在读者了解了加密算法的具体使用流程后,那么我们就可以使用这些加密算法对网络中的数据包进行加密处理,加密算法此处我们先采用AES
算法,在网络通信中,只需要在发送数据之前对特定字符串进行加密处理,而在接收到数据后在使用相同的算法对数据进行恢复即可,读者如果有了套接字编程的基础,那么理解这段代码将变得很容易。
首先来看服务端
代码片段,服务端在接受数据之前通过初始化aes_key
变量设置一个加密密钥,在收到recv()
数据后,直接调用AES
函数实现解密,当解密完成后则直接输出原始字符串。
#include <iostream>
#include <winsock2.h>
#include <WS2tcpip.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/pem.h>
#include <openssl/aes.h>
#include <openssl/crypto.h>
extern "C"
{
#include <openssl/applink.c>
}
#pragma comment(lib,"ws2_32.lib")
#pragma comment(lib,"libssl_static.lib")
#pragma comment(lib,"libcrypto.lib")
// AES加密与解密
void AES(unsigned char* InBuff, unsigned char* OutBuff, unsigned char* key, char* Type)
{
if (strcmp(Type, "encode") == 0)
{
AES_KEY AESEncryptKey;
AES_set_encrypt_key(key, 256, &AESEncryptKey);
AES_encrypt(InBuff, OutBuff, &AESEncryptKey);
}
else if (strcmp(Type, "decode") == 0)
{
AES_KEY AESDecryptKey;
AES_set_decrypt_key(key, 256, &AESDecryptKey);
AES_decrypt(InBuff, OutBuff, &AESDecryptKey);
}
}
int main(int argc, char* argv[])
{
WSADATA WSAData;
WSAStartup(MAKEWORD(2, 0), &WSAData);
SOCKET server_socket;
server_socket = socket(AF_INET, SOCK_STREAM, 0);
struct sockaddr_in ServerAddr;
ServerAddr.sin_family = AF_INET;
ServerAddr.sin_port = htons(9999);
ServerAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
bind(server_socket, (LPSOCKADDR)&ServerAddr, sizeof(ServerAddr));
listen(server_socket, 10);
SOCKET message_socket;
if ((message_socket = accept(server_socket, (LPSOCKADDR)0, (int*)0)) != INVALID_SOCKET)
{
// 生成AES密钥
unsigned char aes_key[32] = { 0x11,0x22,0x33,0x44 };
// 使用RSA私钥加密AES的密钥,并发给客户端
char* encrypt = nullptr;
int encrypt_length = 0;
// 接收客户端发来的AES数据,解密输出
unsigned char Buffer[1024] = {0};
unsigned char DecodeBuf[1024] = { 0 };
recv(message_socket, (char *)Buffer, 1024, 0);
std::cout << "接收加密长度: " << strlen((char *)Buffer) << std::endl;
AES(Buffer, DecodeBuf, aes_key, (char*)"decode");
std::cout << "解密内容: " << DecodeBuf << std::endl;
}
closesocket(server_socket);
WSACleanup();
system("pause");
return 0;
}
接着是客户端
代码,如下所示,首先设置aes_key
密钥对,此处需要保持服务端与客户端密钥的一致性,在发送数据之前先调用AES
算法对字符串进行加密处理,接着在调用send
函数将加密后的字节序传输到服务器端。
#include <iostream>
#include <winsock2.h>
#include <WS2tcpip.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/pem.h>
#include <openssl/aes.h>
#include <openssl/crypto.h>
extern "C"
{
#include <openssl/applink.c>
}
#pragma comment(lib,"ws2_32.lib")
#pragma comment(lib,"libssl_static.lib")
#pragma comment(lib,"libcrypto.lib")
// AES 加密与解密
void AES(unsigned char* InBuff, unsigned char* OutBuff, unsigned char* key, char* Type)
{
if (strcmp(Type, "encode") == 0)
{
AES_KEY AESEncryptKey;
AES_set_encrypt_key(key, 256, &AESEncryptKey);
AES_encrypt(InBuff, OutBuff, &AESEncryptKey);
}
else if (strcmp(Type, "decode") == 0)
{
AES_KEY AESDecryptKey;
AES_set_decrypt_key(key, 256, &AESDecryptKey);
AES_decrypt(InBuff, OutBuff, &AESDecryptKey);
}
}
int main(int argc, char* argv[])
{
WSADATA WSAData;
WSAStartup(MAKEWORD(2, 0), &WSAData);
SOCKET client_socket;
client_socket = socket(AF_INET, SOCK_STREAM, 0);
struct sockaddr_in ClientAddr;
ClientAddr.sin_family = AF_INET;
ClientAddr.sin_port = htons(9999);
ClientAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
if (connect(client_socket, (LPSOCKADDR)&ClientAddr, sizeof(ClientAddr)) != SOCKET_ERROR)
{
unsigned char aes_key[32] = { 0x11,0x22,0x33,0x44 };
// 使用AES加密数据,并发送给服务端
char Buffer[1024] = "hello lyshark";
unsigned char EncodeBuf[1024] = { 0 };
AES((unsigned char *)Buffer, EncodeBuf, aes_key, (char*)"encode");
std::cout << "发送加密长度: " << strlen((char *)EncodeBuf) << std::endl;
send(client_socket, (char *)EncodeBuf, 1024, 0);
closesocket(client_socket);
WSACleanup();
}
system("pause");
return 0;
}
读者可自行编译上方代码,首先运行服务端然后再运行客户端,至此数据会被加密传输到对端,并使用相同的方式解密,如下图所示;
标签:加密传输,AES,20.4,socket,unsigned,char,key,接字,include From: https://www.cnblogs.com/LyShark/p/17802234.html