freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

編程實現(xiàn)aes算法及加密解密過程-全文預(yù)覽

2025-09-13 13:54 上一頁面

下一頁面
  

【正文】 x13,0x5c,0xd2,0xf1,0x40,0x46,0x83,0x38,\0x66,0xdd,0xfd,0x30,0xbf,0x06,0x8b,0x62,0xb3,0x25,0xe2,0x98,0x22,0x88,0x91,0x10,\0x7e,0x6e,0x48,0xc3,0xa3,0xb6,0x1e,0x42,0x3a,0x6b,0x28,0x54,0xfa,0x85,0x3d,0xba,\0x2b,0x79,0x0a,0x15,0x9b,0x9f,0x5e,0xca,0x4e,0xd4,0xac,0xe5,0xf3,0x73,0xa7,0x57,\0xaf,0x58,0xa8,0x50,0xf4,0xea,0xd6,0x74,0x4f,0xae,0xe9,0xd5,0xe7,0xe6,0xad,0xe8,\0x2c,0xd7,0x75,0x7a,0xeb,0x16,0x0b,0xf5,0x59,0xcb,0x5f,0xb0,0x9c,0xa9,0x51,0xa0,\0x7f,0x0c,0xf6,0x6f,0x17,0xc4,0x49,0xec,0xd8,0x43,0x1f,0x2d,0xa4,0x76,0x7b,0xb7,\0xcc,0xbb,0x3e,0x5a,0xfb,0x60,0xb1,0x86,0x3b,0x52,0xa1,0x6c,0xaa,0x55,0x29,0x9d,\0x97,0xb2,0x87,0x90,0x61,0xbe,0xdc,0xfc,0xbc,0x95,0xcf,0xcd,0x37,0x3f,0x5b,0xd1,\0x53,0x39,0x84,0x3c,0x41,0xa2,0x6d,0x47,0x14,0x2a,0x9e,0x5d,0x56,0xf2,0xd3,0xab,\0x44,0x11,0x92,0xd9,0x23,0x20,0x2e,0x89,0xb4,0x7c,0xb8,0x26,0x77,0x99,0xe3,0xa5,\0x67,0x4a,0xed,0xde,0xc5,0x31,0xfe,0x18,0x0d,0x63,0x8c,0x80,0xc0,0xf7,0x70,0x07}。//逆S盒byte InvS_box[256] ={0x52,0x09,0x6a,0xd5,0x30,0x36,0xa5,0x38,0xbf,0x40,0xa3,0x9e,0x81,0xf3,0xd7,0xfb,\0x7c,0xe3,0x39,0x82,0x9b,0x2f,0xff,0x87,0x34,0x8e,0x43,0x44,0xc4,0xde,0xe9,0xcb,\0x54,0x7b,0x94,0x32,0xa6,0xc2,0x23,0x3d,0xee,0x4c,0x95,0x0b,0x42,0xfa,0xc3,0x4e,\0x08,0x2e,0xa1,0x66,0x28,0xd9,0x24,0xb2,0x76,0x5b,0xa2,0x49,0x6d,0x8b,0xd1,0x25,\0x72,0xf8,0xf6,0x64,0x86,0x68,0x98,0x16,0xd4,0xa4,0x5c,0xcc,0x5d,0x65,0xb6,0x92,\0x6c,0x70,0x48,0x50,0xfd,0xed,0xb9,0xda,0x5e,0x15,0x46,0x57,0xa7,0x8d,0x9d,0x84,\0x90,0xd8,0xab,0x00,0x8c,0xbc,0xd3,0x0a,0xf7,0xe4,0x58,0x05,0xb8,0xb3,0x45,0x06,\0xd0,0x2c,0x1e,0x8f,0xca,0x3f,0x0f,0x02,0xc1,0xaf,0xbd,0x03,0x01,0x13,0x8a,0x6b,\0x3a,0x91,0x11,0x41,0x4f,0x67,0xdc,0xea,0x97,0xf2,0xcf,0xce,0xf0,0xb4,0xe6,0x73,\0x96,0xac,0x74,0x22,0xe7,0xad,0x35,0x85,0xe2,0xf9,0x37,0xe8,0x1c,0x75,0xdf,0x6e,\0x47,0xf1,0x1a,0x71,0x1d,0x29,0xc5,0x89,0x6f,0xb7,0x62,0x0e,0xaa,0x18,0xbe,0x1b,\0xfc,0x56,0x3e,0x4b,0xc6,0xd2,0x79,0x20,0x9a,0xdb,0xc0,0xfe,0x78,0xcd,0x5a,0xf4,\0x1f,0xdd,0xa8,0x33,0x88,0x07,0xc7,0x31,0xb1,0x12,0x10,0x59,0x27,0x80,0xec,0x5f,\0x60,0x51,0x7f,0xa9,0x19,0xb5,0x4a,0x0d,0x2d,0xe5,0x7a,0x9f,0x93,0xc9,0x9c,0xef,\0xa0,0xe0,0x3b,0x4d,0xae,0x2a,0xf5,0xb0,0xc8,0xeb,0xbb,0x3c,0x83,0x53,0x99,0x61,\0x17,0x2b,0x04,0x7e,0xba,0x77,0xd6,0x26,0xe1,0x69,0x14,0x63,0x55,0x21,0x0c,0x7d}。(代碼參考自CSDN論壇)include include (AES加解密).hincludeincludeincludebyte in[4][Nb]。(3) 逆列混淆變換逆列混淆變換的處理方法與列混淆變換類似,每一列都通過與一個固定的多項相乘進行變換。解密過程是加密的逆過程,S盒變換、行移位變換、列混淆變換都要進行求逆變換,即逆S盒變換、逆行移位變換、逆列混淆變換。例如,輸入為“89”(十六進制)的值所對應(yīng)的S盒的行值為“8”,列值為“9”,S盒中相應(yīng)位置的值為“a7”,就說明“89”被映射為“87”。而解密過程與加密過程相反,通過把輸入的密文和密鑰由輪函數(shù)經(jīng)Nr輪迭代來實現(xiàn)的,結(jié)尾輪與前Nr1輪不同。密鑰長度—分組長度—輪數(shù)的關(guān)系如表1所示。該算法輸入分組、輸出分組、狀態(tài)長度均為128比特。)AES在軟體及硬件上都能快速地加解密,相對來說較易于實作,且只需要很少的記憶體。通過分組密碼返回的加密數(shù)據(jù)的位數(shù)與輸入 數(shù)據(jù)相同。它被預(yù)期能成為人們公認的加密包括金融、電信和政府數(shù)字信息的方法。信息安全工程課程實驗報告編程實現(xiàn)AES算法的加密解密過程課程名稱:信息安全工程學(xué)生姓名:學(xué)生學(xué)號:專業(yè)班級:任課教師:蔡忠閩 目錄1 背景與意義 32 實驗要求 3 4 4(運行環(huán)境) 44 AES算法加密和解密原理分析 4 6 6 7 76. 測試報告 17 加密 17 解密 197 實驗總結(jié) 211 背景與意義科技的發(fā)展使計算機深入到了我們生活的的方方面面,計算機在帶來方便和提高了工作效率的同時卻也帶來了各種各樣的新問題,其中信息安全問題最為突出,隨著計算機信息安全要求的不斷提高, 計算機保密系統(tǒng)已變得越來越重要,所以我們需要一種較為可靠的加密算法來保護我們信息的安全。AES(The Advanced Encryption Standard)是美國國家標準與技術(shù)研究所用于加密電子數(shù)據(jù)的規(guī)范。與公共密鑰密碼使用密鑰對不同,對稱密鑰密碼使用相同的密鑰加密和解密數(shù)據(jù)。(Rijdael的發(fā)音近于 Rhine doll。測試平臺:Windows 8使用軟件:Visual Studio 2012/C++4 AES算法加密和解密原理分析AES是一個迭代的、對稱密鑰分組的密碼,它可以使用12192和256位密鑰長度,并且用128位分組長度加密和解密數(shù)據(jù)[2]。而AES算法的輪數(shù)Nr僅依賴于密鑰長度Nk,輪數(shù)和密鑰長度的關(guān)系可以表示為:Nr=6+Nk。前Nr1輪依次進行S盒變換、行移位變換、列混淆變換和輪密鑰加變換;結(jié)尾輪與前Nr1輪相比去掉了列混淆變換。映射方法是:把輸入字節(jié)的高4位作為S盒的行值,低4位作為列值,然后取出S盒中對應(yīng)行和列的元素作為輸出。(4) 輪密鑰加變換輪密鑰加變換用于將輸入或中間態(tài)S的每一列與一個密鑰字W[i]進行按位異或,其中, 由原始密鑰通過密鑰擴展算法產(chǎn)生。(2) 逆行移位變換與行移位變換相反,逆行移位變換將態(tài)State
點擊復(fù)制文檔內(nèi)容
研究報告相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1