问题描述
我正在尝试在 Python 中实现 AES 密钥扩展,但遇到了一些问题。这是我正在使用的代码:
Rcon= [
0x8d,0x01,0x02,0x04,0x08,0x10,0x20,0x40,0x80,0x1b,0x36,0x6c,0xd8,0xab,0x4d,0x9a,0x2f,0x5e,0xbc,0x63,0xc6,0x97,0x35,0x6a,0xd4,0xb3,0x7d,0xfa,0xef,0xc5,0x91,0x39,0x72,0xe4,0xd3,0xbd,0x61,0xc2,0x9f,0x25,0x4a,0x94,0x33,0x66,0xcc,0x83,0x1d,0x3a,0x74,0xe8,0xcb,0x8d,0x8d]
sBox = [
0x63,0x7C,0x77,0x7B,0xF2,0x6B,0x6F,0xC5,0x30,0x67,0x2B,0xFE,0xD7,0xAB,0x76,0xCA,0x82,0xC9,0x7D,0xFA,0x59,0x47,0xF0,0xAD,0xD4,0xA2,0xAF,0x9C,0xA4,0xC0,0xB7,0xFD,0x93,0x26,0x3F,0xF7,0xCC,0x34,0xA5,0xE5,0xF1,0x71,0xD8,0x31,0x15,0xC7,0x23,0xC3,0x18,0x96,0x05,0x9A,0x07,0x12,0xE2,0xEB,0x27,0xB2,0x75,0x09,0x2C,0x1A,0x1B,0x6E,0x5A,0xA0,0x52,0x3B,0xD6,0xB3,0x29,0xE3,0x2F,0x84,0x53,0xD1,0x00,0xED,0xFC,0xB1,0x5B,0x6A,0xCB,0xBE,0x4A,0x4C,0x58,0xCF,0xD0,0xEF,0xAA,0xFB,0x43,0x4D,0x85,0x45,0xF9,0x7F,0x50,0x3C,0x9F,0xA8,0x51,0xA3,0x8F,0x92,0x9D,0x38,0xF5,0xBC,0xB6,0xDA,0x21,0xFF,0xF3,0xD2,0xCD,0x0C,0x13,0xEC,0x5F,0x44,0x17,0xC4,0xA7,0x7E,0x3D,0x64,0x5D,0x19,0x73,0x60,0x81,0x4F,0xDC,0x22,0x2A,0x90,0x88,0x46,0xEE,0xB8,0x14,0xDE,0x5E,0x0B,0xDB,0xE0,0x32,0x3A,0x0A,0x49,0x06,0x24,0x5C,0xC2,0xD3,0xAC,0x62,0x95,0xE4,0x79,0xE7,0xC8,0x37,0x6D,0x8D,0xD5,0x4E,0xA9,0x6C,0x56,0xF4,0xEA,0x65,0x7A,0xAE,0xBA,0x78,0x2E,0x1C,0xA6,0xB4,0xC6,0xE8,0xDD,0x1F,0x4B,0xBD,0x8B,0x8A,0x70,0x3E,0xB5,0x48,0x03,0xF6,0x0E,0x57,0xB9,0x86,0xC1,0x1D,0x9E,0xE1,0xF8,0x98,0x11,0x69,0xD9,0x8E,0x9B,0x1E,0x87,0xE9,0xCE,0x55,0x28,0xDF,0x8C,0xA1,0x89,0x0D,0xBF,0xE6,0x42,0x68,0x41,0x99,0x2D,0x0F,0xB0,0x54,0xBB,0x16]
def print_matrix(m):
#Just to print the matrix
for i in m:
for j in i:
print(j,end=" ")
print(" ")
def xor_bytes(a,b):
#Returns a new byte array with the elements xor'ed
return bytes(i^j for i,j in zip(a,b))
def bytes2matrix(text):
#Converts a 16-byte array into a 4x4 matrix
return [list(text[i:i+4]) for i in range(0,len(text),4)]
def expand_key(master_key):
#Expands and returns a list of key matrices for the given master_key.
# Initialize round keys with raw key material.
rounds_by_key_size = {16: 10,24: 12,32: 14}
n_rounds = rounds_by_key_size[len(master_key)]
key_columns = bytes2matrix(master_key)
iteration_size = len(master_key) // 4
# Each iteration has exactly as many columns as the key material.
columns_per_iteration = len(key_columns)
i = 1
while len(key_columns) < (n_rounds + 1) * 4:
# copy prevIoUs word.
word = list(key_columns[-1])
# Perform schedule_core once every "row".
if len(key_columns) % iteration_size == 0:
# Circular shift.
word.append(word.pop(0))
# Map to S-Box.
word = [sBox[b] for b in word]
# XOR with first byte of R-CON,since the others bytes of R-CON are 0.
word[0] ^= Rcon[i]
i += 1
elif len(master_key) == 32 and len(key_columns) % iteration_size == 4:
# Run word through S-Box in the fourth iteration when using a
# 256-bit key.
word = [sBox[b] for b in word]
# XOR with equivalent word from prevIoUs iteration.
word = xor_bytes(word,key_columns[-iteration_size])
key_columns.append(word )
#Group key words in 4x4 byte matrices.
return [key_columns[4*i : 4*(i+1)] for i in range(len(key_columns) // 4)]
#Testing
key='Thats my Kung Fu'
key=key.encode('utf-8')
print_matrix(expand_key(key))
但这就是我的代码:
注意:第 0 轮(第一行)无关紧要,因为我对其进行了转换 (key=key.encode('utf-8')
) 以获得密钥 1 到 10。我确定第 0 轮是正确的。
有些字节是正确的。但是为什么其他人会出错呢?我做错了什么?
此外,如何将符号 b'\something ' 转换为十六进制 (0xsomething),以及如何从代码给我的结果中提取数组(每个轮密钥)?
解决方法
暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!
如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。
小编邮箱:dio#foxmail.com (将#修改为@)