相当于上面的全0的输入),用类似的方法,替换key_sbox信息加密。信息加密就是用函数把待加密信息x分成32位的两部分:xL,xRBF_En对输入信息进行变换,BF_En函数详细过程如下:

  对于i=1至16

  xL=xL^Pi

  xR=F(xL)^xR

  交换xL和xR(最后一轮取消该运算)

blowfish算法

xR=xR^P17

  xL=xL^P18

  重新合并xL和xR

  函数F见下图:

  8位32位

  |-----------S盒1-----------

  ||加

  |8位32位|----

  |-----------S盒2-----------|

  ||

  ||异或----

  32位-|||

  |8位32位||

  |-----------S盒3---------------|加

  ||-----------------32位

  ||

  ||

  |8位32位|

  |-----------S盒4-----------------------

  把xL分成4个8位分组:a,b,c和d

  输出为:F(xL)=((((S[1,a]+S[2,b])MOD4294967296)^s[3,c])+S[4,d])MOD4294967296

  (2的32次方)(2的32次方)

  重新合并后输出的结果就是我们需要的密文。

算法解密

  用BlowFish算法解密,同样也需要两个过程。

  1.密钥预处理

  2.信息解密

  密钥预处理的过程与加密时完全相同

  信息解密的过程就是把信息加密过程的key_pbox逆序使用即可。

  可以看出,选择不同的key,用BlowFish算法加密同样的信息,可以得出不同的结果。

  要破解BlowFish算法,就是要得到BlowFish算法的key。所以,使用BlowFish算法进行加密,最重要的也就是key的选择以及key的保密。其中key的选择可以使用bf_sdk中的_WeakKey函数进行检验。以下是该函数的说明:

  源文:

  ---------------------------------------------------------------------------------------

  _WeakKey

  Function:TestifthegeneratedBoxesareweak

  Argument:none

  Return:AX=Status(1=weak,0=good)

  Affects:AX,BX,CX,DX,SI,DI,directionFlag

  Description:After"_InitCrypt"youshouldtesttheBoxeswiththisfunction.

  Iftheyprovideaweaknesswhichacryptoanalystcoulduseto

  breaktheciphera"1"isreturned.Inthiscaseyoushould

  reloadtheoriginalboxesandlettheuserchooseadifferent

  password.

  ---------------------------------------------------------------------------------------

  译文:

  ---------------------------------------------------------------------------------------

  _WeakKey

  功能:测试产生的box是否安全

  参数:无

  返回:AX=1不安全;AX=0安全

  影响:AX,BX,CX,DX,SI,DI,方向标志

描述:使用"_InitCrypt"函数产生用于加密的Boxes后,你应该用这个函数测试产生的Boxes是否安全,如果该key产生的Boxes不安全——可以被密码分析者通过分析Boxes得到key,那么,你应该采用另外一个key产生一个安全的Boxes用来加密。

BlowFish's 分析

  由于该CrackMe主要是测试你的密码学知识,所以没有在其他方面设关卡。为了减小文件体积,缩短大家下载的时间,用upx加了壳,直接用Trw2000的"PNewSec+Makepe"很方便地就能脱掉

  用常规的方法,很快找到下面关键比较处:

  :004015D951pushecx

  :004015DA52pushedx

  :004015DB6880894000push00408980

  :004015E0E8EBFAFFFFcall004010D0//BF_De(sn)

  :004015E58B442464moveax,dwordptr[esp+64]

  :004015E98B0DF0994000movecx,dwordptr[004099F0]

  :004015EF83C41Caddesp,0000001C

  :004015F23BC1cmpeax,ecx//比较

  :004015F47529jne0040161F

  :004015F68B4C244Cmovecx,dwordptr[esp+4C]

  :004015FAA1EC994000moveax,dwordptr[004099EC]

  :004015FF3BC8cmpecx,eax//比较

  :00401601751Cjne0040161F

  :004016036A30push00000030

  由于BlowFish算法加密,解密输出的信息都是64Bit的,所以要进行两次比较。

  我们既然知道了他对我们的sn进行的变换是BF_De,那么,很显然,我们要找到程序初始化key_pbox和key_sbox的地方。跟进4015E0的Call,找到key_pbox在408980处,下bpm,然后跟踪,分析,找到程序初始化key_pbox和key_sbox的地方,如下:

  :004016C050pusheax

  *PossibleStringDataReffromDataObj->"CrackingForFun"

  |

  :004016C16844804000push00408044

  :004016C66880894000push00408980

  :004016CBE860FAFFFFcall00401130//初始化Boxes

  由此我们知道了BF_De(sn)的key是"CrackingForFun"。

  问题的一半已经解决了。下面我们来看用来比较的另外的64Bit的数是从何而来。

  bpm4099ECw

  跟踪分析后,发现这个用来比较的数是由BF_En(ComputerID,key="ChinaCrackingGroup")生成。

  至此,我们可以写出注册机的算法:

  sn=BF_En((BF_En(ComputerID,key="ChinaCrackingGroup"),key="CrackingForFun")

  只要你编程够强,密码学也还过得去,写出这个东西的注册机就不是困难的事情了。

  附:

  ComputerID的产生

  如果你对这个CrackMe很有兴趣,还想研究一下他的ComputerID是如何产生的,也可以继续跟踪,分析,在这里,我给处我分析的结果:

  ComputerID=BF_En(0776f6c62h,068736966h,key=PW_1)

  其中,PW_1就是你的Windows版本号,可以在“系统属性”里头看到,也就是注册表中的

  H_L_M\Software\Microsoft\Windows\CurrentVersion中的ProductId项。在我的机器上是:

  "25001-OEM-0080247-46673"

  注册机源码里头有一些语句没有派上用场,用“;”屏蔽了,如果你有兴趣,可以把前面的;号去掉然后把.data段里头的PW_1换成你机器的ComputerID,再按照程序中的说明自己修改一下源程序,用Masm32V6重新编译,直接按Generate,也能得到正确的序列号

代码:

  1. ////////////////////////////////////////////////////////////////////////////
  2. ///
  3. // Blowfish.h Header File
  4. //
  5. //    BLOWFISH ENCRYPTION ALGORITHM
  6. //
  7. //    Encryption and Decryption of Byte Strings using the Blowfish Encryption Algorithm.
  8. //    Blowfish is a block cipher that encrypts data in 8-byte blocks. The algorithm consists
  9. //    of two parts: a key-expansion part and a data-ancryption part. Key expansion converts a
  10. //    variable key of at least 1 and at most 56 bytes into several subkey arrays totaling
  11. //    4168 bytes. Blowfish has 16 rounds. Each round consists of a key-dependent permutation,
  12. //    and a key and data-dependent substitution. All operations are XORs and additions on 32-bit words.
  13. //    The only additional operations are four indexed array data lookups per round.
  14. //    Blowfish uses a large number of subkeys. These keys must be precomputed before any data
  15. //    encryption or decryption. The P-array consists of 18 32-bit subkeys: P0, P1,...,P17.
  16. //    There are also four 32-bit S-boxes with 256 entries each: S0,0, S0,1,...,S0,255;
  17. //    S1,0, S1,1,...,S1,255; S2,0, S2,1,...,S2,255; S3,0, S3,1,...,S3,255;
  18. //
  19. //    The Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Cipher Feedback modes
  20. //    are used:
  21. //
  22. //    In ECB mode if the same block is encrypted twice with the same key, the resulting
  23. //    ciphertext blocks are the same.
  24. //
  25. //    In CBC Mode a ciphertext block is obtained by first xoring the
  26. //    plaintext block with the previous ciphertext block, and encrypting the resulting value.
  27. //
  28. //    In CFB mode a ciphertext block is obtained by encrypting the previous ciphertext block
  29. //    and xoring the resulting value with the plaintext
  30. //
  31. //    The previous ciphertext block is usually stored in an Initialization Vector (IV).
  32. //    An Initialization Vector of zero is commonly used for the first block, though other
  33. //    arrangements are also in use.
  34. /*
  35. http://www.counterpane.com/vectors.txt
  36. Test vectors by Eric Young.  These tests all assume Blowfish with 16
  37. rounds.
  38. All data is shown as a hex string with 012345 loading as
  39. data[0]=0x01;
  40. data[1]=0x23;
  41. data[2]=0x45;
  42. ecb test data (taken from the DES validation tests)
  43. key bytes               clear bytes             cipher bytes
  44. 0000000000000000        0000000000000000        4EF997456198DD78
  45. FFFFFFFFFFFFFFFF        FFFFFFFFFFFFFFFF        51866FD5B85ECB8A
  46. 3000000000000000        1000000000000001        7D856F9A613063F2  ???
  47. 1111111111111111        1111111111111111        2466DD878B963C9D
  48. 0123456789ABCDEF        1111111111111111        61F9C3802281B096
  49. 1111111111111111        0123456789ABCDEF        7D0CC630AFDA1EC7
  50. 0000000000000000        0000000000000000        4EF997456198DD78
  51. FEDCBA9876543210        0123456789ABCDEF        0ACEAB0FC6A0A28D
  52. 7CA110454A1A6E57        01A1D6D039776742        59C68245EB05282B
  53. 0131D9619DC1376E        5CD54CA83DEF57DA        B1B8CC0B250F09A0
  54. 07A1133E4A0B2686        0248D43806F67172        1730E5778BEA1DA4
  55. 3849674C2602319E        51454B582DDF440A        A25E7856CF2651EB
  56. 04B915BA43FEB5B6        42FD443059577FA2        353882B109CE8F1A
  57. 0113B970FD34F2CE        059B5E0851CF143A        48F4D0884C379918
  58. 0170F175468FB5E6        0756D8E0774761D2        432193B78951FC98
  59. 43297FAD38E373FE        762514B829BF486A        13F04154D69D1AE5
  60. 07A7137045DA2A16        3BDD119049372802        2EEDDA93FFD39C79
  61. 04689104C2FD3B2F        26955F6835AF609A        D887E0393C2DA6E3
  62. 37D06BB516CB7546        164D5E404F275232        5F99D04F5B163969
  63. 1F08260D1AC2465E        6B056E18759F5CCA        4A057A3B24D3977B
  64. 584023641ABA6176        004BD6EF09176062        452031C1E4FADA8E
  65. 025816164629B007        480D39006EE762F2        7555AE39F59B87BD
  66. 49793EBC79B3258F        437540C8698F3CFA        53C55F9CB49FC019
  67. 4FB05E1515AB73A7        072D43A077075292        7A8E7BFA937E89A3
  68. 49E95D6D4CA229BF        02FE55778117F12A        CF9C5D7A4986ADB5
  69. 018310DC409B26D6        1D9D5C5018F728C2        D1ABB290658BC778
  70. 1C587F1C13924FEF        305532286D6F295A        55CB3774D13EF201
  71. 0101010101010101        0123456789ABCDEF        FA34EC4847B268B2
  72. 1F1F1F1F0E0E0E0E        0123456789ABCDEF        A790795108EA3CAE
  73. E0FEE0FEF1FEF1FE        0123456789ABCDEF        C39E072D9FAC631D
  74. 0000000000000000        FFFFFFFFFFFFFFFF        014933E0CDAFF6E4
  75. FFFFFFFFFFFFFFFF        0000000000000000        F21E9A77B71C49BC
  76. 0123456789ABCDEF        0000000000000000        245946885754369A
  77. FEDCBA9876543210        FFFFFFFFFFFFFFFF        6B5C5A9C5D9E0A5A
  78. set_key test data
  79. data[8]= FEDCBA9876543210
  80. c=F9AD597C49DB005E k[ 1]=F0
  81. c=E91D21C1D961A6D6 k[ 2]=F0E1
  82. c=E9C2B70A1BC65CF3 k[ 3]=F0E1D2
  83. c=BE1E639408640F05 k[ 4]=F0E1D2C3
  84. c=B39E44481BDB1E6E k[ 5]=F0E1D2C3B4
  85. c=9457AA83B1928C0D k[ 6]=F0E1D2C3B4A5
  86. c=8BB77032F960629D k[ 7]=F0E1D2C3B4A596
  87. c=E87A244E2CC85E82 k[ 8]=F0E1D2C3B4A59687
  88. c=15750E7A4F4EC577 k[ 9]=F0E1D2C3B4A5968778
  89. c=122BA70B3AB64AE0 k[10]=F0E1D2C3B4A596877869
  90. c=3A833C9AFFC537F6 k[11]=F0E1D2C3B4A5968778695A
  91. c=9409DA87A90F6BF2 k[12]=F0E1D2C3B4A5968778695A4B
  92. c=884F80625060B8B4 k[13]=F0E1D2C3B4A5968778695A4B3C
  93. c=1F85031C19E11968 k[14]=F0E1D2C3B4A5968778695A4B3C2D
  94. c=79D9373A714CA34F k[15]=F0E1D2C3B4A5968778695A4B3C2D1E ???
  95. c=93142887EE3BE15C k[16]=F0E1D2C3B4A5968778695A4B3C2D1E0F
  96. c=03429E838CE2D14B k[17]=F0E1D2C3B4A5968778695A4B3C2D1E0F00
  97. c=A4299E27469FF67B k[18]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011
  98. c=AFD5AED1C1BC96A8 k[19]=F0E1D2C3B4A5968778695A4B3C2D1E0F001122
  99. c=10851C0E3858DA9F k[20]=F0E1D2C3B4A5968778695A4B3C2D1E0F00112233
  100. c=E6F51ED79B9DB21F k[21]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011223344
  101. c=64A6E14AFD36B46F k[22]=F0E1D2C3B4A5968778695A4B3C2D1E0F001122334455
  102. c=80C7D7D45A5479AD k[23]=F0E1D2C3B4A5968778695A4B3C2D1E0F00112233445566
  103. c=05044B62FA52D080 k[24]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011223344556677
  104. chaining mode test data
  105. key[16]   = 0123456789ABCDEFF0E1D2C3B4A59687
  106. iv[8]     = FEDCBA9876543210
  107. data[29]  = "7654321 Now is the time for " (includes trailing '\0')
  108. data[29]  = 37363534333231204E6F77206973207468652074696D6520666F722000
  109. cbc cipher text
  110. cipher[32]= 6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC
  111. cfb64 cipher text cipher[29]=
  112. E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3
  113. ofb64 cipher text cipher[29]=
  114. E73214A2822139CA62B343CC5B65587310DD908D0C241B2263C2CF80DA
  115. */
  116. #ifndef __BLOWFISH_H__
  117. #define __BLOWFISH_H__
  118. //Block Structure
  119. struct SBlock
  120. {
  121. //Constructors
  122. SBlock(unsigned int l=0, unsigned int r=0) : m_uil(l), m_uir(r) {}
  123. //Copy Constructor
  124. SBlock(const SBlock& roBlock) : m_uil(roBlock.m_uil), m_uir(roBlock.m_uir) {}
  125. SBlock& operator^=(SBlock& b) { m_uil ^= b.m_uil; m_uir ^= b.m_uir; return *this; }
  126. unsigned int m_uil, m_uir;
  127. };
  128. class CBlowFish
  129. {
  130. public:
  131. enum { ECB=0, CBC=1, CFB=2 };
  132. //Constructor - Initialize the P and S boxes for a given Key
  133. CBlowFish(unsigned char* ucKey, size_t n, const SBlock& roChain = SBlock(0UL,0UL));
  134. //Resetting the chaining block
  135. void ResetChain() { m_oChain = m_oChain0; }
  136. // Encrypt/Decrypt Buffer in Place
  137. void Encrypt(unsigned char* buf, size_t n, int iMode=ECB);
  138. void Decrypt(unsigned char* buf, size_t n, int iMode=ECB);
  139. // Encrypt/Decrypt from Input Buffer to Output Buffer
  140. void Encrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode=ECB);
  141. void Decrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode=ECB);
  142. //Private Functions
  143. private:
  144. unsigned int F(unsigned int ui);
  145. void Encrypt(SBlock&);
  146. void Decrypt(SBlock&);
  147. private:
  148. //The Initialization Vector, by default {0, 0}
  149. SBlock m_oChain0;
  150. SBlock m_oChain;
  151. unsigned int m_auiP[18];
  152. unsigned int m_auiS[4][256];
  153. static const unsigned int scm_auiInitP[18];
  154. static const unsigned int scm_auiInitS[4][256];
  155. };
  156. //Extract low order byte
  157. inline unsigned char Byte(unsigned int ui)
  158. {
  159. return (unsigned char)(ui & 0xff);
  160. }
  161. //Function F
  162. inline unsigned int CBlowFish::F(unsigned int ui)
  163. {
  164. return ((m_auiS[0][Byte(ui>>24)] + m_auiS[1][Byte(ui>>16)]) ^ m_auiS[2][Byte(ui>>8)]) + m_auiS[3][Byte(ui)];
  165. }
  166. #endif // __BLOWFISH_H__
  1. ////////////////////////////////////////////////////////////////////////////
  2. ///
  3. // BlowFish.cpp
  4. //
  5. //    Implementation of Bruce Schneier's BLOWFISH algorithm from "Applied
  6. //    Cryptography", Second Edition.
  7. #include <cstring>
  8. #include <exception>
  9. #include "Blowfish.h"
  10. //Initialization with a fixed string which consists of the hexadecimal digits of PI (less the initial 3)
  11. //P-array, 18 32-bit subkeys
  12. const unsigned int CBlowFish::scm_auiInitP[18] = {
  13. 0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344,
  14. 0xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c89,
  15. 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
  16. 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917,
  17. 0x9216d5d9, 0x8979fb1b
  18. };
  19. //Four 32-bit S-boxes with 256 entries each
  20. const unsigned int CBlowFish::scm_auiInitS[4][256] = {
  21. //0
  22. {0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7,
  23. 0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,
  24. 0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
  25. 0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,
  26. 0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,
  27. 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
  28. 0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef,
  29. 0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e,
  30. 0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
  31. 0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,
  32. 0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce,
  33. 0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
  34. 0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e,
  35. 0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x28958677,
  36. 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
  37. 0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032,
  38. 0xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b88,
  39. 0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
  40. 0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e,
  41. 0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,
  42. 0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
  43. 0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98,
  44. 0xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e88,
  45. 0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
  46. 0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,
  47. 0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d,
  48. 0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
  49. 0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7,
  50. 0xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba,
  51. 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
  52. 0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f,
  53. 0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd09,
  54. 0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
  55. 0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb,
  56. 0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c7279,
  57. 0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
  58. 0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab,
  59. 0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df82,
  60. 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
  61. 0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,
  62. 0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0,
  63. 0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
  64. 0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790,
  65. 0xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e8,
  66. 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
  67. 0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0,
  68. 0xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b7,
  69. 0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
  70. 0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad,
  71. 0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,
  72. 0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
  73. 0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9,
  74. 0x165fa266, 0x80957705, 0x93cc7314, 0x211a1477,
  75. 0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
  76. 0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,
  77. 0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,
  78. 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
  79. 0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,
  80. 0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,
  81. 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
  82. 0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,
  83. 0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
  84. 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
  85. 0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a},
  86. //1
  87. {0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,
  88. 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
  89. 0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
  90. 0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
  91. 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
  92. 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
  93. 0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,
  94. 0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,
  95. 0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,
  96. 0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,
  97. 0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,
  98. 0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,
  99. 0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701,
  100. 0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,
  101. 0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
  102. 0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331,
  103. 0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,
  104. 0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,
  105. 0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e,
  106. 0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
  107. 0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,
  108. 0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2,
  109. 0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,
  110. 0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,
  111. 0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,
  112. 0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,
  113. 0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,
  114. 0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3,
  115. 0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,
  116. 0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
  117. 0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4,
  118. 0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,
  119. 0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,
  120. 0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28,
  121. 0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
  122. 0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,
  123. 0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510,
  124. 0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,
  125. 0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,
  126. 0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,
  127. 0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,
  128. 0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,
  129. 0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8,
  130. 0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,
  131. 0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
  132. 0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696,
  133. 0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,
  134. 0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,
  135. 0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0,
  136. 0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
  137. 0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,
  138. 0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250,
  139. 0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,
  140. 0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,
  141. 0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,
  142. 0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
  143. 0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
  144. 0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,
  145. 0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
  146. 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
  147. 0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,
  148. 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
  149. 0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
  150. 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7},
  151. //2
  152. {0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
  153. 0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
  154. 0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
  155. 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
  156. 0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
  157. 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
  158. 0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,
  159. 0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb,
  160. 0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,
  161. 0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
  162. 0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42,
  163. 0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,
  164. 0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,
  165. 0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb,
  166. 0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
  167. 0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,
  168. 0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33,
  169. 0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,
  170. 0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,
  171. 0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,
  172. 0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,
  173. 0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,
  174. 0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b,
  175. 0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,
  176. 0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
  177. 0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728,
  178. 0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,
  179. 0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,
  180. 0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37,
  181. 0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
  182. 0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,
  183. 0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b,
  184. 0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,
  185. 0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,
  186. 0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,
  187. 0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,
  188. 0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,
  189. 0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9,
  190. 0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,
  191. 0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
  192. 0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d,
  193. 0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,
  194. 0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,
  195. 0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61,
  196. 0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
  197. 0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,
  198. 0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2,
  199. 0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,
  200. 0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,
  201. 0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,
  202. 0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,
  203. 0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,
  204. 0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52,
  205. 0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,
  206. 0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
  207. 0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,
  208. 0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
  209. 0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
  210. 0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,
  211. 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
  212. 0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
  213. 0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
  214. 0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
  215. 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0},
  216. //3
  217. {0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,
  218. 0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
  219. 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
  220. 0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
  221. 0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
  222. 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
  223. 0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,
  224. 0xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee22,
  225. 0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
  226. 0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,
  227. 0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9,
  228. 0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
  229. 0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593,
  230. 0xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b51,
  231. 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
  232. 0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c,
  233. 0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b,
  234. 0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
  235. 0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c,
  236. 0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,
  237. 0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
  238. 0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319,
  239. 0x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb,
  240. 0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
  241. 0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,
  242. 0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32,
  243. 0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
  244. 0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166,
  245. 0xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae,
  246. 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
  247. 0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5,
  248. 0x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f47,
  249. 0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
  250. 0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d,
  251. 0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,
  252. 0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
  253. 0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8,
  254. 0x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd,
  255. 0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
  256. 0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,
  257. 0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38,
  258. 0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
  259. 0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c,
  260. 0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b941525,
  261. 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
  262. 0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442,
  263. 0xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e964,
  264. 0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
  265. 0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8,
  266. 0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,
  267. 0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
  268. 0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299,
  269. 0xf523f357, 0xa6327623, 0x93a83531, 0x56cccd02,
  270. 0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
  271. 0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,
  272. 0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,
  273. 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
  274. 0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,
  275. 0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,
  276. 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
  277. 0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,
  278. 0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
  279. 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
  280. 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6}
  281. };
  282. //Constructor - Initialize the P and S boxes for a given Key
  283. CBlowFish::CBlowFish(unsigned char* ucKey, size_t keysize, const SBlock& roChain) : m_oChain0(roChain), m_oChain(roChain)
  284. {
  285. if(keysize<1)
  286. throw exception("Incorrect key length");
  287. //Check the Key - the key length should be between 1 and 56 bytes
  288. if(keysize>56)
  289. keysize = 56;
  290. unsigned char aucLocalKey[56];
  291. unsigned int i, j;
  292. memcpy(aucLocalKey, ucKey, keysize);
  293. //Reflexive Initialization of the Blowfish.
  294. //Generating the Subkeys from the Key flood P and S boxes with PI
  295. memcpy(m_auiP, scm_auiInitP, sizeof m_auiP);
  296. memcpy(m_auiS, scm_auiInitS, sizeof m_auiS);
  297. //Load P boxes with key bytes
  298. const unsigned char* p = aucLocalKey;
  299. unsigned int x=0;
  300. //Repeatedly cycle through the key bits until the entire P array has been XORed with key bits
  301. int iCount = 0;
  302. for(i=0; i<18; i++)
  303. {
  304. x=0;
  305. for(int n=4; n--; )
  306. {
  307. int iVal = (int)(*p);
  308. x <<= 8;
  309. x |= *(p++);
  310. iCount++;
  311. if(iCount == keysize)
  312. {
  313. //All bytes used, so recycle bytes
  314. iCount = 0;
  315. p = aucLocalKey;
  316. }
  317. }
  318. m_auiP[i] ^= x;
  319. }
  320. //Reflect P and S boxes through the evolving Blowfish
  321. SBlock block(0UL,0UL); //all-zero block
  322. for(i=0; i<18; )
  323. Encrypt(block), m_auiP[i++] = block.m_uil, m_auiP[i++] = block.m_uir;
  324. for(j=0; j<4; j++)
  325. for(int k=0; k<256; )
  326. Encrypt(block), m_auiS[j][k++] = block.m_uil, m_auiS[j][k++] = block.m_uir;
  327. }
  328. //Sixteen Round Encipher of Block
  329. void CBlowFish::Encrypt(SBlock& block)
  330. {
  331. unsigned int uiLeft = block.m_uil;
  332. unsigned int uiRight = block.m_uir;
  333. uiLeft ^= m_auiP[0];
  334. uiRight ^= F(uiLeft)^m_auiP[1]; uiLeft ^= F(uiRight)^m_auiP[2];
  335. uiRight ^= F(uiLeft)^m_auiP[3]; uiLeft ^= F(uiRight)^m_auiP[4];
  336. uiRight ^= F(uiLeft)^m_auiP[5]; uiLeft ^= F(uiRight)^m_auiP[6];
  337. uiRight ^= F(uiLeft)^m_auiP[7]; uiLeft ^= F(uiRight)^m_auiP[8];
  338. uiRight ^= F(uiLeft)^m_auiP[9]; uiLeft ^= F(uiRight)^m_auiP[10];
  339. uiRight ^= F(uiLeft)^m_auiP[11]; uiLeft ^= F(uiRight)^m_auiP[12];
  340. uiRight ^= F(uiLeft)^m_auiP[13]; uiLeft ^= F(uiRight)^m_auiP[14];
  341. uiRight ^= F(uiLeft)^m_auiP[15]; uiLeft ^= F(uiRight)^m_auiP[16];
  342. uiRight ^= m_auiP[17];
  343. block.m_uil = uiRight;
  344. block.m_uir = uiLeft;
  345. }
  346. //Sixteen Round Decipher of SBlock
  347. void CBlowFish::Decrypt(SBlock& block)
  348. {
  349. unsigned int uiLeft = block.m_uil;
  350. unsigned int uiRight = block.m_uir;
  351. uiLeft ^= m_auiP[17];
  352. uiRight ^= F(uiLeft)^m_auiP[16]; uiLeft ^= F(uiRight)^m_auiP[15];
  353. uiRight ^= F(uiLeft)^m_auiP[14]; uiLeft ^= F(uiRight)^m_auiP[13];
  354. uiRight ^= F(uiLeft)^m_auiP[12]; uiLeft ^= F(uiRight)^m_auiP[11];
  355. uiRight ^= F(uiLeft)^m_auiP[10]; uiLeft ^= F(uiRight)^m_auiP[9];
  356. uiRight ^= F(uiLeft)^m_auiP[8]; uiLeft ^= F(uiRight)^m_auiP[7];
  357. uiRight ^= F(uiLeft)^m_auiP[6]; uiLeft ^= F(uiRight)^m_auiP[5];
  358. uiRight ^= F(uiLeft)^m_auiP[4]; uiLeft ^= F(uiRight)^m_auiP[3];
  359. uiRight ^= F(uiLeft)^m_auiP[2]; uiLeft ^= F(uiRight)^m_auiP[1];
  360. uiRight ^= m_auiP[0];
  361. block.m_uil = uiRight;
  362. block.m_uir = uiLeft;
  363. }
  364. //Semi-Portable Byte Shuffling
  365. inline void BytesToBlock(unsigned char const* p, SBlock& b)
  366. {
  367. unsigned int y;
  368. //Left
  369. b.m_uil = 0;
  370. y = *p++;
  371. y <<= 24;
  372. b.m_uil |= y;
  373. y = *p++;
  374. y <<= 16;
  375. b.m_uil |= y;
  376. y = *p++;
  377. y <<= 8;
  378. b.m_uil |= y;
  379. y = *p++;
  380. b.m_uil |= y;
  381. //Right
  382. b.m_uir = 0;
  383. y = *p++;
  384. y <<= 24;
  385. b.m_uir |= y;
  386. y = *p++;
  387. y <<= 16;
  388. b.m_uir |= y;
  389. y = *p++;
  390. y <<= 8;
  391. b.m_uir |= y;
  392. y = *p++;
  393. b.m_uir |= y;
  394. }
  395. inline void BlockToBytes(SBlock const& b, unsigned char* p)
  396. {
  397. unsigned int y;
  398. //Right
  399. y = b.m_uir;
  400. *--p = Byte(y);
  401. y = b.m_uir >> 8;
  402. *--p = Byte(y);
  403. y = b.m_uir >> 16;
  404. *--p = Byte(y);
  405. y = b.m_uir >> 24;
  406. *--p = Byte(y);
  407. //Left
  408. y = b.m_uil;
  409. *--p = Byte(y);
  410. y = b.m_uil >> 8;
  411. *--p = Byte(y);
  412. y = b.m_uil >> 16;
  413. *--p = Byte(y);
  414. y = b.m_uil >> 24;
  415. *--p = Byte(y);
  416. }
  417. //Encrypt Buffer in Place
  418. //Returns false if n is multiple of 8
  419. void CBlowFish::Encrypt(unsigned char* buf, size_t n, int iMode)
  420. {
  421. //Check the buffer's length - should be > 0 and multiple of 8
  422. if((n==0)||(n%8!=0))
  423. throw exception("Incorrect buffer length");
  424. SBlock work;
  425. if(iMode == CBC) //CBC mode, using the Chain
  426. {
  427. SBlock chain(m_oChain);
  428. for(; n >= 8; n -= 8)
  429. {
  430. BytesToBlock(buf, work);
  431. work ^= chain;
  432. Encrypt(work);
  433. chain = work;
  434. BlockToBytes(work, buf+=8);
  435. }
  436. }
  437. else if(iMode == CFB) //CFB mode, using the Chain
  438. {
  439. SBlock chain(m_oChain);
  440. for(; n >= 8; n -= 8)
  441. {
  442. Encrypt(chain);
  443. BytesToBlock(buf, work);
  444. work ^= chain;
  445. chain = work;
  446. BlockToBytes(work, buf+=8);
  447. }
  448. }
  449. else //ECB mode, not using the Chain
  450. {
  451. for(; n >= 8; n -= 8)
  452. {
  453. BytesToBlock(buf, work);
  454. Encrypt(work);
  455. BlockToBytes(work, buf+=8);
  456. }
  457. }
  458. }
  459. //Decrypt Buffer in Place
  460. //Returns false if n is multiple of 8
  461. void CBlowFish::Decrypt(unsigned char* buf, size_t n, int iMode)
  462. {
  463. //Check the buffer's length - should be > 0 and multiple of 8
  464. if((n==0)||(n%8!=0))
  465. throw exception("Incorrect buffer length");
  466. SBlock work;
  467. if(iMode == CBC) //CBC mode, using the Chain
  468. {
  469. SBlock crypt, chain(m_oChain);
  470. for(; n >= 8; n -= 8)
  471. {
  472. BytesToBlock(buf, work);
  473. crypt = work;
  474. Decrypt(work);
  475. work ^= chain;
  476. chain = crypt;
  477. BlockToBytes(work, buf+=8);
  478. }
  479. }
  480. else if(iMode == CFB) //CFB mode, using the Chain, not using Decrypt()
  481. {
  482. SBlock crypt, chain(m_oChain);
  483. for(; n >= 8; n -= 8)
  484. {
  485. BytesToBlock(buf, work);
  486. Encrypt(chain);
  487. crypt = work;
  488. work ^= chain;
  489. chain = crypt;
  490. BlockToBytes(work, buf+=8);
  491. }
  492. }
  493. else //ECB mode, not using the Chain
  494. {
  495. for(; n >= 8; n -= 8)
  496. {
  497. BytesToBlock(buf, work);
  498. Decrypt(work);
  499. BlockToBytes(work, buf+=8);
  500. }
  501. }
  502. }
  503. //Encrypt from Input Buffer to Output Buffer
  504. //Returns false if n is multiple of 8
  505. void CBlowFish::Encrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode)
  506. {
  507. //Check the buffer's length - should be > 0 and multiple of 8
  508. if((n==0)||(n%8!=0))
  509. throw exception("Incorrect buffer length");
  510. SBlock work;
  511. if(iMode == CBC) //CBC mode, using the Chain
  512. {
  513. SBlock chain(m_oChain);
  514. for(; n >= 8; n -= 8, in += 8)
  515. {
  516. BytesToBlock(in, work);
  517. work ^= chain;
  518. Encrypt(work);
  519. chain = work;
  520. BlockToBytes(work, out+=8);
  521. }
  522. }
  523. else if(iMode == CFB) //CFB mode, using the Chain
  524. {
  525. SBlock chain(m_oChain);
  526. for(; n >= 8; n -= 8, in += 8)
  527. {
  528. Encrypt(chain);
  529. BytesToBlock(in, work);
  530. work ^= chain;
  531. chain = work;
  532. BlockToBytes(work, out+=8);
  533. }
  534. }
  535. else //ECB mode, not using the Chain
  536. {
  537. for(; n >= 8; n -= 8, in += 8)
  538. {
  539. BytesToBlock(in, work);
  540. Encrypt(work);
  541. BlockToBytes(work, out+=8);
  542. }
  543. }
  544. }
  545. //Decrypt from Input Buffer to Output Buffer
  546. //Returns false if n is multiple of 8
  547. void CBlowFish::Decrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode)
  548. {
  549. //Check the buffer's length - should be > 0 and multiple of 8
  550. if((n==0)||(n%8!=0))
  551. throw exception("Incorrect buffer length");
  552. SBlock work;
  553. if(iMode == CBC) //CBC mode, using the Chain
  554. {
  555. SBlock crypt, chain(m_oChain);
  556. for(; n >= 8; n -= 8, in += 8)
  557. {
  558. BytesToBlock(in, work);
  559. crypt = work;
  560. Decrypt(work);
  561. work ^= chain;
  562. chain = crypt;
  563. BlockToBytes(work, out+=8);
  564. }
  565. }
  566. else if(iMode == CFB) //CFB mode, using the Chain, not using Decrypt()
  567. {
  568. SBlock crypt, chain(m_oChain);
  569. for(; n >= 8; n -= 8, in += 8)
  570. {
  571. BytesToBlock(in, work);
  572. Encrypt(chain);
  573. crypt = work;
  574. work ^= chain;
  575. chain = crypt;
  576. BlockToBytes(work, out+=8);
  577. }
  578. }
  579. else //ECB mode, not using the Chain
  580. {
  581. for(; n >= 8; n -= 8, in += 8)
  582. {
  583. BytesToBlock(in, work);
  584. Decrypt(work);
  585. BlockToBytes(work, out+=8);
  586. }
  587. }
  588. }
  1. 使用实例
  2. try
  3. {
  4. CBlowFish oBlowFish((unsigned char*)"1234567890123456", 16);
  5. char szDataIn1[49] = "ababababccccccccababababccccccccababababcccccccc";
  6. char szDataIn[49];
  7. char szDataOut[49];
  8. memset(szDataIn, 0, 49);
  9. memset(szDataOut, 0, 49);
  10. //Test ECB
  11. strcpy(szDataIn, szDataIn1);
  12. memset(szDataOut, 0, 49);
  13. oBlowFish.Encrypt((unsigned char*)szDataIn,
  14. (unsigned char*)szDataOut, 48, CBlowFish::ECB);
  15. memset(szDataIn, 0, 49);
  16. oBlowFish.Decrypt((unsigned char*)szDataOut,
  17. (unsigned char*)szDataIn, 48, CBlowFish::ECB);
  18. //Test CBC
  19. oBlowFish.ResetChain();
  20. strcpy(szDataIn, szDataIn1);
  21. memset(szDataOut, 0, 49);
  22. oBlowFish.Encrypt((unsigned char*)szDataIn,
  23. (unsigned char*)szDataOut, 48, CBlowFish::CBC);
  24. memset(szDataIn, 0, 49);
  25. oBlowFish.ResetChain();
  26. oBlowFish.Decrypt((unsigned char*)szDataOut,
  27. (unsigned char*)szDataIn, 48, CBlowFish::CBC);
  28. //Test CFB
  29. oBlowFish.ResetChain();
  30. strcpy(szDataIn, szDataIn1);
  31. memset(szDataOut, 0, 49);
  32. oBlowFish.Encrypt((unsigned char*)szDataIn,
  33. (unsigned char*)szDataOut, 48, CBlowFish::CFB);
  34. memset(szDataIn, 0, 49);
  35. oBlowFish.ResetChain();
  36. oBlowFish.Decrypt((unsigned char*)szDataOut,
  37. (unsigned char*)szDataIn, 48, CBlowFish::CFB);
  38. cout << endl;
  39. }
  40. catch(exception& roException)
  41. {
  42. cout << "Exception: "
  43. << roException.what() << endl;
  44. }

代码下载:http://download.csdn.net/detail/byxdaz/4057820

加密算法之BLOWFISH算法的更多相关文章

  1. 逆向常见加密算法值BlowFish算法

    伪c代码简单记录 伪c代码实现BlowFish加密 sub_4012F0(&v22, &v5, &v6); ^ | do { v7 = *v6 ^ v3; v3 = v4 ^ ...

  2. 腾讯webqq最新password加密算法,hash算法

    常常在做webqq机器人,可是最头痛的问题就是腾讯常常加一些验证串来防止robot,如今共享出最新的腾讯password加密算法和hash 算法 hash算法 def webqq_hash(i, a) ...

  3. 加密算法之 MD5算法

    题记:本人自测了很多次,该算法和apache的commons utils包中的MD5算法计算一致 一.针对文件内容生成MD5值 应用场景:针对文件,在传输过程由于网络原因丢帧或者被人别恶意篡改内容,可 ...

  4. 廖雪峰Java10加密与安全-4加密算法-4密钥交换算法

    1DH算法 1.1.原根公式:g^i mod P 条件:1<g<P,0<i<P 原根:介于[1, p-1]之间的任意2个数i,j(p为素数,i≠j)的结果不相等,即 g^i m ...

  5. 对称加密算法之DES算法

    数据加密标准(data encryption standard): DES是一种分组加密算法,输入的明文为64位,密钥为56位,生成的密文为64位. DES对64位的明文分组进行操作.通过一个初始置换 ...

  6. 加密算法之AES算法(转)

    转载http://www.mamicode.com/info-detail-514466.html 0 AES简介 美国国家标准技术研究所在2001年发布了高级加密标准(AES).AES是一个对称分组 ...

  7. php blowfish加密解密具体算法

    PHP Blowfish 算法的加密解密,供大家参考,具体内容如下<?php/*** php blowfish 算法* Class blowfish*/class blowfish{/*** b ...

  8. java-信息安全(二)-对称加密算法DES,3DES,AES,Blowfish,RC2,RC4

    概述 信息安全基本概念: DES(Data Encryption Standard,数据加密标准) 3DES(Triple DES,三重数据加密算法(TDEA,Triple Data Encrypti ...

  9. ABAP实现Blowfish加密算法

    看到SAP社区中有人问是否存在ABAP实现的Blowfish加密算法,无人回答.于是动手实现了一个blowfish-abap.通过blowfish-abap可以在SAP系统中使用Blowfish对数据 ...

随机推荐

  1. 剑指offer 面试22题

    面试22题: 题目:链表中倒数第k个节点 题:输入一个链表,输出该链表中倒数第k个结点. 解题思路:为了实现只遍历链表一次就能找到倒数第k个节点,我们可以定义两个指针.让第一个指针先向前走k-1步,第 ...

  2. 交叉编译Mesa,X11lib,Qt opengl

    记录Mesa配置文件如下: Mesa版本:Mesa-10.2.3 CC=/usr/local/arm-4.8.1/bin/arm-none-linux-gnueabi-gcc CXX=/usr/loc ...

  3. 【Head First Servlets and JSP】笔记13:session & cookie

    session的接口 杀死会话 cookie的性质 cookie的接口 再总结——cookie.session.JSESSIONID的前世今生 简单的定制cookie示例 1.session的接口,配 ...

  4. request模块 一基础部分

    一.HTTP请求   通过requests发送网络请求,方法有get post put delete head options import requests r=requests.get(" ...

  5. ⭐内核MKDEV(MAJOR, MINOR)宏

    版本:linux-2.6.24.4宏:    MKDEV(MAJOR, MINOR);  说明: 获取设备在设备表中的位置.        MAJOR   主设备号        MINOR   次设 ...

  6. linux基础(5)-用户及权限

    用户与组 用户:使用linux时,需要以用户的身份登陆 组    :用来方便组织管理用户   用户种类 -root用户(ID为0的用户为root用户) -系统用户(1-499) -普通用户(500以上 ...

  7. 分析新建的android代码

    1).xml文件中的<?xml version="1.0" encoding="utf-8"?>是每个xml文件开仅有一个的声明xml的代码. 2) ...

  8. Spring初学之FactoryBean配置Bean

    实体bean: Car.java: package spring.beans.factorybean; public class Car { private String name; private ...

  9. js中出现问题--Type Syntax error on token "catch", Identifier expected jquery.js

    解决方案: 1.选中jQuery报错的web工程: 2.右键-->Myeclipse-->Exclude From Validation,选中: 3.继续右键Myeclipse--> ...

  10. zhly

    5. 百叶002 名字2008 1.新浪   阿里矢量图库账号 15031116087 名字2008 2.acdsee 账号  1173209945  同密码一样 3.zhly   我的名字2016 ...