AES加密算法及演示程序(GO-算法核心实现+Python-前端演示系统)

该文介绍了使用Golang实现AES加密算法,包括字符串和文件的加解密,并在遇到Qt库问题后转向使用PyQt创建GUI界面。文章详细展示了代码实现,包括关键函数如子密钥扩展、字节替换、行移位和列混淆等,并提供了加解密的程序源码。
摘要由CSDN通过智能技术生成

一. 个人感悟

该程序实现了AES加密算法的软件实现,使用Golang语言实现核心算法,使用Python实现前端展示程序,功能有字符串的加解密演示、文件的加解密演示。

首先呢,其实AES加密算法我去年已经写过了, 详情见 (AES加密算法软件实现-Java_aes软件实现_西瓜刀盹了的博客-CSDN博客), 今年老师要求还要做GUI ,那就再写一遍吧 . 

这次遇到的Bug是, 密钥扩展的时候, 要竖着一列一列扩展, 但是我赋值的时候给成横向的给了 . 遇到的困难, 还是列混合的时候, 真的不懂有限域乘法的具体算法, 只能用判断的方式, 来乘具体的数值了.

GUI部分了, 先去试了一下GTK, 由于我的Go版本太高了, get已经不支持了, 也是出一堆Bug , 后来去试了Qt, 发现官方文档是两年前的, 还是get , 照着Git上装, 还是装不上.浪费了将近一天时间, 放弃了. 后来用PyQt做了GUi, 然后封装了exe .

二. 结果验证

  1. 我的计算结果:

2. 网站验证

 

  1. 多余的我就不验证了, 我已经测试好了, 都是对的.

三. 程序源码

  1. aes.go

/*
************************************************************************

	> File Name: aes.go
	> Author: Yu/Jinyang

	> Created Time: 2022/10/23

***********************************************************************
*/
package aes

import (
	"fmt"
	"strconv"
)

type Aes struct {
	plain_text   string           //明文字符串
	key          string           //密钥字符串
	cipher_text  [4][4]uint64     //中间变量list
	key_list     [4][4]uint64     //密钥list
	key_extended [11][4][4]uint64 //密钥扩展结果存起来,用于解密
	round        int
}

// 只公开了三个方法, 设置初始明文和密钥, 加密, 解密
// 其他方法全部封装在内, 拒绝访问
func (aes *Aes) SetPlaintextAndKey(p, k string) {
	aes.plain_text = p
	aes.key = k
	aes.round = 0
}

func (aes *Aes) dataFormat() {
	var temp [4][4]uint64
	var err error
	var tag bool = true
	//将明文字符串转换为二维数组
	for j := 0; j < 4; j++ {
		for i := 0; i < 4; i++ {
			temp[i][j], err = strconv.ParseUint(aes.plain_text[(j*8+i*2):(j*8+i*2+2)], 16, 64)
			if err != nil {
				tag = false
				fmt.Println(i, j, "error")
			}
		}
	}
	aes.cipher_text = temp
	//将密钥转换为二维数组
	for j := 0; j < 4; j++ {
		for i := 0; i < 4; i++ {
			temp[i][j], err = strconv.ParseUint(aes.key[(j*8+i*2):(j*8+i*2+2)], 16, 64)
			if err != nil {
				tag = false
				fmt.Println(i, j, "error")

			}
		}
	}
	aes.key_list = temp
	aes.key_extended[0] = temp
	if !tag {
		fmt.Println("过程出现错误!")
	}
}

func (aes *Aes) subBytes() {
	for i := 0; i < 4; i++ {
		aes.cipher_text[i] = aes.s_box_for_row(aes.cipher_text[i])
	}
}

func (aes *Aes) s_box_for_row(row [4]uint64) [4]uint64 {
	var ans [4]uint64
	s_box := [16][16]uint64{
		{0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76},
		{0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0},
		{0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15},
		{0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75},
		{0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84},
		{0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf},
		{0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8},
		{0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2},
		{0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73},
		{0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb},
		{0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79},
		{0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08},
		{0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a},
		{0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e},
		{0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf},
		{0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16}}
	for j := 0; j < 4; j++ {
		index := (row[j] & 0xf0) >> 4
		column := (row[j] & 0xf)
		ans[j] = s_box[index][column]
	}
	return ans
}

func (aes *Aes) shiftRows() {
	var temp [4][4]uint64
	for i := 0; i < 4; i++ {
		for j := 0; j < 4; j++ {
			temp[i][j] = aes.cipher_text[i][(j+i)%4]
		}
	}
	aes.cipher_text = temp
}

func (aes *Aes) mixColumns() {
	matrix := [4][4]uint64{{2, 3, 1, 1}, {1, 2, 3, 1}, {1, 1, 2, 3}, {3, 1, 1, 2}}
	//矩阵转置 放入 temp
	var temp [4][4]uint64
	for i := 0; i < 4; i++ {
		for j := 0; j < 4; j++ {
			temp[i][j] = aes.cipher_text[j][i]
		}
	}
	//遍历 存值
	for j := 0; j < 4; j++ {
		for i := 0; i < 4; i++ {
			aes.cipher_text[i][j] = uint64(aes.mulInFiniteDomain(matrix[i], temp[j]))
		}
	}
}

func (aes *Aes) mulInFiniteDomain(x, y [4]uint64) uint64 {
	var ans uint64
	for i := 0; i < 4; i++ {
		if x[i]&0x01 == 1 {
			ans ^= y[i] & 0xff
		}
		if x[i]&0x02 == 2 {
			ans ^= aes.mulInFiniteDomainTwoNum(y[i])
		}
		if x[i]&0x04 == 4 {
			tem := aes.mulInFiniteDomainTwoNum(y[i])
			ans ^= aes.mulInFiniteDomainTwoNum(tem)
		}
		if x[i]&0x08 == 8 {
			tem := aes.mulInFiniteDomainTwoNum(y[i])
			tem2 := aes.mulInFiniteDomainTwoNum(tem)
			ans ^= aes.mulInFiniteDomainTwoNum(tem2)
		}
	}
	return ans
}

func (aes *Aes) mulInFiniteDomainTwoNum(y uint64) uint64 {
	var ans uint64
	if y&0x80 == 0x80 { //a7 = 1 的情况,  << 1并 异或0x00011011
		ans ^= ((y << 1) & 0xff) ^ (0x1b)
	} else { // a7 = 0 的情况, 直接 << 1 即可
		ans ^= (y << 1) & 0xff
	}
	return ans
}

func (aes *Aes) addRoundKey() {
	for i := 0; i < 4; i++ {
		for j := 0; j < 4; j++ {
			aes.cipher_text[i][j] = aes.cipher_text[i][j] ^ aes.key_list[i][j]
		}
	}
}

func (aes *Aes) keySchedule(round int) {
	var temp [4][4]uint64
	//第一列 , 4的倍数
	var rot_world [4]uint64
	//列移位
	for i := 0; i < 4; i++ {
		rot_world[i] = aes.key_list[(i+1)%4][3]
	}
	//s盒变换
	rot_world = aes.s_box_for_row(rot_world)
	//异或第一列
	for i := 0; i < 4; i++ {
		rot_world[i] = aes.key_list[i][0] ^ rot_world[i]
	}
	//最后异或轮常数
	var rcon uint64
	if round < 8 {
		rcon = 0x01 << round
	} else if round == 8 {
		rcon = 0x1b
	} else if round == 9 {
		rcon = 0x36
	} else {
		fmt.Println("Round out of range!")
	}
	rot_world[0] ^= rcon
	for i := 0; i < 4; i++ {
		temp[i][0] = rot_world[i]
	}
	//处理后三列
	for j := 1; j < 4; j++ {
		for i := 0; i < 4; i++ {
			temp[i][j] = temp[i][j-1] ^ aes.key_list[i][j]
		}
	}
	aes.key_list = temp
	aes.key_extended[round+1] = temp
}

func (aes *Aes) reFormat() string {
	var ans string
	for j := 0; j < 4; j++ {
		for i := 0; i < 4; i++ {
			tem := fmt.Sprintf("%02x", aes.cipher_text[i][j])
			ans += tem

		}
	}
	return ans
}

func (aes *Aes) Encode() string {
	aes.dataFormat()
	aes.addRoundKey()
	aes.keySchedule(aes.round)
	aes.round++
	for i := 0; i < 9; i++ {
		// fmt.Println("第", i, "轮:")
		aes.subBytes()
		// fmt.Printf("s盒后	%x\n", aes.cipher_text)
		aes.shiftRows()
		// fmt.Printf("行移位	%x\n", aes.cipher_text)
		aes.mixColumns()
		// fmt.Printf("列混合	%x\n", aes.cipher_text)
		aes.addRoundKey()
		// fmt.Printf("轮密钥加%x\n", aes.cipher_text)
		aes.keySchedule(aes.round) // 密钥生成
		aes.round++
	}
	//最终轮
	aes.subBytes()
	aes.shiftRows()
	aes.addRoundKey()
	return aes.reFormat()
}

func (aes *Aes) Decode() string {
	aes.key_list = aes.key_extended[10]
	aes.addRoundKey()
	for i := 9; i > 0; i-- {
		aes.reShiftRow()
		aes.resubBytes()
		aes.key_list = aes.key_extended[i]
		aes.addRoundKey()
		aes.remixColumns()
	}
	aes.reShiftRow()
	aes.resubBytes()
	aes.key_list = aes.key_extended[0]
	aes.addRoundKey()
	return aes.reFormat()
}

func (aes *Aes) reShiftRow() {
	var temp [4][4]uint64
	for i := 0; i < 4; i++ {
		for j := 0; j < 4; j++ {
			temp[i][j] = aes.cipher_text[i][(j-i+4)%4]
		}
	}
	aes.cipher_text = temp
}

func (aes *Aes) resubBytes() {
	for i := 0; i < 4; i++ {
		aes.cipher_text[i] = aes.re_s_box_for_row(aes.cipher_text[i])
	}
}

func (aes *Aes) re_s_box_for_row(row [4]uint64) [4]uint64 {
	var ans [4]uint64
	s_box := [16][16]uint64{
		{0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb},
		{0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb},
		{0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e},
		{0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25},
		{0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92},
		{0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84},
		{0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06},
		{0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b},
		{0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73},
		{0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e},
		{0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b},
		{0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4},
		{0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f},
		{0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef},
		{0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61},
		{0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d}}
	for j := 0; j < 4; j++ {
		index := (row[j] & 0xf0) >> 4
		column := (row[j] & 0xf)
		ans[j] = s_box[index][column]
	}
	return ans
}

func (aes *Aes) remixColumns() {
	matrix := [4][4]uint64{{0x0e, 0x0b, 0x0d, 0x09}, {0x09, 0x0e, 0x0b, 0x0d}, {0x0d, 0x09, 0x0e, 0x0b},
		{0x0b, 0x0d, 0x09, 0x0e}}
	//矩阵转置 放入 temp
	var temp [4][4]uint64
	for i := 0; i < 4; i++ {
		for j := 0; j < 4; j++ {
			temp[i][j] = aes.cipher_text[j][i]
		}
	}
	//遍历 存值
	for j := 0; j < 4; j++ {
		for i := 0; i < 4; i++ {
			aes.cipher_text[i][j] = uint64(aes.mulInFiniteDomain(matrix[i], temp[j]))
		}
	}
}

2. aes_core.go

/*
************************************************************************

	> File Name: main.go
	> Author: Yu/Jinyang

	> Created Time: 2022/10/23

***********************************************************************
*/
package main

import (
	"aesDemo/aes"
	"fmt"
)

func main() {
	var plaintext string
	// fmt.Println("请输入128位明文(16进制):")
	fmt.Scanln(&plaintext)
	var key string
	// fmt.Println("请输入128位密钥(16进制):")
	fmt.Scanln(&key)
	aes := aes.Aes{}
	aes.SetPlaintextAndKey(plaintext, key)

	cipher_text := aes.Encode()
	fmt.Println(cipher_text)
	plain_text := aes.Decode()
	fmt.Println(plain_text)

}

3. main.py

import binascii
import os
import sys
from PyQt5 import QtWidgets
from PyQt5.QtCore import Qt
from PyQt5.QtWidgets import QMainWindow, QMessageBox
from random import *
from StaticUI.MainWindow import Ui_MainWindow
import subprocess
import PyInstaller


# 22kb 50s
class MainWindow(QMainWindow, Ui_MainWindow):
    def __init__(self):
        super(MainWindow, self).__init__()
        self.setupUi(self)
        self.init_ui()
        self.bind_button()
        self.plaintext = ""
        self.key = ""
        self.key2 = ""
        self.filepath = ""

    def init_ui(self):
        self.label_12.setTextInteractionFlags(Qt.TextSelectableByMouse)
        pass

    def bind_button(self):
        self.pushButton_2.clicked.connect(self.auto_gen_plaintext)
        self.pushButton_3.clicked.connect(self.auto_gen_key)
        self.pushButton_6.clicked.connect(self.auto_gen_key2)

        self.pushButton_4.clicked.connect(self.str_encode_decode)
        self.pushButton_5.clicked.connect(self.file_encode_decode)
        self.toolButton_4.clicked.connect(self.pick_file)
        pass

    def str_encode_decode(self):
        if len(self.plaintext) != 33 or len(self.key) != 33:
            QMessageBox.information(self, "警告", "明文或密钥长度不对!", QMessageBox.Yes)
        else:
            ret = subprocess.Popen(
                "aes_core.exe",
                stdout=subprocess.PIPE,
                stdin=subprocess.PIPE,
                stderr=subprocess.PIPE,
            )
            ret.stdin.write(self.plaintext.encode())
            ret.stdin.flush()
            ret.stdin.write(self.key.encode())
            ret.stdin.flush()
            ans1 = ret.stdout.readline().decode()

            ans2 = ret.stdout.readline().decode()
            ret.wait()

            self.lineEdit_3.setText(ans1)
            self.lineEdit_4.setText(ans2)

        pass

    def file_encode_decode(self):
        if len(self.key2) != 33:
            QMessageBox.information(self, "警告", "明文或密钥长度不对!", QMessageBox.Yes)
        else:
            self.lineEdit_6.setText("加密中, 请等待!")
            self.lineEdit_5.setText("解密中, 请等待!")
            f = open(self.filepath, "rb")
            output_encode_file = open("aes_encrypted.txt", "wb")
            output_decode_file = open("decode" + self.filepath[-4:], "wb")
            output_encode_buff = ""
            output_decode_buff = ""
            while 1:
                c = f.read(16)
                if not c:
                    break
                else:

                    cc = binascii.hexlify(c)
                    cc = str(cc, encoding="utf-8")
                    fill = 0
                    if len(cc) < 32:
                        fill = 32 - len(cc)
                        cc += (fill) * "0"
                    cc += "\n"
                    cy, m = self.encode_decode(cc, self.key2)
                    # cy = str(cy, encoding='utf-8')
                    cy = cy[:32]
                    cy = binascii.unhexlify(cy)
                    # m = str(m, encoding='utf-8')
                    m = m[:32 - fill]
                    m = binascii.unhexlify(m)
                    # output_encode_buff += cy
                    # output_decode_buff += m
                    output_encode_file.write(cy)
                    output_decode_file.write(m)

                    pass

            self.lineEdit_6.setText(os.getcwd() + "\\aes_encrypted.txt")
            self.lineEdit_5.setText(os.getcwd() + "\\decode" + self.filepath[-4:])
            pass

    def auto_gen_plaintext(self):
        plaintext = "".join([choice("0123456789abcdef") for i in range(32)])
        self.plaintext = plaintext + "\n"
        self.lineEdit.setText(plaintext)
        pass

    def auto_gen_key(self):
        plaintext = "".join([choice("0123456789abcdef") for i in range(32)])
        self.key = plaintext + "\n"
        self.lineEdit_2.setText(plaintext)
        pass

    def auto_gen_key2(self):
        plaintext = "".join([choice("0123456789abcdef") for i in range(32)])
        self.key2 = plaintext + "\n"
        self.lineEdit_7.setText(plaintext)
        pass

    def pick_file(self):
        filename, filetype = QtWidgets.QFileDialog.getOpenFileName(self, "选取文件",
                                                                   os.getcwd() + '\\',
                                                                   "All Files(*);;Text Files(*.txt)")
        self.filepath = filename
        self.toolButton_4.setText(filename)

    @staticmethod
    def encode_decode(plaintext, key):
        ret = subprocess.Popen(
            "aes_core.exe",
            stdout=subprocess.PIPE,
            stdin=subprocess.PIPE,
            stderr=subprocess.PIPE,
        )
        ret.stdin.write(plaintext.encode())
        ret.stdin.flush()
        ret.stdin.write(key.encode())
        ret.stdin.flush()
        ans1 = ret.stdout.readline()

        ans2 = ret.stdout.readline()
        ret.wait()
        print(ans1, ans2)
        return ans1, ans2
        pass


def main():
    app = QtWidgets.QApplication(sys.argv)  # 初始化app
    test = MainWindow()
    test.show()
    sys.exit(app.exec_())
    pass


if __name__ == '__main__':
    main()

(*****************************************************)(* *)(* Advanced Encryption Standard (AES) *)(* Interface Unit v1.3 *)(* *)(* Readme.txt 自述文档 2004.12.04 *)(* *)(*****************************************************)(* 介绍 *)AES 是一种使用安全码进行信息加密的标准。它支持 128 位、192 位和 256 位的密匙。加密算法实现在 ElAES.pas 单元中。本人将其加密方法封装在 AES.pas 单元中,只需要调用两个标准函数就可以完成字符串的加密和解密。(* 密匙长度 *)128 位支持长度为 16 个字符192 位支持长度为 24 个字符256 位支持长度为 32 个字符所有加密和解密操作在默认情况下为 128 位密匙。(* 文件列表 *)..Source AES 单元文件..Example 演示程序(* 适用平台 *)这份 Delphi 的执行基于 FIPS 草案标准,并且 AES 原作者已经通过了以下平台的测试: Delphi 4 Delphi 5 C++ Builder 5 Kylix 1本人又重新进行了补充测试,并顺利通过了以下平台: Delphi 6 Delphi 7特别说明: 在 Delphi 3 标准版中进行测试时,因为缺少 Longword 数据类型和 Math.pas 文件,并且不支持 overload 指示字,所以不能正常编译。(* 演示程序 *)这个示例程序演示了如何使用 AES 模块进行字符串的加密和解密过程。(* 使用方法 *)在程序中引用 AES 单元。调用函数 EncryptString 和 DecryptString 进行字符串的加密和解密。调用函数 EncryptStream 和 DecryptStream 进行流的加密和解密。调用过程 EncryptFile 和 DecryptFile 进行文件的加密和解密。详细参阅 Example 文件夹中的例子。(* 许可协议 *)您可以随意拷贝、使用和发部这个程序,但是必须保证程序的完整性,包括作者信息、版权信息和说明文档。请勿修改作者和版权信息。 这个程序基于 Mozilla Public License Version 1.1 许可,如果您使用了这个程序,那么就意味着您同意了许可协议中的所有内容。您可以在以下站点获取一个许可协议的副本。 http://www.mozilla.org/MPL/许可协议的发布基于 "AS IS" 基础,详细请阅读该许可协议。Alexander Ionov 是 AES 算法的最初作者,保留所有权利。(* 作者信息 *)ElAES 作者:EldoS, Alexander IonovAES Interface Unit 作者:杨泽晖 (Jorlen Young)您可以通过以下方式与我取得联系。WebSite: http://jorlen.51.net/ http://mycampus.03.com.cn/ http://mycampus.1155.net/ http://mycampus.ecoo.net/ http://mycampus.5500.org/Email: stanley_xfx@163.com
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值