收藏 分享(赏)

DES算法用C++实现的源代码.doc

上传人:精品资料 文档编号:10307076 上传时间:2019-10-29 格式:DOC 页数:5 大小:44KB
下载 相关 举报
DES算法用C++实现的源代码.doc_第1页
第1页 / 共5页
DES算法用C++实现的源代码.doc_第2页
第2页 / 共5页
DES算法用C++实现的源代码.doc_第3页
第3页 / 共5页
DES算法用C++实现的源代码.doc_第4页
第4页 / 共5页
DES算法用C++实现的源代码.doc_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

1、DES 算法用 C+实现的源代码 用 C+实现的源代码#include “memory.h“#include “stdio.h“enum encrypt,decrypt;/ENCRYPT:加密,DECRYPT :解密void des_run(char out8,char in8,bool type=encrypt);/设置密钥void des_setkey(const char key8);static void f_func(bool in32,const bool ki48);/f 函数static void s_func(bool out32,const bool in48);/s 盒代

2、替/变换static void transform(bool *out, bool *in, const char *table, int len);static void xor(bool *ina, const bool *inb, int len);/异或static void rotatel(bool *in, int len, int loop);/循环左移/字节组转换成位组static void bytetobit(bool *out,const char *in, int bits);/位组转换成字节组static void bittobyte(char *out, const

3、bool *in, int bits);/置换 IP 表conststatic char ip_table64=58,50,42,34,26,18,10,2,60,52,44,36,28,20,12,4,62,54,46,38,30,22,14,6,64,56,48,40,32,24,16,8,57,49,41,33,25,17,9,1,59,51,43,35,27,19,11,3,61,53,45,37,29,21,13,5,63,55,47,39,31,23,15,7;/逆置换 IP-1 表const static char ipr_table64=40,8,48,16,56,24,64,

4、32,39,7,47,15,55,23,63,31,38,6,46,14,54,22,62,30,37,5,45,13,53,21,61,29,36,4,44,12,52,20,60,28,35,3,43,11, 51,19,59,27,34,2,42,10,50,18,58,26,33,1,41,9,49,17,57,25;/E 位选择表static const char e_table48=32,1, 2, 3, 4, 5,4, 5, 6, 7, 8, 9,8, 9, 10,11,12,13,12,13,14,15,16,17,16,17,18,19,20,21,20,21,22,23,2

5、4,25,24,25,26,27,28,29,28,29,30,31,32,1;/P 换位表const static char p_table32=16,7,20,21,29,12,28,17,1,15,23,26,5,18,31,10,2,8,24,14,32,27,3,9,19,13,30,6,22,11,4,25;/pc1 选位表const static char pc1_table56=57,49,41,33,25,17,9,1,58,50,42,34,26,18,10,2,59,51,43,35,27,19,11,3,60,52,44,36,63,55,47,39,31,23,15,

6、7,62,54,46,38,30,22,14,6,61,53,45,37,29,21,13,5,28,20,12,4;/pc2 选位表const static char pc2_table48=14,17,11,24,1,5,3,28,15,6,21,10,23,19,12,4,26,8,16,7,27,20,13,2,41,52,31,37,47,55,30,40,51,45,33,48,44,49,39,56,34,53,46,42,50,36,29,32;/左移位数表const static char loop_table16=1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,

7、1;/S 盒const static char s_box8416=/s114, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7,0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8,4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0,15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13,/s215, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5

8、, 10,3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5,0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15,13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9,/s310, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8,13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1,13, 6, 4, 9, 8, 15, 3, 0, 1

9、1, 1, 2, 12, 5, 10, 14, 7,1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12,/s47, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15,13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9,10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4,3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14,/s52,

10、12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9,14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6,4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14,11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3,/s612, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11,10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13

11、, 14, 0, 11, 3, 8,9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6,4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13,/s74, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1,13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6,1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2,6, 11, 13, 8,

12、1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12,/s813, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7,1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2,7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8,2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11;static bool subkey1648;/16 圈子密钥void des_run(ch

13、ar out8,char in8, bool type)static bool m64,tmp32,*li=bytetobit(m,in,64);transform(m,m,ip_table,64);if(type=encrypt)for(int i=0;i=0;i-)memcpy(tmp,li,32);f_func(li,subkeyi);xor(li,ri,32);memcpy(ri,tmp,32);transform(m,m,ipr_table,64);bittobyte(out,m,64);void des_setkey(const char key8)static bool k64,

14、 *kl=bytetobit(k,key,64);transform(k,k,pc1_table,56);for(int i=0;i(i%8) void bittobyte(char *out,const bool *in,int bits)memset(out,0,(bits+7)/8);for(int i=0;ibits;i+)outi/8|=ini(i%8);void main()char key8=p,r,o,g,r,a,m,str8;puts(“*DES*“);printf(“n“);printf(“n“);puts(“please input your words“);gets(str);printf(“n“);puts(“*“);des_setkey(key);des_run(str,str,encrypt);puts(“after encrypting:“);puts(str);printf(“n“);puts(“*“);puts(“after decrypting:“);des_run(str,str,decrypt);puts(str);printf(“n“);puts(“*“);printf(“n“);

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 企业管理 > 管理学资料

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报