DES加解密基础实现

DES加解密基础实现

第3章 分组密码.ppt 下载

大概就是各种乱七八糟的盒子换来换去吧。看了点别人的代码,感觉还能写。

funtion.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
"""function"""
# 16轮
MAX_TIME = 16

# IP置换表
ip_table = [58, 50, 42, 34, 26, 18, 10, 2,
60, 52, 44, 36, 28, 20, 12, 4,
62, 54, 46, 38, 30, 22, 14, 6,
64, 56, 48, 40, 32, 24, 16, 8,
57, 49, 41, 33, 25, 17, 9, 1,
59, 51, 43, 35, 27, 19, 11, 3,
61, 53, 45, 37, 29, 21, 13, 5,
63, 55, 47, 39, 31, 23, 15, 7]

# 逆IP置换表
inv_ip_table = [40, 8, 48, 16, 56, 24, 64, 32,
39, 7, 47, 15, 55, 23, 63, 31,
38, 6, 46, 14, 54, 22, 62, 30,
37, 5, 45, 13, 53, 21, 61, 29,
36, 4, 44, 12, 52, 20, 60, 28,
35, 3, 43, 11, 51, 19, 59, 27,
34, 2, 42, 10, 50, 18, 58, 26,
33, 1, 41, 9, 49, 17, 57, 25]

# S盒中的S1盒
S1 = [14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7,
0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8,
4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0,
15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13]

# S盒中的S2盒
S2 = [15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10,
3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5,
0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15,
13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9]

# S盒中的S3盒
S3 = [10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8,
13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1,
13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7,
1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12]

# S盒中的S4盒
S4 = [ 7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15,
13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9,
10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4,
3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14]

# S盒中的S5盒
S5 = [ 2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9,
14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6,
4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14,
11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3]

# S盒中的S6盒
S6 = [12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11,
10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8,
9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6,
4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13]

# S盒中的S7盒
S7 = [ 4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1,
13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6,
1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2,
6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12]

# S盒中的S8盒
S8 = [13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7,
1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2,
7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8,
2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11]

# S盒
s_box = [S1, S2, S3, S4, S5, S6, S7, S8]

# 用于对数据进行扩展置换,将32bit数据扩展为48bit
extend_table = [32, 1, 2, 3, 4, 5,
4, 5, 6, 7, 8, 9,
8, 9, 10, 11, 12, 13,
12, 13, 14, 15, 16, 17,
16, 17, 18, 19, 20, 21,
20, 21, 22, 23, 24, 25,
24, 25, 26, 27, 28, 29,
28, 29, 30, 31, 32, 1]

p_table = [16, 7, 20, 21, 29, 12, 28, 17,
1, 15, 23, 26, 5, 18, 31, 10,
2, 8, 24, 14, 32, 27, 3, 9,
19, 13, 30, 6, 22, 11, 4, 25]


def hex2bin(text):
"""十六进制转二进制比特串"""
result = []
for i in range(len(text)):
result.extend(int2bit(int(text[i], 16)))
return result


def bin2hex(text):
"""二进制比特串转十六进制"""
result = []
q = len(text) // 4
for i in range(q):
dec = int(text[4 * i]) * 8 + int(text[4 * i + 1]) * 4 + \
int(text[4 * i + 2]) * 2 + int(text[4 * i + 3]) * 1
x = hex(dec)[2:].upper()
result.extend(x)
rs = ''.join(result)
return rs

def int2bit(n):
"""0~15整数转比特"""
a = []
for i in range(0, 4):
a.insert(0, str(n % 2))
n = int(n/2)
return a


def ip_replace(text, op):
"""IP置换部分,op为0表示正置换,op为1表示逆置换"""
tmp = [0 for i in range(64)]
if op == 0:
for i in range(64):
tmp[i] = text[ip_table[i] - 1]
return tmp
if op == 1:
for i in range(64):
tmp[i] = text[inv_ip_table[i] - 1]
return tmp


def e_extend(text):
"""进行扩展,将32位扩展为48位"""
extend = [0 for i in range(48)]
for i in range(48):
extend[i] = text[extend_table[i] - 1]
return extend


def s_replace(text):
"""S盒变换部分"""
s_result = [0 for k in range(32)]
for k in range(8):
row = 2*int(text[k*6]) + int(text[k*6+5])
column = 8*int(text[k*6+1]) + 4*int(text[k*6+2]) + \
2*int(text[k*6+3]) + int(text[k*6+4])
tmp = s_box[k][row * 16 + column]
for i in range(4):
s_result[4 * k + i] = int2bit(tmp)[i]
return s_result


def p_replace(text):
"""P置换部分"""
presult = [0 for i in range(32)]
for i in range(32):
presult[i] = text[p_table[i] - 1]
return presult


def xor(bit1, bit2):
"""异或运算"""
xor_result = ['' for i in range(len(bit1))]
for i in range(len(bit1)):
xor_result[i] = str(int(bit1[i]) ^ int(bit2[i]))
return xor_result

""" key_bulid : 生成密钥"""
MaxTime = 16

# 生成子密钥的置换表1,将64位的密钥转换为56位
PC_1 = [57, 49, 41, 33, 25, 17, 9,
1, 58, 50, 42, 34, 26, 18,
10, 2, 59, 51, 43, 35, 27,
19, 11, 3, 60, 52, 44, 36,
63, 55, 47, 39, 31, 23, 15,
7, 62, 54, 46, 38, 30, 22,
14, 6, 61, 53, 45, 37, 29,
21, 13, 5, 28, 20, 12, 4]

# 生成子密钥的置换表2,将56位的密钥转换为48位
PC_2 = [14, 17, 11, 24, 1, 5,
3, 28, 15, 6, 21, 10,
23, 19, 12, 4, 26, 8,
16, 7, 27, 20, 13, 2,
41, 52, 31, 37, 47, 55,
30, 40, 51, 45, 33, 48,
44, 49, 39, 56, 34, 53,
46, 42, 50, 36, 29, 32]


def list_move(bin_list, step):
"""将列表中的元素循环左移"""
return bin_list[step:] + bin_list[:step]


def build(key):
"""生成子密钥"""
key_result = []
key0 = [0 for i in range(56)]
for i in range(len(PC_1)):
key0[i] = key[PC_1[i] - 1]
for i in range(MaxTime):
"""生成16个密钥"""
key1 = [0 for i in range(48)]
# 确定每次左移的步数
if i == 0 or i == 1 or i == 8 or i == 15:
step = 1
else:
step = 2
# 分成两组
tmp1 = key0[0:28]
tmp2 = key0[28:56]
# 循环左移
tmp1 = list_move(tmp1, step)
tmp2 = list_move(tmp2, step)
# 左右连接
key0 = tmp1 + tmp2
# 置换选择
for i in range(len(PC_2)):
key1[i] = key0[PC_2[i] - 1]
# 生成密钥
key_result.append(key1)
# 返回的是一个集合包含了每次的密钥
return key_result

encode.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
"""encode:加密函数"""
import function as f

def encryption(text, keybit):
"""text明文,key密钥"""
keylist = f.build(keybit)
text1 = f.ip_replace(text, 0) # IP置换
L = [text1[i] for i in range(32)]
R = [text1[i] for i in range(32, 64)]
for i in range(16):
tmp = R
tmp = f.e_extend(tmp)
tmp = f.xor(tmp, keylist[i])
tmp = f.s_replace(tmp)
# print("轮数:", i+1, '\t',"S盒压缩后:", "".join(tmp))
tmp = f.p_replace(tmp)
tmp = f.xor(tmp, L)
L = R
R = tmp
# print("轮数:", i+1, '\t',"L值:", "".join(L), '\t', ",R值:", "".join(R))
L, R = R, L
ctext = L
ctext.extend(R)
ctext = f.ip_replace(ctext, 1)
# print("\t完成inv_IP初始逆置换:","".join(ctext))
return f.bin2hex(ctext)


# 文件作为脚本直接执行
if __name__ == '__main__':
choose = input("请输入选择\n二进制 > 1\n十六进制 > 2\n> ")
if choose == "1":
plaintext = input('请输入用二进制表示的明文 \n > ')
key = (input('请输入用二进制表示的密钥 \n > '))
ptext = plaintext
keybit = key
if choose == "2":
plaintext = input('请输入用十六进制表示的明文 \n > ')
# key = (input("8位字符集密钥 \n >").encode().hex())
key = (input('请输入用十六进制表示的密钥 \n > '))
ptext = f.hex2bin(plaintext)
keybit = f.hex2bin(key)
# print("获取原文:","".join(ptext),"\n获取密钥:","".join(keybit))
print('输出的密文为:' + encryption(ptext, keybit))

# 16进制明文 636f6d7075746572
# 16进制密钥 70389aec769284da
# 输出密文 2461029B5988CFB4

decode.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
"""decode:解密函数"""
import function as f


def decryption(text, keybit):
"""
text:明文
key:密钥
"""
key_list = f.build(keybit)
text1 = f.ip_replace(text, 0) # IP置换
L = [text1[i] for i in range(32)]
R = [text1[i] for i in range(32, 64)]
for i in range(16):
tmp = R
tmp = f.e_extend(tmp)
tmp = f.xor(tmp, key_list[15 - i])
tmp = f.s_replace(tmp)
# print("轮数:", i + 1, '\t', "S盒压缩后:", "".join(tmp))
tmp = f.p_replace(tmp)
tmp = f.xor(tmp, L)
L = R
R = tmp
# print("轮数:", i + 1, "L值:", "".join(L), '\t', ",R值:", "".join(R))
L, R = R, L
ctext = L
ctext.extend(R)
ctext = f.ip_replace(ctext, 1)
# print("\t完成inv_IP初始逆置换:", "".join(ctext))
return f.bin2hex(ctext)


# 文件作为脚本直接执行
if __name__ == '__main__':
choose = input("请输入选择\n二进制 > 1\n十六进制 > 2\n> ")
if choose == "1":
print("64bit的M和K")
plaintext = input('请输入用二进制表示的密文 \n > ')
key = (input('请输入用二进制表示的密钥 \n > '))
ptext = plaintext
keybit = key
if choose == "2":
print("64bit的C和K")
plaintext = input('请输入用十六进制表示的密文 \n > ')
# key = (input("8位字符集密钥 \n >").encode().hex())
key = (input('请输入用十六进制表示的密钥 \n > '))
ptext = f.hex2bin(plaintext)
keybit = f.hex2bin(key)
# print("获取密文:", "".join(ptext), "\n获取密钥:", "".join(keybit))
print('输出的明文为:' + decryption(ptext, keybit))

# 16进制明文 636f6d7075746572
# 16进制密钥 70389aec769284da
# 输出密文 2461029B5988CFB4

en_for3.py三重DES加密

1
2
3
4
5
6
7
8
9
10
11
12
13
import DES.encode as encode
import DES.decode as decode
import DES.function as f


def en_for3(plaintext: str, key1: str, key2: str) -> str:
"""
len(str)=16,bit=16
"""
en1 = f.hex2bin(encode.encryption(f.hex2bin(plaintext), f.hex2bin(key1)))
de2 = f.hex2bin(decode.decryption(en1, f.hex2bin(key2)))
en2 = encode.encryption(de2, f.hex2bin(key1))
return en2

三重DES在后面的生成随机数需要用到。