加密算法之BLOWFISH算法

本文介绍了BlowFish加密算法的原理和步骤,包括密钥预处理和信息加密过程。BlowFish算法使用两个盒进行操作,核心加密函数BF_En进行64位信息的加密。解密过程与加密类似,但key_pbox逆序使用。文章还提到了算法的安全性和注册机的生成算法,并介绍了Markdown编辑器的一些新功能。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

分享一下我老师大神的人工智能教程!零基础,通俗易懂!http://blog.youkuaiyun.com/jiangjunshow

也欢迎大家转载本篇文章。分享知识,造福人民,实现我们中华民族伟大复兴!

                 

加密信息

  BlowFish算法用来加密64Bit长度的字符串。

  BlowFish算法使用两个“盒”——ungignedlongpbox[18]和unsignedlongsbox[4,256]。

  BlowFish算法中,有一个核心加密函数:BF_En(后文详细介绍)。该函数输入64位信息,运算后,以64位密文的形式输出。用BlowFish算法加密信息,需要两个过程:

  1.密钥预处理

  2.信息加密

  分别说明如下:

  密钥预处理:

  BlowFish算法的源密钥——pbox和sbox是固定的。我们要加密一个信息,需要自己选择一个key,用这个key对pbox和sbox进行变换,得到下一步信息加密所要用的key_pbox和key_sbox。具体的变化算法如下:

  1)用sbox填充key_sbox

  2)用自己选择的key8个一组地去异或pbox,用异或的结果填充key_pbox。key可以循环使用。

  比如说:选的key是"abcdefghijklmn"。则异或过程为:

  key_pbox[0]=pbox[0]^abcdefgh

  key_pbox[1]=pbox[1]^ijklmnab

  …………

  …………

  如此循环,直到key_box填充完毕。

  3)用BF_En加密一个全0的64位信息,用输出的结果替换key_pbox[0]和key_pbox[1]。i=0

  4)用BF_En加密替换后的key_pbox,key_pbox[i+1],用输出替代key_pbox[i+2]和key_pbox[i+3]

  5)i+2,继续第4步,直到key_pbox全部被替换

  6)用key_pbox[16]和key_pbox[17]做首次输入(相当于上面的全0的输入),用类似的方法,替换key_sbox信息加密。信息加密就是用函数把待加密信息x分成32位的两部分:xL,xRBF_En对输入信息进行变换,BF_En函数详细过程如下:

  对于i=1至16

  xL=xL^Pi

  xR=F(xL)^xR

  交换xL和xR(最后一轮取消该运算)

 

blowfish算法

xR=xR^P17

  xL=xL^P18

  重新合并xL和xR

  函数F见下图:

  8位32位

  |-----------S盒1-----------

  ||加

  |8位32位|----

  |-----------S盒2-----------|

  ||

  ||异或----

  32位-|||

  |8位32位||

  |-----------S盒3---------------|加

  ||-----------------32位

  ||

  ||

  |8位32位|

  |-----------S盒4-----------------------

  把xL分成4个8位分组:a,b,c和d

  输出为:F(xL)=((((S[1,a]+S[2,b])MOD4294967296)^s[3,c])+S[4,d])MOD4294967296

  (2的32次方)(2的32次方)

  重新合并后输出的结果就是我们需要的密文。

算法解密

  用BlowFish算法解密,同样也需要两个过程。

  1.密钥预处理

  2.信息解密

  密钥预处理的过程与加密时完全相同

  信息解密的过程就是把信息加密过程的key_pbox逆序使用即可。

  可以看出,选择不同的key,用BlowFish算法加密同样的信息,可以得出不同的结果。

  要破解BlowFish算法,就是要得到BlowFish算法的key。所以,使用BlowFish算法进行加密,最重要的也就是key的选择以及key的保密。其中key的选择可以使用bf_sdk中的_WeakKey函数进行检验。以下是该函数的说明:

  源文:

  ---------------------------------------------------------------------------------------

  _WeakKey

  Function:TestifthegeneratedBoxesareweak

  Argument:none

  Return:AX=Status(1=weak,0=good)

  Affects:AX,BX,CX,DX,SI,DI,directionFlag

  Description:After"_InitCrypt"youshouldtesttheBoxeswiththisfunction.

  Iftheyprovideaweaknesswhichacryptoanalystcoulduseto

  breaktheciphera"1"isreturned.Inthiscaseyoushould

  reloadtheoriginalboxesandlettheuserchooseadifferent

  password.

  ---------------------------------------------------------------------------------------

  译文:

  ---------------------------------------------------------------------------------------

  _WeakKey

  功能:测试产生的box是否安全

  参数:无

  返回:AX=1不安全;AX=0安全

  影响:AX,BX,CX,DX,SI,DI,方向标志

描述:使用"_InitCrypt"函数产生用于加密的Boxes后,你应该用这个函数测试产生的Boxes是否安全,如果该key产生的Boxes不安全——可以被密码分析者通过分析Boxes得到key,那么,你应该采用另外一个key产生一个安全的Boxes用来加密。

 

BlowFish's 分析

  由于该CrackMe主要是测试你的密码学知识,所以没有在其他方面设关卡。为了减小文件体积,缩短大家下载的时间,用upx加了壳,直接用Trw2000的"PNewSec+Makepe"很方便地就能脱掉

  用常规的方法,很快找到下面关键比较处:

  :004015D951pushecx

  :004015DA52pushedx

  :004015DB6880894000push00408980

  :004015E0E8EBFAFFFFcall004010D0//BF_De(sn)

  :004015E58B442464moveax,dwordptr[esp+64]

  :004015E98B0DF0994000movecx,dwordptr[004099F0]

  :004015EF83C41Caddesp,0000001C

  :004015F23BC1cmpeax,ecx//比较

  :004015F47529jne0040161F

  :004015F68B4C244Cmovecx,dwordptr[esp+4C]

  :004015FAA1EC994000moveax,dwordptr[004099EC]

  :004015FF3BC8cmpecx,eax//比较

  :00401601751Cjne0040161F

  :004016036A30push00000030

  由于BlowFish算法加密,解密输出的信息都是64Bit的,所以要进行两次比较。

  我们既然知道了他对我们的sn进行的变换是BF_De,那么,很显然,我们要找到程序初始化key_pbox和key_sbox的地方。跟进4015E0的Call,找到key_pbox在408980处,下bpm,然后跟踪,分析,找到程序初始化key_pbox和key_sbox的地方,如下:

  :004016C050pusheax

  *PossibleStringDataReffromDataObj->"CrackingForFun"

  |

  :004016C16844804000push00408044

  :004016C66880894000push00408980

  :004016CBE860FAFFFFcall00401130//初始化Boxes

  由此我们知道了BF_De(sn)的key是"CrackingForFun"。

  问题的一半已经解决了。下面我们来看用来比较的另外的64Bit的数是从何而来。

  bpm4099ECw

  跟踪分析后,发现这个用来比较的数是由BF_En(ComputerID,key="ChinaCrackingGroup")生成。

  至此,我们可以写出注册机的算法:

  sn=BF_En((BF_En(ComputerID,key="ChinaCrackingGroup"),key="CrackingForFun")

  只要你编程够强,密码学也还过得去,写出这个东西的注册机就不是困难的事情了。

  附:

  ComputerID的产生

  如果你对这个CrackMe很有兴趣,还想研究一下他的ComputerID是如何产生的,也可以继续跟踪,分析,在这里,我给处我分析的结果:

  ComputerID=BF_En(0776f6c62h,068736966h,key=PW_1)

  其中,PW_1就是你的Windows版本号,可以在“系统属性”里头看到,也就是注册表中的

  H_L_M\Software\Microsoft\Windows\CurrentVersion中的ProductId项。在我的机器上是:

  "25001-OEM-0080247-46673"

  注册机源码里头有一些语句没有派上用场,用“;”屏蔽了,如果你有兴趣,可以把前面的;号去掉然后把.data段里头的PW_1换成你机器的ComputerID,再按照程序中的说明自己修改一下源程序,用Masm32V6重新编译,直接按Generate,也能得到正确的序列号

 

代码:

 

///////////////////////////////////////////////////////////////////////////////// Blowfish.h Header File////    BLOWFISH ENCRYPTION ALGORITHM////    Encryption and Decryption of Byte Strings using the Blowfish Encryption Algorithm.//    Blowfish is a block cipher that encrypts data in 8-byte blocks. The algorithm consists//    of two parts: a key-expansion part and a data-ancryption part. Key expansion converts a//    variable key of at least 1 and at most 56 bytes into several subkey arrays totaling//    4168 bytes. Blowfish has 16 rounds. Each round consists of a key-dependent permutation,//    and a key and data-dependent substitution. All operations are XORs and additions on 32-bit words.//    The only additional operations are four indexed array data lookups per round.//    Blowfish uses a large number of subkeys. These keys must be precomputed before any data//    encryption or decryption. The P-array consists of 18 32-bit subkeys: P0, P1,...,P17.//    There are also four 32-bit S-boxes with 256 entries each: S0,0, S0,1,...,S0,255;//    S1,0, S1,1,...,S1,255; S2,0, S2,1,...,S2,255; S3,0, S3,1,...,S3,255;////    The Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Cipher Feedback modes//    are used:////    In ECB mode if the same block is encrypted twice with the same key, the resulting//    ciphertext blocks are the same.////    In CBC Mode a ciphertext block is obtained by first xoring the//    plaintext block with the previous ciphertext block, and encrypting the resulting value.////    In CFB mode a ciphertext block is obtained by encrypting the previous ciphertext block//    and xoring the resulting value with the plaintext////    The previous ciphertext block is usually stored in an Initialization Vector (IV).//    An Initialization Vector of zero is commonly used for the first block, though other//    arrangements are also in use./*http://www.counterpane.com/vectors.txtTest vectors by Eric Young.  These tests all assume Blowfish with 16rounds.All data is shown as a hex string with 012345 loading asdata[0]=0x01;data[1]=0x23;data[2]=0x45;ecb test data (taken from the DES validation tests)key bytes               clear bytes             cipher bytes0000000000000000        0000000000000000        4EF997456198DD78FFFFFFFFFFFFFFFF        FFFFFFFFFFFFFFFF        51866FD5B85ECB8A3000000000000000        1000000000000001        7D856F9A613063F2  ???1111111111111111        1111111111111111        2466DD878B963C9D0123456789ABCDEF        1111111111111111        61F9C3802281B0961111111111111111        0123456789ABCDEF        7D0CC630AFDA1EC70000000000000000        0000000000000000        4EF997456198DD78FEDCBA9876543210        0123456789ABCDEF        0ACEAB0FC6A0A28D7CA110454A1A6E57        01A1D6D039776742        59C68245EB05282B0131D9619DC1376E        5CD54CA83DEF57DA        B1B8CC0B250F09A007A1133E4A0B2686        0248D43806F67172        1730E5778BEA1DA43849674C2602319E        51454B582DDF440A        A25E7856CF2651EB04B915BA43FEB5B6        42FD443059577FA2        353882B109CE8F1A0113B970FD34F2CE        059B5E0851CF143A        48F4D0884C3799180170F175468FB5E6        0756D8E0774761D2        432193B78951FC9843297FAD38E373FE        762514B829BF486A        13F04154D69D1AE507A7137045DA2A16        3BDD119049372802        2EEDDA93FFD39C7904689104C2FD3B2F        26955F6835AF609A        D887E0393C2DA6E337D06BB516CB7546        164D5E404F275232        5F99D04F5B1639691F08260D1AC2465E        6B056E18759F5CCA        4A057A3B24D3977B584023641ABA6176        004BD6EF09176062        452031C1E4FADA8E025816164629B007        480D39006EE762F2        7555AE39F59B87BD49793EBC79B3258F        437540C8698F3CFA        53C55F9CB49FC0194FB05E1515AB73A7        072D43A077075292        7A8E7BFA937E89A349E95D6D4CA229BF        02FE55778117F12A        CF9C5D7A4986ADB5018310DC409B26D6        1D9D5C5018F728C2        D1ABB290658BC7781C587F1C13924FEF        305532286D6F295A        55CB3774D13EF2010101010101010101        0123456789ABCDEF        FA34EC4847B268B21F1F1F1F0E0E0E0E        0123456789ABCDEF        A790795108EA3CAEE0FEE0FEF1FEF1FE        0123456789ABCDEF        C39E072D9FAC631D0000000000000000        FFFFFFFFFFFFFFFF        014933E0CDAFF6E4FFFFFFFFFFFFFFFF        0000000000000000        F21E9A77B71C49BC0123456789ABCDEF        0000000000000000        245946885754369AFEDCBA9876543210        FFFFFFFFFFFFFFFF        6B5C5A9C5D9E0A5Aset_key test datadata[8]= FEDCBA9876543210c=F9AD597C49DB005E k[ 1]=F0c=E91D21C1D961A6D6 k[ 2]=F0E1c=E9C2B70A1BC65CF3 k[ 3]=F0E1D2c=BE1E639408640F05 k[ 4]=F0E1D2C3c=B39E44481BDB1E6E k[ 5]=F0E1D2C3B4c=9457AA83B1928C0D k[ 6]=F0E1D2C3B4A5c=8BB77032F960629D k[ 7]=F0E1D2C3B4A596c=E87A244E2CC85E82 k[ 8]=F0E1D2C3B4A59687c=15750E7A4F4EC577 k[ 9]=F0E1D2C3B4A5968778c=122BA70B3AB64AE0 k[10]=F0E1D2C3B4A596877869c=3A833C9AFFC537F6 k[11]=F0E1D2C3B4A5968778695Ac=9409DA87A90F6BF2 k[12]=F0E1D2C3B4A5968778695A4Bc=884F80625060B8B4 k[13]=F0E1D2C3B4A5968778695A4B3Cc=1F85031C19E11968 k[14]=F0E1D2C3B4A5968778695A4B3C2Dc=79D9373A714CA34F k[15]=F0E1D2C3B4A5968778695A4B3C2D1E ???c=93142887EE3BE15C k[16]=F0E1D2C3B4A5968778695A4B3C2D1E0Fc=03429E838CE2D14B k[17]=F0E1D2C3B4A5968778695A4B3C2D1E0F00c=A4299E27469FF67B k[18]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011c=AFD5AED1C1BC96A8 k[19]=F0E1D2C3B4A5968778695A4B3C2D1E0F001122c=10851C0E3858DA9F k[20]=F0E1D2C3B4A5968778695A4B3C2D1E0F00112233c=E6F51ED79B9DB21F k[21]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011223344c=64A6E14AFD36B46F k[22]=F0E1D2C3B4A5968778695A4B3C2D1E0F001122334455c=80C7D7D45A5479AD k[23]=F0E1D2C3B4A5968778695A4B3C2D1E0F00112233445566c=05044B62FA52D080 k[24]=F0E1D2C3B4A5968778695A4B3C2D1E0F0011223344556677chaining mode test datakey[16]   = 0123456789ABCDEFF0E1D2C3B4A59687iv[8]     = FEDCBA9876543210data[29]  = "7654321 Now is the time for " (includes trailing '\0')data[29]  = 37363534333231204E6F77206973207468652074696D6520666F722000cbc cipher textcipher[32]= 6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CCcfb64 cipher text cipher[29]= E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3 ofb64 cipher text cipher[29]= E73214A2822139CA62B343CC5B65587310DD908D0C241B2263C2CF80DA*/#ifndef __BLOWFISH_H__#define __BLOWFISH_H__//Block Structurestruct SBlock{ //Constructors SBlock(unsigned int l=0, unsigned int r=0) : m_uil(l), m_uir(r) {} //Copy Constructor SBlock(const SBlock& roBlock) : m_uil(roBlock.m_uil), m_uir(roBlock.m_uir) {} SBlock& operator^=(SBlock& b) { m_uil ^= b.m_uil; m_uir ^= b.m_uir; return *this; } unsigned int m_uil, m_uir;};class CBlowFish{publicenum { ECB=0, CBC=1, CFB=2 }; //Constructor - Initialize the P and S boxes for a given Key CBlowFish(unsigned char* ucKey, size_t n, const SBlock& roChain = SBlock(0UL,0UL)); //Resetting the chaining block void ResetChain() { m_oChain = m_oChain0; } // Encrypt/Decrypt Buffer in Place void Encrypt(unsigned char* buf, size_t n, int iMode=ECB)void Decrypt(unsigned char* buf, size_t n, int iMode=ECB)// Encrypt/Decrypt from Input Buffer to Output Buffer void Encrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode=ECB)void Decrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode=ECB);//Private Functionsprivateunsigned int F(unsigned int ui)void Encrypt(SBlock&)void Decrypt(SBlock&);private//The Initialization Vector, by default {0, 0} SBlock m_oChain0; SBlock m_oChain; unsigned int m_auiP[18]; unsigned int m_auiS[4][256]; static const unsigned int scm_auiInitP[18]; static const unsigned int scm_auiInitS[4][256];};//Extract low order byteinline unsigned char Byte(unsigned int ui)return (unsigned char)(ui & 0xff);}//Function Finline unsigned int CBlowFish::F(unsigned int ui){ return ((m_auiS[0][Byte(ui>>24)] + m_auiS[1][Byte(ui>>16)]) ^ m_auiS[2][Byte(ui>>8)]) + m_auiS[3][Byte(ui)];}#endif // __BLOWFISH_H__


///////////////////////////////////////////////////////////////////////////////// BlowFish.cpp////    Implementation of Bruce Schneier's BLOWFISH algorithm from "Applied //    Cryptography", Second Edition.#include <cstring>#include <exception>#include "Blowfish.h"//Initialization with a fixed string which consists of the hexadecimal digits of PI (less the initial 3)//P-array, 18 32-bit subkeysconst unsigned int CBlowFish::scm_auiInitP[18] = { 0x243f6a88, 0x85a308d3, 0x13198a2e, 0x037073440xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c890x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb54709170x9216d5d9, 0x8979fb1b};//Four 32-bit S-boxes with 256 entries eachconst unsigned int CBlowFish::scm_auiInitS[4][256] = { //0 {0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb70xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f990x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc160x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af260130xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c600xe65525f3, 0xaa55ab94, 0x57489862, 0x63e814400x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x289586770x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x662821930x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec80320xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b880x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f442390x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f00x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a30x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a980xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e880x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa60x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def70xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a24630x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd090xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb30xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c72790x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f80x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df820x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f55730x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a00x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb97900xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e80xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb40x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a00xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b70x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa10xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e2990xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d90x165fa266, 0x80957705, 0x93cc7314, 0x211a14770xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e490x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c50x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a410xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a5329150xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e674000x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd9150xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc58556640x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a}, //1 {0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc41926230xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb2660xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee10x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd60xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc10x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a10x687f3584, 0x52a0e286, 0xb79c5305, 0xaa5007370x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b80xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f547010x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda70xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e410xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb3310x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd870x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d20xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba160x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a5090xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab30x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df40xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c279600x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f660xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff280xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab98020xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f840x1521b628, 0x29076170, 0xecdd4775, 0x619f15100x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade140xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb500x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f70x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da80xf837889a, 0x97e32d77, 0x11ed935f, 0x166812810x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba990x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac246960xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc31280x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c730x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e00x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd00xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd21050xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d8162500xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a30x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b2850x095bbf00, 0xad19489d, 0x1462b174, 0x23820e000x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f70610x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d997350xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec90xdb73dbd3, 0x105588cd, 0x675fda79, 0xe36743400xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff200x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7}, //2 {0xe93d5a68, 0x948140f7, 0xf64c261c, 0x946929340x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a200680xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b88400x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f450xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb85040x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b60xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a420x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b20x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba4895270x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db330xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce30x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e170x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x411135640x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad181150x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb9220x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f7280xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f00x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd370xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e8040xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea30xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb63500x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c90x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e610x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc20x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b90x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e20x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc43246330xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe100x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f1690xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f520x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d0270x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b50xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d620x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c216340xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d760x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c240x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc40x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c8370xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0}, //3 {0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb40x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c80x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc60x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee3040xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee220xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a40x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd60x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e90xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a590x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee5930xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b510x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d280x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e280x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf3190x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f9910xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe320xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e6800xa2ae0810, 0xdd6db224, 0x69852dfd, 0x090721660xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd50x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f470xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e63700x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af840xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea0480x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f80x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac90xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac70x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada380x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b9415250xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d10xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a4420xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e9640x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d80xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb22990xf523f357, 0xa6327623, 0x93a83531, 0x56cccd020xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc0xde966292, 0x81b949d0, 0x4c50901b, 0x71c656140xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f60x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf00xba38209c, 0xf746ce76, 0x77afa1c5, 0x207560600x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f90x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6}};//Constructor - Initialize the P and S boxes for a given KeyCBlowFish::CBlowFish(unsigned char* ucKey, size_t keysize, const SBlock& roChain) : m_oChain0(roChain), m_oChain(roChain){ if(keysize<1)  throw exception("Incorrect key length"); //Check the Key - the key length should be between 1 and 56 bytes if(keysize>56)  keysize = 56unsigned char aucLocalKey[56]; unsigned int i, j; memcpy(aucLocalKey, ucKey, keysize); //Reflexive Initialization of the Blowfish. //Generating the Subkeys from the Key flood P and S boxes with PI memcpy(m_auiP, scm_auiInitP, sizeof m_auiP); memcpy(m_auiS, scm_auiInitS, sizeof m_auiS); //Load P boxes with key bytes const unsigned char* p = aucLocalKey; unsigned int x=0//Repeatedly cycle through the key bits until the entire P array has been XORed with key bits int iCount = 0for(i=0; i<18; i++) {  x=0;  for(int n=4; n--; )  {   int iVal = (int)(*p);   x <<= 8;   x |= *(p++);   iCount++;   if(iCount == keysize)   {    //All bytes used, so recycle bytes     iCount = 0;    p = aucLocalKey;   }  }  m_auiP[i] ^= x; } //Reflect P and S boxes through the evolving Blowfish SBlock block(0UL,0UL); //all-zero block for(i=0; i<18; )  Encrypt(block), m_auiP[i++] = block.m_uil, m_auiP[i++] = block.m_uir; for(j=0; j<4; j++)  for(int k=0; k<256; )   Encrypt(block), m_auiS[j][k++] = block.m_uil, m_auiS[j][k++] = block.m_uir;}//Sixteen Round Encipher of Blockvoid CBlowFish::Encrypt(SBlock& block){ unsigned int uiLeft = block.m_uil; unsigned int uiRight = block.m_uir; uiLeft ^= m_auiP[0]; uiRight ^= F(uiLeft)^m_auiP[1]; uiLeft ^= F(uiRight)^m_auiP[2]; uiRight ^= F(uiLeft)^m_auiP[3]; uiLeft ^= F(uiRight)^m_auiP[4]; uiRight ^= F(uiLeft)^m_auiP[5]; uiLeft ^= F(uiRight)^m_auiP[6]; uiRight ^= F(uiLeft)^m_auiP[7]; uiLeft ^= F(uiRight)^m_auiP[8]; uiRight ^= F(uiLeft)^m_auiP[9]; uiLeft ^= F(uiRight)^m_auiP[10]; uiRight ^= F(uiLeft)^m_auiP[11]; uiLeft ^= F(uiRight)^m_auiP[12]; uiRight ^= F(uiLeft)^m_auiP[13]; uiLeft ^= F(uiRight)^m_auiP[14]; uiRight ^= F(uiLeft)^m_auiP[15]; uiLeft ^= F(uiRight)^m_auiP[16]; uiRight ^= m_auiP[17]; block.m_uil = uiRight; block.m_uir = uiLeft;}//Sixteen Round Decipher of SBlockvoid CBlowFish::Decrypt(SBlock& block){ unsigned int uiLeft = block.m_uil; unsigned int uiRight = block.m_uir; uiLeft ^= m_auiP[17]; uiRight ^= F(uiLeft)^m_auiP[16]; uiLeft ^= F(uiRight)^m_auiP[15]; uiRight ^= F(uiLeft)^m_auiP[14]; uiLeft ^= F(uiRight)^m_auiP[13]; uiRight ^= F(uiLeft)^m_auiP[12]; uiLeft ^= F(uiRight)^m_auiP[11]; uiRight ^= F(uiLeft)^m_auiP[10]; uiLeft ^= F(uiRight)^m_auiP[9]; uiRight ^= F(uiLeft)^m_auiP[8]; uiLeft ^= F(uiRight)^m_auiP[7]; uiRight ^= F(uiLeft)^m_auiP[6]; uiLeft ^= F(uiRight)^m_auiP[5]; uiRight ^= F(uiLeft)^m_auiP[4]; uiLeft ^= F(uiRight)^m_auiP[3]; uiRight ^= F(uiLeft)^m_auiP[2]; uiLeft ^= F(uiRight)^m_auiP[1]; uiRight ^= m_auiP[0]; block.m_uil = uiRight; block.m_uir = uiLeft;}//Semi-Portable Byte Shufflinginline void BytesToBlock(unsigned char const* p, SBlock& b)unsigned int y; //Left b.m_uil = 0; y = *p++; y <<= 24; b.m_uil |= y; y = *p++; y <<= 16; b.m_uil |= y; y = *p++; y <<= 8; b.m_uil |= y; y = *p++; b.m_uil |= y; //Right b.m_uir = 0; y = *p++; y <<= 24; b.m_uir |= y; y = *p++; y <<= 16; b.m_uir |= y; y = *p++; y <<= 8; b.m_uir |= y; y = *p++; b.m_uir |= y;}inline void BlockToBytes(SBlock const& b, unsigned char* p)unsigned int y; //Right y = b.m_uir; *--p = Byte(y); y = b.m_uir >> 8; *--p = Byte(y); y = b.m_uir >> 16; *--p = Byte(y); y = b.m_uir >> 24; *--p = Byte(y); //Left y = b.m_uil; *--p = Byte(y); y = b.m_uil >> 8; *--p = Byte(y); y = b.m_uil >> 16; *--p = Byte(y); y = b.m_uil >> 24; *--p = Byte(y);}//Encrypt Buffer in Place//Returns false if n is multiple of 8void CBlowFish::Encrypt(unsigned char* buf, size_t n, int iMode){ //Check the buffer's length - should be > 0 and multiple of 8 if((n==0)||(n%8!=0))  throw exception("Incorrect buffer length"); SBlock work; if(iMode == CBC) //CBC mode, using the Chain {  SBlock chain(m_oChain);  for(; n >= 8; n -= 8)  {   BytesToBlock(buf, work);   work ^= chain;   Encrypt(work);   chain = work;   BlockToBytes(work, buf+=8);  } } else if(iMode == CFB) //CFB mode, using the Chain {  SBlock chain(m_oChain);  for(; n >= 8; n -= 8)  {   Encrypt(chain);   BytesToBlock(buf, work);   work ^= chain;   chain = work;   BlockToBytes(work, buf+=8);  } } else //ECB mode, not using the Chain {  for(; n >= 8; n -= 8)  {   BytesToBlock(buf, work);   Encrypt(work);   BlockToBytes(work, buf+=8);  } }}//Decrypt Buffer in Place//Returns false if n is multiple of 8void CBlowFish::Decrypt(unsigned char* buf, size_t n, int iMode){ //Check the buffer's length - should be > 0 and multiple of 8 if((n==0)||(n%8!=0))  throw exception("Incorrect buffer length"); SBlock work; if(iMode == CBC) //CBC mode, using the Chain {  SBlock crypt, chain(m_oChain);  for(; n >= 8; n -= 8)  {   BytesToBlock(buf, work);   crypt = work;   Decrypt(work);   work ^= chain;   chain = crypt;   BlockToBytes(work, buf+=8);  } } else if(iMode == CFB) //CFB mode, using the Chain, not using Decrypt() {  SBlock crypt, chain(m_oChain);  for(; n >= 8; n -= 8)  {   BytesToBlock(buf, work);   Encrypt(chain);   crypt = work;   work ^= chain;   chain = crypt;   BlockToBytes(work, buf+=8);  } } else //ECB mode, not using the Chain {  for(; n >= 8; n -= 8)  {   BytesToBlock(buf, work);   Decrypt(work);   BlockToBytes(work, buf+=8);  } }}//Encrypt from Input Buffer to Output Buffer//Returns false if n is multiple of 8void CBlowFish::Encrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode){ //Check the buffer's length - should be > 0 and multiple of 8 if((n==0)||(n%8!=0))  throw exception("Incorrect buffer length"); SBlock work; if(iMode == CBC) //CBC mode, using the Chain {  SBlock chain(m_oChain);  for(; n >= 8; n -= 8, in += 8)  {   BytesToBlock(in, work);   work ^= chain;   Encrypt(work);   chain = work;   BlockToBytes(work, out+=8);  } } else if(iMode == CFB) //CFB mode, using the Chain {  SBlock chain(m_oChain);  for(; n >= 8; n -= 8, in += 8)  {   Encrypt(chain);   BytesToBlock(in, work);   work ^= chain;   chain = work;   BlockToBytes(work, out+=8);  } } else //ECB mode, not using the Chain {  for(; n >= 8; n -= 8, in += 8)  {   BytesToBlock(in, work);   Encrypt(work);   BlockToBytes(work, out+=8);  } }}//Decrypt from Input Buffer to Output Buffer//Returns false if n is multiple of 8void CBlowFish::Decrypt(const unsigned char* in, unsigned char* out, size_t n, int iMode){ //Check the buffer's length - should be > 0 and multiple of 8 if((n==0)||(n%8!=0))  throw exception("Incorrect buffer length"); SBlock work; if(iMode == CBC) //CBC mode, using the Chain {  SBlock crypt, chain(m_oChain);  for(; n >= 8; n -= 8, in += 8)  {   BytesToBlock(in, work);   crypt = work;   Decrypt(work);   work ^= chain;   chain = crypt;   BlockToBytes(work, out+=8);  } } else if(iMode == CFB) //CFB mode, using the Chain, not using Decrypt() {  SBlock crypt, chain(m_oChain);  for(; n >= 8; n -= 8, in += 8)  {   BytesToBlock(in, work);   Encrypt(chain);   crypt = work;   work ^= chain;   chain = crypt;   BlockToBytes(work, out+=8);  } } else //ECB mode, not using the Chain {  for(; n >= 8; n -= 8, in += 8)  {   BytesToBlock(in, work);   Decrypt(work);   BlockToBytes(work, out+=8);  } }}


使用实例tryCBlowFish oBlowFish((unsigned char*)"1234567890123456", 16)char szDataIn1[49] = "ababababccccccccababababccccccccababababcccccccc"char szDataIn[49];  char szDataOut[49];  memset(szDataIn, 0, 49);  memset(szDataOut, 0, 49);  //Test ECB  strcpy(szDataIn, szDataIn1);  memset(szDataOut, 0, 49);  oBlowFish.Encrypt((unsigned char*)szDataIn,                     (unsigned char*)szDataOut, 48, CBlowFish::ECB);  memset(szDataIn, 0, 49);  oBlowFish.Decrypt((unsigned char*)szDataOut,                     (unsigned char*)szDataIn, 48, CBlowFish::ECB);  //Test CBC  oBlowFish.ResetChain();  strcpy(szDataIn, szDataIn1);  memset(szDataOut, 0, 49);  oBlowFish.Encrypt((unsigned char*)szDataIn,                     (unsigned char*)szDataOut, 48, CBlowFish::CBC);  memset(szDataIn, 0, 49);  oBlowFish.ResetChain();  oBlowFish.Decrypt((unsigned char*)szDataOut,                     (unsigned char*)szDataIn, 48, CBlowFish::CBC);  //Test CFB  oBlowFish.ResetChain();  strcpy(szDataIn, szDataIn1);  memset(szDataOut, 0, 49);  oBlowFish.Encrypt((unsigned char*)szDataIn,                     (unsigned char*)szDataOut, 48, CBlowFish::CFB);  memset(szDataIn, 0, 49);  oBlowFish.ResetChain();  oBlowFish.Decrypt((unsigned char*)szDataOut,                     (unsigned char*)szDataIn, 48, CBlowFish::CFB);  cout << endl;}catch(exception& roException){  cout << "Exception: "        << roException.what() << endl;}


代码下载:http://download.youkuaiyun.com/detail/byxdaz/4057820

           

给我老师的人工智能教程打call!http://blog.youkuaiyun.com/jiangjunshow
这里写图片描述
你好! 这是你第一次使用 **Markdown编辑器** 所展示的欢迎页。如果你想学习如何使用Markdown编辑器, 可以仔细阅读这篇文章,了解一下Markdown的基本语法知识。

新的改变

我们对Markdown编辑器进行了一些功能拓展与语法支持,除了标准的Markdown编辑器功能,我们增加了如下几点新功能,帮助你用它写博客:

  1. 全新的界面设计 ,将会带来全新的写作体验;
  2. 在创作中心设置你喜爱的代码高亮样式,Markdown 将代码片显示选择的高亮样式 进行展示;
  3. 增加了 图片拖拽 功能,你可以将本地的图片直接拖拽到编辑区域直接展示;
  4. 全新的 KaTeX数学公式 语法;
  5. 增加了支持甘特图的mermaid语法1 功能;
  6. 增加了 多屏幕编辑 Markdown文章功能;
  7. 增加了 焦点写作模式、预览模式、简洁写作模式、左右区域同步滚轮设置 等功能,功能按钮位于编辑区域与预览区域中间;
  8. 增加了 检查列表 功能。

功能快捷键

撤销:Ctrl/Command + Z
重做:Ctrl/Command + Y
加粗:Ctrl/Command + B
斜体:Ctrl/Command + I
标题:Ctrl/Command + Shift + H
无序列表:Ctrl/Command + Shift + U
有序列表:Ctrl/Command + Shift + O
检查列表:Ctrl/Command + Shift + C
插入代码:Ctrl/Command + Shift + K
插入链接:Ctrl/Command + Shift + L
插入图片:Ctrl/Command + Shift + G

合理的创建标题,有助于目录的生成

直接输入1次#,并按下space后,将生成1级标题。
输入2次#,并按下space后,将生成2级标题。
以此类推,我们支持6级标题。有助于使用TOC语法后生成一个完美的目录。

如何改变文本的样式

强调文本 强调文本

加粗文本 加粗文本

标记文本

删除文本

引用文本

H2O is是液体。

210 运算结果是 1024.

插入链接与图片

链接: link.

图片: Alt

带尺寸的图片: Alt

当然,我们为了让用户更加便捷,我们增加了图片拖拽功能。

如何插入一段漂亮的代码片

博客设置页面,选择一款你喜欢的代码片高亮样式,下面展示同样高亮的 代码片.

// An highlighted block var foo = 'bar'; 

生成一个适合你的列表

  • 项目
    • 项目
      • 项目
  1. 项目1
  2. 项目2
  3. 项目3
  • 计划任务
  • 完成任务

创建一个表格

一个简单的表格是这么创建的:

项目Value
电脑$1600
手机$12
导管$1

设定内容居中、居左、居右

使用:---------:居中
使用:----------居左
使用----------:居右

第一列第二列第三列
第一列文本居中第二列文本居右第三列文本居左

SmartyPants

SmartyPants将ASCII标点字符转换为“智能”印刷标点HTML实体。例如:

TYPEASCIIHTML
Single backticks'Isn't this fun?'‘Isn’t this fun?’
Quotes"Isn't this fun?"“Isn’t this fun?”
Dashes-- is en-dash, --- is em-dash– is en-dash, — is em-dash

创建一个自定义列表

Markdown
Text-to- HTML conversion tool
Authors
John
Luke

如何创建一个注脚

一个具有注脚的文本。2

注释也是必不可少的

Markdown将文本转换为 HTML

KaTeX数学公式

您可以使用渲染LaTeX数学表达式 KaTeX:

Gamma公式展示 Γ ( n ) = ( n − 1 ) ! ∀ n ∈ N \Gamma(n) = (n-1)!\quad\forall n\in\mathbb N Γ(n)=(n1)!nN 是通过欧拉积分

Γ ( z ) = ∫ 0 ∞ t z − 1 e − t d t &ThinSpace; . \Gamma(z) = \int_0^\infty t^{z-1}e^{-t}dt\,. Γ(z)=0tz1etdt.

你可以找到更多关于的信息 LaTeX 数学表达式here.

新的甘特图功能,丰富你的文章

gantt
        dateFormat  YYYY-MM-DD
        title Adding GANTT diagram functionality to mermaid
        section 现有任务
        已完成               :done,    des1, 2014-01-06,2014-01-08
        进行中               :active,  des2, 2014-01-09, 3d
        计划一               :         des3, after des2, 5d
        计划二               :         des4, after des3, 5d
  • 关于 甘特图 语法,参考 这儿,

UML 图表

可以使用UML图表进行渲染。 Mermaid. 例如下面产生的一个序列图::

张三 李四 王五 你好!李四, 最近怎么样? 你最近怎么样,王五? 我很好,谢谢! 我很好,谢谢! 李四想了很长时间, 文字太长了 不适合放在一行. 打量着王五... 很好... 王五, 你怎么样? 张三 李四 王五

这将产生一个流程图。:

链接
长方形
圆角长方形
菱形
  • 关于 Mermaid 语法,参考 这儿,

FLowchart流程图

我们依旧会支持flowchart的流程图:

  • 关于 Flowchart流程图 语法,参考 这儿.

导出与导入

导出

如果你想尝试使用此编辑器, 你可以在此篇文章任意编辑。当你完成了一篇文章的写作, 在上方工具栏找到 文章导出 ,生成一个.md文件或者.html文件进行本地保存。

导入

如果你想加载一篇你写过的.md文件或者.html文件,在上方工具栏可以选择导入功能进行对应扩展名的文件导入,
继续你的创作。


  1. mermaid语法说明 ↩︎

  2. 注脚的解释 ↩︎

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值