您好,欢迎访问三七文档
当前位置:首页 > 临时分类 > 46南昌大学计算机网络安全实验报告
-1-实验报告实验课程:计算机网络安全学生姓名:信念学号:1314LOVE专业班级:网络间谍088-2-目录一、实验一………………………………………………………3二、实验二………………………………………………………11三、实验三………………………………………………………23四、实验四………………………………………………………27-3-南昌大学实验报告一学生姓名:信念学号:1314LOVE专业班级:网络间谍088班实验类型:▥验证□综合□设计□创新实验日期:实验成绩:一、实验名称DES算法的实现二、实验目的通过用DES算法对实际的数据进行加密和解密来深刻了解DES的运行原理。三、实验基本原理和内容1.DES算法详述DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位,其功能是把输入的64位数据块按位重新组合,并把输出分为L0、R0两部分,每部分各长32位,其置换规则见下表:58,50,12,34,26,18,10,2,60,52,44,36,28,20,12,4,62,54,46,38,30,22,14,6,64,56,48,40,32,24,16,8,57,49,41,33,25,17,9,1,59,51,43,35,27,19,11,3,61,53,45,37,29,21,13,5,63,55,47,39,31,23,15,7,即将输入的第58位换到第一位,第50位换到第2位,……,依此类推,最后一位是原来的第7位。L0、R0则是换位输出后的两部分,L0是输出的左32位,R0是右32位,例:设置换前的输入值为D1D2D3……D64,则经过初始置换后的结果为:L0=D550……D8;R0=D57D49...D7。经过26次迭代运算后,得到L16、R16,将此作为输入,进行逆置换,即得到密文输出。逆置换正好是初始置的逆运算,例如,第1位经过初始置换后,处于第40位,而通过逆置换,又将第40位换回到第1位,其逆置换规则如下表所示:40,8,48,16,56,24,64,32,39,7,47,15,55,23,63,31,38,6,46,14,54,22,62,30,37,5,45,13,53,21,61,29,36,4,44,12,52,20,60,28,35,3,43,11,51,19,59,27,34,2,42,10,50,18,5826,33,1,41,9,49,17,57,25,放大换位表32,1,2,3,4,5,4,5,6,7,8,9,8,9,10,11,12,13,12,13,14,15,16,17,16,17,18,19,20,21,20,21,22,23,24,25,24,25,26,27,28,29,28,29,30,31,32,1,单纯换位表16,7,20,21,29,12,28,17,1,15,23,26,5,18,31,10,2,8,24,14,32,27,3,9,19,13,30,6,22,11,4,25,在f(Ri,Ki)算法描述图中,S1,S2...S8为选择函数,其功能是把6bit数据变为4bit数据。下面给出选择函数Si(i=1,2......8)的功能表:选择函数Si-4-S1:14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7,0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8,4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0,15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13,S2:15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10,3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5,0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15,13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9,S3:10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8,13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1,13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7,1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12,S4:7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15,13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9,10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4,3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14,S5:2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9,14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6,4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14,11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3,S6:12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11,10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8,9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6,4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13,S7:4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1,13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6,1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2,6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12,S8:13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7,1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2,7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8,2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11,四、主要仪器设备及耗材PC机一台五、实验步骤与结果1.运行程序2.加密过程(同时生成密文文档)3.解密过程(同时生成明文外部文档)-5-六、实验原代码//DES算法C++源代码:#includestdafx.h#includeDESTest.h#includeDESTestDlg.h#includeEncrypt.hvoidCDES::deskey(unsignedcharkey[8],Modemd){registerintii,j,l,m,n;unsignedcharpc1m[56],pcr[56];unsignedlongkn[32];for(j=0;j56;j++){l=pc1[j];m=l&07;pc1m[j]=(key[l3]&bytebit[m])?1:0;}for(ii=0;ii16;ii++){if(md==DECRYPT)m=(15-ii)1;elsem=ii1;n=m+1;kn[m]=kn[n]=0L;for(j=0;j28;j++){l=j+totrot[ii];if(l28)pcr[j]=pc1m[l];elsepcr[j]=pc1m[l-28];}-6-for(j=28;j56;j++){l=j+totrot[ii];if(l56)pcr[j]=pc1m[l];elsepcr[j]=pc1m[l-28];}for(j=0;j24;j++){if(pcr[pc2[j]])kn[m]|=bigbyte[j];if(pcr[pc2[j+24]])kn[n]|=bigbyte[j];}}cookey(kn);return;}voidCDES::cookey(registerunsignedlong*raw1){registerunsignedlong*cook,*raw0;unsignedlongdough[32];registerinti;cook=dough;for(i=0;i16;i++,raw1++){raw0=raw1++;*cook=(*raw0&0x00fc0000L)6;*cook|=(*raw0&0x00000fc0L)10;*cook|=(*raw1&0x00fc0000L)10;*cook++|=(*raw1&0x00000fc0L)6;*cook=(*raw0&0x0003f000L)12;*cook|=(*raw0&0x0000003fL)16;*cook|=(*raw1&0x0003f000L)4;*cook++|=(*raw1&0x0000003fL);}usekey(dough);return;-7-}voidCDES::usekey(registerunsignedlong*from){registerunsignedlong*to,*endp;to=KnL,endp=&KnL[32];while(toendp){*to++=*from++;}return;}voidCDES::scrunch(registerunsignedchar*outof,registerunsignedlong*into){*into=(*outof++&0xffL)24;*into|=(*outof++&0xffL)16;*into|=(*outof++&0xffL)8;*into++|=(*outof++&0xffL);*into=(*outof++&0xffL)24;*into|=(*outof++&0xffL)16;*into|=(*outof++&0xffL)8;*into|=(*outof&0xffL);return;}voidCDES::unscrun(registerunsignedlong*outof,registerunsignedchar*into){*into++=(*outof24)&0xffL;*into++=(*outof16)&0xffL;*into++=(*outof8)&0xffL;*into++=*outof++&0xffL;*into++=(*outof24)&0xffL;*into++=(*outof16)&0xffL;*into++=(*outof8)&0xffL;*into=*outof&0xffL;return;}voidCDES::desfunc(registerunsignedlong*block,registerunsignedlong*keys){-8-registerunsignedlongfval,work,right,leftt;registerintround;leftt=block[0];right=block[1];work=((leftt4)^right)&0x0f0f0f0fL;right^=work;leftt^=(work4);work=((leftt16)^right)&0x0000ffffL;right^=work;leftt^=(work16);work=((right2)^leftt)&0x33333333L;leftt^=work;right^=(work2);work=((right8)^leftt)&0x00ff00ffL;leftt^=work;right^=(work8);right=((right1)|((right31)&1L))&0xffffffffL;work=(leftt^right)&0xaaaaaaaaL;leftt^=work;right^=work;leftt=((leftt1)|((leftt31)&1L))&0xffffffffL;for(round=0;ro
本文标题:46南昌大学计算机网络安全实验报告
链接地址:https://www.777doc.com/doc-5318934 .html