AES分组加密使用示例-程序员宅基地

技术标签: git  操作系统  

AES分组加密使用示例

示例1

/* 

tomcrypt(http://libtomcrypt.org/) 

aes分段加密演示。使用前 #include <tomcrypt.h> 

AES,分段长度16,密钥最大长度32 

还支持以下各种分段加密方式,其分段长度和密钥长度参考 crypt.pdf 21页 

Blowfish  

XTEA  

RC5  

RC6  

SAFER+  

Rijndael (aka AES)  

Twofish  

SAFER (K64, SK64, K128, SK128)  

RC2  

DES, 3DES  

CAST5  

Noekeon  

Skipjack  

Anubis (with optional tweak as proposed by the developers)  

Khazad 

使用其他加密方式只要将下面aes开头的函数名换成对应的开头 

例如des使用的函数是 des_setup,des_ecb_encrypt,des_ecb_decrypt 

更详细的内容看 crypt.pdf第三章 以及 tomcrypt_cipher.h  */  

/* 

下面的程序实现的功能: 

将字符串c1aes方法加密放在c2,再解密放在c3,密钥是myKey  */  

unsigned char myKey[32]="这里是你的密钥,不要超过32字节";  

symmetric_key skey;//加密状态,各类对称加密函数都需要  

aes_setup(myKey, 32, 0, &skey);  

//加密前初始化状态(密钥,密钥长度,迭代次数(0:使用推荐值),加密状态 )  

unsigned char c1[32]="这里是你需要加密的字符,长度任意";//随便取一个字符串  

unsigned char c2[32];//输出长度>=输入长度,分段长度的倍数(这里就是16的倍数)  

//分段加密,每段长度为16,(一般不可能只有2段,自己写循环吧)  

aes_ecb_encrypt(&c1[0], &c2[0],&skey);  

aes_ecb_encrypt(&c1[16], &c2[16],&skey);  

unsigned char c3[32];  

aes_setup(myKey, 32, 0, &skey);  

//解密前初始化状态,其实和加密的状态是完全一致的  

//分段解密  

aes_ecb_decrypt(&c2[0], &c3[0],&skey);  

aes_ecb_decrypt(&c2[16], &c3[16],&skey);  

/* 

如以上内容有错误,或有疑问——————>[email protected]  */

示例2

#include <openssl/aes.h>
#include <stdio.h>
#include <stdlib.h>

typedef unsigned char uchar;

// Fill in actual key here
static const uchar ckey[] = "\x12\x12";

void print(const char *str, uchar *in, uchar *out)
{
    // Print in hex because encrypted data is not always ASCII-friendly ;-)

    int i;

    printf("%s\n", str);
    printf("Input:\t");
    for (i = 0; i < AES_BLOCK_SIZE; i++)
        printf("%x", in[i]);
    printf("\n");
    printf("Output:\t");
    for (i = 0; i < AES_BLOCK_SIZE; i++)
        printf("%x", out[i]);
    printf("\n\n");
}

void Encrypt(uchar *in, uchar *out, int debug)
{
    static int firstRun = 1;
    static AES_KEY encryptKey;

    if (firstRun == 1)
    {
        AES_set_encrypt_key(ckey, 256, &encryptKey);
        firstRun = 0;
    }

    AES_ecb_encrypt(in, out, &encryptKey, AES_ENCRYPT);

    if (debug)
        print("Encryption:", in, out);
}

void Decrypt(uchar *in, uchar *out, int debug)
{
    static int firstRun = 1;
    static AES_KEY decryptKey;

    if (firstRun == 1)
    {
        AES_set_decrypt_key(ckey, 256, &decryptKey);
        firstRun = 0;
    }

    AES_ecb_encrypt(in, out, &decryptKey, AES_DECRYPT);

    if (debug)
        print("Decryption:", in, out);
}

void Encrypt32(uchar *in, uchar *out, int debug)
{
    static int firstRun = 1;
    static AES_KEY encryptKey;

    if (firstRun == 1)
    {
        AES_set_encrypt_key(ckey, 256, &encryptKey);
        firstRun = 0;
    }   

    AES_ecb_encrypt(in, out, &encryptKey, AES_ENCRYPT);
    AES_ecb_encrypt(&in[AES_BLOCK_SIZE], &out[AES_BLOCK_SIZE], &encryptKey, AES_ENCRYPT);

    if (debug)
        print("Encryption:", in, out);
}

void Decrypt32(uchar *in, uchar *out, int debug)
{
    static int firstRun = 1;
    static AES_KEY decryptKey;

    if (firstRun == 1)
    {
        AES_set_decrypt_key(ckey, 256, &decryptKey);
        firstRun = 0;
    }   

    AES_ecb_encrypt(in, out, &decryptKey, AES_DECRYPT);
    AES_ecb_encrypt(&in[AES_BLOCK_SIZE], &out[AES_BLOCK_SIZE], &decryptKey, AES_DECRYPT);

    if (debug)
        print("Decryption:", in, out);
}

// Test client
int main(int argc, char **argv) 
{
    int BLOCKS = 1e6, PRINT = 0, i;
  
	argc--; argv++;
	while (argc > 0) 
    {
        if ((*argv)[0] == '-') 
        {
            if (!strcmp(*argv, "-help")) { printf("Usage: AES [-trials N] [-print]"); exit(0); }
            else if (!strcmp(*argv, "-trials")) { argc--; argv++; BLOCKS = atoi(*argv); }
            else if (!strcmp(*argv, "-print")) { PRINT = 1; }
            else { fprintf(stderr, "Invalid program argument: %s", *argv); exit(0); }
        }

        argv++; 
        argc--;
	}

    // Sample input
    uchar in[2 * AES_BLOCK_SIZE] = "helloworld1234\nhelloworld1234\n";
    uchar out[2 * AES_BLOCK_SIZE];

    printf("Running %d trials...\n", BLOCKS);

    // Run trials
    for (i = 0; i < BLOCKS; i++)
    {
        Encrypt32(in, out, PRINT);
        Decrypt32(out, in, PRINT);
    }
    
    printf("Completed encryption and decryption of %d blocks.\n", BLOCKS);

    return 0;
}

 

  示例3

/* nettle-openssl.c
 *
 * Glue that's used only by the benchmark, and subject to change.
 */

/* nettle, low-level cryptographics library
 *
 * Copyright (C) 2002 Niels M�ller
 *  
 * The nettle library is free software; you can redistribute it and/or modify
 * it under the terms of the GNU Lesser General Public License as published by
 * the Free Software Foundation; either version 2.1 of the License, or (at your
 * option) any later version.
 * 
 * The nettle library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
 * License for more details.
 * 
 * You should have received a copy of the GNU Lesser General Public License
 * along with the nettle library; see the file COPYING.LIB.  If not, write to
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
 * MA 02111-1307, USA.
 */

#if HAVE_CONFIG_H
# include "config.h"
#endif

/* Openssl glue, for comparative benchmarking only */

#if WITH_OPENSSL

/* No ancient ssleay compatibility */
#define NCOMPAT
#define OPENSSL_DISABLE_OLD_DES_SUPPORT

#include <assert.h>

#include <openssl/aes.h>
#include <openssl/blowfish.h>
#include <openssl/des.h>
#include <openssl/cast.h>
#include <openssl/rc4.h>

#include <openssl/md5.h>
#include <openssl/sha.h>

#include "nettle-internal.h"


/* AES */
static nettle_set_key_func openssl_aes_set_encrypt_key;
static void
openssl_aes_set_encrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
  AES_set_encrypt_key(key, length * 8, ctx);
}

static nettle_set_key_func openssl_aes_set_decrypt_key;
static void
openssl_aes_set_decrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
  AES_set_decrypt_key(key, length * 8, ctx);
}

static nettle_crypt_func openssl_aes_encrypt;
static void
openssl_aes_encrypt(void *ctx, unsigned length,
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % AES_BLOCK_SIZE));
  while (length)
    {
      AES_ecb_encrypt(src, dst, ctx, AES_ENCRYPT);
      length -= AES_BLOCK_SIZE;
      dst += AES_BLOCK_SIZE;
      src += AES_BLOCK_SIZE;
    }
}

static nettle_crypt_func openssl_aes_decrypt;
static void
openssl_aes_decrypt(void *ctx, unsigned length,
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % AES_BLOCK_SIZE));
  while (length)
    {
      AES_ecb_encrypt(src, dst, ctx, AES_DECRYPT);
      length -= AES_BLOCK_SIZE;
      dst += AES_BLOCK_SIZE;
      src += AES_BLOCK_SIZE;
    }
}

const struct nettle_cipher
nettle_openssl_aes128 = {
  "openssl aes128", sizeof(AES_KEY),
  16, 16,
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

const struct nettle_cipher
nettle_openssl_aes192 = {
  "openssl aes192", sizeof(AES_KEY),
  /* Claim no block size, so that the benchmark doesn't try CBC mode
   * (as openssl cipher + nettle cbc is somewhat pointless to
   * benchmark). */
  16, 24,
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

const struct nettle_cipher
nettle_openssl_aes256 = {
  "openssl aes256", sizeof(AES_KEY),
  /* Claim no block size, so that the benchmark doesn't try CBC mode
   * (as openssl cipher + nettle cbc is somewhat pointless to
   * benchmark). */
  16, 32,
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

/* Arcfour */
static nettle_set_key_func openssl_arcfour_set_key;
static void
openssl_arcfour_set_key(void *ctx, unsigned length, const uint8_t *key)
{
  RC4_set_key(ctx, length, key);
}

static nettle_crypt_func openssl_arcfour_crypt;
static void
openssl_arcfour_crypt(void *ctx, unsigned length,
		      uint8_t *dst, const uint8_t *src)
{
  RC4(ctx, length, src, dst);
}

const struct nettle_cipher
nettle_openssl_arcfour128 = {
  "openssl arcfour128", sizeof(RC4_KEY),
  0, 16,
  openssl_arcfour_set_key, openssl_arcfour_set_key,
  openssl_arcfour_crypt, openssl_arcfour_crypt
};

/* Blowfish */
static nettle_set_key_func openssl_bf_set_key;
static void
openssl_bf_set_key(void *ctx, unsigned length, const uint8_t *key)
{
  BF_set_key(ctx, length, key);
}

static nettle_crypt_func openssl_bf_encrypt;
static void
openssl_bf_encrypt(void *ctx, unsigned length,
		   uint8_t *dst, const uint8_t *src)
{
  assert (!(length % BF_BLOCK));
  while (length)
    {
      BF_ecb_encrypt(src, dst, ctx, BF_ENCRYPT);
      length -= BF_BLOCK;
      dst += BF_BLOCK;
      src += BF_BLOCK;
    }
}

static nettle_crypt_func openssl_bf_decrypt;
static void
openssl_bf_decrypt(void *ctx, unsigned length,
		   uint8_t *dst, const uint8_t *src)
{
  assert (!(length % BF_BLOCK));
  while (length)
    {
      BF_ecb_encrypt(src, dst, ctx, BF_DECRYPT);
      length -= BF_BLOCK;
      dst += BF_BLOCK;
      src += BF_BLOCK;
    }
}

const struct nettle_cipher
nettle_openssl_blowfish128 = {
  "openssl bf128", sizeof(BF_KEY),
  8, 16,
  openssl_bf_set_key, openssl_bf_set_key,
  openssl_bf_encrypt, openssl_bf_decrypt
};


/* DES */
static nettle_set_key_func openssl_des_set_key;
static void
openssl_des_set_key(void *ctx, unsigned length, const uint8_t *key)
{
  assert(length == 8);  
  /* Not sure what "unchecked" means. We want to ignore parity bits,
     but it would still make sense to check for weak keys. */
  /* Explicit cast used as I don't want to care about openssl's broken
     array typedefs DES_cblock and const_DES_cblock. */
  DES_set_key_unchecked( (void *) key, ctx);
}

#define DES_BLOCK_SIZE 8

static nettle_crypt_func openssl_des_encrypt;
static void
openssl_des_encrypt(void *ctx, unsigned length,
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % DES_BLOCK_SIZE));
  while (length)
    {
      DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_ENCRYPT);
      length -= DES_BLOCK_SIZE;
      dst += DES_BLOCK_SIZE;
      src += DES_BLOCK_SIZE;
    }
}

static nettle_crypt_func openssl_des_decrypt;
static void
openssl_des_decrypt(void *ctx, unsigned length,
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % DES_BLOCK_SIZE));
  while (length)
    {
      DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_DECRYPT);
      length -= DES_BLOCK_SIZE;
      dst += DES_BLOCK_SIZE;
      src += DES_BLOCK_SIZE;
    }
}

const struct nettle_cipher
nettle_openssl_des = {
  "openssl des", sizeof(DES_key_schedule),
  8, 8,
  openssl_des_set_key, openssl_des_set_key,
  openssl_des_encrypt, openssl_des_decrypt
};


/* Cast128 */
static nettle_set_key_func openssl_cast_set_key;
static void
openssl_cast_set_key(void *ctx, unsigned length, const uint8_t *key)
{
  CAST_set_key(ctx, length, key);
}

static nettle_crypt_func openssl_cast_encrypt;
static void
openssl_cast_encrypt(void *ctx, unsigned length,
		     uint8_t *dst, const uint8_t *src)
{
  assert (!(length % CAST_BLOCK));
  while (length)
    {
      CAST_ecb_encrypt(src, dst, ctx, CAST_ENCRYPT);
      length -= CAST_BLOCK;
      dst += CAST_BLOCK;
      src += CAST_BLOCK;
    }
}

static nettle_crypt_func openssl_cast_decrypt;
static void
openssl_cast_decrypt(void *ctx, unsigned length,
		     uint8_t *dst, const uint8_t *src)
{
  assert (!(length % CAST_BLOCK));
  while (length)
    {
      CAST_ecb_encrypt(src, dst, ctx, CAST_DECRYPT);
      length -= CAST_BLOCK;
      dst += CAST_BLOCK;
      src += CAST_BLOCK;
    }
}

const struct nettle_cipher
nettle_openssl_cast128 = {
  "openssl cast128", sizeof(CAST_KEY),
  8, CAST_KEY_LENGTH,
  openssl_cast_set_key, openssl_cast_set_key,
  openssl_cast_encrypt, openssl_cast_decrypt
};

/* Hash functions */

/* md5 */
static nettle_hash_init_func openssl_md5_init;
static void
openssl_md5_init(void *ctx)
{
  MD5_Init(ctx);
}

static nettle_hash_update_func openssl_md5_update;
static void
openssl_md5_update(void *ctx,
		    unsigned length,
		    const uint8_t *src)
{
  MD5_Update(ctx, src, length);
}

static nettle_hash_digest_func openssl_md5_digest;
static void
openssl_md5_digest(void *ctx,
		    unsigned length, uint8_t *dst)
{
  assert(length == SHA_DIGEST_LENGTH);
  MD5_Final(dst, ctx);
  MD5_Init(ctx);
}

const struct nettle_hash
nettle_openssl_md5 = {
  "openssl md5", sizeof(SHA_CTX),
  SHA_DIGEST_LENGTH, SHA_CBLOCK,
  openssl_md5_init,
  openssl_md5_update,
  openssl_md5_digest
};

/* sha1 */
static nettle_hash_init_func openssl_sha1_init;
static void
openssl_sha1_init(void *ctx)
{
  SHA1_Init(ctx);
}

static nettle_hash_update_func openssl_sha1_update;
static void
openssl_sha1_update(void *ctx,
		    unsigned length,
		    const uint8_t *src)
{
  SHA1_Update(ctx, src, length);
}

static nettle_hash_digest_func openssl_sha1_digest;
static void
openssl_sha1_digest(void *ctx,
		    unsigned length, uint8_t *dst)
{
  assert(length == SHA_DIGEST_LENGTH);
  SHA1_Final(dst, ctx);
  SHA1_Init(ctx);
}

const struct nettle_hash
nettle_openssl_sha1 = {
  "openssl sha1", sizeof(SHA_CTX),
  SHA_DIGEST_LENGTH, SHA_CBLOCK,
  openssl_sha1_init,
  openssl_sha1_update,
  openssl_sha1_digest
};
  
#endif /* WITH_OPENSSL */

 

  

 

原文

http://read.pudn.com/downloads69/sourcecode/windows/file/246969/Rinick's%20sample/aes.cpp__.htm

http://git.lysator.liu.se/nettle/nettle/blobs/raw/8b23832a9e531bc67875f0f7514ab06e45a0cffa/examples/nettle-openssl.c

https://github.com/jrupac/AES/blob/master/AES.c

转载于:https://www.cnblogs.com/mydomain/archive/2013/05/31/3109593.html

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/weixin_30390075/article/details/97100574

智能推荐

QNX screen使用介绍 第四章_qnx screen_set_window_property_iv-程序员宅基地

文章浏览阅读3.9k次。十、screen 剪辑缓冲区当根据需求只需要显示一个指定的区域时,如图所示,可以在一个大的缓冲区中剪辑一个特定的区域用于显示。注意,只能剪辑一个矩形设置窗口缓冲区和源尺寸 int src_size[2] = {1920, 720}; screen_set_window_property_iv(screen_window, SCREEN_PROPERTY_BUFFER_SIZE, src_size); screen_set_window_property_iv(scr.._qnx screen_set_window_property_iv

2.4G WLAN芯片 AR9341 学习笔记_ar9341芯片参数-程序员宅基地

文章浏览阅读7.8k次。【芯片概述】 AR9341是一款用于 2.4GHz 网络的 WLAN 平台芯片,CPU核为 MIPS 74Kc。芯片内置 MAC/PHY 模块,支持 20MHz/144Mbps 传输模式和 40MHz/300Mbps 传输模式,支持从 NOR flash 上启动。除此之外,AR9341还有很多其它内置模块,其系统框图如下:图1 AR9341系统框图 【Datashe_ar9341芯片参数

Waymo无人出租车加州上线一个月,日均156单,还有真·自动驾驶服务-程序员宅基地

文章浏览阅读380次。鱼羊 发自 凹非寺量子位 报道 | 公众号 QbitAIWaymo的RoboTaxi——无人驾驶出租进展怎么样,今天官方给出成绩单。Waymo向加州公共事业委员会(CPU...

三分-程序员宅基地

文章浏览阅读777次。知识点系列之---三分

【冰极峰教程系列之四】:九宫格应用案例--极酷网页播放器-程序员宅基地

文章浏览阅读83次。原创:冰极峰 转载请注明出处 时间:2009年6月29日 8:42:38冰极峰教程系列之一:九宫格基本布局冰极峰教程系列之二:牢不可破的九宫格布局冰极峰教程系列之三:三层分离的完美九宫格冰极峰教程系列之四:九宫格应用案例--极酷网页播放器冰极峰教程系列之五:无hack并支持透明圆角框的全兼容九宫格布局在前面的三篇系列文章中,我对九宫格布局作了详细的介绍。先..._html 9宫格播放器

php实现导出csv文件_php导出csv文件原理-程序员宅基地

文章浏览阅读246次。为何要用csv导出文件呢,因为它小巧,导出数据效率高,万行数据秒级导出。。。不香吗?定义csv文件<?php/** * User : 青草根 * Email : [email protected] * Blog : http://52qcg.cn * QQ : 876146977 * 微 信 : caimh0223 * Date : 2020-05-30 * Time : 14:._php导出csv文件原理

随便推点

9.19-9.21-程序员宅基地

文章浏览阅读82次。6.SELECT *,base_salary+title_salary AS 应发工资,base_salary+title_salary-deduction AS 实发工资 FROM (department AS d INNER JOIN employee AS e ON d.`depid`=e.`depid`) INNER JOIN salary AS s ON e.`empid`=s.`empid`;7.SELECT * FROM employee WHERE employee.`NAME` LIK

RPA学习天地:来也 RPA高阶培训(一)产品基础架构_rpa培训材料-程序员宅基地

文章浏览阅读6.4k次。1.产品概述产品组成分为:Creator(设计器)、Worker(机器人)、Commander(控制平台)和Mage(AI平台)四个主要功能组件。分别为RPA机器人生产、执行、分配、智能化提供相应的工具和平台。Creator(设计器):采用中文可视化界面,同时支持拖拽式低代码或无代码的流程开发以及专业开发模式,支持一键录制流程并自动生成机器人。Worker(机器人):具备人机交互和无人值守两种模式,在人机交互模式下,通过人机协同的方式,完成桌面任务。在无人值守模式下,能够根据 UiBot Com_rpa培训材料

深度学习数据集整理百度云,持续更新!!!!_soda-d数据集下载-程序员宅基地

CASIA-WebFace 是一个脸部数据集,可用于深度学习。该数据集的下载链接为:https://pan.baidu.com/s/1O5QlCTkvkq3mR0lyfNOHuA 提取码:kko7。

腾讯云Elasticsearch集群多可用区容灾实现原理及最佳实践-程序员宅基地

文章浏览阅读895次。导语 | 为了进一步满足腾讯云 Elasticsearch 客户对服务稳定性、集群高可用性等容灾能力的要求。腾讯云 ES 产品提供了跨可用区部署的解决方案,本文将为大家介绍实现原理与实践..._elasticsearch集群如何做到灾备

cv2.threshold() 进行简单的图像分割,构建Mask_python cv.threshold mask-程序员宅基地

文章浏览阅读2.7k次,点赞2次,收藏5次。cv2.threshold() 阈值:使用Python,OpenCV进行简单的图像分割,构建Mask_python cv.threshold mask

用python画关系网络图-使用python画社交网络图实例代码-程序员宅基地

文章浏览阅读2.1k次,点赞3次,收藏7次。在图书馆的检索系统中,关于图书的信息里面有一个是图书相关借阅关系图。跟这个社交网络图是一样的,反映了不同对象间的关联性。利用python画社交网络图使用的库是 networkx,更多关于networkx的介绍与使用大家可以参考这篇文章:https://www.jb51.net/article/159743.htm下面开始本文的正文:import networkx as nximport matpl..._python plt绘制两个群体间的网络关系图

推荐文章

热门文章

相关标签