AES/CBC/Nopadding,Hex编码怎么实现啊

需要使用python实现一个AES加密,AES加密,CBC模式,Nopadding填充模式,HEX编码
我自己使用pycryptodome仅能实现b64和UTF-8编码,有没有人帮忙看看啊
希望实现的是这样一个效果↓

img

from Crypto.Cipher import AES
import binascii

def aes_encrypt(key, iv, plaintext):
    cipher = AES.new(key, AES.MODE_CBC, iv)
    ciphertext = cipher.encrypt(plaintext)
    return ciphertext

def aes_decrypt(key, iv, ciphertext):
    cipher = AES.new(key, AES.MODE_CBC, iv)
    plaintext = cipher.decrypt(ciphertext)
    return plaintext

def add_padding(plaintext):
    padding_length = AES.block_size - (len(plaintext) % AES.block_size)
    padded_plaintext = plaintext + bytes([padding_length] * padding_length)
    return padded_plaintext

def remove_padding(padded_plaintext):
    padding_length = padded_plaintext[-1]
    plaintext = padded_plaintext[:-padding_length]
    return plaintext

def encrypt_text(key, iv, plaintext):
    padded_plaintext = add_padding(plaintext)
    ciphertext = aes_encrypt(key, iv, padded_plaintext)
    return binascii.hexlify(ciphertext).decode()

def decrypt_text(key, iv, ciphertext):
    ciphertext = binascii.unhexlify(ciphertext)
    padded_plaintext = aes_decrypt(key, iv, ciphertext)
    plaintext = remove_padding(padded_plaintext)
    return plaintext.decode()

key = b'0123456789abcdef'  # 16字节的密钥
iv = b'abcdef9876543210'  # 16字节的初始向量
plaintext = b'This is a secret message'

encrypted_text = encrypt_text(key, iv, plaintext)
print("加密后的文本:", encrypted_text)

decrypted_text = decrypt_text(key, iv, encrypted_text)
print("解密后的文本:", decrypted_text)

TechWhizKid参考GPT回答:

from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad
from binascii import unhexlify, hexlify

def aes_encrypt(key, data):
    # AES key必须是162432字节长度
    assert len(key) in (16, 24, 32)
    # 创建cipher对象
    cipher = AES.new(key, AES.MODE_ECB)
    # AES的CBC模式要长度为16的初始化向量
    iv = b'\0' * 16
    cipher = AES.new(key, AES.MODE_CBC, iv)
    # 由于我们使用NoPadding,因此数据的长度必须是16的倍数
    assert len(data) % 16 == 0
    # 加密数据
    encrypted = cipher.encrypt(data)
    # 使用hex编码
    encrypted = hexlify(encrypted).decode()
    return encrypted

def aes_decrypt(key, data):
    # 解密时,要先解hex编码
    data = unhexlify(data)
    # AES key必须是162432字节长度
    assert len(key) in (16, 24, 32)
    # AES的CBC模式要长度为16的初始化向量
    iv = b'\0' * 16
    cipher = AES.new(key, AES.MODE_CBC, iv)
    # 解密数据
    decrypted = cipher.decrypt(data)
    return decrypted

key = b'Sixteen byte key'
data = b'Hello, world!   '  # 数据长度为16,满足NoPadding的需要

encrypted = aes_encrypt(key, data)
print('加密:', encrypted)

decrypted = aes_decrypt(key, encrypted)
print('解密:', decrypted)

这个你会满意的

from Crypto.Cipher import AES
import binascii

def AES_Encrypt(data, key):
    data = data + (16 - len(data.encode()) % 16) * chr(16 - len(data.encode()) % 16)
    iv = b"\x01\x02\x03\x04\x05\x06\x07\x08\t\x01\x02\x03\x04\x05\x06\x07"
    cipher = AES.new(key.encode("utf-8"), AES.MODE_CBC, iv=iv)
    ciphertext = binascii.b2a_hex(cipher.encrypt(data.encode("utf-8"))).decode()
    return ciphertext

key = 'at1Q722ZZu8tLhJ1'  # 必须为16txt = "hello world!"

encrypt_txt = AES_Encrypt(txt,key)
print("AES加密结果:",encrypt_txt)

提供一段参考代码,代码构思:
代码中使用cryptography库来实现AES加密。首先,初始化密钥和IV,并使用这些参数创建一个AES加密器。接下来,使用PKCS7填充模式对明文进行填充,确保明文长度是16字节的倍数。然后,使用加密器对填充后的明文进行加密,并将得到的密文转换为HEX编码字符串。最后,打印出加密后的密文(以HEX编码形式)。

from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes  
from cryptography.hazmat.backends import default_backend  
from cryptography.hazmat.primitives import padding  
from cryptography.hazmat.primitives.asymmetric import padding as asymmetric_padding  
from cryptography.hazmat.primitives.serialization import load_pem_private_key  
  
# 初始化密钥和IV  
key = b'0123456789abcdef'  # 16字节的密钥  
iv = b'abcdef0123456789'  # 16字节的IV  
  
# 初始化加密器  
cipher = Cipher(algorithms.AES(key), modes.CBC(iv), backend=default_backend())  
encryptor = cipher.encryptor()  
  
# 填充明文  
plaintext = b'This is a secret message.'  # 明文必须是16字节的倍数,这里使用padding填充  
padded_plaintext = padding.PKCS7(128).padder().update(plaintext) + padding.PKCS7(128).padder().finalize()  
  
# 加密明文  
ciphertext = encryptor.update(padded_plaintext) + encryptor.finalize()  
  
# 将密文转换为HEX编码字符串  
hex_encoded_ciphertext = ciphertext.hex()  
  
print("加密后的密文(HEX编码):", hex_encoded_ciphertext)
#如有帮助,恭请采纳

结果

img

涉及中文和特殊字符的话:

加密算法是基于字节(bytes)而不是字符(characters)进行操作的,所以在加密之前,你需要将你的明文转换为字节序列,例如使用encode()方法。同样,在解密之后,你需要将你的密文转换为字符序列,例如使用decode()方法。

对于中文和特殊字符,你需要注意使用合适的编码方式,例如UTF-8或者GBK,以保证加密和解密的一致性。不同的编码方式可能会导致不同的字节序列,从而影响加密的结果

代码

# 导入pycryptodome库
from Crypto.Cipher import AES
import binascii

# 定义密钥和初始化向量,长度为16字节(128位)
key = b'92oifgGh893*cj%7'
iv = b'1234567890abcdef'

# 定义Nopadding填充函数,用空格填充明文
def nopadding(text):
  while len(text) % 16 != 0:
    text += b' '
  return text

# 定义HEX编码函数,将二进制数据转换为十六进制字符串
def hex_encode(data):
  return binascii.hexlify(data).decode('utf-8')

# 创建AES对象,指定密钥,CBC模式和IV
aes = AES.new(key, AES.MODE_CBC, iv)

# 待加密的明文
plaintext = b'Hello, this is a plain text'

# 对明文进行Nopadding填充
padded = nopadding(plaintext)

# 对填充后的明文进行加密,得到二进制的密文
ciphertext = aes.encrypt(padded)

# 对密文进行HEX编码,得到十六进制的字符串
encoded = hex_encode(ciphertext)

# 打印结果
print(encoded)


可以参考:
Python实现AES的CBC模式加密和解密过程详解:https://www.cnblogs.com/kongbursi-2292702937/p/13359760.html
使用Python实现AES(256)加密,ECB模式,pkcs7补全(AES五种加密模式(CBC、ECB、CTR、OCF、CFB)):
https://www.cnblogs.com/shenzhuang/p/10302182.html

from Crypto.Cipher import AES
from Crypto.Random import get_random_bytes

# 生成随机密钥
key = get_random_bytes(16)
iv = get_random_bytes(16)

# 创建加密对象
cipher = AES.new(key, AES.MODE_CBC, iv)

# 输入要加密的数据
data = b'This is the data to be encrypted'

# 加密数据
ciphertext = cipher.encrypt(data)

# 将加密后的数据转换为HEX编码
hex_ciphertext = hex(ciphertext)[2:].zfill(16)

# 输出加密后的HEX编码
print(hex_ciphertext)

aes cbc nopadding python 实现 aes算法python


class AES_128:
    #列混合矩阵
    MIX_C  = [[0x2, 0x3, 0x1, 0x1], [0x1, 0x2, 0x3, 0x1], [0x1, 0x1, 0x2, 0x3], [0x3, 0x1, 0x1, 0x2]]
    I_MIXC = [[0xe, 0xb, 0xd, 0x9], [0x9, 0xe, 0xb, 0xd], [0xd, 0x9, 0xe, 0xb], [0xb, 0xd, 0x9, 0xe]]
    RCon   = [0x01000000, 0x02000000, 0x04000000, 0x08000000, 0x10000000, 0x20000000, 0x40000000, 0x80000000, 0x1B000000, 0x36000000]

    S_BOX = [[0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76],
             [0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0, 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0],
             [0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15],
             [0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A, 0x07, 0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75],
             [0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0, 0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84],
             [0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B, 0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF],
             [0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85, 0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8],
             [0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5, 0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2],
             [0xCD, 0x0C, 0x13, 0xEC, 0x5F, 0x97, 0x44, 0x17, 0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73],
             [0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88, 0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB],
             [0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C, 0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79],
             [0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9, 0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08],
             [0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6, 0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A],
             [0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E, 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E],
             [0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF],
             [0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68, 0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16]]

    I_SBOX = [[0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB],
              [0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87, 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB],
              [0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E],
              [0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2, 0x76, 0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25],
              [0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92],
              [0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA, 0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84],
              [0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A, 0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06],
              [0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02, 0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B],
              [0x3A, 0x91, 0x11, 0x41, 0x4F, 0x67, 0xDC, 0xEA, 0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73],
              [0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85, 0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E],
              [0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89, 0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B],
              [0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20, 0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4],
              [0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31, 0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F],
              [0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D, 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF],
              [0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61],
              [0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26, 0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D]]

    def subBytes(self,Matrix,state):#根据传入的Matrix确定实现字节代替(或逆字节代替)
        return [Matrix[i][j] for i,j in[(t>>4,t&0xf) for t in state]]
    def mixColumns(self,matrix,state):
        ls=[]
        temp=0x0
        for round in range(4):
            for row in range(4):#矩阵MIX_C的一行乘以state的每一列
                for col in range(4):
                    temp^=self.mul_all(matrix[round][col],state[col*4+row])
                ls.append(temp)
                temp=0x0
        return ls

    def shiftRows(self,s):#加密时的行移位
        return [s[0],s[1],s[2],s[3],
                s[5],s[6],s[7],s[4],
                s[10],s[11],s[8],s[9],
                s[15],s[12],s[13],s[14]]
    def inShiftRows(self,s):#逆行移位,解密时的行移位
        return [s[0],s[1],s[2],s[3],
                s[7],s[4],s[5],s[6],
                s[10],s[11],s[8],s[9],
                s[13],s[14],s[15],s[12]]
    def addRoundKey(self,state,kw):
        ls=[0]*16
        for row in range(4):
            for col in range(4):
                ls[col*4+row]=state[col*4+row]^kw[row*4+col]
        return ls

    def mul_2(self,p1,p2):#递归处理有限域乘法(处理乘数p1的数据形如:0x1,0x2,0x4,0x8,0x10,0x20,0x40,0x80)
        if p1==1:         #p1为乘数,p2为被乘数
           return p2
        else:
            return (self.mul_2(p1>>1,(p2<<1&0xff)^(0x1b if p2&0x80 else 0x00)))#result=(p2<<1&0xff)^(0x1b if p2&0x80 else 0x00)中间结果项
    def mul_all(self,p1,p2):#有限域(G(2^8))上的乘法
        result=0x0
        pp=p1
        temp=0x1
        for i in range(8):
            if p1==0:#当乘数等于0的时候就跳出循环
                break
            if pp&temp:
                result^=self.mul_2(temp,p2)
            temp<<=1
            p1>>=1
        return result

    def keyExpansion(self,key):
        kw=[key>>96,key>>64&0xffffffff,key>>32&0xffffffff,key&0xffffffff]+[0]*40
        for i in range(4,44):
            temp=kw[i-1]
            if i%4==0:
                temp=self.subWord(self.rotWord(temp))^self.RCon[i//4-1]
            kw[i]=kw[i-4]^temp
        return [(kw[4*i]>>24,kw[4*i]>>16&0xff,kw[4*i]>>8&0xff,kw[4*i]&0xff,
                kw[4*i+1]>>24,kw[4*i+1]>>16&0xff,kw[4*i+1]>>8&0xff,kw[4*i+1]&0xff,
                kw[4*i+2]>>24,kw[4*i+2]>>16&0xff,kw[4*i+2]>>8&0xff,kw[4*i+2]&0xff,
                kw[4*i+3]>>24,kw[4*i+3]>>16&0xff,kw[4*i+3]>>8&0xff,kw[4*i+3]&0xff)for i in range(11)]
    def rotWord(self,word):
        return ((word&0xffffff)<<8) + (word>>24)
    def subWord(self,word):
        result=0x0
        for i in range(4):
            temp=word&0xff000000
            word<<=8
            temp>>=24
            result=(result<<8)+self.S_BOX[temp>>4][temp&0xf]
        return result
        #加密
    def encrypt(self,text,key):
        kw=self.keyExpansion(key)
        state=self.slipt(text)
        state=self.addRoundKey(state,kw[0])
        for i in range(1,10):
            state=self.subBytes(self.S_BOX,state)
            state=self.shiftRows(state)
            state=self.mixColumns(self.MIX_C,state)
            state=self.addRoundKey(state,kw[i])
        state=self.subBytes(self.S_BOX,state)
        state=self.shiftRows(state)
        state=self.addRoundKey(state,kw[10])
        return state
    def decrypt(self,text,key):
        kw=self.keyExpansion(key)
        state=self.slipt(text)
        state=self.addRoundKey(state,kw[10])
        for i in [9,8,7,6,5,4,3,2,1]:
            state=self.inShiftRows(state)
            state=self.subBytes(self.I_SBOX,state)
            state=self.addRoundKey(state,kw[i])
            state=self.mixColumns(self.I_MIXC,state)
        state=self.inShiftRows(state)
        state=self.subBytes(self.I_SBOX,state)
        state=self.addRoundKey(state,kw[0])
        return state

    #将输入的16字节进行划分    
    def slipt(self,text):
        ls=[0]*16
        for i in [3,2,1,0]:
            for j in [3,2,1,0]:
                ls[4*j+i]=text&0xff
                text>>=8
        return ls

#打印数据
def show(s):
    for i in range(4):
        for j in range(4):
            print(hex(s[4*j+i]),end=' ')

print("加密:1      解密: 2    示例:3     退出:0")
k=int(input("你要进行的操作:"))
my=AES_128()
while k!=0:
    if k==1:
        text1=int(input("请输入明文:"),16)
        key1=int(input("请输入密钥:"),16)
        s=my.encrypt(text1,key1)
        show(s)
    elif k==2:
        ciphertext1=int(input("请输入密文:"),16)
        key1=int(input("请输入密钥:"),16)
        s=my.decrypt(ciphertext1,key1)
        show(s)
    elif k==3:
        text=0x3243f6a8885a308d313198a2e0370734
        key= 0x2b7e151628aed2a6abf7158809cf4f3c
        s=my.encrypt(text,key)
        print("加密后的密文:")
        show(s)
        
        ciphertext=0x3925841d02dc09fbdc118597196a0b32
        s=my.decrypt(ciphertext,key)
        print('解密出的明文:')
        show(s)
    print()
    k=int(input("你要进行的操作:"))

可以使用Crypto库实现

该回答通过自己思路及引用到GPTᴼᴾᴱᴺᴬᴵ搜索,得到内容具体如下:

以下是使用pycryptodome库在Python中实现AES/CBC/Nopadding和Hex编码的示例代码:

from Crypto.Cipher import AES
import codecs

# 加密函数
def encrypt(key, iv, plaintext):
    aes = AES.new(key, AES.MODE_CBC, iv)
    ciphertext = aes.encrypt(plaintext)
    # 将加密后的结果转换为十六进制编码
    return codecs.encode(ciphertext, 'hex').decode('utf-8')

# 解密函数
def decrypt(key, iv, ciphertext):
    aes = AES.new(key, AES.MODE_CBC, iv)
    # 将十六进制编码的密文转换为二进制形式
    ciphertext = codecs.decode(ciphertext.encode('utf-8'), 'hex')
    plaintext = aes.decrypt(ciphertext)
    # 去除解密后多余的填充字节
    return plaintext.rstrip(b'\0').decode('utf-8')

# 测试代码
key = b'0123456789abcdef'
iv = b'1234567890abcdef'
plaintext = 'hello world'
ciphertext = encrypt(key, iv, plaintext)
print('加密后的结果:', ciphertext)
decrypted_plaintext = decrypt(key, iv, ciphertext)
print('解密后的结果:', decrypted_plaintext)

在这个示例中,我们使用了codecs模块将二进制数据转换为十六进制编码的字符串,以便于输出和传输。如果你不需要输出十六进制编码的字符串,可以直接使用二进制形式的密文和明文。


如果以上回答对您有所帮助,点击一下采纳该答案~谢谢