如何使用AES在一个程序中加密,在另一个程序中解密

如何使用AES在一个程序中加密,在另一个程序中解密,第1张

1.程序加密可结合AES算法,在程序运行中,通过外部芯片中的AES密钥,加密数据来验证双方的正确性,称之为对比认此搭证。

2.加密数据传输过程中,可通过森清拿AES加密后形成密文传输,到达安全端后再进行解密,实现数据传输安全控制。

3.综合1和2,当前高大上的方式是程序加密可进行移植到加密芯片,存储在加密芯片中,运行也在加密芯片正虚内部运行,输入数据参数,返回执行结果,同时辅助以AES加密和认证,实现数据程序的全方位防护

恰好我有。能运行的,C语言的。

#include <string.h>

#include "aes.h"

#include "commonage.h"

#define byte unsigned char

#define BPOLY 0x1b //!<Lower 8 bits of (x^8+x^4+x^3+x+1), ie. (x^4+x^3+x+1).

#define BLOCKSIZE 16 //!<大余者 Block size in number of bytes.

#define KEYBITS 128 //!<Use AES128.

#define ROUNDS 10 //!<Number of rounds.

#define KEYLENGTH 16 //!<Key length in number of bytes.

byte xdata block1[ 256 ]/滚薯/!<Workspace 1.

byte xdata block2[ 256 ]//!<Worksapce 2.

byte xdata * powTbl//!<Final location of exponentiation lookup table.

byte xdata * logTbl//!<Final location of logarithm lookup table.

byte xdata * sBox//!<Final location of s-box.

byte xdata * sBoxInv//!<Final location of inverse s-box.

byte xdata * expandedKey//毁源!<Final location of expanded key.

void CalcPowLog( byte * powTbl, byte * logTbl )

{

byte xdata i = 0

byte xdata t = 1

do {

// Use 0x03 as root for exponentiation and logarithms.

powTbl[i] = t

logTbl[t] = i

i++

// Muliply t by 3 in GF(2^8).

t ^= (t <<1) ^ (t &0x80 ? BPOLY : 0)

} while( t != 1 )// Cyclic properties ensure that i <255.

powTbl[255] = powTbl[0]// 255 = '-0', 254 = -1, etc.

}

void CalcSBox( byte * sBox )

{

byte xdata i, rot

byte xdata temp

byte xdata result

// Fill all entries of sBox[].

i = 0

do {

// Inverse in GF(2^8).

if( i >0 ) {

temp = powTbl[ 255 - logTbl[i] ]

} else {

temp = 0

}

// Affine transformation in GF(2).

result = temp ^ 0x63// Start with adding a vector in GF(2).

for( rot = 0rot <4rot++ ) {

// Rotate left.

temp = (temp<<1) | (temp>>7)

// Add rotated byte in GF(2).

result ^= temp

}

// Put result in table.

sBox[i] = result

} while( ++i != 0 )

}

void CalcSBoxInv( byte * sBox, byte * sBoxInv )

{

byte xdata i = 0

byte xdata j = 0

// Iterate through all elements in sBoxInv using i.

do {

// Search through sBox using j.

cleardog()

do {

// Check if current j is the inverse of current i.

if( sBox[ j ] == i ) {

// If so, set sBoxInc and indicate search finished.

sBoxInv[ i ] = j

j = 255

}

} while( ++j != 0 )

} while( ++i != 0 )

}

void CycleLeft( byte * row )

{

// Cycle 4 bytes in an array left once.

byte xdata temp = row[0]

row[0] = row[1]

row[1] = row[2]

row[2] = row[3]

row[3] = temp

}

void InvMixColumn( byte * column )

{

byte xdata r0, r1, r2, r3

r0 = column[1] ^ column[2] ^ column[3]

r1 = column[0] ^ column[2] ^ column[3]

r2 = column[0] ^ column[1] ^ column[3]

r3 = column[0] ^ column[1] ^ column[2]

column[0] = (column[0] <<1) ^ (column[0] &0x80 ? BPOLY : 0)

column[1] = (column[1] <<1) ^ (column[1] &0x80 ? BPOLY : 0)

column[2] = (column[2] <<1) ^ (column[2] &0x80 ? BPOLY : 0)

column[3] = (column[3] <<1) ^ (column[3] &0x80 ? BPOLY : 0)

r0 ^= column[0] ^ column[1]

r1 ^= column[1] ^ column[2]

r2 ^= column[2] ^ column[3]

r3 ^= column[0] ^ column[3]

column[0] = (column[0] <<1) ^ (column[0] &0x80 ? BPOLY : 0)

column[1] = (column[1] <<1) ^ (column[1] &0x80 ? BPOLY : 0)

column[2] = (column[2] <<1) ^ (column[2] &0x80 ? BPOLY : 0)

column[3] = (column[3] <<1) ^ (column[3] &0x80 ? BPOLY : 0)

r0 ^= column[0] ^ column[2]

r1 ^= column[1] ^ column[3]

r2 ^= column[0] ^ column[2]

r3 ^= column[1] ^ column[3]

column[0] = (column[0] <<1) ^ (column[0] &0x80 ? BPOLY : 0)

column[1] = (column[1] <<1) ^ (column[1] &0x80 ? BPOLY : 0)

column[2] = (column[2] <<1) ^ (column[2] &0x80 ? BPOLY : 0)

column[3] = (column[3] <<1) ^ (column[3] &0x80 ? BPOLY : 0)

column[0] ^= column[1] ^ column[2] ^ column[3]

r0 ^= column[0]

r1 ^= column[0]

r2 ^= column[0]

r3 ^= column[0]

column[0] = r0

column[1] = r1

column[2] = r2

column[3] = r3

}

byte Multiply( unsigned char num, unsigned char factor )

{

byte mask = 1

byte result = 0

while( mask != 0 ) {

// Check bit of factor given by mask.

if( mask &factor ) {

// Add current multiple of num in GF(2).

result ^= num

}

// Shift mask to indicate next bit.

mask <<= 1

// Double num.

num = (num <<1) ^ (num &0x80 ? BPOLY : 0)

}

return result

}

byte DotProduct( unsigned char * vector1, unsigned char * vector2 )

{

byte result = 0

result ^= Multiply( *vector1++, *vector2++ )

result ^= Multiply( *vector1++, *vector2++ )

result ^= Multiply( *vector1++, *vector2++ )

result ^= Multiply( *vector1 , *vector2 )

return result

}

void MixColumn( byte * column )

{

byte xdata row[8] = {

0x02, 0x03, 0x01, 0x01,

0x02, 0x03, 0x01, 0x01

}// Prepare first row of matrix twice, to eliminate need for cycling.

byte xdata result[4]

// Take dot products of each matrix row and the column vector.

result[0] = DotProduct( row+0, column )

result[1] = DotProduct( row+3, column )

result[2] = DotProduct( row+2, column )

result[3] = DotProduct( row+1, column )

// Copy temporary result to original column.

column[0] = result[0]

column[1] = result[1]

column[2] = result[2]

column[3] = result[3]

}

void SubBytes( byte * bytes, byte count )

{

do {

*bytes = sBox[ *bytes ]// Substitute every byte in state.

bytes++

} while( --count )

}

void InvSubBytesAndXOR( byte * bytes, byte * key, byte count )

{

do {

// *bytes = sBoxInv[ *bytes ] ^ *key// Inverse substitute every byte in state and add key.

*bytes = block2[ *bytes ] ^ *key// Use block2 directly. Increases speed.

bytes++

key++

} while( --count )

}

void InvShiftRows( byte * state )

{

byte temp

// Note: State is arranged column by column.

// Cycle second row right one time.

temp = state[ 1 + 3*4 ]

state[ 1 + 3*4 ] = state[ 1 + 2*4 ]

state[ 1 + 2*4 ] = state[ 1 + 1*4 ]

state[ 1 + 1*4 ] = state[ 1 + 0*4 ]

state[ 1 + 0*4 ] = temp

// Cycle third row right two times.

temp = state[ 2 + 0*4 ]

state[ 2 + 0*4 ] = state[ 2 + 2*4 ]

state[ 2 + 2*4 ] = temp

temp = state[ 2 + 1*4 ]

state[ 2 + 1*4 ] = state[ 2 + 3*4 ]

state[ 2 + 3*4 ] = temp

// Cycle fourth row right three times, ie. left once.

temp = state[ 3 + 0*4 ]

state[ 3 + 0*4 ] = state[ 3 + 1*4 ]

state[ 3 + 1*4 ] = state[ 3 + 2*4 ]

state[ 3 + 2*4 ] = state[ 3 + 3*4 ]

state[ 3 + 3*4 ] = temp

}

void ShiftRows( byte * state )

{

byte temp

// Note: State is arranged column by column.

// Cycle second row left one time.

temp = state[ 1 + 0*4 ]

state[ 1 + 0*4 ] = state[ 1 + 1*4 ]

state[ 1 + 1*4 ] = state[ 1 + 2*4 ]

state[ 1 + 2*4 ] = state[ 1 + 3*4 ]

state[ 1 + 3*4 ] = temp

// Cycle third row left two times.

temp = state[ 2 + 0*4 ]

state[ 2 + 0*4 ] = state[ 2 + 2*4 ]

state[ 2 + 2*4 ] = temp

temp = state[ 2 + 1*4 ]

state[ 2 + 1*4 ] = state[ 2 + 3*4 ]

state[ 2 + 3*4 ] = temp

// Cycle fourth row left three times, ie. right once.

temp = state[ 3 + 3*4 ]

state[ 3 + 3*4 ] = state[ 3 + 2*4 ]

state[ 3 + 2*4 ] = state[ 3 + 1*4 ]

state[ 3 + 1*4 ] = state[ 3 + 0*4 ]

state[ 3 + 0*4 ] = temp

}

void InvMixColumns( byte * state )

{

InvMixColumn( state + 0*4 )

InvMixColumn( state + 1*4 )

InvMixColumn( state + 2*4 )

InvMixColumn( state + 3*4 )

}

void MixColumns( byte * state )

{

MixColumn( state + 0*4 )

MixColumn( state + 1*4 )

MixColumn( state + 2*4 )

MixColumn( state + 3*4 )

}

void XORBytes( byte * bytes1, byte * bytes2, byte count )

{

do {

*bytes1 ^= *bytes2// Add in GF(2), ie. XOR.

bytes1++

bytes2++

} while( --count )

}

void CopyBytes( byte * to, byte * from, byte count )

{

do {

*to = *from

to++

from++

} while( --count )

}

void KeyExpansion( byte * expandedKey )

{

byte xdata temp[4]

byte i

byte xdata Rcon[4] = { 0x01, 0x00, 0x00, 0x00 }// Round constant.

unsigned char xdata *key

unsigned char xdata a[16]

key=a

//以下为加解密密码,共16字节。可以选择任意值

key[0]=0x30

key[1]=0x30

key[2]=0x30

key[3]=0x30

key[4]=0x30

key[5]=0x30

key[6]=0x30

key[7]=0x30

key[8]=0x30

key[9]=0x30

key[10]=0x30

key[11]=0x30

key[12]=0x30

key[13]=0x30

key[14]=0x30

key[15]=0x30

////////////////////////////////////////////

// Copy key to start of expanded key.

i = KEYLENGTH

do {

*expandedKey = *key

expandedKey++

key++

} while( --i )

// Prepare last 4 bytes of key in temp.

expandedKey -= 4

temp[0] = *(expandedKey++)

temp[1] = *(expandedKey++)

temp[2] = *(expandedKey++)

temp[3] = *(expandedKey++)

// Expand key.

i = KEYLENGTH

while( i <BLOCKSIZE*(ROUNDS+1) ) {

// Are we at the start of a multiple of the key size?

if( (i % KEYLENGTH) == 0 ) {

CycleLeft( temp )// Cycle left once.

SubBytes( temp, 4 )// Substitute each byte.

XORBytes( temp, Rcon, 4 )// Add constant in GF(2).

*Rcon = (*Rcon <<1) ^ (*Rcon &0x80 ? BPOLY : 0)

}

// Keysize larger than 24 bytes, ie. larger that 192 bits?

#if KEYLENGTH >24

// Are we right past a block size?

else if( (i % KEYLENGTH) == BLOCKSIZE ) {

SubBytes( temp, 4 )// Substitute each byte.

}

#endif

// Add bytes in GF(2) one KEYLENGTH away.

XORBytes( temp, expandedKey - KEYLENGTH, 4 )

// Copy result to current 4 bytes.

*(expandedKey++) = temp[ 0 ]

*(expandedKey++) = temp[ 1 ]

*(expandedKey++) = temp[ 2 ]

*(expandedKey++) = temp[ 3 ]

i += 4// Next 4 bytes.

}

}

void InvCipher( byte * block, byte * expandedKey )

{

byte round = ROUNDS-1

expandedKey += BLOCKSIZE * ROUNDS

XORBytes( block, expandedKey, 16 )

expandedKey -= BLOCKSIZE

do {

InvShiftRows( block )

InvSubBytesAndXOR( block, expandedKey, 16 )

expandedKey -= BLOCKSIZE

InvMixColumns( block )

} while( --round )

InvShiftRows( block )

InvSubBytesAndXOR( block, expandedKey, 16 )

}

void Cipher( byte * block, byte * expandedKey )//完成一个块(16字节,128bit)的加密

{

byte round = ROUNDS-1

XORBytes( block, expandedKey, 16 )

expandedKey += BLOCKSIZE

do {

SubBytes( block, 16 )

ShiftRows( block )

MixColumns( block )

XORBytes( block, expandedKey, 16 )

expandedKey += BLOCKSIZE

} while( --round )

SubBytes( block, 16 )

ShiftRows( block )

XORBytes( block, expandedKey, 16 )

}

void aesInit( unsigned char * tempbuf )

{

powTbl = block1

logTbl = block2

CalcPowLog( powTbl, logTbl )

sBox = tempbuf

CalcSBox( sBox )

expandedKey = block1 //至此block1用来存贮密码表

KeyExpansion( expandedKey )

sBoxInv = block2// Must be block2. block2至此开始只用来存贮SBOXINV

CalcSBoxInv( sBox, sBoxInv )

}

//对一个16字节块解密,参数buffer是解密密缓存,chainBlock是要解密的块

void aesDecrypt( unsigned char * buffer, unsigned char * chainBlock )

{

//byte xdata temp[ BLOCKSIZE ]

//CopyBytes( temp, buffer, BLOCKSIZE )

CopyBytes(buffer,chainBlock,BLOCKSIZE)

InvCipher( buffer, expandedKey )

//XORBytes( buffer, chainBlock, BLOCKSIZE )

CopyBytes( chainBlock, buffer, BLOCKSIZE )

}

//对一个16字节块完成加密,参数buffer是加密缓存,chainBlock是要加密的块

void aesEncrypt( unsigned char * buffer, unsigned char * chainBlock )

{

CopyBytes( buffer, chainBlock, BLOCKSIZE )

//XORBytes( buffer, chainBlock, BLOCKSIZE )

Cipher( buffer, expandedKey )

CopyBytes( chainBlock, buffer, BLOCKSIZE )

}

//加解密函数,参数为加解密标志,要加解密的数据缓存起始指针,要加解密的数据长度(如果解密运算,必须是16的整数倍。)

unsigned char aesBlockDecrypt(bit Direct,unsigned char *ChiperDataBuf,unsigned char DataLen)

{

unsigned char xdata i

unsigned char xdata Blocks

unsigned char xdata sBoxbuf[256]

unsigned char xdata tempbuf[16]

unsigned long int xdata OrignLen=0//未加密数据的原始长度

if(Direct==0)

{

*((unsigned char *)&OrignLen+3)=ChiperDataBuf[0]

*((unsigned char *)&OrignLen+2)=ChiperDataBuf[1]

*((unsigned char *)&OrignLen+1)=ChiperDataBuf[2]

*((unsigned char *)&OrignLen)=ChiperDataBuf[3]

DataLen=DataLen-4

}

else

{

memmove(ChiperDataBuf+4,ChiperDataBuf,DataLen)

OrignLen=DataLen

ChiperDataBuf[0]=OrignLen

ChiperDataBuf[1]=OrignLen>>8

ChiperDataBuf[2]=OrignLen>>16

ChiperDataBuf[3]=OrignLen>>24

}

cleardog()

aesInit(sBoxbuf) //初始化

if(Direct==0)//解密

{

Blocks=DataLen/16

for(i=0i<Blocksi++)

{

cleardog()

aesDecrypt(tempbuf,ChiperDataBuf+4+16*i)

}

memmove(ChiperDataBuf,ChiperDataBuf+4,OrignLen)

cleardog()

return(OrignLen)

}

else//加密

{

if(DataLen%16!=0)

{

Blocks=DataLen/16+1

//memset(ChiperDataBuf+4+Blocks*16-(DataLen%16),0x00,DataLen%16)//不足16字节的块补零处理

}

else

{

Blocks=DataLen/16

}

for(i=0i<Blocksi++)

{

cleardog()

aesEncrypt(tempbuf,ChiperDataBuf+4+16*i)

}

cleardog()

return(Blocks*16+4)

}

}

//#endif

以上是C文件。以下是头文件

#ifndef AES_H

#define AES_H

extern void aesInit( unsigned char * tempbuf )

extern void aesDecrypt(unsigned char *buffer, unsigned char *chainBlock)

extern void aesEncrypt( unsigned char * buffer, unsigned char * chainBlock )

extern void aesInit( unsigned char * tempbuf )

extern void aesDecrypt( unsigned char * buffer, unsigned char * chainBlock )

extern void aesEncrypt( unsigned char * buffer, unsigned char * chainBlock )

extern unsigned char aesBlockDecrypt(bit Direct,unsigned char *ChiperDataBuf,unsigned char DataLen)

#endif // AES_H

这是我根据网上程序改写的。只支持128位加解密。没有使用占内存很多的查表法。故运算速度会稍慢。


欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/yw/12445181.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2023-05-25
下一篇 2023-05-25

发表评论

登录后才能评论

评论列表(0条)

保存