⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 descipher.java

📁 一个远程登陆器的原代码
💻 JAVA
📖 第 1 页 / 共 2 页
字号:
//
// This DES class has been extracted from package Acme.Crypto for use in VNC.
// The bytebit[] array has been reversed so that the most significant bit
// in each byte of the key is ignored, not the least significant.  Also the
// unnecessary odd parity code has been removed.
//
// These changes are:
//  Copyright (C) 1999 AT&T Laboratories Cambridge.  All Rights Reserved.
//
// This software is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
//

// DesCipher - the DES encryption method
//
// The meat of this code is by Dave Zimmerman <dzimm@widget.com>, and is:
//
// Copyright (c) 1996 Widget Workshop, Inc. All Rights Reserved.
//
// Permission to use, copy, modify, and distribute this software
// and its documentation for NON-COMMERCIAL or COMMERCIAL purposes and
// without fee is hereby granted, provided that this copyright notice is kept 
// intact. 
// 
// WIDGET WORKSHOP MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY
// OF THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
// TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
// PARTICULAR PURPOSE, OR NON-INFRINGEMENT. WIDGET WORKSHOP SHALL NOT BE LIABLE
// FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING OR
// DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.
// 
// THIS SOFTWARE IS NOT DESIGNED OR INTENDED FOR USE OR RESALE AS ON-LINE
// CONTROL EQUIPMENT IN HAZARDOUS ENVIRONMENTS REQUIRING FAIL-SAFE
// PERFORMANCE, SUCH AS IN THE OPERATION OF NUCLEAR FACILITIES, AIRCRAFT
// NAVIGATION OR COMMUNICATION SYSTEMS, AIR TRAFFIC CONTROL, DIRECT LIFE
// SUPPORT MACHINES, OR WEAPONS SYSTEMS, IN WHICH THE FAILURE OF THE
// SOFTWARE COULD LEAD DIRECTLY TO DEATH, PERSONAL INJURY, OR SEVERE
// PHYSICAL OR ENVIRONMENTAL DAMAGE ("HIGH RISK ACTIVITIES").  WIDGET WORKSHOP
// SPECIFICALLY DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR
// HIGH RISK ACTIVITIES.
//
//
// The rest is:
//
// Copyright (C) 1996 by Jef Poskanzer <jef@acme.com>.  All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions
// are met:
// 1. Redistributions of source code must retain the above copyright
//    notice, this list of conditions and the following disclaimer.
// 2. Redistributions in binary form must reproduce the above copyright
//    notice, this list of conditions and the following disclaimer in the
//    documentation and/or other materials provided with the distribution.
//
// THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
// ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
// OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
// SUCH DAMAGE.
//
// Visit the ACME Labs Java page for up-to-date versions of this and other
// fine Java utilities: http://www.acme.com/java/


//import java.io.*;

/// The DES encryption method.
// <P>
// This is surprisingly fast, for pure Java.  On a SPARC 20, wrapped
// in Acme.Crypto.EncryptedOutputStream or Acme.Crypto.EncryptedInputStream,
// it does around 7000 bytes/second.
// <P>
// Most of this code is by Dave Zimmerman <dzimm@widget.com>, and is
// Copyright (c) 1996 Widget Workshop, Inc.  See the source file for details.
// <P>
// <A HREF="/resources/classes/Acme/Crypto/DesCipher.java">Fetch the software.</A><BR>
// <A HREF="/resources/classes/Acme.tar.Z">Fetch the entire Acme package.</A>
// <P>
// @see Des3Cipher
// @see EncryptedOutputStream
// @see EncryptedInputStream

public class DesCipher
    {

    // Constructor, byte-array key.
    public DesCipher( byte[] key )
	{
	setKey( key );
	}

    // Key routines.

    private int[] encryptKeys = new int[32];
    private int[] decryptKeys = new int[32];

    /// Set the key.
    public void setKey( byte[] key )
	{
	deskey( key, true, encryptKeys );
	deskey( key, false, decryptKeys );
	}

    // Turn an 8-byte key into internal keys.
    private void deskey( byte[] keyBlock, boolean encrypting, int[] KnL )
	{
	int i, j, l, m, n;
	int[] pc1m = new int[56];
	int[] pcr = new int[56];
	int[] kn = new int[32];

	for ( j = 0; j < 56; ++j )
	    {
	    l = pc1[j];
	    m = l & 07;
	    pc1m[j] = ( (keyBlock[l >>> 3] & bytebit[m]) != 0 )? 1: 0;
	    }

	for ( i = 0; i < 16; ++i )
	    {
	    if ( encrypting )
		m = i << 1;
	    else
		m = (15-i) << 1;
	    n = m+1;
	    kn[m] = kn[n] = 0;
	    for ( j = 0; j < 28; ++j )
		{
		l = j+totrot[i];
		if ( l < 28 )
		    pcr[j] = pc1m[l];
		else
		    pcr[j] = pc1m[l-28];
		}
	    for ( j=28; j < 56; ++j )
		{
		l = j+totrot[i];
		if ( l < 56 )
		    pcr[j] = pc1m[l];
		else
		    pcr[j] = pc1m[l-28];
		}
	    for ( j = 0; j < 24; ++j )
		{
		if ( pcr[pc2[j]] != 0 )
		    kn[m] |= bigbyte[j];
		if ( pcr[pc2[j+24]] != 0 )
		    kn[n] |= bigbyte[j];
		}
	    }
	cookey( kn, KnL );
	}

    private void cookey( int[] raw, int KnL[] )
	{
	int raw0, raw1;
	int rawi, KnLi;
	int i;

	for ( i = 0, rawi = 0, KnLi = 0; i < 16; ++i )
	    {
	    raw0 = raw[rawi++];
	    raw1 = raw[rawi++];
	    KnL[KnLi]  = (raw0 & 0x00fc0000) <<   6;
	    KnL[KnLi] |= (raw0 & 0x00000fc0) <<  10;
	    KnL[KnLi] |= (raw1 & 0x00fc0000) >>> 10;
	    KnL[KnLi] |= (raw1 & 0x00000fc0) >>>  6;
	    ++KnLi;
	    KnL[KnLi]  = (raw0 & 0x0003f000) <<  12;
	    KnL[KnLi] |= (raw0 & 0x0000003f) <<  16;
	    KnL[KnLi] |= (raw1 & 0x0003f000) >>>  4;
	    KnL[KnLi] |= (raw1 & 0x0000003f);
	    ++KnLi;
	    }
	}


    // Block encryption routines.

    private int[] tempInts = new int[2];

    /// Encrypt a block of eight bytes.
    public void encrypt( byte[] clearText, int clearOff, byte[] cipherText, int cipherOff )
	{
	squashBytesToInts( clearText, clearOff, tempInts, 0, 2 );
	des( tempInts, tempInts, encryptKeys );
	spreadIntsToBytes( tempInts, 0, cipherText, cipherOff, 2 );
	}

    /// Decrypt a block of eight bytes.
    public void decrypt( byte[] cipherText, int cipherOff, byte[] clearText, int clearOff )
	{
	squashBytesToInts( cipherText, cipherOff, tempInts, 0, 2 );
	des( tempInts, tempInts, decryptKeys );
	spreadIntsToBytes( tempInts, 0, clearText, clearOff, 2 );
	}

	// Encrypt a text which is a multiple of 8 bytes.
    public void encryptText( byte[] clearText, byte[] cipherText, byte[] key) {
		int i, j;
		
		for (i = 0; i< 8; i++)
			clearText[i] ^= key[i];
		encrypt(clearText, 0, cipherText, 0);
		for (i = 8; i < clearText.length; i += 8) {
			for (j = 0; j < 8; j++)
				clearText[i + j] ^= cipherText[i + j - 8];
			encrypt(clearText, i, cipherText, i);
		}
	}

    // Decrypt a text which is a multiple of 8 bytes.
    public void decryptText( byte[] cipherText, byte[] clearText, byte[] key) {
    		int i, j;
    		for (i = cipherText.length - 8; i > 0; i -= 8) {
    			decrypt(cipherText, i, clearText, i);
    			for (j = 0; j < 8; j++)
    				clearText[i + j] ^= cipherText[i + j - 8];
    		}
    		/* i = 0 */
    		decrypt(cipherText, 0, clearText, 0);
    		for (i = 0; i < 8; i++)
    			clearText[i] ^= key[i];
    	}

    // The DES function.
    private void des( int[] inInts, int[] outInts, int[] keys )
	{
	int fval, work, right, leftt;
	int round;
	int keysi = 0;

	leftt = inInts[0];
	right = inInts[1];

	work   = ((leftt >>>  4) ^ right) & 0x0f0f0f0f;
	right ^= work;
	leftt ^= (work << 4);

	work   = ((leftt >>> 16) ^ right) & 0x0000ffff;
	right ^= work;
	leftt ^= (work << 16);

	work   = ((right >>>  2) ^ leftt) & 0x33333333;
	leftt ^= work;
	right ^= (work << 2);

	work   = ((right >>>  8) ^ leftt) & 0x00ff00ff;
	leftt ^= work;
	right ^= (work << 8);
	right  = (right << 1) | ((right >>> 31) & 1);

	work   = (leftt ^ right) & 0xaaaaaaaa;
	leftt ^= work;
	right ^= work;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -