借鉴了别人的,我记录一下,怕丢了
#16个由已知的K生成的子密钥
subKey = [([0] * 48) for ll in range(16)]
#01明文重组打乱顺序
ip = [ 58, 50, 42, 34, 26, 18, 10, 2, 60, 52, 44, 36, 28, 20, 12, 4,
62, 54, 46, 38, 30, 22, 14, 6, 64, 56, 48, 40, 32, 24, 16, 8,
57, 49, 41, 33, 25, 17, 9, 1, 59, 51, 43, 35, 27, 19, 11, 3,
61, 53, 45, 37, 29, 21, 13, 5, 63, 55, 47, 39, 31, 23, 15, 7 ]
#16轮迭代后左右部分交换经过逆置换得到01密文
_ip = [ 40, 8, 48, 16, 56, 24, 64, 32, 39, 7,47, 15, 55, 23, 63, 31,
38, 6, 46, 14, 54, 22, 62, 30, 37, 5, 45,13, 53, 21, 61, 29,
36, 4, 44, 12, 52, 20, 60, 28, 35, 3, 43, 11,51, 19, 59, 27,
34, 2, 42, 10, 50, 18, 58, 26, 33, 1, 41, 9, 49, 17, 57, 25 ]
#PC_1置换压缩K 65-->56
PC_1= [ 57, 49, 41, 33, 25, 17, 9,
1 , 58, 50, 42, 34, 26, 18,
10, 2, 59, 51, 43, 35, 27,
19, 11, 3, 60, 52, 44, 36,
63, 55, 47, 39, 31, 23, 15,
7 , 62, 54, 46, 38, 30, 22,
14, 6, 61, 53, 45, 37, 29,
21, 13, 5, 28, 20, 12, 4 ]
#PC_2置换得到子密钥 56-->48
PC_2=[ 14, 17, 11, 24, 1 , 5,
3 , 28, 15, 6, 21, 10,
23, 19, 12, 4, 26, 8,
16, 7, 27, 20, 13, 2,
41, 52, 31, 37, 47, 55,
30, 40, 51, 45, 33, 48,
44, 49, 39, 56, 34, 53,
46, 42, 50, 36, 29, 32 ]
#E扩展 R_i-1 32-->48
E = [ 32, 1 , 2 , 3 , 4 , 5 ,
4 , 5 , 6 , 7 , 8 , 9 ,
8 , 9 , 10, 11, 12, 13,
12, 13, 14, 15, 16, 17,
16, 17, 18, 19, 20, 21,
20, 21, 22, 23, 24, 25,
24, 25, 26, 27, 28, 29,
28, 29, 30, 31, 32, 31 ]
#8个s盒用于压缩 48-->32
s1 = [
[ 14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7 ],
[ 0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8 ],
[ 4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0 ],
[ 15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13 ] ]
s2 = [
[ 15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10 ],
[ 3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5 ],
[ 0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15 ],
[ 13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9 ] ]
s3 = [
[ 10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8 ],
[ 13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1 ],
[ 13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7 ],
[ 1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12 ] ]
s4 = [
[ 7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15 ],
[ 13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9 ],
[ 10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4 ],
[ 3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14 ] ]
s5 = [
[ 2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9 ],
[ 14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6 ],
[ 4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14 ],
[ 11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3 ] ]
s6 = [
[ 12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11 ],
[ 10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8 ],
[ 9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6 ],
[ 4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13 ] ]
s7 = [
[ 4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1 ],
[ 13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6 ],
[ 1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2 ],
[ 6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12 ] ]
s8 = [
[ 13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7 ],
[ 1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2 ],
[ 7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8 ],
[ 2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11 ] ]
#P盒置换,只打乱顺序重组,同IP _IP
P_he = [ 16, 7 , 20, 21, 29, 12, 28, 17,
1 , 15, 23, 26, 5 , 18, 31, 10,
2 , 8 , 24, 14, 32, 27, 3 , 9 ,
19, 13, 30, 6 , 22, 11, 4 , 25 ]
# i=1,2,9,16 << 1 左移
LS = [ 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2,2, 1 ]
base = [str(x) for x in range(10)] + [ chr(x) for x in range(ord('A'),ord('A')+6)]
def bin2dec(string_num):
return str(int(string_num, 2))
def hex2dec(string_num):
return str(int(string_num.upper(), 16))
def hex2bin(string_num):
return dec2bin(hex2dec(string_num.upper()))
def bin2hex(string_num):
return dec2hex(bin2dec(string_num))
def dec2bin(string_num):
num = int(string_num)
mid = []
while True:
if num == 0: break
num,rem = divmod(num, 2)
mid.append(base[rem])
return ''.join([str(x) for x in mid[::-1]])
def dec2hex(string_num):
num = int(string_num)
if num==0:
return '0'
mid = []
while True:
if num == 0: break
num,rem = divmod(num, 16)
mid.append(base[rem])
return ''.join([str(x) for x in mid[::-1]])
def string2Binary(str):
le = len(str)
dest =[0]*le*4
i = 0
for c in str:
i += 4
j = 0
s = hex2bin(c)
l = len(s)
for d in s:
dest[i-l+j]=int(d)
j += 1
return dest
def zhihuan(k,temp):
le=len(temp)
dest=[0]*le
for i in range(le):
dest[i] = k[temp[i] - 1]
return dest
def setKey(k):
temp = string2Binary(k)
print('binarykey:',temp,sep='\n')
left = [0]*28
right = [0]*28
temp1 = [0]*56
temp1 = zhihuan(temp,PC_1)
print('PC_1 key:',temp1,sep='\n')
#C0,D0:
for i in range(28):
left[i] = temp1[i]
right[i] = temp1[i + 28]
#list left move:
for i in range(16):
left = Move(left, LS[i])
right = Move(right, LS[i])
for j in range(28):
temp1[j] = left[j]
temp1[j + 28] = right[j]
subKey[i] = zhihuan(temp1,PC_2)
def Move(k, ls):
temp = 0
le = len(k)
for i in range(ls):
temp = k[0]
for j in range(le-1):
k[j] = k[j + 1]
k[le - 1] = temp
return k
def diffOr( source1, source2):
le = len(source1)
dest = [0]*le
for i in range(le):
dest[i] = source1[i] ^ source2[i]
return dest
def jiami( D, K) :
temp = [0]*64;
data = string2Binary(D)
print('stringM:',D,sep='\n')
print('binaryM:',data,sep='\n')
data = zhihuan(data,ip)
print('IPM:',data,sep='\n')
left = [([0] * 32) for i in range(17)]
right = [([0] * 32) for i in range(17)]
for j in range(32):
left[0][j] = data[j]
right[0][j] = data[j + 32]
#get key_i:
setKey(K)
for i in range(1,17):
key = subKey[i - 1]
# L1 = R0
left[i] = right[i - 1]
# R1 = L0 ^ f(R0,K1)
fTemp = f(right[i - 1], key)# 32bit
right[i] = diffOr(left[i - 1], fTemp)
for i in range(32):# swap L16 R16
temp[i] = right[16][i]
temp[32 + i] = left[16][i]
print('L16 R16 B:',temp,sep='\n')
temp = zhihuan(temp,_ip)
print('_IP B:',temp,sep='\n')
str = binary2ASC(intArr2Str(temp))
return str
def jiemi( D, K) :
temp = [0]*64;
data = string2Binary(D)
print('stringMi:',D,sep='\n')
print('binaryMi:',data,sep='\n')
data = zhihuan(data,ip)
print('IPMi:',data,sep='\n')
left = [([0] * 32) for i in range(17)]
right = [([0] * 32) for i in range(17)]
for j in range(32):
left[0][j] = data[j]
right[0][j] = data[j + 32]
#get key_i:
setKey(K)
for i in range(1,17):
key = subKey[16-i]#key_16 15...1
# L1 = R0
left[i] = right[i - 1]
# R1 = L0 ^ f(R0,K1)
fTemp = f(right[i - 1], key)# 32bit
right[i] = diffOr(left[i - 1], fTemp)
for i in range(32):# swap L16 R16
temp[i] = right[16][i]
temp[32 + i] = left[16][i]
print('L0 R0 B:',temp,sep='\n')
temp = zhihuan(temp,_ip)
print('_IP B:',temp,sep='\n')
str = binary2ASC(intArr2Str(temp))
return str
def press(source) :# s he 48 --> 32
ret = [0]*32
temp = [([0] * 6) for i in range(8)]
s =[s1,s2,s3,s4,s5,s6,s7,s8]
st=[]
for i in range(8):
for j in range(6):
temp[i][j] = source[i * 6 + j]
for i in range(8):
# (16)
x = temp[i][0] * 2 + temp[i][5]#r=a0a5 B -->D
# (2345)
y = temp[i][1] * 8 + temp[i][2] * 4 + temp[i][3] * 2+ temp[i][4]#l=a1a2a3a4 B -->D
val = s[i][x][y]
# val D --> B
ch = dec2hex(str(val))
st.append(ch)
ret = string2Binary(st)
#print('Sbox:',ret,sep='\n')
ret = zhihuan(ret,P_he)
#print('Sbox+P:',ret,sep='\n')
return ret
def f( R, K):
dest = [0]*32
temp = [0]*48
expendR = zhihuan(R,E)# 48bit
temp = diffOr(expendR, K);
dest = press(temp)
return dest
def intArr2Str( arr) :
sb = []
le=len(arr)
for i in range(le):
sb.append(str(arr[i]))
return ''.join(sb)
def binary2ASC(s):
st = ''
ii = 0
le= len(s)
if le % 4 != 0:
while ii < (4 - len % 4):
s = "0" + s
le=le/4
le=int(le)
for i in range(le):
st += bin2hex(s[i * 4 : i * 4 + 4])
return st
#if __name__=="__main__":
D='abc1Ff11111111111'
K='FFFFFFFFFFFFFFFF'
mi='D88D97F5DE636181'
print('miwenjiami:',jiami(D,K))
print()
print('mingwenjiemi:',jiemi(mi,K))