亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tea.java

?? 支持IMAP/POP3協議的webmail源碼
?? JAVA
字號:
/* CVS ID: $Id: TEA.java,v 1.1.1.1 2002/10/02 18:42:50 wastl Exp $ */
package net.wastl.webmail.misc;

import java.math.*;

/**
* Tiny Encryption Algorithm.
* <P>
* (The following description is from the web page for the C and Assembler source
* code at <A HREF="http://vader.brad.ac.uk/tea/tea.shtml"> University of Bradford
* Yorkshire, England - The Cryptography & Computer Communications Security
* Group</A>) The description is used with the permission of the authors,
* Dr S J Shepherd and D A G Gillies.
* <P>
* The Tiny Encryption Algorithm is one of the fastest and most efficient
* cryptographic algorithms in existence. It was developed by David
* Wheeler and Roger Needham at the Computer Laboratory of Cambridge
* University. It is a Feistel cipher which uses operations from mixed
* (orthogonal) algebraic groups - XORs and additions in this case. It
* encrypts 64 data bits at a time using a 128-bit key. It seems highly
* resistant to differential cryptanalysis, and achieves complete
* diffusion (where a one bit difference in the plaintext will cause
* approximately 32 bit differences in the ciphertext) after only six
* rounds. Performance on a modern desktop computer or workstation is
* very impressive. 
* <P>
* TEA takes 64 bits of data in v[0] and v[1], and 128 bits of key in
* k[0] - k[3]. The result is returned in w[0] and w[1]. Returning the
* result separately makes implementation of cipher modes other than
* Electronic Code Book a little bit easier.
* <P>
* TEA can be operated in any of the modes of DES.
* <P>
* n is the number of iterations. 32 is ample, 16 is sufficient, as few
* as eight should be OK for most applications, especially ones where
* the data age quickly (real-time video, for example). The algorithm
* achieves good dispersion after six iterations. The iteration count
* can be made variable if required.
* <P>
* Note this algorithm is optimised for 32-bit CPUs with fast shift
* capabilities. It can very easily be ported to assembly language on
* most CPUs.
* <P>
* delta is chosen to be the Golden ratio ((5/4)1/2 - 1/2 ~ 0.618034)
* multiplied by 232. On entry to decipher(), sum is set to be delta *
* n. Which way round you call the functions is arbitrary: DK(EK(P)) =
* EK(DK(P)) where EK and DK are encryption and decryption under key K
* respectively. 
* <P>
* Translator's notes:
* <UL>
* <LI> Although the <I>this algorithm is optimised for
* 32-bit CPUs with fast shift capabilities</I> Java manages to throw
* it all away by not providing unsigned values resulting in the excessive
* use of AND's to prevent sign extension on promotion of a byte 
* to an integer.
* </LI>
* <P>
* <LI>
* The following description is taken from the
* Mach5 Software cryptography archives at
* <A HREF="http://www.mach5.com/crypto/">www.mach5.com/crypto</A>.
* <p><font face="Arial" size="4">Tiny Encryption Algorithm (TEA)</font><br>
* <font size="3" face="Arial">TEA is a cryptographic algorithm designed to minimize memory
* footprint, and maximize speed. However, the cryptographers from <a
*
* href="http://www.counterpane.com">Counterpane Systems</a> have <a
*
* href="http://www.cs.berkeley.edu/~daw/keysched-crypto96.ps">discovered three related-key
* attacks </a>on TEA, the best of which requires only 223 chosen plaintexts and one related
* key query. The problems arise from the overly simple key schedule. Each TEA key can be
* found to have three other equivalent keys, as described in <a
*
* href="http://www.cs.berkeley.edu/~daw/keysched-icics97.ps">a paper</a> by <a
*
* href="http://www.cs.berkeley.edu/~daw/">David Wagner</a>, John Kelsey, and <a
*
* href="http://www.counterpane.com/schneier.html">Bruce Schneier</a>. This precludes the
* possibility of using TEA as a hash function. Roger Needham and David Wheeler have proposed
* <a href="http://www.cl.cam.ac.uk/ftp/users/djw3/xtea.ps">extensions to TEA</a> that
* counters the above attacks.</font></p>
* </LI>
* </UL>
*
* <P> Example of use:
* <PRE>
* byte key[] = new BigInteger("39e858f86df9b909a8c87cb8d9ad599", 16).toByteArray();
* TEA t = new TEA(key);
* <BR>
* String src = "hello world!";
* System.out.println("input = " + src);
* byte plainSource[] = src.getBytes();
* int enc[] = t.encode(plainSource, plainSource.length);
* System.out.println(t.padding() + " bytes added as padding.");
* byte dec[] = t.decode(enc);
* System.out.println("output = " + new String(dec));
* </PRE>
*
* @author Translated by Michael Lecuyer (mjl@theorem.com) from the C Language.
* @version 1.0 Sep 8, 1998
* @since JDK1.1
*/

public class TEA
{
   private int _key[];  // The 128 bit key.
   private byte _keyBytes[];  // original key as found
   private int _padding;      // amount of padding added in byte --> integer conversion.

   /**
   * Encodes and decodes "Hello world!" for your personal pleasure.
   */
   public static void main(String args[])
   {
      // A simple test of TEA.

      byte key[] = new BigInteger("39e858f86df9b909a8c87cb8d9ad599", 16).toByteArray();
      TEA t = new TEA(key);

      String src = "hello world!";
      System.out.println("input = " + src);
      byte plainSource[] = src.getBytes();
      int enc[] = t.encode(plainSource, plainSource.length);
      System.out.println(t.padding() + " bytes added as padding.");
      byte dec[] = t.decode(enc);
      System.out.println("output = " + new String(dec));
   }

   /**
   * Accepts key for enciphering/deciphering.
   *
   * @throws ArrayIndexOutOfBoundsException if the key isn't the correct length.
   *
   * @param key 128 bit (16 byte) key.
   */
   public TEA(byte key[])
   {
      int klen = key.length;
      _key = new int[4];
      
      // Incorrect key length throws exception.
      if (klen != 16)
         throw new ArrayIndexOutOfBoundsException(this.getClass().getName() + ": Key is not 16 bytes");

      int j, i;
      for (i = 0, j = 0; j < klen; j += 4, i++)
         _key[i] = (key[j] << 24 ) | (((key[j+1])&0xff) << 16) | (((key[j+2])&0xff) << 8) | ((key[j+3])&0xff);

      _keyBytes = key;  // save for toString.
   }

   /**
   * Representation of TEA class
   */
   public String toString()
   {
      String tea = this.getClass().getName();
      tea +=  ": Tiny Encryption Algorithm (TEA)  key: " + dumpBytes(_keyBytes);
      return tea;
   }

   /**
   * Encipher two <code>int</code>s.
   * Replaces the original contents of the parameters with the results.
   * The integers are usually created from 8 bytes.
   * The usual way to collect bytes to the int array is:
   * <PRE>
   * byte ba[] = { .... };
   * int v[] = new int[2];
   * v[0] = (ba[j] << 24 ) | (((ba[j+1])&0xff) << 16) | (((ba[j+2])&0xff) << 8) | ((ba[j+3])&0xff);
   * v[1] = (ba[j+4] << 24 ) | (((ba[j+5])&0xff) << 16) | (((ba[j+6])&0xff) << 8) | ((ba[j+7])&0xff);
   * v = encipher(v);
   * </PRE>
   *
   * @param v two <code>int</code> array as input. 
   *
   * @return array of two <code>int</code>s, enciphered.
   */
   public int [] encipher(int v[])
   {
      int y=v[0];
      int z=v[1];
      int sum=0;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      while(n-->0)
      {
         sum += delta;
         y += (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         z += (y << 4)+c ^ y+sum ^ (y >> 5)+d;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Decipher two <code>int</code>s.
   * Replaces the original contents of the parameters with the results.
   * The integers are usually decocted to 8 bytes.
   * The decoction of the <code>int</code>s to bytes can be done
   * this way.
   * <PRE>
   * int x[] = decipher(ins);
   * outb[j]   = (byte)(x[0] >>> 24);
   * outb[j+1] = (byte)(x[0] >>> 16);
   * outb[j+2] = (byte)(x[0] >>> 8);
   * outb[j+3] = (byte)(x[0]);
   * outb[j+4] = (byte)(x[1] >>> 24);
   * outb[j+5] = (byte)(x[1] >>> 16);
   * outb[j+6] = (byte)(x[1] >>> 8);
   * outb[j+7] = (byte)(x[1]);
   * </PRE>
   *
   * @param v <code>int</code> array of 2
   *
   * @return deciphered <code>int</code> array of 2
   */
   public int [] decipher(int v[])
   {
      int y=v[0];
      int z=v[1];
      int sum=0xC6EF3720;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      // sum = delta<<5, in general sum = delta * n 

      while(n-->0)
      {
         z -= (y << 4)+c ^ y+sum ^ (y >> 5) + d;
         y -= (z << 4)+a ^ z+sum ^ (z >> 5) + b;
         sum -= delta;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Encipher two <code>bytes</code>s.
   *
   * @param v <code>byte</code> array of 2
   *
   * @return enciphered <code>byte</code> array of 2
   */
   public byte [] encipher(byte v[])
   {
      byte y=v[0];
      byte z=v[1];
      int sum=0;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      while(n-->0)
      {
         sum += delta;
         y += (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         z += (y << 4)+c ^ y+sum ^ (y >> 5)+d;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Decipher two <code>bytes</code>s.
   *
   * @param v <code>byte</code> array of 2
   *
   * @return decipherd <code>byte</code> array of 2
   */
   public byte [] decipher(byte v[])
   {
      byte y=v[0];
      byte z=v[1];
      int sum=0xC6EF3720;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      // sum = delta<<5, in general sum = delta * n 

      while(n-->0)
      {
         z -= (y << 4)+c ^ y+sum ^ (y >> 5)+d;
         y -= (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         sum -= delta;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Byte wrapper for encoding.
   * Converts bytes to ints.
   * Padding will be added if required.
   *
   * @param b incoming <code>byte</code> array
   *
   * @param byte count
   *
   * @return integer conversion array, possibly with padding.
   *
   * @see #padding
   */
   int [] encode(byte b[], int count)
   {
      int j ,i;
      int bLen = count;
      byte bp[] = b;

      _padding = bLen % 8;
      if (_padding != 0)   // Add some padding, if necessary.
      {
         _padding = 8 - (bLen % 8);
         bp = new byte[bLen + _padding];
         System.arraycopy(b, 0, bp, 0, bLen);
         bLen = bp.length;
      }

      int intCount = bLen / 4;
      int r[] = new int[2];
      int out[] = new int[intCount];

      for (i = 0, j = 0; j < bLen; j += 8, i += 2)
      {
         // Java's unforgivable lack of unsigneds causes more bit
         // twiddling than this language really needs.
         r[0] = (bp[j] << 24 ) | (((bp[j+1])&0xff) << 16) | (((bp[j+2])&0xff) << 8) | ((bp[j+3])&0xff);
         r[1] = (bp[j+4] << 24 ) | (((bp[j+5])&0xff) << 16) | (((bp[j+6])&0xff) << 8) | ((bp[j+7])&0xff);
         encipher(r);
         out[i] = r[0];
         out[i+1] = r[1];
      }

      return out;
   }

   /**
   * Report how much padding was done in the last encode.
   *
   * @return bytes of padding added
   *
   * @see #encode
   */
   public int padding()
   {
      return _padding;
   }

   /**
   * Convert a byte array to ints and then decode.
   * There may be some padding at the end of the byte array from
   * the previous encode operation.
   *
   * @param b bytes to decode
   * @param count number of bytes in the array to decode
   *
   * @return <code>byte</code> array of decoded bytes.
   */
   public byte [] decode(byte b[], int count)
   {
      int i, j;

      int intCount = count / 4;
      int ini[] = new int[intCount];
      for (i = 0, j = 0; i < intCount; i += 2, j += 8)
      {
         ini[i] = (b[j] << 24 ) | (((b[j+1])&0xff) << 16) | (((b[j+2])&0xff) << 8) | ((b[j+3])&0xff);
         ini[i+1] = (b[j+4] << 24 ) | (((b[j+5])&0xff) << 16) | (((b[j+6])&0xff) << 8) | ((b[j+7])&0xff);
      }
      return decode(ini);
   }

   /**
   * Decode an integer array.
   * There may be some padding at the end of the byte array from
   * the previous encode operation.
   *
   * @param b bytes to decode
   * @param count number of bytes in the array to decode
   *
   * @return <code>byte</code> array of decoded bytes.
   */
   public byte [] decode(int b[])
   {
      // create the large number and start stripping ints out, two at a time.
      int intCount = b.length;

      byte outb[] = new byte[intCount * 4];
      int tmp[] = new int[2];

      // decipher all the ints.
      int i, j;
      for (j = 0, i = 0; i < intCount; i += 2, j += 8)
      {
         tmp[0] = b[i];
         tmp[1] = b[i+1];
         decipher(tmp);
         outb[j]   = (byte)(tmp[0] >>> 24);
         outb[j+1] = (byte)(tmp[0] >>> 16);
         outb[j+2] = (byte)(tmp[0] >>> 8);
         outb[j+3] = (byte)(tmp[0]);
         outb[j+4] = (byte)(tmp[1] >>> 24);
         outb[j+5] = (byte)(tmp[1] >>> 16);
         outb[j+6] = (byte)(tmp[1] >>> 8);
         outb[j+7] = (byte)(tmp[1]);
      }

      return outb;
   }


   // Display some bytes in HEX.
   //
   private String dumpBytes(byte b[])
   {
      StringBuffer r = new StringBuffer();
      final String hex = "0123456789ABCDEF";

      for (int i = 0; i < b.length; i++)
      {
         int c = ((b[i]) >>> 4) & 0xf;
         r.append(hex.charAt(c));
         c = ((int)b[i] & 0xf);
         r.append(hex.charAt(c));
      }

      return r.toString();
   }

}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕av在线一区二区三区| 久久久美女毛片| 97久久超碰国产精品| 盗摄精品av一区二区三区| 91免费国产在线观看| 欧美一区中文字幕| 国产精品狼人久久影院观看方式| 亚洲国产一二三| 国产**成人网毛片九色| 欧美久久免费观看| 国产网红主播福利一区二区| 亚洲bt欧美bt精品777| 国产a视频精品免费观看| 欧美天天综合网| 国产精品色噜噜| 狠狠色丁香婷综合久久| av影院午夜一区| 欧美精品第一页| 国产日韩欧美a| 一区二区三区精品| 国产精品91一区二区| 欧美吻胸吃奶大尺度电影 | 久久久激情视频| 亚洲超丰满肉感bbw| 国产麻豆成人传媒免费观看| 精品视频在线免费看| 国产精品色在线观看| 日本在线播放一区二区三区| 欧美在线一二三四区| 国产精品视频麻豆| 久久99久久久欧美国产| 欧美日韩国产不卡| 亚洲日本成人在线观看| 丁香婷婷综合色啪| 久久综合久久综合九色| 蜜臀av亚洲一区中文字幕| 欧美日韩视频在线观看一区二区三区| 国产精品久久久久婷婷| 国产91精品一区二区| 26uuu色噜噜精品一区| 久久国产乱子精品免费女| 国产欧美久久久精品影院| 久久国产精品99久久久久久老狼| 欧美怡红院视频| 一区二区三区在线观看国产| 91色.com| 一区二区三区.www| 色婷婷综合中文久久一本| 亚洲日本一区二区三区| 99精品桃花视频在线观看| 亚洲色图欧美激情| 91精品福利视频| 亚洲最大成人网4388xx| 欧美午夜理伦三级在线观看| 午夜成人在线视频| 欧美放荡的少妇| 久久99精品国产.久久久久久| 精品乱码亚洲一区二区不卡| 国产一区二区h| 国产精品女上位| 色婷婷国产精品| 亚洲综合免费观看高清在线观看| 欧美午夜一区二区三区| 免费成人在线播放| 精品国产1区二区| 99久久久久久| 亚洲高清免费视频| 精品国产免费一区二区三区香蕉 | 成人午夜看片网址| 一区二区在线看| 日韩西西人体444www| 国产呦精品一区二区三区网站| 国产人久久人人人人爽| 91免费视频网| 日韩高清电影一区| 国产日本欧美一区二区| 欧美视频在线一区| 麻豆成人免费电影| 1区2区3区精品视频| 欧美精选一区二区| 国产成人丝袜美腿| 亚洲已满18点击进入久久| 日韩欧美在线影院| 99久久精品国产毛片| 免费观看30秒视频久久| 国产精品久久久久久久岛一牛影视 | 久久综合色鬼综合色| 91小视频在线| 国内精品久久久久影院薰衣草| 亚洲欧洲色图综合| 日韩美女主播在线视频一区二区三区| 成人激情视频网站| 日本亚洲电影天堂| 亚洲欧洲国产日韩| 精品国产乱码久久久久久久久| 色婷婷久久99综合精品jk白丝| 另类小说综合欧美亚洲| 亚洲男人电影天堂| 国产日韩欧美精品在线| 欧美一区二区三区在线视频| 91蜜桃在线观看| 国产二区国产一区在线观看| 日韩在线播放一区二区| ...xxx性欧美| 国产欧美综合在线观看第十页| 欧美性欧美巨大黑白大战| av在线播放成人| 国产成人免费xxxxxxxx| 久久不见久久见免费视频1| 一区二区三区欧美久久| 欧美国产欧美综合| 26uuu色噜噜精品一区| 欧美一级黄色大片| 欧美精品乱码久久久久久| 91丨porny丨国产| 久久在线观看免费| 欧美猛男男办公室激情| 欧美色视频一区| 色欧美乱欧美15图片| av成人动漫在线观看| 国产在线播精品第三| 国产一区二区三区av电影| 麻豆一区二区在线| 蜜臀久久99精品久久久久宅男| 亚洲va国产天堂va久久en| 亚洲一区二区五区| 亚洲一区二区三区四区在线免费观看 | 久久久久亚洲综合| 欧美性大战久久久| 欧美在线你懂得| 欧美日韩国产一区二区三区地区| 欧美熟乱第一页| 欧美裸体bbwbbwbbw| 欧美日本视频在线| 欧美久久久久中文字幕| 欧美一级黄色录像| 精品国产三级电影在线观看| ww久久中文字幕| 久久看人人爽人人| 国产精品青草久久| 亚洲欧美偷拍另类a∨色屁股| 亚洲欧美日本韩国| 有码一区二区三区| www.激情成人| 色一区在线观看| 欧美久久久一区| 精品国免费一区二区三区| 久久久久久麻豆| 成人免费在线播放视频| 亚洲电影一区二区| 久久成人免费网站| 不卡的av在线播放| 欧美日韩视频在线第一区| 日韩欧美一区二区视频| 国产欧美日韩麻豆91| 亚洲三级免费观看| 日本成人在线网站| 成人毛片在线观看| 欧美中文字幕不卡| 久久综合中文字幕| 亚洲欧美国产三级| 日本伊人午夜精品| www.欧美.com| 日韩一区二区三区av| 国产精品日日摸夜夜摸av| 亚洲一区在线电影| 国产精品99久久久久久似苏梦涵| 91女厕偷拍女厕偷拍高清| 欧美一区二区三区视频在线| 国产精品系列在线| 免费一级片91| 91老司机福利 在线| 日韩免费一区二区三区在线播放| 国产精品久久福利| 青青草原综合久久大伊人精品| 成人自拍视频在线观看| 7777精品伊人久久久大香线蕉完整版| 国产农村妇女精品| 美国毛片一区二区三区| 在线欧美一区二区| 欧美激情一区三区| 麻豆精品久久精品色综合| 在线看日韩精品电影| 日本一区免费视频| 久久99精品国产麻豆不卡| 欧美在线制服丝袜| 国产精品网曝门| 激情久久五月天| 欧美丰满嫩嫩电影| 一区二区在线观看视频| 成人aaaa免费全部观看| 精品999在线播放| 丝袜国产日韩另类美女| 色老头久久综合| 一区二区中文字幕在线| 国产高清成人在线| 日韩免费看的电影| 麻豆国产欧美一区二区三区| 欧美放荡的少妇| 亚洲欧美精品午睡沙发|