亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tea.java

?? 郵局系統(tǒng)
?? JAVA
字號:
/* CVS ID: $Id: TEA.java,v 1.2 2000/04/06 08:02:02 wastl Exp $ */
package net.wastl.webmail.misc;

import java.math.*;

/**
* Tiny Encryption Algorithm.
* <P>
* (The following description is from the web page for the C and Assembler source
* code at <A HREF="http://vader.brad.ac.uk/tea/tea.shtml"> University of Bradford
* Yorkshire, England - The Cryptography & Computer Communications Security
* Group</A>) The description is used with the permission of the authors,
* Dr S J Shepherd and D A G Gillies.
* <P>
* The Tiny Encryption Algorithm is one of the fastest and most efficient
* cryptographic algorithms in existence. It was developed by David
* Wheeler and Roger Needham at the Computer Laboratory of Cambridge
* University. It is a Feistel cipher which uses operations from mixed
* (orthogonal) algebraic groups - XORs and additions in this case. It
* encrypts 64 data bits at a time using a 128-bit key. It seems highly
* resistant to differential cryptanalysis, and achieves complete
* diffusion (where a one bit difference in the plaintext will cause
* approximately 32 bit differences in the ciphertext) after only six
* rounds. Performance on a modern desktop computer or workstation is
* very impressive. 
* <P>
* TEA takes 64 bits of data in v[0] and v[1], and 128 bits of key in
* k[0] - k[3]. The result is returned in w[0] and w[1]. Returning the
* result separately makes implementation of cipher modes other than
* Electronic Code Book a little bit easier.
* <P>
* TEA can be operated in any of the modes of DES.
* <P>
* n is the number of iterations. 32 is ample, 16 is sufficient, as few
* as eight should be OK for most applications, especially ones where
* the data age quickly (real-time video, for example). The algorithm
* achieves good dispersion after six iterations. The iteration count
* can be made variable if required.
* <P>
* Note this algorithm is optimised for 32-bit CPUs with fast shift
* capabilities. It can very easily be ported to assembly language on
* most CPUs.
* <P>
* delta is chosen to be the Golden ratio ((5/4)1/2 - 1/2 ~ 0.618034)
* multiplied by 232. On entry to decipher(), sum is set to be delta *
* n. Which way round you call the functions is arbitrary: DK(EK(P)) =
* EK(DK(P)) where EK and DK are encryption and decryption under key K
* respectively. 
* <P>
* Translator's notes:
* <UL>
* <LI> Although the <I>this algorithm is optimised for
* 32-bit CPUs with fast shift capabilities</I> Java manages to throw
* it all away by not providing unsigned values resulting in the excessive
* use of AND's to prevent sign extension on promotion of a byte 
* to an integer.
* </LI>
* <P>
* <LI>
* The following description is taken from the
* Mach5 Software cryptography archives at
* <A HREF="http://www.mach5.com/crypto/">www.mach5.com/crypto</A>.
* <p><font face="Arial" size="4">Tiny Encryption Algorithm (TEA)</font><br>
* <font size="3" face="Arial">TEA is a cryptographic algorithm designed to minimize memory
* footprint, and maximize speed. However, the cryptographers from <a
*
* href="http://www.counterpane.com">Counterpane Systems</a> have <a
*
* href="http://www.cs.berkeley.edu/~daw/keysched-crypto96.ps">discovered three related-key
* attacks </a>on TEA, the best of which requires only 223 chosen plaintexts and one related
* key query. The problems arise from the overly simple key schedule. Each TEA key can be
* found to have three other equivalent keys, as described in <a
*
* href="http://www.cs.berkeley.edu/~daw/keysched-icics97.ps">a paper</a> by <a
*
* href="http://www.cs.berkeley.edu/~daw/">David Wagner</a>, John Kelsey, and <a
*
* href="http://www.counterpane.com/schneier.html">Bruce Schneier</a>. This precludes the
* possibility of using TEA as a hash function. Roger Needham and David Wheeler have proposed
* <a href="http://www.cl.cam.ac.uk/ftp/users/djw3/xtea.ps">extensions to TEA</a> that
* counters the above attacks.</font></p>
* </LI>
* </UL>
*
* <P> Example of use:
* <PRE>
* byte key[] = new BigInteger("39e858f86df9b909a8c87cb8d9ad599", 16).toByteArray();
* TEA t = new TEA(key);
* <BR>
* String src = "hello world!";
* System.out.println("input = " + src);
* byte plainSource[] = src.getBytes();
* int enc[] = t.encode(plainSource, plainSource.length);
* System.out.println(t.padding() + " bytes added as padding.");
* byte dec[] = t.decode(enc);
* System.out.println("output = " + new String(dec));
* </PRE>
*
* @author Translated by Michael Lecuyer (mjl@theorem.com) from the C Language.
* @version 1.0 Sep 8, 1998
* @since JDK1.1
*/

public class TEA
{
   private int _key[];  // The 128 bit key.
   private byte _keyBytes[];  // original key as found
   private int _padding;      // amount of padding added in byte --> integer conversion.

   /**
   * Encodes and decodes "Hello world!" for your personal pleasure.
   */
   public static void main(String args[])
   {
      // A simple test of TEA.

      byte key[] = new BigInteger("39e858f86df9b909a8c87cb8d9ad599", 16).toByteArray();
      TEA t = new TEA(key);

      String src = "hello world!";
      System.out.println("input = " + src);
      byte plainSource[] = src.getBytes();
      int enc[] = t.encode(plainSource, plainSource.length);
      System.out.println(t.padding() + " bytes added as padding.");
      byte dec[] = t.decode(enc);
      System.out.println("output = " + new String(dec));
   }

   /**
   * Accepts key for enciphering/deciphering.
   *
   * @throws ArrayIndexOutOfBoundsException if the key isn't the correct length.
   *
   * @param key 128 bit (16 byte) key.
   */
   public TEA(byte key[])
   {
      int klen = key.length;
      _key = new int[4];
      
      // Incorrect key length throws exception.
      if (klen != 16)
         throw new ArrayIndexOutOfBoundsException(this.getClass().getName() + ": Key is not 16 bytes");

      int j, i;
      for (i = 0, j = 0; j < klen; j += 4, i++)
         _key[i] = (key[j] << 24 ) | (((key[j+1])&0xff) << 16) | (((key[j+2])&0xff) << 8) | ((key[j+3])&0xff);

      _keyBytes = key;  // save for toString.
   }

   /**
   * Representation of TEA class
   */
   public String toString()
   {
      String tea = this.getClass().getName();
      tea +=  ": Tiny Encryption Algorithm (TEA)  key: " + dumpBytes(_keyBytes);
      return tea;
   }

   /**
   * Encipher two <code>int</code>s.
   * Replaces the original contents of the parameters with the results.
   * The integers are usually created from 8 bytes.
   * The usual way to collect bytes to the int array is:
   * <PRE>
   * byte ba[] = { .... };
   * int v[] = new int[2];
   * v[0] = (ba[j] << 24 ) | (((ba[j+1])&0xff) << 16) | (((ba[j+2])&0xff) << 8) | ((ba[j+3])&0xff);
   * v[1] = (ba[j+4] << 24 ) | (((ba[j+5])&0xff) << 16) | (((ba[j+6])&0xff) << 8) | ((ba[j+7])&0xff);
   * v = encipher(v);
   * </PRE>
   *
   * @param v two <code>int</code> array as input. 
   *
   * @return array of two <code>int</code>s, enciphered.
   */
   public int [] encipher(int v[])
   {
      int y=v[0];
      int z=v[1];
      int sum=0;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      while(n-->0)
      {
         sum += delta;
         y += (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         z += (y << 4)+c ^ y+sum ^ (y >> 5)+d;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Decipher two <code>int</code>s.
   * Replaces the original contents of the parameters with the results.
   * The integers are usually decocted to 8 bytes.
   * The decoction of the <code>int</code>s to bytes can be done
   * this way.
   * <PRE>
   * int x[] = decipher(ins);
   * outb[j]   = (byte)(x[0] >>> 24);
   * outb[j+1] = (byte)(x[0] >>> 16);
   * outb[j+2] = (byte)(x[0] >>> 8);
   * outb[j+3] = (byte)(x[0]);
   * outb[j+4] = (byte)(x[1] >>> 24);
   * outb[j+5] = (byte)(x[1] >>> 16);
   * outb[j+6] = (byte)(x[1] >>> 8);
   * outb[j+7] = (byte)(x[1]);
   * </PRE>
   *
   * @param v <code>int</code> array of 2
   *
   * @return deciphered <code>int</code> array of 2
   */
   public int [] decipher(int v[])
   {
      int y=v[0];
      int z=v[1];
      int sum=0xC6EF3720;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      // sum = delta<<5, in general sum = delta * n 

      while(n-->0)
      {
         z -= (y << 4)+c ^ y+sum ^ (y >> 5) + d;
         y -= (z << 4)+a ^ z+sum ^ (z >> 5) + b;
         sum -= delta;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Encipher two <code>bytes</code>s.
   *
   * @param v <code>byte</code> array of 2
   *
   * @return enciphered <code>byte</code> array of 2
   */
   public byte [] encipher(byte v[])
   {
      byte y=v[0];
      byte z=v[1];
      int sum=0;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      while(n-->0)
      {
         sum += delta;
         y += (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         z += (y << 4)+c ^ y+sum ^ (y >> 5)+d;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Decipher two <code>bytes</code>s.
   *
   * @param v <code>byte</code> array of 2
   *
   * @return decipherd <code>byte</code> array of 2
   */
   public byte [] decipher(byte v[])
   {
      byte y=v[0];
      byte z=v[1];
      int sum=0xC6EF3720;
      int delta=0x9E3779B9;
      int a=_key[0];
      int b=_key[1];
      int c=_key[2];
      int d=_key[3];
      int n=32;

      // sum = delta<<5, in general sum = delta * n 

      while(n-->0)
      {
         z -= (y << 4)+c ^ y+sum ^ (y >> 5)+d;
         y -= (z << 4)+a ^ z+sum ^ (z >> 5)+b;
         sum -= delta;
      }

      v[0] = y;
      v[1] = z;

      return v;
   }

   /**
   * Byte wrapper for encoding.
   * Converts bytes to ints.
   * Padding will be added if required.
   *
   * @param b incoming <code>byte</code> array
   *
   * @param byte count
   *
   * @return integer conversion array, possibly with padding.
   *
   * @see #padding
   */
   int [] encode(byte b[], int count)
   {
      int j ,i;
      int bLen = count;
      byte bp[] = b;

      _padding = bLen % 8;
      if (_padding != 0)   // Add some padding, if necessary.
      {
         _padding = 8 - (bLen % 8);
         bp = new byte[bLen + _padding];
         System.arraycopy(b, 0, bp, 0, bLen);
         bLen = bp.length;
      }

      int intCount = bLen / 4;
      int r[] = new int[2];
      int out[] = new int[intCount];

      for (i = 0, j = 0; j < bLen; j += 8, i += 2)
      {
         // Java's unforgivable lack of unsigneds causes more bit
         // twiddling than this language really needs.
         r[0] = (bp[j] << 24 ) | (((bp[j+1])&0xff) << 16) | (((bp[j+2])&0xff) << 8) | ((bp[j+3])&0xff);
         r[1] = (bp[j+4] << 24 ) | (((bp[j+5])&0xff) << 16) | (((bp[j+6])&0xff) << 8) | ((bp[j+7])&0xff);
         encipher(r);
         out[i] = r[0];
         out[i+1] = r[1];
      }

      return out;
   }

   /**
   * Report how much padding was done in the last encode.
   *
   * @return bytes of padding added
   *
   * @see #encode
   */
   public int padding()
   {
      return _padding;
   }

   /**
   * Convert a byte array to ints and then decode.
   * There may be some padding at the end of the byte array from
   * the previous encode operation.
   *
   * @param b bytes to decode
   * @param count number of bytes in the array to decode
   *
   * @return <code>byte</code> array of decoded bytes.
   */
   public byte [] decode(byte b[], int count)
   {
      int i, j;

      int intCount = count / 4;
      int ini[] = new int[intCount];
      for (i = 0, j = 0; i < intCount; i += 2, j += 8)
      {
         ini[i] = (b[j] << 24 ) | (((b[j+1])&0xff) << 16) | (((b[j+2])&0xff) << 8) | ((b[j+3])&0xff);
         ini[i+1] = (b[j+4] << 24 ) | (((b[j+5])&0xff) << 16) | (((b[j+6])&0xff) << 8) | ((b[j+7])&0xff);
      }
      return decode(ini);
   }

   /**
   * Decode an integer array.
   * There may be some padding at the end of the byte array from
   * the previous encode operation.
   *
   * @param b bytes to decode
   * @param count number of bytes in the array to decode
   *
   * @return <code>byte</code> array of decoded bytes.
   */
   public byte [] decode(int b[])
   {
      // create the large number and start stripping ints out, two at a time.
      int intCount = b.length;

      byte outb[] = new byte[intCount * 4];
      int tmp[] = new int[2];

      // decipher all the ints.
      int i, j;
      for (j = 0, i = 0; i < intCount; i += 2, j += 8)
      {
         tmp[0] = b[i];
         tmp[1] = b[i+1];
         decipher(tmp);
         outb[j]   = (byte)(tmp[0] >>> 24);
         outb[j+1] = (byte)(tmp[0] >>> 16);
         outb[j+2] = (byte)(tmp[0] >>> 8);
         outb[j+3] = (byte)(tmp[0]);
         outb[j+4] = (byte)(tmp[1] >>> 24);
         outb[j+5] = (byte)(tmp[1] >>> 16);
         outb[j+6] = (byte)(tmp[1] >>> 8);
         outb[j+7] = (byte)(tmp[1]);
      }

      return outb;
   }


   // Display some bytes in HEX.
   //
   private String dumpBytes(byte b[])
   {
      StringBuffer r = new StringBuffer();
      final String hex = "0123456789ABCDEF";

      for (int i = 0; i < b.length; i++)
      {
         int c = ((b[i]) >>> 4) & 0xf;
         r.append(hex.charAt(c));
         c = ((int)b[i] & 0xf);
         r.append(hex.charAt(c));
      }

      return r.toString();
   }

}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美日韩国产综合在线 | 国产精品久久久久婷婷| 欧美日韩五月天| 欧美日韩一区高清| 欧美日本不卡视频| 欧美日韩www| 欧美一区2区视频在线观看| 91麻豆精品久久久久蜜臀| 91精品国产综合久久精品麻豆 | 日韩三级伦理片妻子的秘密按摩| 91豆麻精品91久久久久久| 在线免费视频一区二区| 欧美撒尿777hd撒尿| 欧美一级理论片| 久久天堂av综合合色蜜桃网| 久久精品视频免费观看| 综合久久久久久| 亚洲综合丁香婷婷六月香| 丝袜国产日韩另类美女| 久久精品国产亚洲高清剧情介绍| 国产精品538一区二区在线| 国产91对白在线观看九色| 91美女蜜桃在线| 91精品国产综合久久小美女 | 97se亚洲国产综合自在线 | 国产一二三精品| 99re热这里只有精品免费视频| 91福利在线播放| 久久综合网色—综合色88| 中文字幕在线观看不卡| 日韩极品在线观看| 国产不卡在线播放| 欧美日韩在线直播| 欧美激情一区二区在线| 天天综合色天天综合| 国产高清不卡一区二区| 欧美夫妻性生活| 中文字幕一区二区三区色视频| 亚洲va国产va欧美va观看| 国产一区二区三区黄视频 | 日韩av一级片| av在线播放成人| 欧美成人三级在线| 亚洲综合色成人| 99视频有精品| 亚洲国产精品成人综合| 男人的天堂亚洲一区| 色综合视频在线观看| 久久久久久久久久久久久夜| 亚洲aaa精品| 91网站最新地址| 国产精品天美传媒| 久久精品99久久久| 91精品国产91久久久久久最新毛片 | 日韩精品一级中文字幕精品视频免费观看 | 日本美女一区二区三区| 91影院在线免费观看| 国产亚洲精品中文字幕| 九色综合狠狠综合久久| 这里只有精品免费| 亚洲第一av色| 欧美日韩mp4| 香蕉成人啪国产精品视频综合网 | 4438x成人网最大色成网站| 亚洲色图制服诱惑| 99精品在线观看视频| 日韩一区在线播放| 成人爱爱电影网址| 国产精品欧美极品| 成人理论电影网| 国产精品欧美一级免费| 成人性视频网站| 亚洲色图制服诱惑 | 国产偷国产偷亚洲高清人白洁| 久久不见久久见中文字幕免费| 欧美一区二区日韩一区二区| 丝袜亚洲另类丝袜在线| 日韩一区二区在线观看视频播放| 天堂影院一区二区| 日韩视频一区二区在线观看| 日韩精品欧美成人高清一区二区| 欧美日本精品一区二区三区| 蜜桃一区二区三区在线| 538prom精品视频线放| 久久97超碰国产精品超碰| 日韩欧美一区在线观看| 国产精品一品二品| 亚洲日本在线天堂| 欧美二区三区的天堂| 久久精品久久99精品久久| 精品免费一区二区三区| 国产成人av一区| 亚洲女子a中天字幕| 欧美日韩精品一区视频| 国产呦精品一区二区三区网站| 中文字幕乱码亚洲精品一区| 一本一道久久a久久精品综合蜜臀| 亚洲成人免费电影| 精品久久久久久久久久久久久久久| 国产成人啪免费观看软件| 亚洲欧美日韩在线| 91精品国产一区二区三区蜜臀| 国产麻豆视频一区二区| 一区二区三区成人在线视频| 日韩美女视频一区二区在线观看| 不卡电影一区二区三区| 日精品一区二区三区| 亚洲国产精品成人久久综合一区| 欧美中文字幕久久| 国产精品亚洲第一区在线暖暖韩国| 最新不卡av在线| 日韩精品在线网站| 色久综合一二码| 国产精品正在播放| 丝袜美腿一区二区三区| 国产精品高潮呻吟| 精品久久久久久久久久久久包黑料 | 国产视频视频一区| 欧美日韩国产一级二级| 国产成人a级片| 久久aⅴ国产欧美74aaa| 亚洲国产日韩a在线播放| 国产精品美女一区二区三区 | 色婷婷香蕉在线一区二区| 精品在线观看免费| 亚洲夂夂婷婷色拍ww47| 国产精品国产三级国产普通话蜜臀 | 亚洲va韩国va欧美va| 欧美国产综合一区二区| 精品久久国产字幕高潮| 4438x成人网最大色成网站| 色av一区二区| 成人爱爱电影网址| 国产麻豆精品95视频| 日韩高清不卡一区| 亚洲国产成人av网| 亚洲综合激情网| 一区二区在线电影| 日韩伦理免费电影| 中文字幕+乱码+中文字幕一区| 久久久亚洲精华液精华液精华液| 制服丝袜亚洲色图| 欧美三级韩国三级日本三斤| 欧美在线影院一区二区| 色8久久精品久久久久久蜜| 99久久伊人久久99| 成熟亚洲日本毛茸茸凸凹| 国产一区不卡视频| 国产在线播放一区三区四| 国内精品在线播放| 国产在线国偷精品产拍免费yy| 美女www一区二区| 免费看精品久久片| 极品少妇一区二区三区精品视频| 久久成人av少妇免费| 国产在线一区观看| 粉嫩欧美一区二区三区高清影视| 国产成人丝袜美腿| 91首页免费视频| 欧美色国产精品| 日韩三级精品电影久久久 | 欧美午夜片在线看| 欧美日韩国产成人在线免费| 欧美剧情片在线观看| 欧美一区二区三区免费大片| 欧美xingq一区二区| 久久久一区二区三区捆绑**| 国产亚洲欧美日韩日本| 亚洲天堂2016| 日韩电影在线免费| 激情六月婷婷久久| 成人sese在线| 欧美三级中文字| 久久免费电影网| 一区二区三区欧美日韩| 日韩福利电影在线观看| 国产精品一区二区不卡| 91高清视频免费看| 欧美成人综合网站| 中文字幕一区在线观看| 天天综合天天做天天综合| 国产精品99久久久| 欧美日韩国产片| 欧美国产日韩a欧美在线观看 | 日韩视频永久免费| 国产欧美日韩另类视频免费观看| 一区二区在线观看视频| 久久av老司机精品网站导航| 91麻豆蜜桃一区二区三区| 91精品国产手机| 亚洲乱码精品一二三四区日韩在线| 日韩黄色免费电影| 91麻豆国产福利在线观看| 7777精品久久久大香线蕉| 一区二区中文视频| 蜜桃在线一区二区三区| 91在线播放网址| 久久久99精品久久| 日本va欧美va欧美va精品| av不卡免费电影|