亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? loki97.c

?? LOKI97加密解密算法,用C語言實現的一種加密解密算法。
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* * Implements the LOKI97 block cipher.<p> * * LOKI97 is a 128-bit symmetric block cipher with a 256-bit key schedule, * which may be initialised from 128, 192, or 256-bit keys. It uses 16 rounds * of data computation using a balanced feistel network with a complex * function f which incorporates two S-P layers. The 256-bit key schedule * uses 33 rounds of an unbalanced feistel network using the same complex * function f to generate the subkeys.<p> * * LOKI97 was written by Lawrie Brown (ADFA), Josef Pieprzyk, and Jennifer * Seberry (UOW) in 1997.<p> * * <b>Copyright</b> &copy; 1998 by <a href="mailto:Lawrie.Brown@adfa.oz.au"> * Lawrie Brown</a> & ITRACE (UNSW) * * <br>All rights reserved.<p> * * Author:  Lawrie Brown * * code derived from LOKI97 java implementation by Lawrie Brown & Raif Naffah *//* include standard AES C header file */#include "loki97.h"/* Global defines and variables */#define NAME	"LOKI97"#define DEBUG	0/* * Debug diagnostics. Valid values of symbolic constant DEBUG: <p> * * Values are:<dl compact> * <dt> 1 <dd> engine calls, * <dt> 2 <dd> enc/dec round values, * <dt> 3 <dd> subkeys, * <dt> 4 <dd> func f calls, * <dt> 5 <dd> func f internals, * <dt> 6 <dd> static init. </dl> */#define debuglevel DEBUG /*  LOKI97 algorithm specific constants and tables *//* ........................................................................... *//* Generator polynomial for S-box S1, in GF(2<sup>13</sup>). */#define S1_GEN 0x2911/* Size of S-box S1, for 13-bit inputs. */#define S1_SIZE 0x2000/* Table of pre-computed S-box S1 values. */static BYTE S1[S1_SIZE];/* Generator polynomial for S-box S2, in GF(2<sup>11</sup>). */#define S2_GEN 0xAA7/* Size of S-box S2, for 11-bit inputs. */#define S2_SIZE 0x800/* Table of pre-computed S-box S2 values. */static BYTE S2[S2_SIZE];/* Constant value for Delta which is used in the key schedule */static ULONG64 DELTA = {0x9E3779B9L, 0x7F4A7C15L};/* * Table specifying the pre-computed permutation P. * nb. precompute permutations for lowest 8 bits only, *     value of P is a 64-bit wide (long) mask of the permuted input value. */static ULONG64 P[0x100];/* Flag specifying whether once-off init of S1, S2 and P has been done */static int init_done = FALSE;/* prototypes for local utility functions */static int enECB(cipherInstance *cipher, keyInstance *key, BYTE *input, 		int inputLen, BYTE *outBuffer);static int enCBC(cipherInstance *cipher, keyInstance *key, BYTE *input, 		int inputLen, BYTE *outBuffer);static int enCFB1(cipherInstance *cipher, keyInstance *key, BYTE *input, 		int inputLen, BYTE *outBuffer);static int deECB(cipherInstance *cipher, keyInstance *key, BYTE *input,		int inputLen, BYTE *outBuffer);static int deCBC(cipherInstance *cipher, keyInstance *key, BYTE *input,		int inputLen, BYTE *outBuffer);static int deCFB1(cipherInstance *cipher, keyInstance *key, BYTE *input, 		int inputLen, BYTE *outBuffer);static ULONG64 f (ULONG64 A, ULONG64 B) ;static ULONG64 add64(ULONG64 a, ULONG64 b) ;static ULONG64 sub64(ULONG64 a, ULONG64 b) ;static int exp3 (int b, int g, int n) ;static int mult (int a, int b, int g, int n) ;static ULONG64 byteToULONG64(BYTE *inp) ;static BYTE *ULONG64ToBYTE(BYTE *buf, ULONG64 I) ;static BYTE *charToBYTE(BYTE *buf, char *hex, int len) ;static ULONG64 charToULONG64(char *hex) ;static int fromHex (char ch) ;static int puthex(BYTE *out, int len, FILE *f);/*  Initialise cipher, precompute S-boxes and permutation table *//* ......................................................................... */int cipherInit(cipherInstance *cipher, BYTE mode, char *IV){    int S1_MASK = S1_SIZE - 1;	/*  mask to select S1 input bits */    int S2_MASK = S2_SIZE - 1;	/*  mask to select S2 input bits */    int i, j, k;		/*  index into S-box, P bit , out bit */    int b;			/*  S-box fn input */    long pval;			/*  perm P mask for given input value */    BYTE *input;		/*  pointer into byte array for IV */    if (debuglevel) fprintf(stderr,"%s: cipherInit(mode=%d, IV=%s)\n", NAME, mode, IV);    if (!init_done) {        /*  precompute S-box tables for S1 and S2 */        if (debuglevel > 5) fprintf(stderr,"%s: Static init of S1, S2 & P \n", NAME);        for (i = 0; i < S1_SIZE; i++) { /*  for all S1 inputs */            b = i ^ S1_MASK; /*  compute input value */            S1[i] = exp3(b, S1_GEN, S1_SIZE); /*  compute fn value */            if (debuglevel > 5) fprintf(stderr,"%s: S1[%04X] = %02X\n", NAME, i, S1[i]);        }        for (i = 0; i < S2_SIZE; i++) { /*  for all S2 inputs */            b = i ^ S2_MASK; /*  compute input value */            S2[i] = exp3(b, S2_GEN, S2_SIZE); /*  compute fn value */            if (debuglevel > 5) fprintf(stderr,"%s: S2[%04X] = %02X\n", NAME, i, S2[i]);        }            /*  initialising expanded permutation P table (for lowest BYTE only) */        /*    Permutation P maps input bits [63..0] to outputs bits: */        /*    [56, 48, 40, 32, 24, 16,  8, 0, */        /*     57, 49, 41, 33, 25, 17,  9, 1, */        /*     58, 50, 42, 34, 26, 18, 10, 2, */        /*     59, 51, 43, 35, 27, 19, 11, 3, */        /*     60, 52, 44, 36, 28, 20, 12, 4, */        /*     61, 53, 45, 37, 29, 21, 13, 5, */        /*     62, 54, 46, 38, 30, 22, 14, 6, */        /*     63, 55, 47, 39, 31, 23, 15, 7]  <- this row only used in table */        /*   since it is so regular, we can construct it on the fly */        for (i = 0; i < 0x100; i++) { /*  loop over all 8-bit inputs */            /*  for each input bit permute to specified output position */            pval = 0L;            for (j = 0, k = 7; j < 4; j++, k += 8)	/* do right half of P */                pval |= (long)((i >> j) & 0x1) << k;            P[i].r = pval;            pval = 0L;            for (j = 4, k = 7; j < 8; j++, k += 8)	/* do left half of P */                pval |= (long)((i >> j) & 0x1) << k;            P[i].l = pval;            if (debuglevel > 5) fprintf(stderr,"%s: P[%02X] = %08X%08X\n", NAME, i, P[i].l, P[i].r);        }	/* and remember that init has been done */	init_done = TRUE;    }    /* now fill out cipherInstance structure */    cipher->mode = mode;				/* copy mode over */    if (IV != NULL) {					/* IV specified */	charToBYTE(cipher->IV,IV,sizeof(cipher->IV));	/* convert IV */        /*  pack IV into IVL and IVR */	input = cipher->IV;        cipher->IVL = byteToULONG64(input); input += 8;        cipher->IVR = byteToULONG64(input); input += 8;    } else {						/* no IV, so set to 0 */	memset(cipher->IV,0,sizeof(cipher->IV));	cipher->IVL.l = cipher->IVL.r = cipher->IVR.l = cipher->IVR.r = 0L;    }    cipher->blockSize = BLOCK_SIZE*8;			/* BLOCK_SIZE in bits */    /* decide correct return value */    if ((mode == MODE_ECB)||(mode == MODE_CBC)||(mode == MODE_CFB1))        return TRUE;    else        return BAD_CIPHER_MODE;}/* * Returns residue of base b to power 3 mod g in GF(2^n). * * @param b  Base of exponentiation, the exponent being always 3. * @param g  Irreducible polynomial generating Galois Field (GF(2^n)). * @param n  Size of the galois field. * @return (b ** 3) mod g. */static int exp3 (int b, int g, int n) {    int r = b;            /*  r = b */    if (b == 0)        return 0;    b = mult(r, b, g, n); /*  r = b ** 2 */    r = mult(r, b, g, n); /*  r = b ** 3 */    return r;}/* * Returns the product of two binary numbers a and b, using the * generator g as the modulus: p = (a * b) mod g. g Generates a * suitable Galois Field in GF(2^n). * * @param a  First multiplicand. * @param b  Second multiplicand. * @param g  Irreducible polynomial generating Galois Field. * @param n  Size of the galois field. * @return (a * b) mod g. */static int mult (int a, int b, int g, int n) {    int p = 0;    while (b != 0) {        if ((b & 0x01) != 0)            p ^= a;        a <<= 1;        if (a >= n)            a ^= g;        b >>= 1;    }    return p;}/*  Basic NIST API methods for LOKI97 *//* ......................................................................... *//* Expand a user-supplied key material into a LOKI97 session key.  */int makeKey(keyInstance *key, BYTE direction, int keyLen, char *keyMaterial){    ULONG64 k4, k3, k2, k1;		/*  key schedule 128-bit entities */    ULONG64 deltan = DELTA;		/*  multiples of delta */    ULONG64 t1, t2;			/*  temps used for doing 64-bit adds */    ULONG64 f_out;			/*  fn f output value for debug */    int i = 0;				/*  index into key input */    /*  do some basic sanity checks on the keyMaterial */    if ((key == NULL) || (keyMaterial == NULL)) return BAD_KEY_INSTANCE;    if (!(direction == DIR_ENCRYPT || direction == DIR_DECRYPT))        return BAD_KEY_DIR;    if (!(keyLen == 128 || keyLen == 192 || keyLen == 256))        return BAD_KEY_MAT;    /* fill out the keyInstance structure with input params */    key->direction = direction;    key->keyLen = keyLen;    strncpy(key->keyMaterial, keyMaterial, MAX_KEY_SIZE);    /*  convert ascii hex text into into 64-bit entities: k4, k3, k2, k1 */    k4 = charToULONG64(keyMaterial); keyMaterial += 16;    k3 = charToULONG64(keyMaterial); keyMaterial += 16;    if (keyLen == 128) {   /*  128-bit key - call fn f twice to gen 256 bits */        k2 = f(k3, k4);        k1 = f(k4, k3);    } else {                /*  192 or 256-bit key - pack k2 from key data */        k2 = charToULONG64(keyMaterial); keyMaterial += 16;        if (keyLen == 192) /*  192-bit key - call fn f once to gen 256 bits */            k1 = f(k4, k3);        else {              /*  256-bit key - pack k1 from key data */            k1 = charToULONG64(keyMaterial); keyMaterial += 16;        }    }    if (debuglevel) fprintf(stderr,"%s: makeKey(%08X%08X%08X%08X%08X%08X%08X%08X,%s)\n", NAME, k4.l, k4.r, k3.l, k3.r, k2.l, k2.r, k1.l, k1.r, direction?"Dec":"Enc");    /*  iterate over all LOKI97 rounds to generate the required subkeys */    for (i = 0; i < NUM_SUBKEYS; i++) {	t1 = add64(k1,k3);		/* compute f(k1+k3+n.delta,k2) */	t2 = add64(t1,deltan);        f_out = f(t2, k2);        key->SK[i].l = k4.l ^ f_out.l;	/*  compute next subkey using fn f */        key->SK[i].r = k4.r ^ f_out.r;        k4 = k3;			/*  exchange the other words around */        k3 = k2;        k2 = k1;        k1 = key->SK[i];        deltan = add64(deltan,DELTA);	/*  next multiple of delta */        if (debuglevel > 2) fprintf(stderr,"%s: SK[%02d]=%08X%08X\t", NAME, i, key->SK[i].l, key->SK[i].r);        if (debuglevel > 2) fprintf(stderr,"f=%08X%08X,\tdeltan=%08X%08X\n", f_out.l, f_out.r, deltan.l, deltan.r);    }    return TRUE;}/* ....................................................................... *//* * blockEncrypt(cipher,key,input,inputLen,outBuffer) - *     encrypt blocks of plaintext from input to outBuffer using cipher & key. */int blockEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, 		int inputLen, BYTE *outBuffer){    /*  do some basic sanity checks on params */    if (!init_done) return BAD_CIPHER_STATE;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
婷婷开心久久网| 国产区在线观看成人精品 | 亚洲一区二区三区四区的| 久久久久国产成人精品亚洲午夜| 91免费观看在线| 欧美中文字幕久久| 91福利精品第一导航| 色www精品视频在线观看| 99久久久久久| 在线观看不卡一区| 欧美日韩国产色站一区二区三区| 欧美日韩国产经典色站一区二区三区| 在线观看日韩国产| 91麻豆精品国产自产在线观看一区| 欧美亚一区二区| 777午夜精品视频在线播放| 欧美精品国产精品| 日韩亚洲欧美综合| 国产偷国产偷精品高清尤物| 欧美国产精品久久| 日韩av电影免费观看高清完整版在线观看| 亚洲综合视频网| 免费精品视频在线| eeuss鲁片一区二区三区| 色婷婷综合久久久| 日韩欧美不卡一区| 日韩一区日韩二区| 天堂资源在线中文精品| 国模冰冰炮一区二区| av电影在线观看完整版一区二区| 色婷婷综合在线| 日韩精品中文字幕一区| 国产精品免费免费| 午夜精品国产更新| 东方欧美亚洲色图在线| 精品视频一区三区九区| 欧美精品一区二区久久婷婷| 亚洲人成影院在线观看| 久久99精品久久久久久久久久久久| 成人免费黄色大片| 制服丝袜亚洲色图| 亚洲欧洲国产专区| 精品亚洲成a人| 欧洲精品视频在线观看| 国产区在线观看成人精品| 视频一区欧美日韩| 一本到不卡免费一区二区| 26uuuu精品一区二区| 亚洲夂夂婷婷色拍ww47| 国产一区在线观看视频| 欧美高清视频www夜色资源网| 久久色.com| 青青草精品视频| 精品视频一区二区三区免费| 中文字幕av一区二区三区高| 日本91福利区| 欧美日韩国产一二三| 国产精品国产成人国产三级| 国产在线一区观看| 在线不卡中文字幕播放| 日韩经典一区二区| 91亚洲精品久久久蜜桃网站| 欧美韩日一区二区三区四区| 午夜精品一区二区三区免费视频 | 亚洲日本青草视频在线怡红院| 免费成人在线网站| 7777精品伊人久久久大香线蕉的 | 欧美视频一区二区在线观看| 国产精品久久久久婷婷 | 中文字幕电影一区| 精彩视频一区二区| 精品剧情v国产在线观看在线| 亚洲va国产va欧美va观看| 欧美在线观看视频在线| 尤物av一区二区| 97精品视频在线观看自产线路二| 中文字幕免费不卡在线| 成人精品国产福利| 国产精品久久久久久久久快鸭| 国产一区二区视频在线| 国产三级一区二区| 国产一区二区免费视频| 久久综合九色综合久久久精品综合| 偷拍一区二区三区四区| 5858s免费视频成人| 视频精品一区二区| 欧美一区二区久久| 看电影不卡的网站| 国产日韩视频一区二区三区| 国产精品一区二区在线观看网站| 国产农村妇女毛片精品久久麻豆 | 欧美成人一区二区三区片免费 | 一本到不卡免费一区二区| 亚洲女同女同女同女同女同69| 色综合久久综合网| 日日夜夜免费精品| 欧美精品一区二区三区蜜桃| 国产成人高清在线| 亚洲无人区一区| 日韩欧美国产小视频| 高清免费成人av| 一区二区三区产品免费精品久久75| 欧美日韩中文另类| 韩国av一区二区| 亚洲人成精品久久久久| 777欧美精品| 国产精品18久久久久久久久| **欧美大码日韩| 日韩欧美精品在线视频| 成人手机电影网| 亚洲.国产.中文慕字在线| 久久久亚洲精华液精华液精华液| www.66久久| 久久国产精品99久久久久久老狼 | 欧美日韩免费一区二区三区视频| 日韩成人免费看| 国产精品毛片久久久久久| 欧美精品日韩综合在线| 成人av在线网站| 奇米亚洲午夜久久精品| 亚洲欧美偷拍三级| 久久久亚洲欧洲日产国码αv| 91搞黄在线观看| 国产一区二区精品久久| 亚洲一区二区偷拍精品| 欧美激情一区二区三区全黄| 日韩一区二区在线观看| 色成年激情久久综合| 国产在线精品一区在线观看麻豆| 亚洲午夜在线视频| 国产精品美女久久久久av爽李琼| 精品国产91乱码一区二区三区 | 国产精品看片你懂得| 777奇米四色成人影色区| 色综合天天综合给合国产| 国产精品99久| 精品一区二区三区不卡| 日韩中文字幕区一区有砖一区| 中文字幕五月欧美| www国产精品av| 日韩欧美一二三四区| 欧美高清hd18日本| 欧美在线免费播放| 欧美亚洲动漫精品| 日本精品视频一区二区| 91在线你懂得| 91在线免费视频观看| 99视频在线精品| av电影在线观看不卡| 成人黄动漫网站免费app| 国产99久久久国产精品潘金 | 色婷婷国产精品综合在线观看| 九色porny丨国产精品| 麻豆传媒一区二区三区| 日韩国产精品久久久久久亚洲| 亚洲电影你懂得| 日韩国产精品久久| 成人免费高清视频在线观看| 国产成人在线看| voyeur盗摄精品| 一本色道**综合亚洲精品蜜桃冫| 91麻豆国产精品久久| 色婷婷av一区二区| 色美美综合视频| 欧美另类久久久品| 欧美一区二区三区爱爱| 欧美久久一区二区| 日韩欧美国产一区在线观看| 久久久久久久网| 国产拍揄自揄精品视频麻豆| 亚洲欧洲日韩av| 五月天激情小说综合| 美女脱光内衣内裤视频久久影院| 麻豆91精品视频| 成人性视频免费网站| 色婷婷综合视频在线观看| 欧美精品免费视频| 精品999在线播放| 亚洲男女一区二区三区| 图片区小说区区亚洲影院| 精彩视频一区二区三区| 99re这里都是精品| 日韩一区二区三区视频在线观看 | 99r国产精品| 911国产精品| 欧美韩日一区二区三区| 亚洲国产一区视频| 国产精品456| 欧美日韩中字一区| 欧美国产精品专区| 日本欧美一区二区三区| av激情综合网| 精品欧美一区二区在线观看| 国产精品成人免费在线| 日韩精品一级二级| 成人a区在线观看| 国产精品久久久久aaaa樱花| 亚洲国产精品影院| 成人一级黄色片| 制服丝袜中文字幕一区|