对于学校我正在进行AES实施。 我在公共函数加密中使用以下函数制作两个循环。
9次:subBytes,shiftRows,$ mixColumns,$ addRoundkey 1次:尚未实现此目的。
函数本身有效,只有最后一个函数$ addroundkey不会改变我的状态。
即时使用以下代码:
<?php
session_start();
include_once("io.php"); //io operations for reading input to bytearrays and visa versa
$_SESSION['debug'] = "";
$_SESSION['input'] = htmlspecialchars(trim($_POST['input']));
$_SESSION['key'] = htmlspecialchars(trim($_POST['key']));
$_SESSION['format'] = htmlspecialchars(trim($_POST['format']));
$_SESSION['source'] = $_SERVER['SCRIPT_FILENAME'];
$operation = htmlspecialchars(trim($_POST['operation']));
$iop = new ioOperations();
//create byte array from string key
$key = $iop->getByteArrayFromKeyString();
//create byte array from user's input
$bytearray = $iop->getByteArrayFromInput();
if (empty($bytearray)) $_SESSION['debug'] .= "\ninput not valid";
else
{
//create AES state (4x4 bytes) of byte array
$state = $iop->getState($bytearray);
//put key in 4x4 byte array too
// $key = $iop->getState($keyarray);
// perform a subBytes operation
$aesops = new Aes();
$result = array();
$_SESSION['debug'] .= "\nThe ". $operation . " operation:\n";
switch ($operation){
case "subBytes":
$result=$aesops->subBytes($state);
break;
case "shiftRows":
$result=$aesops->shiftRows($state);
break;
case "mixColumns":
$result=$aesops->mixColumns($state);
break;
case "addRoundKey":
$w = $aesops->keyExpansion($key); //generate roundkeys in key expansion
$result=$aesops->addRoundKey($state, $w, 0); //add roundkey 0 for this example
break;
case "encrypt":
$result=$aesops->encrypt($state);
break;
case "decrypt":
$result=$aesops->decrypt($state);
break;
default:
$_SESSION['debug'] .= "\n Error, operation not valid";
}
// now convert back the final state to output
$output = $iop->convertStateToByteArray($result);
$_SESSION['debug'] .= "\n\nThe hexadecimal result of the ". $operation ." operation:\n$output\n";
$_SESSION['output'] = $output;
}
header('Location:operations.php'); //reload the operations.php page with the session values
?>
<?php
/*
* This is the class section of this php file.
* It defines two classes AesSubbytes and ioOperations
*/
class Aes {
/**
* This class implements onse part of the AES algortihm, the subBytes operation.
* It is meant for demonstration purpose only.
**/
// sBox is the pre-computed multiplicative inverse in GF(2^8) used in subBytes() and also in the keyExpansion.
private static $sBox = array(
0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76,
0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0,
0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15,
0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75,
0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84,
0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf,
0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8,
0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,
0xcd,0x0c,0x13,0xec,0x5f,0x97,0x44,0x17,0xc4,0xa7,0x7e,0x3d,0x64,0x5d,0x19,0x73,
0x60,0x81,0x4f,0xdc,0x22,0x2a,0x90,0x88,0x46,0xee,0xb8,0x14,0xde,0x5e,0x0b,0xdb,
0xe0,0x32,0x3a,0x0a,0x49,0x06,0x24,0x5c,0xc2,0xd3,0xac,0x62,0x91,0x95,0xe4,0x79,
0xe7,0xc8,0x37,0x6d,0x8d,0xd5,0x4e,0xa9,0x6c,0x56,0xf4,0xea,0x65,0x7a,0xae,0x08,
0xba,0x78,0x25,0x2e,0x1c,0xa6,0xb4,0xc6,0xe8,0xdd,0x74,0x1f,0x4b,0xbd,0x8b,0x8a,
0x70,0x3e,0xb5,0x66,0x48,0x03,0xf6,0x0e,0x61,0x35,0x57,0xb9,0x86,0xc1,0x1d,0x9e,
0xe1,0xf8,0x98,0x11,0x69,0xd9,0x8e,0x94,0x9b,0x1e,0x87,0xe9,0xce,0x55,0x28,0xdf,
0x8c,0xa1,0x89,0x0d,0xbf,0xe6,0x42,0x68,0x41,0x99,0x2d,0x0f,0xb0,0x54,0xbb,0x16);
// rCon is Round Constant used for the Key Expansion, first column is 2^(r-1) in GF(2^8)
private static $rCon = array(
array(0x00, 0x00, 0x00, 0x00),
array(0x01, 0x00, 0x00, 0x00),
array(0x02, 0x00, 0x00, 0x00),
array(0x04, 0x00, 0x00, 0x00),
array(0x08, 0x00, 0x00, 0x00),
array(0x10, 0x00, 0x00, 0x00),
array(0x20, 0x00, 0x00, 0x00),
array(0x40, 0x00, 0x00, 0x00),
array(0x80, 0x00, 0x00, 0x00),
array(0x1b, 0x00, 0x00, 0x00),
array(0x36, 0x00, 0x00, 0x00) );
public function encrypt($input)
{
// array with methods names
/* $methods= array('subBytes', 'shiftRows', 'mixColumns', 'addRoundKey');*/
$subBytes = 'subBytes';
$shiftRows = 'shiftRows';
$mixColumns = 'mixColumns';
$addRoundkey = 'addRoundKey';
for ($k = 1; $k <= 9; $k++)
{
$input = $this->$subBytes($input);
$input = $this->$shiftRows($input);
$input = $this->$mixColumns($input);
$input = $this->$addRoundkey($input, $w, $rnd);
}
/*foreach($methods as $method)
{
$input = $this->$method($input);
}*/
return($input);
}
public function decrypt($input)
{
$_SESSION['debug'] .= "^^^^^^^^^^^^^^^^^^^^^^^^^^^\nDecryptie van een blok data is \nnog niet geimplementeerd, \nzie opdrachten studiewijzer\n^^^^^^^^^^^^^^^^^^^^^^^^^^^\n";
return($input);
} //end function decrypt
public function subBytes($state)
{
for ($row=0; $row<4; $row++){ // for all 16 bytes in the (4x4-byte) State
for ($column=0; $column<4; $column++){ // for all 16 bytes in the (4x4-byte) State
$_SESSION['debug'] .= "state[$row][$column]=" . $state[$row][$column] .
"-->" . self::$sBox[$state[$row][$column]]."\n";
$state[$row][$column] = self::$sBox[$state[$row][$column]];
}
}
return $state;
} // end function subBytes
public function shiftRows($state)
{
$temp = array(); //create temporary array for shifting
for ($row=0; $row<4; $row++){
for ($column=0; $column<4; $column++){
//shiftleft the rows n positions for row n, so 0 for row 0, 1 position for row 1, etc.
$temp[$row][$column] = $state[$row][($column+$row)%4];
}
}
//now, copy back the result from temp to state
for ($row=0; $row<4; $row++){
for ($column=0; $column<4; $column++){
$state[$row][$column] = $temp[$row][$column];
$_SESSION['debug'] .= "state[$row][$column]=".$state[$row][$column]."\n";
}
}
return $state;
} // end function shiftRows
public static function mixColumns($state)
{
//multiplication tables taken from http://en.wikipedia.org/wiki/Rijndael_mix_columns
static $mul2 = array(
0x00,0x02,0x04,0x06,0x08,0x0a,0x0c,0x0e,0x10,0x12,0x14,0x16,0x18,0x1a,0x1c,0x1e,
0x20,0x22,0x24,0x26,0x28,0x2a,0x2c,0x2e,0x30,0x32,0x34,0x36,0x38,0x3a,0x3c,0x3e,
0x40,0x42,0x44,0x46,0x48,0x4a,0x4c,0x4e,0x50,0x52,0x54,0x56,0x58,0x5a,0x5c,0x5e,
0x60,0x62,0x64,0x66,0x68,0x6a,0x6c,0x6e,0x70,0x72,0x74,0x76,0x78,0x7a,0x7c,0x7e,
0x80,0x82,0x84,0x86,0x88,0x8a,0x8c,0x8e,0x90,0x92,0x94,0x96,0x98,0x9a,0x9c,0x9e,
0xa0,0xa2,0xa4,0xa6,0xa8,0xaa,0xac,0xae,0xb0,0xb2,0xb4,0xb6,0xb8,0xba,0xbc,0xbe,
0xc0,0xc2,0xc4,0xc6,0xc8,0xca,0xcc,0xce,0xd0,0xd2,0xd4,0xd6,0xd8,0xda,0xdc,0xde,
0xe0,0xe2,0xe4,0xe6,0xe8,0xea,0xec,0xee,0xf0,0xf2,0xf4,0xf6,0xf8,0xfa,0xfc,0xfe,
0x1b,0x19,0x1f,0x1d,0x13,0x11,0x17,0x15,0x0b,0x09,0x0f,0x0d,0x03,0x01,0x07,0x05,
0x3b,0x39,0x3f,0x3d,0x33,0x31,0x37,0x35,0x2b,0x29,0x2f,0x2d,0x23,0x21,0x27,0x25,
0x5b,0x59,0x5f,0x5d,0x53,0x51,0x57,0x55,0x4b,0x49,0x4f,0x4d,0x43,0x41,0x47,0x45,
0x7b,0x79,0x7f,0x7d,0x73,0x71,0x77,0x75,0x6b,0x69,0x6f,0x6d,0x63,0x61,0x67,0x65,
0x9b,0x99,0x9f,0x9d,0x93,0x91,0x97,0x95,0x8b,0x89,0x8f,0x8d,0x83,0x81,0x87,0x85,
0xbb,0xb9,0xbf,0xbd,0xb3,0xb1,0xb7,0xb5,0xab,0xa9,0xaf,0xad,0xa3,0xa1,0xa7,0xa5,
0xdb,0xd9,0xdf,0xdd,0xd3,0xd1,0xd7,0xd5,0xcb,0xc9,0xcf,0xcd,0xc3,0xc1,0xc7,0xc5,
0xfb,0xf9,0xff,0xfd,0xf3,0xf1,0xf7,0xf5,0xeb,0xe9,0xef,0xed,0xe3,0xe1,0xe7,0xe5);
static $mul3 = array(
0x00,0x03,0x06,0x05,0x0c,0x0f,0x0a,0x09,0x18,0x1b,0x1e,0x1d,0x14,0x17,0x12,0x11,
0x30,0x33,0x36,0x35,0x3c,0x3f,0x3a,0x39,0x28,0x2b,0x2e,0x2d,0x24,0x27,0x22,0x21,
0x60,0x63,0x66,0x65,0x6c,0x6f,0x6a,0x69,0x78,0x7b,0x7e,0x7d,0x74,0x77,0x72,0x71,
0x50,0x53,0x56,0x55,0x5c,0x5f,0x5a,0x59,0x48,0x4b,0x4e,0x4d,0x44,0x47,0x42,0x41,
0xc0,0xc3,0xc6,0xc5,0xcc,0xcf,0xca,0xc9,0xd8,0xdb,0xde,0xdd,0xd4,0xd7,0xd2,0xd1,
0xf0,0xf3,0xf6,0xf5,0xfc,0xff,0xfa,0xf9,0xe8,0xeb,0xee,0xed,0xe4,0xe7,0xe2,0xe1,
0xa0,0xa3,0xa6,0xa5,0xac,0xaf,0xaa,0xa9,0xb8,0xbb,0xbe,0xbd,0xb4,0xb7,0xb2,0xb1,
0x90,0x93,0x96,0x95,0x9c,0x9f,0x9a,0x99,0x88,0x8b,0x8e,0x8d,0x84,0x87,0x82,0x81,
0x9b,0x98,0x9d,0x9e,0x97,0x94,0x91,0x92,0x83,0x80,0x85,0x86,0x8f,0x8c,0x89,0x8a,
0xab,0xa8,0xad,0xae,0xa7,0xa4,0xa1,0xa2,0xb3,0xb0,0xb5,0xb6,0xbf,0xbc,0xb9,0xba,
0xfb,0xf8,0xfd,0xfe,0xf7,0xf4,0xf1,0xf2,0xe3,0xe0,0xe5,0xe6,0xef,0xec,0xe9,0xea,
0xcb,0xc8,0xcd,0xce,0xc7,0xc4,0xc1,0xc2,0xd3,0xd0,0xd5,0xd6,0xdf,0xdc,0xd9,0xda,
0x5b,0x58,0x5d,0x5e,0x57,0x54,0x51,0x52,0x43,0x40,0x45,0x46,0x4f,0x4c,0x49,0x4a,
0x6b,0x68,0x6d,0x6e,0x67,0x64,0x61,0x62,0x73,0x70,0x75,0x76,0x7f,0x7c,0x79,0x7a,
0x3b,0x38,0x3d,0x3e,0x37,0x34,0x31,0x32,0x23,0x20,0x25,0x26,0x2f,0x2c,0x29,0x2a,
0x0b,0x08,0x0d,0x0e,0x07,0x04,0x01,0x02,0x13,0x10,0x15,0x16,0x1f,0x1c,0x19,0x1a);
for ($c=0; $c<4; $c++) {
$a = array(4); // 'a' is a copy of the current column from 's'
for ($i=0; $i<4; $i++) $a[$i] = $state[$i][$c];
$_SESSION['debug'] .= "\na is copy column from state: " . implode(",", $a);
$state[0][$c] = $mul2[$a[0]] ^ $mul3[$a[1]] ^ $a[2] ^ $a[3]; // 2*a0 + 3*a1 + a2 + a3
$state[1][$c] = $a[0] ^ $mul2[$a[1]] ^ $mul3[$a[2]] ^ $a[3]; // a0 * 2*a1 + 3*a2 + a3
$state[2][$c] = $a[0] ^ $a[1] ^ $mul2[$a[2]] ^ $mul3[$a[3]]; // a0 + a1 + 2*a2 + 3*a3
$state[3][$c] = $mul3[$a[0]] ^ $a[1] ^ $a[2] ^ $mul2[$a[3]]; // 3*a0 + a1 + a2 + 2*a3
$_SESSION['debug'] .= "\nresulting column: ".$state[0][$c].",".$state[1][$c].",".$state[2][$c].",".$state[3][$c];
}
return $state;
} // end function mixColumns
public function addRoundKey($state, $w, $rnd) // xor Round Key into state S [§5.1.4]
{
$_SESSION['debug'] .= "\naddRoundKey:\n";
for ($r=0; $r<4; $r++) {
for ($c=0; $c<4; $c++){
$_SESSION['debug'] .= "state[".$r."][".$c."]=".$state[$r][$c]." XOR ".$w[$rnd*4+$c][$r]."=";
$state[$r][$c] ^= $w[$rnd*4+$c][$r];
$_SESSION['debug'] .= $state[$r][$c]."\n";
}
}
return $state;
} // end function addRoundKey
public static function keyExpansion($key) // generate Key Schedule from Key
{
$_SESSION['debug'] .= "keyExpansion:\n";
$Nk = count($key)/4; // key length (in words): 4/6/8 for 128/192/256-bit keys
$Nr = $Nk + 6; // no of rounds: 10/12/14 for 128/192/256-bit keys
$w = array();
$temp = array();
$_SESSION['debug'] .= "key[0]=";
for ($i=0; $i<$Nk; $i++) {
$r = array($key[4*$i], $key[4*$i+1], $key[4*$i+2], $key[4*$i+3]);
$w[$i] = $r;
//$_SESSION['debug'] .= "w[".$i."]=";
for ($n=0; $n<4; $n++) $_SESSION['debug'] .= dechex($w[$i][$n])." ";
}
$_SESSION['debug'] .= "\nkey[1]=";
for ($i=$Nk; $i<(4*($Nr+1)); $i++) {
$w[$i] = array();
for ($t=0; $t<4; $t++) $temp[$t] = $w[$i-1][$t];
if ($i % $Nk == 0) {
$temp = self::subWord(self::rotWord($temp));
for ($t=0; $t<4; $t++) $temp[$t] ^= self::$rCon[$i/$Nk][$t];
} else if ($Nk > 6 && $i%$Nk == 4) {
$temp = self::subWord($temp);
}
//$_SESSION['debug'] .= "w[".$i."]=";
for ($t=0; $t<4; $t++) {
$w[$i][$t] = $w[$i-$Nk][$t] ^ $temp[$t];
$_SESSION['debug'] .= dechex($w[$i][$t])." ";
}
if (((($i+1)%4)==0)&&($i<4*$Nr)) $_SESSION['debug'] .= "\nkey[".(($i+1)/4)."]=";
}
return $w;
}// end function keyExpansion
private static function subWord($w) // apply SBox to 4-byte word w
{
for ($i=0; $i<4; $i++) $w[$i] = self::$sBox[$w[$i]];
return $w;
}
private static function rotWord($w) // rotate 4-byte word w left by one byte
{
$tmp = $w[0];
for ($i=0; $i<3; $i++) $w[$i] = $w[$i+1];
$w[3] = $tmp;
return $w;
}
} //end class AesSubBytes
?>
有人可以解释为什么$ w和$ rnd似乎无法正常工作?