Python 實(shí)現(xiàn)國產(chǎn)SM3加密算法的示例代碼
SM3是中華人民共和國政府采用的一種密碼散列函數(shù)標(biāo)準(zhǔn),由國家密碼管理局于2010年12月17日發(fā)布。主要用于報(bào)告文件數(shù)字簽名及驗(yàn)證。
Python3代碼如下:
from math import ceil ############################################################################## # # 國產(chǎn)SM3加密算法 # ############################################################################## IV = "7380166f 4914b2b9 172442d7 da8a0600 a96f30bc 163138aa e38dee4d b0fb0e4e" IV = int(IV.replace(" ", ""), 16) a = [] for i in range(0, 8): a.append(0) a[i] = (IV >> ((7 - i) * 32)) & 0xFFFFFFFF IV = a def out_hex(list1): for i in list1: print("%08x" % i) print("\n") def rotate_left(a, k): k = k % 32 return ((a << k) & 0xFFFFFFFF) | ((a & 0xFFFFFFFF) >> (32 - k)) T_j = [] for i in range(0, 16): T_j.append(0) T_j[i] = 0x79cc4519 for i in range(16, 64): T_j.append(0) T_j[i] = 0x7a879d8a def FF_j(X, Y, Z, j): if 0 <= j and j < 16: ret = X ^ Y ^ Z elif 16 <= j and j < 64: ret = (X & Y) | (X & Z) | (Y & Z) return ret def GG_j(X, Y, Z, j): if 0 <= j and j < 16: ret = X ^ Y ^ Z elif 16 <= j and j < 64: # ret = (X | Y) & ((2 ** 32 - 1 - X) | Z) ret = (X & Y) | ((~ X) & Z) return ret def P_0(X): return X ^ (rotate_left(X, 9)) ^ (rotate_left(X, 17)) def P_1(X): return X ^ (rotate_left(X, 15)) ^ (rotate_left(X, 23)) def CF(V_i, B_i): W = [] for i in range(16): weight = 0x1000000 data = 0 for k in range(i * 4, (i + 1) * 4): data = data + B_i[k] * weight weight = int(weight / 0x100) W.append(data) for j in range(16, 68): W.append(0) W[j] = P_1(W[j - 16] ^ W[j - 9] ^ (rotate_left(W[j - 3], 15))) ^ (rotate_left(W[j - 13], 7)) ^ W[j - 6] str1 = "%08x" % W[j] W_1 = [] for j in range(0, 64): W_1.append(0) W_1[j] = W[j] ^ W[j + 4] str1 = "%08x" % W_1[j] A, B, C, D, E, F, G, H = V_i """ print "00", out_hex([A, B, C, D, E, F, G, H]) """ for j in range(0, 64): SS1 = rotate_left(((rotate_left(A, 12)) + E + (rotate_left(T_j[j], j))) & 0xFFFFFFFF, 7) SS2 = SS1 ^ (rotate_left(A, 12)) TT1 = (FF_j(A, B, C, j) + D + SS2 + W_1[j]) & 0xFFFFFFFF TT2 = (GG_j(E, F, G, j) + H + SS1 + W[j]) & 0xFFFFFFFF D = C C = rotate_left(B, 9) B = A A = TT1 H = G G = rotate_left(F, 19) F = E E = P_0(TT2) A = A & 0xFFFFFFFF B = B & 0xFFFFFFFF C = C & 0xFFFFFFFF D = D & 0xFFFFFFFF E = E & 0xFFFFFFFF F = F & 0xFFFFFFFF G = G & 0xFFFFFFFF H = H & 0xFFFFFFFF V_i_1 = [] V_i_1.append(A ^ V_i[0]) V_i_1.append(B ^ V_i[1]) V_i_1.append(C ^ V_i[2]) V_i_1.append(D ^ V_i[3]) V_i_1.append(E ^ V_i[4]) V_i_1.append(F ^ V_i[5]) V_i_1.append(G ^ V_i[6]) V_i_1.append(H ^ V_i[7]) return V_i_1 def hash_msg(msg): # print(msg) len1 = len(msg) reserve1 = len1 % 64 msg.append(0x80) reserve1 = reserve1 + 1 # 56-64, add 64 byte range_end = 56 if reserve1 > range_end: range_end = range_end + 64 for i in range(reserve1, range_end): msg.append(0x00) bit_length = (len1) * 8 bit_length_str = [bit_length % 0x100] for i in range(7): bit_length = int(bit_length / 0x100) bit_length_str.append(bit_length % 0x100) for i in range(8): msg.append(bit_length_str[7 - i]) # print(msg) group_count = round(len(msg) / 64) B = [] for i in range(0, group_count): B.append(msg[i * 64:(i + 1) * 64]) V = [] V.append(IV) for i in range(0, group_count): V.append(CF(V[i], B[i])) y = V[i + 1] result = "" for i in y: result = '%s%08x' % (result, i) return result def str2byte(msg): # 字符串轉(zhuǎn)換成byte數(shù)組 ml = len(msg) msg_byte = [] msg_bytearray = msg # 如果加密對(duì)象是字符串,則在此對(duì)msg做encode()編碼即可,否則不編碼 for i in range(ml): msg_byte.append(msg_bytearray[i]) return msg_byte def byte2str(msg): # byte數(shù)組轉(zhuǎn)字符串 ml = len(msg) str1 = b"" for i in range(ml): str1 += b'%c' % msg[i] return str1.decode('utf-8') def hex2byte(msg): # 16進(jìn)制字符串轉(zhuǎn)換成byte數(shù)組 ml = len(msg) if ml % 2 != 0: msg = '0' + msg ml = int(len(msg) / 2) msg_byte = [] for i in range(ml): msg_byte.append(int(msg[i * 2:i * 2 + 2], 16)) return msg_byte def byte2hex(msg): # byte數(shù)組轉(zhuǎn)換成16進(jìn)制字符串 ml = len(msg) hexstr = "" for i in range(ml): hexstr = hexstr + ('%02x' % msg[i]) return hexstr def KDF(Z, klen): # Z為16進(jìn)制表示的比特串(str),klen為密鑰長度(單位byte) klen = int(klen) ct = 0x00000001 rcnt = ceil(klen / 32) Zin = hex2byte(Z) Ha = "" for i in range(int(rcnt)): msg = Zin + hex2byte('%08x' % ct) # print(msg) Ha = Ha + hash_msg(msg) # print(Ha) ct += 1 return Ha[0: klen * 2] def sm3_hash(msg, Hexstr=0): """ 封裝方法,外部調(diào)用 :param msg: 二進(jìn)制流(如若需要傳入字符串,則把str2byte方法里msg做encode()編碼一下,否則不編碼) :param Hexstr: 0 :return: 64位SM3加密結(jié)果 """ if (Hexstr): msg_byte = hex2byte(msg) else: msg_byte = str2byte(msg) return hash_msg(msg_byte) if __name__ == '__main__': print(sm3_hash(b'SM3Test'))# 打印結(jié)果:901053b4681483b737dd2dd9f9a7f56805aa1b03337f8c1abb763a96776b8905
以上就是Python 實(shí)現(xiàn)國產(chǎn)SM3加密算法的示例代碼的詳細(xì)內(nèi)容,更多關(guān)于Python 實(shí)現(xiàn)國產(chǎn)SM3加密算法的資料請(qǐng)關(guān)注腳本之家其它相關(guān)文章!
- DES加密解密算法之python實(shí)現(xiàn)版(圖文并茂)
- python實(shí)現(xiàn)可逆簡單的加密算法
- python3 常見解密加密算法實(shí)例分析【base64、MD5等】
- Python實(shí)現(xiàn)常見的幾種加密算法(MD5,SHA-1,HMAC,DES/AES,RSA和ECC)
- Python實(shí)現(xiàn)ElGamal加密算法的示例代碼
- 盤點(diǎn)Python加密解密模塊hashlib的7種加密算法(推薦)
- 利用python設(shè)計(jì)圖像加密技術(shù)(Arnold算法)
- python?中的pycrypto?算法加密
- python3中rsa加密算法詳情
- python算法加密 pyarmor與docker
相關(guān)文章
PyCharm 配置遠(yuǎn)程python解釋器和在本地修改服務(wù)器代碼
這篇文章主要介紹了PyCharm 配置遠(yuǎn)程python解釋器和在本地修改服務(wù)器代碼,文中通過示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來一起學(xué)習(xí)學(xué)習(xí)吧2019-07-07Python函數(shù)之iterrows(),iteritems(),itertuples()的區(qū)別說明
這篇文章主要介紹了Python函數(shù)之iterrows(),iteritems(),itertuples()的區(qū)別說明,具有很好的參考價(jià)值,希望對(duì)大家有所幫助。如有錯(cuò)誤或未考慮完全的地方,望不吝賜教2022-05-05Django Haystack 全文檢索與關(guān)鍵詞高亮的實(shí)現(xiàn)
這篇文章主要介紹了Django Haystack 全文檢索與關(guān)鍵詞高亮的實(shí)現(xiàn),文中通過示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來一起學(xué)習(xí)學(xué)習(xí)吧2020-02-02Python使用matplotlib和pandas實(shí)現(xiàn)的畫圖操作【經(jīng)典示例】
這篇文章主要介紹了Python使用matplotlib和pandas實(shí)現(xiàn)的畫圖操作,結(jié)合實(shí)例形式分析了Python基于matplotlib和pandas的數(shù)值運(yùn)算與圖形顯示操作相關(guān)實(shí)現(xiàn)技巧,并對(duì)部分代碼的圖形顯示進(jìn)行了顯示效果測(cè)試,需要的朋友可以參考下2018-06-06python之Socket網(wǎng)絡(luò)編程詳解
這篇文章主要為大家詳細(xì)介紹了python之Socket網(wǎng)絡(luò)編程,具有一定的參考價(jià)值,感興趣的小伙伴們可以參考一下2016-09-09Python3 加密(hashlib和hmac)模塊的實(shí)現(xiàn)
本篇文章主要介紹了Python3 加密(hashlib / hmac)模塊的實(shí)現(xiàn),小編覺得挺不錯(cuò)的,現(xiàn)在分享給大家,也給大家做個(gè)參考。一起跟隨小編過來看看吧2017-11-11