RSA算法描述:
1) 选择两个大素数 p、q, 计算 n = p*q;
2) 产生 e, d 使:
e*d = 1mod(p-1)(q-1)
e 与 (p-1)(q-1) 互质
[公钥] e、n
[私钥] d、n
3) 加密:
c = m^d mod n
4) 解密:
m = c^e mod n
--------------------------------------------------------------------------------------
libtommath是一个大数算法库。以下的代码是用这个库中的函数实现的,相当简单。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
|
#include <tommath.h> typedef struct { int bits; /* bits in key */ mp_int n; /* modulus */ mp_int e; /* public exponent */ mp_int d; /* private exponent */ }rsa_key; int rsa_rng(unsigned char *dst, int len, void *dat) { int x; for (x = 0; x < len; x++) dst[x] = rand () & 0xFF; return len; } int rsa_preme_random( mp_int *a, int bits ) { int err = mp_prime_random_ex( a, 8, bits, LTM_PRIME_2MSB_ON|LTM_PRIME_SAFE, rsa_rng, NULL ); if (err != MP_OKAY) { return -1; } return 0; } int rsa_gen_key( rsa_key *key, int bits ) { mp_int p, q; mp_int sp, sq; mp_int n, m; mp_int e, d; mp_int t; //init mp_ints mp_init( &p ); mp_init( &q ); mp_init( &sp ); mp_init( &sq ); mp_init( &n ); mp_init( &m ); mp_init( &e ); mp_init( &d ); mp_init( &t ); //genarate p & q rsa_preme_random( &p, bits/2 ); rsa_preme_random( &q, bits/2 ); //make n & m mp_sub_d( &p, 1, &sp ); mp_sub_d( &q, 1, &sq ); mp_mul( &p, &q, &n ); mp_mul( &sp, &sq, &m ); //make e & d mp_set( &e, 127 ); retry_e: mp_gcd( &e, &m, &t ); if ( ( mp_cmp_d(&t, 1) ) > 0 ){ mp_add_d( &e, 2, &e ); goto retry_e; } mp_invmod( &e, &m, &d ); //copy n d e to key struct mp_init( &key->n ); mp_init( &key->d ); mp_init( &key->e ); key->bits = bits; mp_copy( &n, &key->n ); mp_copy( &d, &key->d ); mp_copy( &e, &key->e ); mp_clear( &p ); mp_clear( &q ); mp_clear( &sp );mp_clear( &sq ); mp_clear( &n ); mp_clear( &m ); mp_clear( &e ); mp_clear( &d ); mp_clear( &t ); return 0; } /*set rsa key by string */ int rsa_set_key( rsa_key *key, char *sn, char *se, char *sd, int bits, int radix ) { key->bits = bits; mp_init( &key->n ); mp_init( &key->d ); mp_init( &key->e ); if ( sn ) mp_read_radix( &key->n, sn, radix ); if ( se ) mp_read_radix( &key->e, se, radix ); if ( sd ) mp_read_radix( &key->d, sd, radix ); return 0; } /*encrypt by private key */ int rsa_encrypt(mp_int *c, mp_int *m, rsa_key *key) { mp_exptmod( c, &key->d, &key->n, m ); return 0; } /*decrypt by public key */ int rsa_decrypt(mp_int *m, mp_int *c, rsa_key *key) { mp_exptmod( m, &key->e, &key->n, c ); return 0; } int rsa_test() { mp_int c, m; rsa_key key; char sn[] = "BB7F51983FD8707FD6227C23DEF5D5377A5A737CEF3C5252E578EFE136DF87B50473F9341F1640C8D258034E14C16993FCE6C6B8C3CEEB65FC8FBCD8EB77B3B05AC7C4D09E0FA1BA2EFE87D3184DB6718AE41A7CAD89B8DCE0FE80CEB523D5D647F9DB58A31D2E71AC677E67FA6E75820736C9893761EE4ACD11F31DBDC349EF" ; char se[] = "010001" ; char sm[] = "AA7B0BF4AAE8B7C2ECC485ACFA57770E50BB9207233E4278654717E470691981C187F81FFC3B90895063EF98C0D86B5297B655399309E6699FEE2270B0F3431B5ABAD7E516261926C35BF6BBFEFB49366EBE96DC510E9CBD915337E8188D517D15DCF90298C40233EEEAFD5A9459F5D3410E6B89B44DF6E818FA3594EF935534" ; char sc[1024]; mp_init( &c ); mp_init( &m ); rsa_set_key( &key, sn, se, NULL, 128, 16 ); mp_read_radix( &m, sm, 16 ); rsa_decrypt( &m, &c, &key ); mp_toradix( &c, sc, 16 ); printf ( "%s\n" , sc); return 0; } |