//S盒
0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0,monospace;font-size:14px;">
0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15,monospace;font-size:14px;">
0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75,monospace;font-size:14px;">
0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84,monospace;font-size:14px;">
0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf,monospace;font-size:14px;">
0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8,monospace;font-size:14px;">
0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,monospace;font-size:14px;">
0xcd,0x0c,0x13,0xec,0x5f,0x97,0x44,0x17,0xc4,0xa7,0x7e,0x3d,0x64,0x5d,0x19,0x73,monospace;font-size:14px;">
0x60,0x81,0x4f,0xdc,0x22,0x2a,0x90,0x88,0x46,0xee,0xb8,0x14,0xde,0x5e,0x0b,0xdb,monospace;font-size:14px;">
0xe0,0x32,0x3a,0x0a,0x49,0x06,0x24,0x5c,0xc2,0xd3,0xac,0x62,0x91,0x95,0xe4,0x79,monospace;font-size:14px;">
0xe7,0xc8,0x37,0x6d,0x8d,0xd5,0x4e,0xa9,0x6c,0x56,0xf4,0xea,0x65,0x7a,0xae,0x08,monospace;font-size:14px;">
0xba,0x78,0x25,0x2e,0x1c,0xa6,0xb4,0xc6,0xe8,0xdd,0x74,0x1f,0x4b,0xbd,0x8b,0x8a,monospace;font-size:14px;">
0x70,0x3e,0xb5,0x66,0x48,0x03,0xf6,0x0e,0x61,0x35,0x57,0xb9,0x86,0xc1,0x1d,0x9e,monospace;font-size:14px;">
0xe1,0xf8,0x98,0x11,0x69,0xd9,0x8e,0x94,0x9b,0x1e,0x87,0xe9,0xce,0x55,0x28,0xdf,monospace;font-size:14px;">
0x8c,0xa1,0x89,0x0d,0xbf,0xe6,0x42,0x68,0x41,0x99,0x2d,0x0f,0xb0,0x54,0xbb,0x16,monospace;font-size:14px;">
}
//逆S盒
0x52,0x09,monospace;font-size:14px;">
0x7c,monospace;font-size:14px;">
0x54,monospace;font-size:14px;">
0x08,monospace;font-size:14px;">
0x72,monospace;font-size:14px;">
0x6c,0x70,monospace;font-size:14px;">
0x90,0x8c,0xca,monospace;font-size:14px;">
0x3a,monospace;font-size:14px;">
0x96,0xe7,monospace;font-size:14px;">
0x47,0xb7,monospace;font-size:14px;">
0xfc,0xcd,monospace;font-size:14px;">
0x1f,0x51,monospace;font-size:14px;">
0xa0,0xe0,0x53,monospace;font-size:14px;">
0x17,0x04,0xba,0xe1,0x63,monospace;font-size:14px;">
//代码位置src/crypto/aes/const.go
## 行移位ShiftRows
AES输入的16个字节组成4x4字节矩阵,行移位即:
第1行保持不变,第2行循环左移1个字节,第3行循环左移2个字节,第4行循环左移3个字节。
逆向行移位为后3行做行移位的反向操作,如第2行循环右移1个字节,其他行类似处理。
附行移位示意图如下:
## 列混淆MixColumns
列混淆和逆向列混淆,实际上是使用乘法矩阵,但是其加法和乘法均为定义在有限域上的加法和乘法。
如下为正向列混淆:
如下为逆向列混淆:
## 轮密钥加AddRoundKey
轮密钥加,即128位输入与128位轮密钥做异或运算。
## go标准库中AES加密算法实现
go标准库中AES算法加密、解密实现代码如下:
func newCipherGeneric(key []byte) (cipher.Block,error) {
n := len(key) + 28
c := aesCipher{make([]uint32,n),make([]uint32,n)}
//密钥扩展
expandKeyGo(key,c.enc,c.dec)
return &c,nil
//加密
//xk即子密钥组
func encryptBlockGo(xk []uint32,dst,src []byte) {
var s0,s1,s2,s3,t0,t1,t2,t3 uint32
//按4x4矩阵排列
s0 = uint32(src[0])<<24 | uint32(src[1])<<16 | uint32(src[2])<<8 | uint32(src[3])
s1 = uint32(src[4])<<24 | uint32(src[5])<<16 | uint32(src[6])<<8 | uint32(src[7])
s2 = uint32(src[8])<<24 | uint32(src[9])<<16 | uint32(src[10])<<8 | uint32(src[11])
s3 = uint32(src[12])<<24 | uint32(src[13])<<16 | uint32(src[14])<<8 | uint32(src[15])
//第1次轮密钥加
s0 ^= xk[0]
s1 ^= xk[1]
s2 ^= xk[2]
s3 ^= xk[3]
//nr为中间重复轮数
//例如128位密钥,44字子密钥,此处为9轮
nr := len(xk)/4 - 2
//4表示已使用了4个字子密钥
k := 4
for r := 0; r < nr; r++ {
//此处代码包括字节代替、行移位、列混淆、轮密钥加
t0 = xk[k+0] ^ te0[uint8(s0>>24)] ^ te1[uint8(s1>>16)] ^ te2[uint8(s2>>8)] ^ te3[uint8(s3)]
t1 = xk[k+1] ^ te0[uint8(s1>>24)] ^ te1[uint8(s2>>16)] ^ te2[uint8(s3>>8)] ^ te3[uint8(s0)]
t2 = xk[k+2] ^ te0[uint8(s2>>24)] ^ te1[uint8(s3>>16)] ^ te2[uint8(s0>>8)] ^ te3[uint8(s1)]
t3 = xk[k+3] ^ te0[uint8(s3>>24)] ^ te1[uint8(s0>>16)] ^ te2[uint8(s1>>8)] ^ te3[uint8(s2)]
k += 4
s0,s3 = t0,t3
//此处为字节代替和行移位
s0 = uint32(sBox0[t0>>24])<<24 | uint32(sBox0[t1>>16&0xff])<<16 | uint32(sBox0[t2>>8&0xff])<<8 | uint32(sBox0[t3&0xff])
s1 = uint32(sBox0[t1>>24])<<24 | uint32(sBox0[t2>>16&0xff])<<16 | uint32(sBox0[t3>>8&0xff])<<8 | uint32(sBox0[t0&0xff])
s2 = uint32(sBox0[t2>>24])<<24 | uint32(sBox0[t3>>16&0xff])<<16 | uint32(sBox0[t0>>8&0xff])<<8 | uint32(sBox0[t1&0xff])
s3 = uint32(sBox0[t3>>24])<<24 | uint32(sBox0[t0>>16&0xff])<<16 | uint32(sBox0[t1>>8&0xff])<<8 | uint32(sBox0[t2&0xff])
//轮密钥加
s0 ^= xk[k+0]
s1 ^= xk[k+1]
s2 ^= xk[k+2]
s3 ^= xk[k+3]
//输出
dst[0],dst[1],dst[2],dst[3] = byte(s0>>24),byte(s0>>16),byte(s0>>8),byte(s0)
dst[4],dst[5],dst[6],dst[7] = byte(s1>>24),byte(s1>>16),byte(s1>>8),byte(s1)
dst[8],dst[9],dst[10],dst[11] = byte(s2>>24),byte(s2>>16),byte(s2>>8),byte(s2)
dst[12],dst[13],dst[14],dst[15] = byte(s3>>24),byte(s3>>16),byte(s3>>8),byte(s3)
//解密
func decryptBlockGo(xk []uint32,monospace;font-size:14px;">
//此处代码包括逆向字节代替、逆向行移位、逆向列混淆、轮密钥加
t0 = xk[k+0] ^ td0[uint8(s0>>24)] ^ td1[uint8(s3>>16)] ^ td2[uint8(s2>>8)] ^ td3[uint8(s1)]
t1 = xk[k+1] ^ td0[uint8(s1>>24)] ^ td1[uint8(s0>>16)] ^ td2[uint8(s3>>8)] ^ td3[uint8(s2)]
t2 = xk[k+2] ^ td0[uint8(s2>>24)] ^ td1[uint8(s1>>16)] ^ td2[uint8(s0>>8)] ^ td3[uint8(s3)]
t3 = xk[k+3] ^ td0[uint8(s3>>24)] ^ td1[uint8(s2>>16)] ^ td2[uint8(s1>>8)] ^ td3[uint8(s0)]
//最后一轮仅包括逆向字节代替、逆向行移位、轮密钥加
//此处为逆向字节代替和逆向行移位
s0 = uint32(sBox1[t0>>24])<<24 | uint32(sBox1[t3>>16&0xff])<<16 | uint32(sBox1[t2>>8&0xff])<<8 | uint32(sBox1[t1&0xff])
s1 = uint32(sBox1[t1>>24])<<24 | uint32(sBox1[t0>>16&0xff])<<16 | uint32(sBox1[t3>>8&0xff])<<8 | uint32(sBox1[t2&0xff])
s2 = uint32(sBox1[t2>>24])<<24 | uint32(sBox1[t1>>16&0xff])<<16 | uint32(sBox1[t0>>8&0xff])<<8 | uint32(sBox1[t3&0xff])
s3 = uint32(sBox1[t3>>24])<<24 | uint32(sBox1[t2>>16&0xff])<<16 | uint32(sBox1[t1>>8&0xff])<<8 | uint32(sBox1[t0&0xff])
网址:http://www.qukuailianxueyuan.io/
欲领取造币技术与全套虚拟机资料
区块链技术交流QQ群:756146052 备注:CSDN
尹成学院微信:备注:CSDN
版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 dio@foxmail.com 举报,一经查实,本站将立刻删除。