http://www.example-code.com/vcpp/dh_key_exchange.asp
#include <CkDh.h>
CkCrypt2.h>

void)
    {
    //  Create two separate instances of the DH object.
    CkDh dhBob;
    CkDh dhAlice;

    bool success;

    //  Unlock the component once at program startup...
    success = dhBob.);
    true) {
        printf(lastErrorText());
        return;
    }

    //  The DH algorithm begins with a large prime, P, and a generator, G.
    //  These don't have to be secret, and they may be transmitted over an insecure channel.
    //  The generator is a small integer and typically has the value 2 or 5.

    //  The Chilkat DH component provides the ability to use known
    

    //  This example will use a known safe prime.  Generating
    //  new safe primes is a time-consuming CPU intensive task
    //  and is normally done offline.

    //  Bob will choose to use the 2nd of our 8 pre-chosen safe primes.
    //  It is the Prime for the 2nd Oakley Group (RFC 2409) --
    //  1024-bit MODP Group.  Generator is 2.
    //  The prime is: 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }
    dhBob.2);

    //  The computed shared secret will be equal to the size of the prime (in bits).
    //  In this case the prime is 1024 bits, so the shared secret will be 128 bytes (128 * 8 = 1024).
    //  However, the result is returned as an SSH1-encoded bignum in hex string format.
    //  The SSH1-encoding prepends a 2-byte count, so the result is going  to be 2 bytes
    //  longer: 130 bytes.  This results in a hex string that is 260 characters long (two chars
    //  per byte for the hex encoding).

    const char * p;
    long g;
    //  Bob will now send P and G to Alice.
    p = dhBob.p();
    g = dhBob.get_G();

    //  Alice calls SetPG to set P and G.  SetPG checks
    //  the values to make sure it's a safe prime and will
    //  return false if not.
    success = dhAlice.SetPG(p,g);
    true) {
        printf();
        return;
    }

    
    //  value.  The CreateE method has one argument: numBits.
    //  It should be set to twice the size of the number of bits
    //  in the session key.

    //  Let's say we want to generate a 128-bit session key
    //  for AES encryption.  The shared secret generated by the Diffie-Hellman
    //  algorithm will be longer, so we'll hash the result to arrive at the
    //  desired session key length.  However, the length of the session
    //  key we'll utlimately produce determines the value that should be
    //  passed to the CreateE method.

    //  In this case, we'll be creating a 128-bit session key, so pass 256 to CreateE.
    //  This setting is for security purposes only -- the value
    //  passed to CreateE does not change the length of the shared secret
    //  that is produced by Diffie-Hellman.
    //  Also, there is no need to pass in a value larger
    //  than 2 times the expected session key length.  It suffices to
    //  pass exactly 2 times the session key length.

    //  Bob generates a random E (which has the mathematical
    //  properties required for DH).
    const char * eBob;
    eBob = dhBob.256);

    //  Alice does the same:
    const char * eAlice;
    eAlice = dhAlice.256);

    
    

    //  Each side computes the shared secret by calling FindK.
    

    const char * kBob;
    const char * kAlice;

    
    kBob = dhBob.findK(eAlice);

    
    kAlice = dhAlice.findK(eBob);

    //  Amazingly, kBob and kAlice are identical and the expected
    //  length (260 characters).  The strings contain the hex encoded bytes of
    //  our shared secret:
    printf();
    printf(,kBob);
    printf();
    printf(,kAlice);

    //  To arrive at a 128-bit session key for AES encryption, Bob and Alice should
    //  both transform the raw shared secret using a hash algorithm that produces
    //  the size of session key desired.   MD5 produces a 16-byte (128-bit) result, so
    //  this is a good choice for 128-bit AES.

    //  Here's how you would use Chilkat Crypt (a separate Chilkat component) to
    //  produce the session key:
    CkCrypt2 crypt;
    success = crypt.);
    true) {
        printf(lastErrorText());
        return;
    }

    crypt.);
    crypt.);

    const char * sessionKey;
    sessionKey = crypt.hashStringENC(kBob);

    printf();
    printf(,sessionKey);

    //  Encrypt something...
    crypt.);
    crypt.128);
    crypt.);

    //  Use an IV that is the MD5 hash of the session key...
    const char * iv;
    iv = crypt.hashStringENC(sessionKey);

    //  AES uses a 16-byte IV:
    printf();
    printf(,iv);

    crypt.);
    crypt.);

    //  Encrypt some text:
    const char * cipherText64;

    crypt.);
    cipherText64 = crypt.);
    printf(,cipherText64);

    const char * plainText;
    plainText = crypt.decryptStringENC(cipherText64);

    printf(,plainText);
    }

相关文章:

  • 2021-08-30
  • 2022-12-23
  • 2022-01-02
  • 2021-11-27
  • 2021-09-24
  • 2022-12-23
  • 2022-12-23
  • 2021-09-26
猜你喜欢
  • 2021-11-08
  • 2022-12-23
  • 2022-12-23
  • 2021-06-05
  • 2021-05-18
  • 2022-12-23
  • 2022-12-23
相关资源
相似解决方案