网课推荐 武汉大学的密码学课程,老师讲的很不错。
DES简要分析
实验结果
源代码
# --------------生成密钥需要的数组 ---------------
# 置换选择1
PC_1tab = [57, 49, 41, 33, 25, 17, 9,
1, 58, 50, 42, 34, 26, 18,
10, 2, 59, 51, 43, 35, 27,
19, 11, 3, 60, 52, 44, 36,
63, 55, 47, 39, 31, 23, 15,
7, 62, 54, 46, 38, 30, 22,
14, 6, 61, 53, 45, 37, 29,
21, 13, 5, 28, 20, 12, 4]
# 置换选择2
PC_2tab = [14, 17, 11, 24, 1, 5,
3, 28, 15, 6, 21, 10,
23, 19, 12, 4, 26, 8,
16, 7, 27, 20, 13, 2,
41, 52, 31, 37, 47, 55,
30, 40, 51, 45, 33, 48,
44, 49, 39, 56, 34, 53,
46, 42, 50, 36, 29, 32]
# 循环左移位数表
Left_move = [1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1]
# --------------加密过程需要的数组 ---------------
# 初始置换IP表,将原始明文打乱
IPtab = [58, 50, 42, 34, 26, 18, 10, 2,
60, 52, 44, 36, 28, 20, 12, 4,
62, 54, 46, 38, 30, 22, 14, 6,
64, 56, 48, 40, 32, 24, 16, 8,
57, 49, 41, 33, 25, 17, 9, 1,
59, 51, 43, 35, 27, 19, 11, 3,
61, 53, 45, 37, 29, 21, 13, 5,
63, 55, 47, 39, 31, 23, 15, 7]
#逆初始置换IP-1表
tIPtable=[40,8,48,16,56,24,64,32,
39,7,47,15,55,23,63,31,
38,6,46,14,54,22,62,30,
37,5,45,13,53,21,61,29,
36,4,44,12,52,20,60,28,
35,3,43,11,51,19,59,27,
34,2,42,10,50,18,58,26,
33,1,41,9,49,17,57,25]
# 选择运算E的矩阵,将32位的R变为48位,方便与子密钥异或
E = [32, 1, 2, 3, 4, 5,
4, 5, 6, 7, 8, 9,
8, 9, 10, 11, 12, 13,
12, 13, 14, 15, 16, 17,
16, 17, 18, 19, 20, 21,
20, 21, 22, 23, 24, 25,
24, 25, 26, 27, 28, 29,
28, 29, 30, 31, 32, 1]
# des算法s盒
S=[[14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7,
0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8,
4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0,
15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13,],
[15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10,
3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5,
0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15,
13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9,],
[10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8,
13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1,
13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7,
1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12],
[7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15,
13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9,
10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4,
3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14,],
[2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9,
14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6,
4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14,
11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3],
[12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11,
10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8,
9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6,
4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13,],
[4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1,
13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6,
1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2,
6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12],
[13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7,
1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2,
7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8,
2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11]]
#置换p表
P=[16,7,20,21,
29,12,28,17,
1,15,23,26,
5,18,31,10,
2,8,24,14,
32,27,3,9,
19,13,30,6,
22,11,4,25]
# ----------------------产生16个子密钥----------------------
# 置换函数
def zhihuan(s, tab):
# 计算置换表长度
length = len(tab)
list = []
for i in range(0, length):
temp = tab[i]
# 找到s中temp位的数据,依次加入list中
list.extend(str(s[temp - 1]))
# 字符串连接
s_new = "".join(list)
return s_new
# 循环左移函数
# 法二:令字符串Arr.extend(Arr)(即Arr=Arr+Arr),取新的字符串Arr_new=Arr[m+1:len(Arr)+m](即m+1到len(Arr)+m位)
def LeftMove(Arr, i):
# 取出要左移的位数
m = Left_move[i]
# 定义空数组临时存放
Arr_new = []
# 开始左移
for j in range(m, 28):
Arr_new.append(Arr[j])
for j in range(0, m):
Arr_new.append(Arr[j])
# print(Arr_new)
return Arr_new
# 子密钥生成函数
def Gen_key(key):
# print("第一步生成子密钥")
Kkid = [] # 子密钥存放列表
# 置换选择1
s = zhihuan(key, PC_1tab)
C = s[0:28]
D = s[28:56]
# print("C_0:"+str(C))
# print("D_0:" + str(D))
# 16次的循环左移及转换选择2,以生成子密钥K
for i in range(0, 16):
C = LeftMove(C, i)
D = LeftMove(D, i)
# 将C和D合并成56位中间数据
CD = C + D
# 置换选择2从中选择出一个48位的子密码Ki
key = zhihuan(CD, PC_2tab)
Kkid.append(key)
# print("第%d个子密钥为:%s"%(i+1,str(key)))
return Kkid
# ----------------------------加密----------------------------
# 异或函数,相同为0,不同为1
def XOR(s1, s2):
strlen = len(s1)
s3 = []
for i in range(0, strlen):
s3.extend(str(int(s1[i]) ^ int(s2[i])))
s4 = "".join(s3)
return s4
#S盒将输入的六位,前两位做行数,中间四位做列数
def Fun_S(f,subst_Arr):
b=[]
for i in range(0,8):
row=int(f[i*6])*2+int(f[i*6+5])
col=int(f[i*6+1])*8+int(f[i*6+2])*4+int(f[i*6+3])*2+int(f[i*6+4])
result=subst_Arr[i][row*16+col]
#print(result)
a=[]
for i in range(0,4):
#每次都在最前面插入
a.insert(0,str(result%2))
result=int(result/2)# 注意加int,因为忘记加int而出现很多位小数
b.extend(a)
c = "".join(b)
#print("S盒的结果(32位):"+c)
return c
def Fun_f(R, key):
# 选择运算E,将32位的R变为48位,方便与子密钥异或
R_new = zhihuan(R, E)
# 与子密钥异或
f = XOR(R_new, key)
#print("子密钥加:"+str(f))
# 利用S盒将48位转为32位
S_result=Fun_S(f,S)
# 置换算法P把S盒输出的32位数据打乱重排
P_result=zhihuan(S_result,P)
#print("P置换:"+P_result)
return P_result
# 加密函数,调用上述几个函数
def Encryption(MingWen, Kkid):
# 使用初始置换Ip实现第一步密码变换
Ipzhihuan = zhihuan(MingWen, IPtab)
print("初始置换:%s" % (str(Ipzhihuan)))
L = Ipzhihuan[0:32]
R = Ipzhihuan[32:64]
for i in range(0, 16):
temp=Fun_f(R, Kkid[i])
R_new=XOR(L,temp)
print("第%d个L:%s" % (i + 1, R))
print("第%d个R:%s\n" % (i + 1, R_new))
L=R
R=R_new
# 使用逆初始置换IP-1,生成最终密文
MiWen=zhihuan(R+L,tIPtable)
print("密文:"+MiWen+'\n\n')
return MiWen
# ----------------------------解密----------------------------
# 将64位密文当做明文输入,第一次使用密钥K16
def Decryption(MiWen,Kkid):
# 初始置换Ip
Ipzhihuan = zhihuan(MiWen, IPtab)
print("解密初始置换:%s" % (str(Ipzhihuan)))
L = Ipzhihuan[0:32]
R = Ipzhihuan[32:64]
'''相比于加密,多定义变量m,使密钥从16开始使用'''
m=15
for i in range(0, 16):
temp=Fun_f(R, Kkid[m])
R_new=XOR(L,temp)
print("第%d个L:%s" % (i + 1, R))
print("第%d个R:%s\n" % (i + 1, R_new))
L=R
R=R_new
m=m-1
# 使用逆初始置换IP-1,生成最终密文
MingWen=zhihuan(R+L,tIPtable)
print("解密后明文:"+MingWen)
return MingWen
# ----------------------------加解密----------------------------
# 因为加密函数与解密函数,大部分代码重合,现利用if函数将其合并
def En_De_cryption(text, Kkid,method):
# 使用初始置换Ip实现第一步密码变换
Ipzhihuan = zhihuan(text, IPtab)
#print("初始置换:%s" % (str(Ipzhihuan)))
L = Ipzhihuan[0:32]
R = Ipzhihuan[32:64]
for i in range(0, 16):
if(method=='1'):
temp=Fun_f(R,Kkid[i])
else:
temp=Fun_f(R, Kkid[15-i])
R_new=XOR(L,temp)
#print("第%d个L:%s" % (i + 1, R))
#print("第%d个R:%s\n" % (i + 1, R_new))
L=R #新的L是上一阶段的R
R=R_new #新的R是由F函数及XOR异或L得到的
# 使用逆初始置换IP-1,生成最终密文
text_new=zhihuan(R+L,tIPtable)
return text_new
# ----------------------------优化部分----------------------------
# 针对问题:1.输入字符串必须是二进制格式;2.输入字符串必须是64位
# 字符串转为二进制,一个字符转为八位的二进制
def StrToBinary(text):
temp=""
for i in text:
# 找到字节对应ASCII值
a=ord(i)
# 将ASCII值转化为二进制
b=bin(a)
if len(b)==8:
b='00'+b[2:]
else:
b='0'+b[2:]
temp=temp+b
return temp
# 二进制转字符串
def BinaryToStr(text):
temp=''
m=int(len(text)/8)
for i in range(0,m):
n = text[i*8]+'0'+text[i*8+1:i*8+8]
x = chr(int(n, 2))
temp=temp+x
return temp
# 不够64位补0
def deal_text(text):
while (len(text) < 64):
text = text + '0'
return text
# ----------------------------主函数----------------------------
if __name__ == '__main__':
# 自定义密钥及明文
'''
key = "0011000100110010001100110011010000110101001101100011011100111000"
MingWen = "0011000000110001001100100011001100110100001101010011011000110111"
# 得到16个子密钥
Kkid = Gen_key(key)
# 加密
MiWen=Encryption(MingWen, Kkid)
# 解密
MingWen_new=Decryption(MiWen,Kkid)
'''
# 优化一:程序可一直加解密,按退出键才可退出程序
'''
# 加解密函数
method=input('1.加密\n2.解密\n按换行键或其他数字,可退出,请输入要选择的操作(数字):\n')
while method.strip()!=""and(method=='1' or method=='2'):
method=int(method)
MingWen=input("请输入待加密/带解密的文本:\n")
text=En_De_cryption(MingWen,Kkid,method)
if(method=='1'):
print("加密后得到的密文为:"+text)
else:
print("解密后得到的明文为:"+text)
print('--------------------------------------------------------------------------------')
method = input('1.加密\n2.解密\n按换行键可退出,请输入(数字):\n')
'''
# 优化二:密钥及明文可输入八位以内的字母数字,例如abcd1234
method = input('1.加密\n2.解密\n按换行键或其他数字,可退出,请输入要选择的操作(数字):\n')
while method.strip() != "" and (method == '1' or method == '2'):
# 文本
if method=='1':
text = input("请输入待加密文本(8位的字母串):\n") # 一个字母转为二进制占8字节
text = StrToBinary(text) # 字母转二进制
if method=='2':
text = input("请输入待解密二进制串:\n")
text = deal_text(text) # 如果不满足64位,则后面补0
# 密钥
miyao = input("请输入密钥(8位的字母串):\n")
miyao=StrToBinary(miyao)
miyao = deal_text(miyao)
zimiyao=Gen_key(miyao)
# 加解密
result=En_De_cryption(text,zimiyao,method)
print("处理结果为:" + result)
if method== '2':
print('解密后明文为:'+BinaryToStr(result))
print('--------------------------------------------------------------------------------')
method = input('1.加密\n2.解密\n按换行键或其他数字,可退出,请输入要选择的操作(数字):\n')