AES分组加密使用示例
示例1
/*
tomcrypt(http://libtomcrypt.org/)
aes分段加密演示。使用前 #include <tomcrypt.h>
AES,分段长度16,密钥最大长度32
还支持以下各种分段加密方式,其分段长度和密钥长度参考 crypt.pdf 21页
Blowfish
XTEA
RC5
RC6
SAFER+
Rijndael (aka AES)
Twofish
SAFER (K64, SK64, K128, SK128)
RC2
DES, 3DES
CAST5
Noekeon
Skipjack
Anubis (with optional tweak as proposed by the developers)
Khazad
使用其他加密方式只要将下面aes开头的函数名换成对应的开头
例如des使用的函数是 des_setup,des_ecb_encrypt,des_ecb_decrypt
更详细的内容看 crypt.pdf第三章 以及 tomcrypt_cipher.h */
/*
下面的程序实现的功能:
将字符串c1用aes方法加密放在c2,再解密放在c3,密钥是myKey */
unsigned char myKey[32]="这里是你的密钥,不要超过32字节";
symmetric_key skey;//加密状态,各类对称加密函数都需要
aes_setup(myKey, 32, 0, &skey);
//加密前初始化状态(密钥,密钥长度,迭代次数(0:使用推荐值),加密状态 )
unsigned char c1[32]="这里是你需要加密的字符,长度任意";//随便取一个字符串
unsigned char c2[32];//输出长度>=输入长度,分段长度的倍数(这里就是16的倍数)
//分段加密,每段长度为16,(一般不可能只有2段,自己写循环吧)
aes_ecb_encrypt(&c1[0], &c2[0],&skey);
aes_ecb_encrypt(&c1[16], &c2[16],&skey);
unsigned char c3[32];
aes_setup(myKey, 32, 0, &skey);
//解密前初始化状态,其实和加密的状态是完全一致的
//分段解密
aes_ecb_decrypt(&c2[0], &c3[0],&skey);
aes_ecb_decrypt(&c2[16], &c3[16],&skey);
/*
如以上内容有错误,或有疑问——————>[email protected] */
示例2
#include <openssl/aes.h>
#include <stdio.h>
#include <stdlib.h>
typedef unsigned char uchar;
// Fill in actual key here
static const uchar ckey[] = "\x12\x12";
void print(const char *str, uchar *in, uchar *out)
{
// Print in hex because encrypted data is not always ASCII-friendly ;-)
int i;
printf("%s\n", str);
printf("Input:\t");
for (i = 0; i < AES_BLOCK_SIZE; i++)
printf("%x", in[i]);
printf("\n");
printf("Output:\t");
for (i = 0; i < AES_BLOCK_SIZE; i++)
printf("%x", out[i]);
printf("\n\n");
}
void Encrypt(uchar *in, uchar *out, int debug)
{
static int firstRun = 1;
static AES_KEY encryptKey;
if (firstRun == 1)
{
AES_set_encrypt_key(ckey, 256, &encryptKey);
firstRun = 0;
}
AES_ecb_encrypt(in, out, &encryptKey, AES_ENCRYPT);
if (debug)
print("Encryption:", in, out);
}
void Decrypt(uchar *in, uchar *out, int debug)
{
static int firstRun = 1;
static AES_KEY decryptKey;
if (firstRun == 1)
{
AES_set_decrypt_key(ckey, 256, &decryptKey);
firstRun = 0;
}
AES_ecb_encrypt(in, out, &decryptKey, AES_DECRYPT);
if (debug)
print("Decryption:", in, out);
}
void Encrypt32(uchar *in, uchar *out, int debug)
{
static int firstRun = 1;
static AES_KEY encryptKey;
if (firstRun == 1)
{
AES_set_encrypt_key(ckey, 256, &encryptKey);
firstRun = 0;
}
AES_ecb_encrypt(in, out, &encryptKey, AES_ENCRYPT);
AES_ecb_encrypt(&in[AES_BLOCK_SIZE], &out[AES_BLOCK_SIZE], &encryptKey, AES_ENCRYPT);
if (debug)
print("Encryption:", in, out);
}
void Decrypt32(uchar *in, uchar *out, int debug)
{
static int firstRun = 1;
static AES_KEY decryptKey;
if (firstRun == 1)
{
AES_set_decrypt_key(ckey, 256, &decryptKey);
firstRun = 0;
}
AES_ecb_encrypt(in, out, &decryptKey, AES_DECRYPT);
AES_ecb_encrypt(&in[AES_BLOCK_SIZE], &out[AES_BLOCK_SIZE], &decryptKey, AES_DECRYPT);
if (debug)
print("Decryption:", in, out);
}
// Test client
int main(int argc, char **argv)
{
int BLOCKS = 1e6, PRINT = 0, i;
argc--; argv++;
while (argc > 0)
{
if ((*argv)[0] == '-')
{
if (!strcmp(*argv, "-help")) { printf("Usage: AES [-trials N] [-print]"); exit(0); }
else if (!strcmp(*argv, "-trials")) { argc--; argv++; BLOCKS = atoi(*argv); }
else if (!strcmp(*argv, "-print")) { PRINT = 1; }
else { fprintf(stderr, "Invalid program argument: %s", *argv); exit(0); }
}
argv++;
argc--;
}
// Sample input
uchar in[2 * AES_BLOCK_SIZE] = "helloworld1234\nhelloworld1234\n";
uchar out[2 * AES_BLOCK_SIZE];
printf("Running %d trials...\n", BLOCKS);
// Run trials
for (i = 0; i < BLOCKS; i++)
{
Encrypt32(in, out, PRINT);
Decrypt32(out, in, PRINT);
}
printf("Completed encryption and decryption of %d blocks.\n", BLOCKS);
return 0;
}
示例3
/* nettle-openssl.c
*
* Glue that's used only by the benchmark, and subject to change.
*/
/* nettle, low-level cryptographics library
*
* Copyright (C) 2002 Niels M�ller
*
* The nettle library is free software; you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation; either version 2.1 of the License, or (at your
* option) any later version.
*
* The nettle library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with the nettle library; see the file COPYING.LIB. If not, write to
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
* MA 02111-1307, USA.
*/
#if HAVE_CONFIG_H
# include "config.h"
#endif
/* Openssl glue, for comparative benchmarking only */
#if WITH_OPENSSL
/* No ancient ssleay compatibility */
#define NCOMPAT
#define OPENSSL_DISABLE_OLD_DES_SUPPORT
#include <assert.h>
#include <openssl/aes.h>
#include <openssl/blowfish.h>
#include <openssl/des.h>
#include <openssl/cast.h>
#include <openssl/rc4.h>
#include <openssl/md5.h>
#include <openssl/sha.h>
#include "nettle-internal.h"
/* AES */
static nettle_set_key_func openssl_aes_set_encrypt_key;
static void
openssl_aes_set_encrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
AES_set_encrypt_key(key, length * 8, ctx);
}
static nettle_set_key_func openssl_aes_set_decrypt_key;
static void
openssl_aes_set_decrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
AES_set_decrypt_key(key, length * 8, ctx);
}
static nettle_crypt_func openssl_aes_encrypt;
static void
openssl_aes_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % AES_BLOCK_SIZE));
while (length)
{
AES_ecb_encrypt(src, dst, ctx, AES_ENCRYPT);
length -= AES_BLOCK_SIZE;
dst += AES_BLOCK_SIZE;
src += AES_BLOCK_SIZE;
}
}
static nettle_crypt_func openssl_aes_decrypt;
static void
openssl_aes_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % AES_BLOCK_SIZE));
while (length)
{
AES_ecb_encrypt(src, dst, ctx, AES_DECRYPT);
length -= AES_BLOCK_SIZE;
dst += AES_BLOCK_SIZE;
src += AES_BLOCK_SIZE;
}
}
const struct nettle_cipher
nettle_openssl_aes128 = {
"openssl aes128", sizeof(AES_KEY),
16, 16,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
const struct nettle_cipher
nettle_openssl_aes192 = {
"openssl aes192", sizeof(AES_KEY),
/* Claim no block size, so that the benchmark doesn't try CBC mode
* (as openssl cipher + nettle cbc is somewhat pointless to
* benchmark). */
16, 24,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
const struct nettle_cipher
nettle_openssl_aes256 = {
"openssl aes256", sizeof(AES_KEY),
/* Claim no block size, so that the benchmark doesn't try CBC mode
* (as openssl cipher + nettle cbc is somewhat pointless to
* benchmark). */
16, 32,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
/* Arcfour */
static nettle_set_key_func openssl_arcfour_set_key;
static void
openssl_arcfour_set_key(void *ctx, unsigned length, const uint8_t *key)
{
RC4_set_key(ctx, length, key);
}
static nettle_crypt_func openssl_arcfour_crypt;
static void
openssl_arcfour_crypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
RC4(ctx, length, src, dst);
}
const struct nettle_cipher
nettle_openssl_arcfour128 = {
"openssl arcfour128", sizeof(RC4_KEY),
0, 16,
openssl_arcfour_set_key, openssl_arcfour_set_key,
openssl_arcfour_crypt, openssl_arcfour_crypt
};
/* Blowfish */
static nettle_set_key_func openssl_bf_set_key;
static void
openssl_bf_set_key(void *ctx, unsigned length, const uint8_t *key)
{
BF_set_key(ctx, length, key);
}
static nettle_crypt_func openssl_bf_encrypt;
static void
openssl_bf_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % BF_BLOCK));
while (length)
{
BF_ecb_encrypt(src, dst, ctx, BF_ENCRYPT);
length -= BF_BLOCK;
dst += BF_BLOCK;
src += BF_BLOCK;
}
}
static nettle_crypt_func openssl_bf_decrypt;
static void
openssl_bf_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % BF_BLOCK));
while (length)
{
BF_ecb_encrypt(src, dst, ctx, BF_DECRYPT);
length -= BF_BLOCK;
dst += BF_BLOCK;
src += BF_BLOCK;
}
}
const struct nettle_cipher
nettle_openssl_blowfish128 = {
"openssl bf128", sizeof(BF_KEY),
8, 16,
openssl_bf_set_key, openssl_bf_set_key,
openssl_bf_encrypt, openssl_bf_decrypt
};
/* DES */
static nettle_set_key_func openssl_des_set_key;
static void
openssl_des_set_key(void *ctx, unsigned length, const uint8_t *key)
{
assert(length == 8);
/* Not sure what "unchecked" means. We want to ignore parity bits,
but it would still make sense to check for weak keys. */
/* Explicit cast used as I don't want to care about openssl's broken
array typedefs DES_cblock and const_DES_cblock. */
DES_set_key_unchecked( (void *) key, ctx);
}
#define DES_BLOCK_SIZE 8
static nettle_crypt_func openssl_des_encrypt;
static void
openssl_des_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % DES_BLOCK_SIZE));
while (length)
{
DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_ENCRYPT);
length -= DES_BLOCK_SIZE;
dst += DES_BLOCK_SIZE;
src += DES_BLOCK_SIZE;
}
}
static nettle_crypt_func openssl_des_decrypt;
static void
openssl_des_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % DES_BLOCK_SIZE));
while (length)
{
DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_DECRYPT);
length -= DES_BLOCK_SIZE;
dst += DES_BLOCK_SIZE;
src += DES_BLOCK_SIZE;
}
}
const struct nettle_cipher
nettle_openssl_des = {
"openssl des", sizeof(DES_key_schedule),
8, 8,
openssl_des_set_key, openssl_des_set_key,
openssl_des_encrypt, openssl_des_decrypt
};
/* Cast128 */
static nettle_set_key_func openssl_cast_set_key;
static void
openssl_cast_set_key(void *ctx, unsigned length, const uint8_t *key)
{
CAST_set_key(ctx, length, key);
}
static nettle_crypt_func openssl_cast_encrypt;
static void
openssl_cast_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % CAST_BLOCK));
while (length)
{
CAST_ecb_encrypt(src, dst, ctx, CAST_ENCRYPT);
length -= CAST_BLOCK;
dst += CAST_BLOCK;
src += CAST_BLOCK;
}
}
static nettle_crypt_func openssl_cast_decrypt;
static void
openssl_cast_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % CAST_BLOCK));
while (length)
{
CAST_ecb_encrypt(src, dst, ctx, CAST_DECRYPT);
length -= CAST_BLOCK;
dst += CAST_BLOCK;
src += CAST_BLOCK;
}
}
const struct nettle_cipher
nettle_openssl_cast128 = {
"openssl cast128", sizeof(CAST_KEY),
8, CAST_KEY_LENGTH,
openssl_cast_set_key, openssl_cast_set_key,
openssl_cast_encrypt, openssl_cast_decrypt
};
/* Hash functions */
/* md5 */
static nettle_hash_init_func openssl_md5_init;
static void
openssl_md5_init(void *ctx)
{
MD5_Init(ctx);
}
static nettle_hash_update_func openssl_md5_update;
static void
openssl_md5_update(void *ctx,
unsigned length,
const uint8_t *src)
{
MD5_Update(ctx, src, length);
}
static nettle_hash_digest_func openssl_md5_digest;
static void
openssl_md5_digest(void *ctx,
unsigned length, uint8_t *dst)
{
assert(length == SHA_DIGEST_LENGTH);
MD5_Final(dst, ctx);
MD5_Init(ctx);
}
const struct nettle_hash
nettle_openssl_md5 = {
"openssl md5", sizeof(SHA_CTX),
SHA_DIGEST_LENGTH, SHA_CBLOCK,
openssl_md5_init,
openssl_md5_update,
openssl_md5_digest
};
/* sha1 */
static nettle_hash_init_func openssl_sha1_init;
static void
openssl_sha1_init(void *ctx)
{
SHA1_Init(ctx);
}
static nettle_hash_update_func openssl_sha1_update;
static void
openssl_sha1_update(void *ctx,
unsigned length,
const uint8_t *src)
{
SHA1_Update(ctx, src, length);
}
static nettle_hash_digest_func openssl_sha1_digest;
static void
openssl_sha1_digest(void *ctx,
unsigned length, uint8_t *dst)
{
assert(length == SHA_DIGEST_LENGTH);
SHA1_Final(dst, ctx);
SHA1_Init(ctx);
}
const struct nettle_hash
nettle_openssl_sha1 = {
"openssl sha1", sizeof(SHA_CTX),
SHA_DIGEST_LENGTH, SHA_CBLOCK,
openssl_sha1_init,
openssl_sha1_update,
openssl_sha1_digest
};
#endif /* WITH_OPENSSL */
原文
http://read.pudn.com/downloads69/sourcecode/windows/file/246969/Rinick's%20sample/aes.cpp__.htm
http://git.lysator.liu.se/nettle/nettle/blobs/raw/8b23832a9e531bc67875f0f7514ab06e45a0cffa/examples/nettle-openssl.c
https://github.com/jrupac/AES/blob/master/AES.c