C语言的AES加密
C语言的AES加密 稍微封装了几个函数 方便使用
#if 1
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
/*aes_small.c*/
//辅助矩阵
/*s盒矩阵:The AES Substitution Table*/// 256 位的密匙256 位支持长度为32 个字符
static const unsigned char sbox[]={ //static:内部变量 const:只读,不可变常量
0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,
0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,
0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0,
0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,
0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15,
0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,
0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75,
0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,
0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84,
0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,
0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf,
0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,
0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8,
0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,
0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,
0xcd,0x0c,0x13,0xec,0x5f,0x97,0x44,0x17,
0xc4,0xa7,0x7e,0x3d,0x64,0x5d,0x19,0x73,
0x60,0x81,0x4f,0xdc,0x22,0x2a,0x90,0x88,
0x46,0xee,0xb8,0x14,0xde,0x5e,0x0b,0xdb,
0xe0,0x32,0x3a,0x0a,0x49,0x06,0x24,0x5c,
0xc2,0xd3,0xac,0x62,0x91,0x95,0xe4,0x79,
0xe7,0xc8,0x37,0x6d,0x8d,0xd5,0x4e,0xa9,
0x6c,0x56,0xf4,0xea,0x65,0x7a,0xae,0x08,
0xba,0x78,0x25,0x2e,0x1c,0xa6,0xb4,0xc6,
0xe8,0xdd,0x74,0x1f,0x4b,0xbd,0x8b,0x8a,
0x70,0x3e,0xb5,0x66,0x48,0x03,0xf6,0x0e,
0x61,0x35,0x57,0xb9,0x86,0xc1,0x1d,0x9e,
0xe1,0xf8,0x98,0x11,0x69,0xd9,0x8e,0x94,
0x9b,0x1e,0x87,0xe9,0xce,0x55,0x28,0xdf,
0x8c,0xa1,0x89,0x0d,0xbf,0xe6,0x42,0x68,
0x41,0x99,0x2d,0x0f,0xb0,0x54,0xbb,0x16,
};
//逆向S 盒矩阵
static const unsigned char contrary_sbox[]={
0x52,0x09,0x6a,0xd5,0x30,0x36,0xa5,0x38,
0xbf,0x40,0xa3,0x9e,0x81,0xf3,0xd7,0xfb,
0x7c,0xe3,0x39,0x82,0x9b,0x2f,0xff,0x87,
0x34,0x8e,0x43,0x44,0xc4,0xde,0xe9,0xcb,
0x54,0x7b,0x94,0x32,0xa6,0xc2,0x23,0x3d,
0xee,0x4c,0x95,0x0b,0x42,0xfa,0xc3,0x4e,//0x4e
0x08,0x2e,0xa1,0x66,0x28,0xd9,0x24,0xb2,
0x76,0x5b,0xa2,0x49,0x6d,0x8b,0xd1,0x25,
0x72,0xf8,0xf6,0x64,0x86,0x68,0x98,0x16,
0xd4,0xa4,0x5c,0xcc,0x5d,0x65,0xb6,0x92,
0x6c,0x70,0x48,0x50,0xfd,0xed,0xb9,0xda,
0x5e,0x15,0x46,0x57,0xa7,0x8d,0x9d,0x84,
0x90,0xd8,0xab,0x00,0x8c,0xbc,0xd3,0x0a,
0xf7,0xe4,0x58,0x05,0xb8,0xb3,0x45,0x06,
0xd0,0x2c,0x1e,0x8f,0xca,0x3f,0x0f,0x02,
0xc1,0xaf,0xbd,0x03,0x01,0x13,0x8a,0x6b,
0x3a,0x91,0x11,0x41,0x4f,0x67,0xdc,0xea,
0x97,0xf2,0xcf,0xce,0xf0,0xb4,0xe6,0x73,
0x96,0xac,0x74,0x22,0xe7,0xad,0x35,0x85,
0xe2,0xf9,0x37,0xe8,0x1c,0x75,0xdf,0x6e,
0x47,0xf1,0x1a,0x71,0x1d,0x29,0xc5,0x89,
0x6f,0xb7,0x62,0x0e,0xaa,0x18,0xbe,0x1b,
0xfc,0x56,0x3e,0x4b,0xc6,0xd2,0x79,0x20,
0x9a,0xdb,0xc0,0xfe,0x78,0xcd,0x5a,0xf4,
0x1f,0xdd,0xa8,0x33,0x88,0x07,0xc7,0x31,
0xb1,0x12,0x10,0x59,0x27,0x80,0xec,0x5f,
0x60,0x51,0x7f,0xa9,0x19,0xb5,0x4a,0x0d,
0x2d,0xe5,0x7a,0x9f,0x93,0xc9,0x9c,0xef,
0xa0,0xe0,0x3b,0x4d,0xae,0x2a,0xf5,0xb0,
0xc8,0xeb,0xbb,0x3c,0x83,0x53,0x99,0x61,
0x17,0x2b,0x04,0x7e,0xba,0x77,0xd6,0x26,
0xe1,0x69,0x14,0x63,0x55,0x21,0x0c,0x7d,
};
/*轮常量表 The key schedule rcon table*/
static const unsigned char Rcon[]={
0x01,0x02,0x04,0x08,0x10,0x20,0x40,0x80,0x1b,0x36}; //辅助函数
/*有限域*2乘法 The x2time() function */
static unsigned char x2time(unsigned char x)
{
if (x&0x80)
{
return (((x<<)^0x1B)&0xFF);
}
return x<<;
}
/*有限域*3乘法 The x2time() function */
static unsigned char x3time(unsigned char x)
{
return (x2time(x)^x);
}
/*有限域*4乘法 The x4time() function */
static unsigned char x4time(unsigned char x)
{
return ( x2time(x2time(x)) );
}
/*有限域*8乘法 The x8time() function */
static unsigned char x8time(unsigned char x)
{
return ( x2time(x2time(x2time(x))) );
}
/*有限域9乘法 The x9time() function */
static unsigned char x9time(unsigned char x) //9:1001
{
return ( x8time(x)^x );
}
/*有限域*B乘法 The xBtime() function */
static unsigned char xBtime(unsigned char x) //B:1011
{
return ( x8time(x)^x2time(x)^x );
}
/*有限域*D乘法 The xDtime() function */
static unsigned char xDtime(unsigned char x) //D:1101
{
return ( x8time(x)^x4time(x)^x );
}
/*有限域*E乘法 The xEtime() function */
static unsigned char xEtime(unsigned char x) //E:1110
{
return ( x8time(x)^x4time(x)^x2time(x) );
} /****************************************************************************************************************/
/*第三类操作:列混合操作 MixColumns: Process the entire block*/
static void MixColumns(unsigned char *col)//列混合
{
unsigned char tmp[],xt[];
int i;
for(i=;i<;i++,col+=) //col代表一列的基地址,col+4:下一列的基地址
{
/*
xt[0]=x2time(col[0]);
xt[1]=x2time(col[1]);
xt[2]=x2time(col[2]);
xt[3]=x2time(col[3]);
//xt[n]代表*2 xt[n]^col[n]代表*3 col[n]代表*1
tmp[0]=(xt[0])^(xt[1]^col[1])^col[2]^col[3]; //2 3 1 1
tmp[1]=col[0]^(xt[1])^(xt[2]^col[2])^col[3]; //1 2 3 1
tmp[2]=col[0]^col[1]^(xt[2])^(xt[3]^col[3]); //1 1 2 3
tmp[3]=(xt[0]^col[0])^col[1]^col[2]^(xt[3]); //3 1 1 2
*/
tmp[]=x2time(col[])^x3time(col[])^col[]^col[]; //2 3 1 1
tmp[]=col[]^x2time(col[])^x3time(col[])^col[]; //1 2 3 1
tmp[]=col[]^col[]^x2time(col[])^x3time(col[]); //1 1 2 3
tmp[]=x3time(col[])^col[]^col[]^x2time(col[]); //3 1 1 2
//修改后的值 直接在原矩阵上修改
col[]=tmp[];
col[]=tmp[];
col[]=tmp[];
col[]=tmp[];
}
}
//逆向列混淆
static void Contrary_MixColumns(unsigned char *col)
{
unsigned char tmp[];
unsigned char xt2[];//colx2
unsigned char xt4[];//colx4
unsigned char xt8[];//colx8
int x;
for(x=;x<;x++,col+=)
{
/*
xt2[0]=x2time(col[0]);
xt2[1]=x2time(col[1]);
xt2[2]=x2time(col[2]);
xt2[3]=x2time(col[3]);
xt4[0]=x2time(xt2[0]);
xt4[1]=x2time(xt2[1]);
xt4[2]=x2time(xt2[2]);
xt4[3]=x2time(xt2[3]);
xt8[0]=x2time(xt4[0]);
xt8[1]=x2time(xt4[1]);
xt8[2]=x2time(xt4[2]);
xt8[3]=x2time(xt4[3]);
tmp[0]=xt8[0]^xt4[0]^xt2[0]^xt8[1]^xt2[1]^col[1]^xt8[2]^xt4[2]^col[2]^xt8[3]^col[3];
tmp[1]=xt8[0]^col[0]^xt8[1]^xt4[1]^xt2[1]^xt8[2]^xt2[2]^col[2]^xt8[3]^xt4[3]^col[3];
tmp[2]=xt8[0]^xt4[0]^col[0]^xt8[1]^col[1]^xt8[2]^xt4[2]^xt2[2]^xt8[3]^xt2[3]^col[3];
tmp[3]=xt8[0]^xt2[0]^col[0]^xt8[1]^xt4[1]^col[1]^xt8[2]^col[2]^xt8[3]^xt4[3]^xt2[3];
*/
tmp[]=xEtime(col[])^xBtime(col[])^xDtime(col[])^x9time(col[]);
tmp[]=x9time(col[])^xEtime(col[])^xBtime(col[])^xDtime(col[]);
tmp[]=xDtime(col[])^x9time(col[])^xEtime(col[])^xBtime(col[]);
tmp[]=xBtime(col[])^xDtime(col[])^x9time(col[])^xEtime(col[]);
col[]=tmp[];
col[]=tmp[];
col[]=tmp[];
col[]=tmp[];
}
}
/*第二类操作:行移位:行左循环移位 ShiftRows:Shifts the entire block*/
static void ShiftRows(unsigned char *col)//正向行移位
{
/*
1 5 9 13 5 9 13 1
2 6 10 14 10 14 2 6
3 7 11 15 15 3 7 11
4 8 12 16 16 4 8 12
*/
unsigned char t;
/*1nd row*///左移1位
t=col[];col[]=col[];col[]=col[];col[]=col[];col[]=t;
/*2rd row*///左移2位,交换2次数字来实现
t=col[];col[]=col[];col[]=t;
t=col[];col[]=col[];col[]=t;
/*3th row*///左移3位,相当于右移1次
t=col[];col[]=col[];col[]=col[];col[]=col[];col[]=t;
/*4th row*/ //第4行不移位
}
//逆向行移位
static void Contrary_ShiftRows(unsigned char *col)
{
unsigned char t;
/*1nd row*/
t=col[];col[]=col[];col[]=col[];col[]=col[];col[]=t;
/*2rd row*/
t=col[];col[]=col[];col[]=t;
t=col[];col[]=col[];col[]=t;
/*3th row*/
t=col[];col[]=col[];col[]=col[];col[]=col[];col[]=t;
/*4th row*/ //第4行不移位
}
/*第一类操作:s盒字节代换替换 SubBytes*/
static void SubBytes(unsigned char *col)//字节代换
{
int x;
for(x=;x<;x++)
{
col[x]=sbox[col[x]];
}
}
//逆向字节代换
static void Contrary_SubBytes(unsigned char *col)
{
int x;
for(x=;x<;x++)
{
col[x]=contrary_sbox[col[x]];
}
}
/*第四类操作:轮密钥加 AddRoundKey*/
static void AddRoundKey(unsigned char *col,unsigned char *expansionkey,int round)//密匙加
{
//扩展密钥:44*32bit =11*4* 4*8 = 16字节*11轮,每轮用16字节密钥
//第0轮,只进行一次轮密钥加
//第1-10轮,轮密钥加
int x;
for(x=;x<;x++) //每1轮操作:4*32bit密钥 = 16个字节密钥
{
col[x]^=expansionkey[(round<<)+x];
}
}
/* AES加密总函数 10轮4类操作 Encrypt a single block with Nr Rounds(10,12,14)*/
void AesEncrypt(unsigned char *blk,unsigned char *expansionkey,int Nr)//加密一个区块
{
//输入blk原文,直接在上面修改,输出blk密文
//输入skey:
//输入Nr = 10轮
int round;
//第1轮之前:轮密钥加
AddRoundKey(blk,expansionkey,);
//第1-9轮:4类操作:字节代换、行移位、列混合、轮密钥加
for(round=;round<=(Nr-);round++)
{
SubBytes(blk); //输入16字节数组,直接在原数组上修改
ShiftRows(blk); //输入16字节数组,直接在原数组上修改
MixColumns(blk); //输入16字节数组,直接在原数组上修改
AddRoundKey(blk,expansionkey,round);
}
//第10轮:不进行列混合
SubBytes(blk);
ShiftRows(blk);
AddRoundKey(blk,expansionkey,Nr);
}
//AES 解密总函数
void Contrary_AesEncrypt(unsigned char *blk,unsigned char *expansionkey,int Nr)
{
int x;
/* unsigned char *contrary_key=key;
for(x=0;x<11;x++,key+=16)
Contrary_MixColumns(key);*/
AddRoundKey(blk,expansionkey,Nr);
Contrary_ShiftRows(blk);
Contrary_SubBytes(blk);
for(x=(Nr-);x>=;x--)
{
AddRoundKey(blk,expansionkey,x);
Contrary_MixColumns(blk);
Contrary_ShiftRows(blk);
Contrary_SubBytes(blk);
}
AddRoundKey(blk,expansionkey,);
}
/*//密钥编排,16字节--->44列32bit密钥生成--> 11组16字节:分别用于11轮 轮密钥加运算
Schedule a secret key for use.
*outkey[] must be 16*15 bytes in size
*Nk==number of 32 bit words in the key,e.g.,4,6,8
*Nr==number of rounds,e.g.,10,12,14
*/
void ScheduleKey(unsigned char *inkey,unsigned char *outkey,int Nk,int Nr)//安排一个保密密钥使用
{
//inkey:初始16字节密钥key
//outkey:11组*16字节扩展密钥expansionkey
//Nk:4列
//Nr:10轮round
unsigned char temp[],t;
int x,i;
/*copy the key*/
//第0组:[0-3]直接拷贝
for(i=;i<(*Nk);i++)
{
outkey[i]=inkey[i];
}
//第1-10组:[4-43]
i=Nk;
while(i<(*(Nr+))) //i=4~43 WORD 32bit的首字节地址,每一个4字节
{//1次循环生成1个字节扩展密钥,4次循环生成一个WORD
//temp:4字节数组:代表一个WORD密钥
/*temp=w[i-1]*/
//i不是4的倍数的时候
//每个temp = 每个outkey32bit = 4字节
for(x=;x<;x++)
temp[x]=outkey[(*(i-))+x]; //i:32bit的首字节地址
//i是4的倍数的时候
if(i%Nk==)
{
/*字循环:循环左移1字节 RotWord()*/
t=temp[];temp[]=temp[];temp[]=temp[];temp[]=temp[];temp[]=t;
/*字节代换:SubWord()*/
for(x=;x<;x++)
{
temp[x]=sbox[temp[x]];
}
/*轮常量异或:Rcon[j]*/
temp[]^=Rcon[(i/Nk)-];
}
//else if(Nk>6 && (i%Nk)==4) //Nk>6的算法不同,暂时用不到
//{
// /*SubWord*/
// for(x=0;x<4;x++)
// {
// temp[x]=sbox[temp[x]];
// }
//} /*w[i] = w[i-4]^w[i-1]*/
for(x=;x<;x++)
{
outkey[(*i)+x]=outkey[(*(i-Nk))+x]^temp[x];
}
++i;
}
}
void EncMem(void* buf,int size)
{
unsigned char key[];
unsigned char expansionkey[*];
unsigned char* p=(unsigned char*)buf;
int i=,count=;
sprintf((char*)key,"%s","test123!!!");
for(i=;i<&&i<size;++i)
{
if(p[i]>)++count;
}
if(count>)return;
key[]=;
/*加密*/
ScheduleKey(key,expansionkey,,); //1、密钥扩展生成
while(size>=)
{
AesEncrypt(p,expansionkey,); //2、AES 加密
p+=;
size-=;
}
}
void DecMem(void* buf,int size)
{
unsigned char key[];
unsigned char expansionkey[*];
unsigned char* p=(unsigned char*)buf;
int i=,count=;
sprintf((char*)key,"%s","test123!!!");
for(i=;i<&&i<size;++i)
{
if(p[i]>)++count;
}
if(count<)return;
key[]=;
/*加密*/
ScheduleKey(key,expansionkey,,); //1、密钥扩展生成
while(size>=)
{
Contrary_AesEncrypt(p,expansionkey,);//AES 解密
p+=;
size-=;
}
}
int EncFile(const char* file)
{
unsigned char* buf=;
int size=;
FILE* fp=;
fp=fopen(file,"rb");
if(!fp)return -;
fseek(fp,,);
size=(int)ftell(fp);
buf=(unsigned char*)malloc(size+);;
buf[size]=; fseek(fp,,);
fread(buf,size,,fp);
fclose(fp); EncMem(buf,size); fp=fopen(file,"wb+");
fwrite(buf,size,,fp);
fclose(fp);
return ; }
#endif
C语言的AES加密的更多相关文章
- java php c# 三种语言的AES加密互转
java php c# 三种语言的AES加密互转 最近做的项目中有一个领取优惠券的功能,项目是用php写得,不得不佩服,php自带的方法简洁而又方便好用.项目是为平台为其他公司发放优惠券,结果很囧的是 ...
- C#, Java, PHP, Python和Javascript几种语言的AES加密解密实现[转载]
原文:http://outofmemory.cn/code-snippet/35524/AES-with-javascript-java-csharp-python-or-php c#里面的AES加密 ...
- C#, Java, PHP, Python和Javascript几种语言的AES加密解密实现
特别提示:本人博客部分有参考网络其他博客,但均是本人亲手编写过并验证通过.如发现博客有错误,请及时提出以免误导其他人,谢谢!欢迎转载,但记得标明文章出处:http://www.cnblogs.com/ ...
- AES加密的C语言实现
摘自网上一种AES加密,用C语言实现通过32字节密钥对16字节长度数据进行加密. #include <string.h> #include <stdio.h> #ifndef ...
- AES加密php,java,.net三种语言同步实现加密、解密
话不多数上代码: java::: /* * To change this license header, choose License Headers in Project Properties. * ...
- 非对称技术栈实现AES加密解密
非对称技术栈实现AES加密解密 正如前面的一篇文章所述,https协议的SSL层是实现在传输层之上,应用层之下,也就是说在应用层上看到的请求还是明码的,对于某些场景下要求这些http请求参数是非可读的 ...
- Java aes加密C#解密的取巧方法
摘要: 项目开发过程中遇到一个棘手的问题:A系统使用java开发,通过AES加密数据,B系统使用C#开发,需要从A系统获取数据,但在AES解密的时候遇到麻烦.Java的代码和C#的代码无法互通. Ja ...
- AES加密CBC模式兼容互通四种编程语言平台【PHP、Javascript、Java、C#】
原文:AES加密CBC模式兼容互通四种编程语言平台[PHP.Javascript.Java.C#] 由于本人小菜,开始对AES加密并不了解,在网络上花了比较多时间查阅资料整理: 先简单从百度找来介绍: ...
- java与C#、.NET AES加密、解密 解决方案
1.情景展示 Java提供的密钥,C#无法解密. 2.原因分析 在Java中,AES的实际密钥需要用到KeyGenerator 和 SecureRandom,但是C#和.NET 里面没有这2个类, ...
随机推荐
- 使用filebeat收集日志传输到redis的各种效果展示
0 环境 Linux主机,cengtos7系统 安装有openresty软件,用来访问生成日志信息 1.15.8版本 安装有filebeat软件,用来收集openresty的日志 7.3版本 安装有r ...
- 简单CSS实现闪烁动画(+1白话讲解)
原文:简单CSS实现闪烁动画(+1白话讲解) 本文转载于:猿2048网站⇒https://www.mk2048.com/blog/blog.php?id=icj2chj2ab 背景 本文承接自上文&l ...
- 4种vue当中的指令和它的用法
1.v-if:判断是否隐藏 2.v-for:数据循环 3.v-bind:class:绑定一个属性 4.v-model:实现数据双向绑定 这里重点说明一个v-if和v-show的区别: 共同点:都是通过 ...
- 在docker容器中为elasticsearch配置跨域访问
一.在docker容器中进入elasticsearch对应的容器 docker exec -it [容器名] /bin/bash 二.安装vim编辑器 因为我们需要更改配置文件,安装过的朋友就不用安装 ...
- JVM内存分配和垃圾回收以及性能调优
JVM内存分配策略 一:堆中优先分配Eden 大多数情况下,对象都在新生代的Eden区中分配内存.而新生代会频繁进行垃圾回收. 二:大对象直接进入老年代 需要大量连续空间的对象,如:长字符串.数组等, ...
- 实践周java基础软件开发app之五子棋
五子棋人机对战实践项目 总的任务和目标 完成一个人机对战的五子棋项目,基本效果如下: 第一部分 Java绘图原理 1. 基本概念 像素,坐标 第二部分 绘制棋盘 1. 基本思路 在一个JPan ...
- 新手的Linux zcat命令示例
Zcat是一个命令行实用程序,用于查看压缩文件的内容.它将压缩文件扩展为标准输出,允许您查看内容. 分类:Linux命令操作系统 2018-08-13 00:00:00 通常,使用gzip压缩的文件可 ...
- tensorboard_scalar
import numpy as np from tensorboardX import SummaryWriter writer=SummaryWriter(log_dir="scala&q ...
- associate.py 源代码 及 使用方法
ORB_SLAM2运行RGBD数据集需要使用图片序列信息 使用以下代码进行汇集: #!/usr/bin/python # Software License Agreement (BSD License ...
- MYSQL利用merge存储引擎来实现分表
创建user1和user2两个分表 建表语句如下:只是表名不一样,其他字段信息及主键一致. CREATE TABLE IF NOT EXISTS user1( id INT(11) NOT NUL ...