無線區域網產品使用的SMS4密碼演算法及其實現
cnbragon發表於2007-02-24
SMS4演算法由國家商用密碼管理辦公室釋出,其演算法的介紹可以從國家商用密碼管理辦公室的網站上下載到:
http://www.oscca.gov.cn/Doc/6/News_1106.htm
我花了點時間,簡單的實現了這個演算法,程式碼如下:
其中有不少程式碼是可以進一步最佳化以提高速度的,比如 i%4 => i&3 ; i*8 => i << 3
#include <stdio.h>
#define ROUND 32
static unsigned long FK[4]={
0xA3B1BAC6,0x56AA3350,0x677D9197,0xB27022DC
};
static unsigned long CK[ROUND]={
0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269,
0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9,
0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249,
0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9,
0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229,
0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,
0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209,
0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279
};
static unsigned char Sbox[256]={
0xd6,0x90,0xe9,0xfe,0xcc,0xe1,0x3d,0xb7,0x16,0xb6,0x14,0xc2,0x28,0xfb,0x2c,0x05,
0x2b,0x67,0x9a,0x76,0x2a,0xbe,0x04,0xc3,0xaa,0x44,0x13,0x26,0x49,0x86,0x06,0x99,
0x9c,0x42,0x50,0xf4,0x91,0xef,0x98,0x7a,0x33,0x54,0x0b,0x43,0xed,0xcf,0xac,0x62,
0xe4,0xb3,0x1c,0xa9,0xc9,0x08,0xe8,0x95,0x80,0xdf,0x94,0xfa,0x75,0x8f,0x3f,0xa6,
0x47,0x07,0xa7,0xfc,0xf3,0x73,0x17,0xba,0x83,0x59,0x3c,0x19,0xe6,0x85,0x4f,0xa8,
0x68,0x6b,0x81,0xb2,0x71,0x64,0xda,0x8b,0xf8,0xeb,0x0f,0x4b,0x70,0x56,0x9d,0x35,
0x1e,0x24,0x0e,0x5e,0x63,0x58,0xd1,0xa2,0x25,0x22,0x7c,0x3b,0x01,0x21,0x78,0x87,
0xd4,0x00,0x46,0x57,0x9f,0xd3,0x27,0x52,0x4c,0x36,0x02,0xe7,0xa0,0xc4,0xc8,0x9e,
0xea,0xbf,0x8a,0xd2,0x40,0xc7,0x38,0xb5,0xa3,0xf7,0xf2,0xce,0xf9,0x61,0x15,0xa1,
0xe0,0xae,0x5d,0xa4,0x9b,0x34,0x1a,0x55,0xad,0x93,0x32,0x30,0xf5,0x8c,0xb1,0xe3,
0x1d,0xf6,0xe2,0x2e,0x82,0x66,0xca,0x60,0xc0,0x29,0x23,0xab,0x0d,0x53,0x4e,0x6f,
0xd5,0xdb,0x37,0x45,0xde,0xfd,0x8e,0x2f,0x03,0xff,0x6a,0x72,0x6d,0x6c,0x5b,0x51,
0x8d,0x1b,0xaf,0x92,0xbb,0xdd,0xbc,0x7f,0x11,0xd9,0x5c,0x41,0x1f,0x10,0x5a,0xd8,
0x0a,0xc1,0x31,0x88,0xa5,0xcd,0x7b,0xbd,0x2d,0x74,0xd0,0x12,0xb8,0xe5,0xb4,0xb0,
0x89,0x69,0x97,0x4a,0x0c,0x96,0x77,0x7e,0x65,0xb9,0xf1,0x09,0xc5,0x6e,0xc6,0x84,
0x18,0xf0,0x7d,0xec,0x3a,0xdc,0x4d,0x20,0x79,0xee,0x5f,0x3e,0xd7,0xcb,0x39,0x48
};
#define ROL(x,y) ((x)<<(y) | (x)>>(32-(y)))
unsigned long T1(unsigned long dwA)
{
unsigned char a0[4]={0};
unsigned char b0[4]={0};
unsigned long dwB=0;
unsigned long dwC=0;
int i=0;
for (i=0;i<4;i++)
{
a0[i] = (dwA>>(i*8)) & 0xff;
b0[i] = Sbox[a0[i]];
dwB |= (b0[i]<<(i*8));
}
dwC=dwB^ROL(dwB,2)^ROL(dwB,10)^ROL(dwB,18)^ROL(dwB,24);
return dwC;
}
unsigned long T2(unsigned long dwA)
{
unsigned char a0[4]={0};
unsigned char b0[4]={0};
unsigned long dwB=0;
unsigned long dwC=0;
int i=0;
for (i=0;i<4;i++)
{
a0[i] = (dwA>>(i*8)) & 0xff;
b0[i] = Sbox[a0[i]];
dwB |= (b0[i]<<(i*8));
}
dwC=dwB^ROL(dwB,13)^ROL(dwB,23);
return dwC;
}
/* MK[4] is the Encrypt Key, rk[32] is Round Key */
void Key_Expansion(unsigned long MK[], unsigned long rk[])
{
unsigned long K[4]={0};
int i=0;
for (i=0;i<4;i++)
{
K[i] = MK[i] ^ FK[i];
}
for (i=0;i<ROUND;i++)
{
K[i%4]^=T2(K[(i+1)%4]^K[(i+2)%4]^K[(i+3)%4]^CK[i]);
rk[i]=K[i%4];
}
}
/* X[4] is PlainText, rk[32] is round Key, Y[4] is CipherText */
void ECB_Encryption(unsigned long X[], unsigned long rk[], unsigned long Y[])
{
unsigned long tempX[4]={0};
int i=0;
for (i=0;i<4;i++)
{
tempX[i]=X[i];
}
for (i=0;i<ROUND;i++)
{
tempX[i%4]^=T1(tempX[(i+1)%4]^tempX[(i+2)%4]^tempX[(i+3)%4]^rk[i]);
}
for (i=0;i<4;i++)
{
Y[i]=tempX[3-i];
}
}
/* X[4] is PlainText, rk[32] is round Key, Y[4] is CipherText */
void ECB_Decryption(unsigned long X[], unsigned long rk[], unsigned long Y[])
{
unsigned long tempX[4]={0};
int i=0;
for (i=0;i<4;i++)
{
tempX[i]=X[i];
}
for (i=0;i<ROUND;i++)
{
tempX[i%4]^=T1(tempX[(i+1)%4]^tempX[(i+2)%4]^tempX[(i+3)%4]^rk[(31-i)]);
}
for (i=0;i<4;i++)
{
Y[i]=tempX[3-i];
}
}
void main()
{
unsigned long key[4]={0x01234567,0x89abcdef,0xfedcba98,0x76543210};
unsigned long roundkey[32]={0};
unsigned long plaintext[4]={0x01234567,0x89abcdef,0xfedcba98,0x76543210};
unsigned long ciphertext[4]={0};
unsigned long test[4]={0};
int i=0;
int j=0;
Key_Expansion(key,roundkey);
for (i=0;i<ROUND;i++)
{
printf("rk[ %d ] = %08x ", i,roundkey[i]);
}
printf("Encrypt: ");
ECB_Encryption(plaintext,roundkey,ciphertext);
for (i=0;i<4;i++)
{
printf("X[ %d ] = %08x ", i,ciphertext[i]);
}
printf("Decrypt: ");
ECB_Decryption(ciphertext,roundkey,test);
for (i=0;i<4;i++)
{
printf("X[ %d ] = %08x ", i,test[i]);
}
printf("Encrypt 1000000 times: ");
for (i=0;i<1000000;i++)
{
ECB_Encryption(plaintext,roundkey,ciphertext);
for (j=0;j<4;j++)
{
plaintext[j]=ciphertext[j];
}
}
for (i=0;i<4;i++)
{
printf("Y[ %d ] = %08x ",i,ciphertext[i]);
}
}
#define ROUND 32
static unsigned long FK[4]={
0xA3B1BAC6,0x56AA3350,0x677D9197,0xB27022DC
};
static unsigned long CK[ROUND]={
0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269,
0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9,
0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249,
0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9,
0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229,
0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299,
0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209,
0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279
};
static unsigned char Sbox[256]={
0xd6,0x90,0xe9,0xfe,0xcc,0xe1,0x3d,0xb7,0x16,0xb6,0x14,0xc2,0x28,0xfb,0x2c,0x05,
0x2b,0x67,0x9a,0x76,0x2a,0xbe,0x04,0xc3,0xaa,0x44,0x13,0x26,0x49,0x86,0x06,0x99,
0x9c,0x42,0x50,0xf4,0x91,0xef,0x98,0x7a,0x33,0x54,0x0b,0x43,0xed,0xcf,0xac,0x62,
0xe4,0xb3,0x1c,0xa9,0xc9,0x08,0xe8,0x95,0x80,0xdf,0x94,0xfa,0x75,0x8f,0x3f,0xa6,
0x47,0x07,0xa7,0xfc,0xf3,0x73,0x17,0xba,0x83,0x59,0x3c,0x19,0xe6,0x85,0x4f,0xa8,
0x68,0x6b,0x81,0xb2,0x71,0x64,0xda,0x8b,0xf8,0xeb,0x0f,0x4b,0x70,0x56,0x9d,0x35,
0x1e,0x24,0x0e,0x5e,0x63,0x58,0xd1,0xa2,0x25,0x22,0x7c,0x3b,0x01,0x21,0x78,0x87,
0xd4,0x00,0x46,0x57,0x9f,0xd3,0x27,0x52,0x4c,0x36,0x02,0xe7,0xa0,0xc4,0xc8,0x9e,
0xea,0xbf,0x8a,0xd2,0x40,0xc7,0x38,0xb5,0xa3,0xf7,0xf2,0xce,0xf9,0x61,0x15,0xa1,
0xe0,0xae,0x5d,0xa4,0x9b,0x34,0x1a,0x55,0xad,0x93,0x32,0x30,0xf5,0x8c,0xb1,0xe3,
0x1d,0xf6,0xe2,0x2e,0x82,0x66,0xca,0x60,0xc0,0x29,0x23,0xab,0x0d,0x53,0x4e,0x6f,
0xd5,0xdb,0x37,0x45,0xde,0xfd,0x8e,0x2f,0x03,0xff,0x6a,0x72,0x6d,0x6c,0x5b,0x51,
0x8d,0x1b,0xaf,0x92,0xbb,0xdd,0xbc,0x7f,0x11,0xd9,0x5c,0x41,0x1f,0x10,0x5a,0xd8,
0x0a,0xc1,0x31,0x88,0xa5,0xcd,0x7b,0xbd,0x2d,0x74,0xd0,0x12,0xb8,0xe5,0xb4,0xb0,
0x89,0x69,0x97,0x4a,0x0c,0x96,0x77,0x7e,0x65,0xb9,0xf1,0x09,0xc5,0x6e,0xc6,0x84,
0x18,0xf0,0x7d,0xec,0x3a,0xdc,0x4d,0x20,0x79,0xee,0x5f,0x3e,0xd7,0xcb,0x39,0x48
};
#define ROL(x,y) ((x)<<(y) | (x)>>(32-(y)))
unsigned long T1(unsigned long dwA)
{
unsigned char a0[4]={0};
unsigned char b0[4]={0};
unsigned long dwB=0;
unsigned long dwC=0;
int i=0;
for (i=0;i<4;i++)
{
a0[i] = (dwA>>(i*8)) & 0xff;
b0[i] = Sbox[a0[i]];
dwB |= (b0[i]<<(i*8));
}
dwC=dwB^ROL(dwB,2)^ROL(dwB,10)^ROL(dwB,18)^ROL(dwB,24);
return dwC;
}
unsigned long T2(unsigned long dwA)
{
unsigned char a0[4]={0};
unsigned char b0[4]={0};
unsigned long dwB=0;
unsigned long dwC=0;
int i=0;
for (i=0;i<4;i++)
{
a0[i] = (dwA>>(i*8)) & 0xff;
b0[i] = Sbox[a0[i]];
dwB |= (b0[i]<<(i*8));
}
dwC=dwB^ROL(dwB,13)^ROL(dwB,23);
return dwC;
}
/* MK[4] is the Encrypt Key, rk[32] is Round Key */
void Key_Expansion(unsigned long MK[], unsigned long rk[])
{
unsigned long K[4]={0};
int i=0;
for (i=0;i<4;i++)
{
K[i] = MK[i] ^ FK[i];
}
for (i=0;i<ROUND;i++)
{
K[i%4]^=T2(K[(i+1)%4]^K[(i+2)%4]^K[(i+3)%4]^CK[i]);
rk[i]=K[i%4];
}
}
/* X[4] is PlainText, rk[32] is round Key, Y[4] is CipherText */
void ECB_Encryption(unsigned long X[], unsigned long rk[], unsigned long Y[])
{
unsigned long tempX[4]={0};
int i=0;
for (i=0;i<4;i++)
{
tempX[i]=X[i];
}
for (i=0;i<ROUND;i++)
{
tempX[i%4]^=T1(tempX[(i+1)%4]^tempX[(i+2)%4]^tempX[(i+3)%4]^rk[i]);
}
for (i=0;i<4;i++)
{
Y[i]=tempX[3-i];
}
}
/* X[4] is PlainText, rk[32] is round Key, Y[4] is CipherText */
void ECB_Decryption(unsigned long X[], unsigned long rk[], unsigned long Y[])
{
unsigned long tempX[4]={0};
int i=0;
for (i=0;i<4;i++)
{
tempX[i]=X[i];
}
for (i=0;i<ROUND;i++)
{
tempX[i%4]^=T1(tempX[(i+1)%4]^tempX[(i+2)%4]^tempX[(i+3)%4]^rk[(31-i)]);
}
for (i=0;i<4;i++)
{
Y[i]=tempX[3-i];
}
}
void main()
{
unsigned long key[4]={0x01234567,0x89abcdef,0xfedcba98,0x76543210};
unsigned long roundkey[32]={0};
unsigned long plaintext[4]={0x01234567,0x89abcdef,0xfedcba98,0x76543210};
unsigned long ciphertext[4]={0};
unsigned long test[4]={0};
int i=0;
int j=0;
Key_Expansion(key,roundkey);
for (i=0;i<ROUND;i++)
{
printf("rk[ %d ] = %08x ", i,roundkey[i]);
}
printf("Encrypt: ");
ECB_Encryption(plaintext,roundkey,ciphertext);
for (i=0;i<4;i++)
{
printf("X[ %d ] = %08x ", i,ciphertext[i]);
}
printf("Decrypt: ");
ECB_Decryption(ciphertext,roundkey,test);
for (i=0;i<4;i++)
{
printf("X[ %d ] = %08x ", i,test[i]);
}
printf("Encrypt 1000000 times: ");
for (i=0;i<1000000;i++)
{
ECB_Encryption(plaintext,roundkey,ciphertext);
for (j=0;j<4;j++)
{
plaintext[j]=ciphertext[j];
}
}
for (i=0;i<4;i++)
{
printf("Y[ %d ] = %08x ",i,ciphertext[i]);
}
}
相關文章
- 元件無線區域網2024-04-04元件
- 嵌入式無線區域網裝置的設計與實現2017-07-03
- 【專案原始碼】- 【區域網聊天】android實現區域網聊天 - UDP實現2016-05-03原始碼AndroidUDP
- 區域網密碼嗅探器 官網2007-07-27密碼
- 區域網無線無紙化會議選擇什麼軟體實現互動?2021-07-07
- 企業無線覆蓋,企業無線網路,辦公無線區域網方案2019-11-19
- 線性表及其演算法(java實現)2019-01-19演算法Java
- 使用Hive中自定義UDAF函式實現統計區域產品使用者訪問排名2018-01-26Hive函式
- win10找回無線網路密碼的方法_win10如何檢視無線網路密碼2020-04-16Win10密碼
- 區域網訪問共享檔案需要密碼怎麼辦?取消區域網共享檔案訪問密碼的方法2019-04-09密碼
- 無線AP以及其與無線路由器的區別2022-11-09路由器
- 無線網怎麼設定密碼2017-01-16密碼
- (二)區塊鏈的共識演算法:PoS 及其 例子 程式碼 實現2018-09-10區塊鏈演算法
- Win10系統怎麼修改無線網路密碼_win10修改無線網路密碼的方法2019-12-13Win10密碼
- 為什麼使用Redis及其產品定位2014-08-27Redis
- 無線wifi密碼的破解2013-11-24WiFi密碼
- 無線路由器接入區域網的三種方式2020-12-10路由器
- win10區域網設定密碼如何設定 win10區域網怎麼設定訪問密碼2020-09-28Win10密碼
- 無程式碼快速實現自動填寫產品單價功能2020-09-30
- win10 怎麼查無線密碼_win10系統如何看無線網密碼2020-03-18Win10密碼
- win10 無線密碼怎麼檢視_win10如何檢視無線網密碼2020-08-22Win10密碼
- 區域網內無線DDoS攻擊策略及概述2016-08-18
- 無線區域網標準、技術的發展、應用2008-05-23
- 完成無線區域網路搭建構架的六要素(轉)2007-08-13
- 企業網盤實現區域網共享2021-06-24
- 小米路由器配合微信實現無需密碼連線wifi的方法2016-06-10路由器密碼WiFi
- Windows 7 下檢視無線網路密碼2016-09-07Windows密碼
- 如何實現 SSH 無密碼登入2015-05-14密碼
- 線性表及其實現2018-10-30
- Java實現區域網內單播2014-03-19Java
- 區域網實現VLAN例項(轉)2007-08-11
- win7 或 win8 建立無線區域網2013-11-14Win7
- Python攻防-暴力破解附近區域網WIFI密碼2022-04-28PythonWiFi密碼
- 最常見的7種無線區域網安全威脅詳解!2022-11-30
- WLAN無線區域網安全技術的選用及發展2007-09-14
- 組網例項:無線區域網WLAN企業應用(轉)2007-08-13
- 網際網路產品使用者研究的四大誤區2014-02-02
- 一線備份軟體廠商及其產品簡介2009-09-27