`
cwmwss
  • 浏览: 5007 次
  • 性别: Icon_minigender_1
  • 来自: 杭州
社区版块
存档分类
最新评论

JAVA与.NET的同步DES加解密

阅读更多
.NET中DES加解密
  #region DESEnCode DES加密
        public static string DESEnCode(string pToEncrypt, string sKey)
        {
            pToEncrypt = HttpContext.Current.Server.UrlEncode(pToEncrypt);
            DESCryptoServiceProvider des = new DESCryptoServiceProvider();
            des.Mode = System.Security.Cryptography.CipherMode.ECB;
            byte[] inputByteArray = Encoding.GetEncoding("UTF-8").GetBytes(pToEncrypt);

            //建立加密对象的密钥和偏移量   
            //原文使用ASCIIEncoding.ASCII方法的GetBytes方法   
            //使得输入密码必须输入英文文本   
            des.Key = ASCIIEncoding.ASCII.GetBytes(sKey);
            des.IV = ASCIIEncoding.ASCII.GetBytes(sKey);
            MemoryStream ms = new MemoryStream();
            CryptoStream cs = new CryptoStream(ms, des.CreateEncryptor(), CryptoStreamMode.Write);

            cs.Write(inputByteArray, 0, inputByteArray.Length);
            cs.FlushFinalBlock();

            StringBuilder ret = new StringBuilder();
            foreach (byte b in ms.ToArray())
            {
                ret.AppendFormat("{0:X2}", b);
            }
            ret.ToString();
            return ret.ToString();
        }
        #endregion       


        #region DESDeCode DES解密
        public static string DESDeCode(string pToDecrypt, string sKey)
        {
            //    HttpContext.Current.Response.Write(pToDecrypt + "<br>" + sKey);  
            //    HttpContext.Current.Response.End();  
            DESCryptoServiceProvider des = new DESCryptoServiceProvider();
            des.Mode = System.Security.Cryptography.CipherMode.ECB;
            byte[] inputByteArray = new byte[pToDecrypt.Length / 2];
            for (int x = 0; x < pToDecrypt.Length / 2; x++)
            {
                int i = (Convert.ToInt32(pToDecrypt.Substring(x * 2, 2), 16));
                inputByteArray[x] = (byte)i;
            }

            des.Key = ASCIIEncoding.ASCII.GetBytes(sKey);
            des.IV = ASCIIEncoding.ASCII.GetBytes(sKey);
            MemoryStream ms = new MemoryStream();
            CryptoStream cs = new CryptoStream(ms, des.CreateDecryptor(), CryptoStreamMode.Write);
            cs.Write(inputByteArray, 0, inputByteArray.Length);
            cs.FlushFinalBlock();
            StringBuilder ret = new StringBuilder();
            return HttpContext.Current.Server.UrlDecode(System.Text.Encoding.Default.GetString(ms.ToArray()));
        }
        #endregion
 

 java与上面.NET同步的DES加解密

import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESKeySpec;
import javax.crypto.spec.IvParameterSpec;

public class Encrypt {  
      public static String myDecrypt(String message, String key) throws Exception {

        byte[] bytesrc = convertHexString(message);
        Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding");
        DESKeySpec desKeySpec = new DESKeySpec(key.getBytes("US-ASCII"));
        SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES");
        SecretKey secretKey = keyFactory.generateSecret(desKeySpec);
        IvParameterSpec iv = new IvParameterSpec(key.getBytes("US-ASCII"));
        cipher.init(Cipher.DECRYPT_MODE, secretKey, iv);
        byte[] retByte = cipher.doFinal(bytesrc);
        return new String(retByte);
    }

    public static String myEncrypt(String message, String key) throws Exception {
        //message = java.net.URLEncoder.encode(message, "ascii");
        Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding");
        DESKeySpec desKeySpec = new DESKeySpec(key.getBytes("US-ASCII"));
        SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES");
        SecretKey secretKey = keyFactory.generateSecret(desKeySpec);
        IvParameterSpec iv = new IvParameterSpec(key.getBytes("US-ASCII"));
        cipher.init(Cipher.ENCRYPT_MODE, secretKey, iv);
        byte[] encryptbyte = cipher.doFinal(message.getBytes());
        return toHexString(encryptbyte).toUpperCase();
       
    }

    public static byte[] convertHexString(String ss) {
        byte digest[] = new byte[ss.length() / 2];
        for (int i = 0; i < digest.length; i++) {
            String byteString = ss.substring(2 * i, 2 * i + 2);
            int byteValue = Integer.parseInt(byteString, 16);
            digest[i] = (byte) byteValue;
        }

        return digest;
    }
    public static String toHexString(byte b[]) {
        StringBuffer hexString = new StringBuffer();
        for (int i = 0; i < b.length; i++) {
            String plainText = Integer.toHexString(0xff & b[i]);
            if (plainText.length() < 2)
                plainText = "0" + plainText;
            hexString.append(plainText);
        }

        return hexString.toString();
    }

}

 

JS单独的DES加解密

<html>
<head>
<title>DES加密</title>
<meta http-equiv="Content-Type" content="text/html;charset=gb3212">
<script type="text/javascript">
<!--//des加解密函数
//key:加密用的密钥
//message:需要加密的字符串
//encrypt:加密还是解密,1为加密,0,解密
function des(key,message,encrypt,mode,iv){
 //declaring this locally speeds things up a bit
 var spfunction1=new Array(0x1010400,0,0x10000,0x1010404,0x1010004,0x10404,0x4,0x10000,0x400,0x1010400,0x1010404,0x400,0x1000404,0x1010004,0x1000000,0x4,0x404,0x1000400,0x1000400,0x10400,0x10400,0x1010000,0x1010000,0x1000404,0x10004,0x1000004,0x1000004,0x10004,0,0x404,0x10404,0x1000000,0x10000,0x1010404,0x4,0x1010000,0x1010400,0x1000000,0x1000000,0x400,0x1010004,0x10000,0x10400,0x1000004,0x400,0x4,0x1000404,0x10404,0x1010404,0x10004,0x1010000,0x1000404,0x1000004,0x404,0x10404,0x1010400,0x404,0x1000400,0x1000400,0,0x10004,0x10400,0,0x1010004);
 var spfunction2=new Array(-0x7fef7fe0,-0x7fff8000,0x8000,0x108020,0x100000,0x20,-0x7fefffe0,-0x7fff7fe0,-0x7fffffe0,-0x7fef7fe0,-0x7fef8000,-0x80000000,-0x7fff8000,0x100000,0x20,-0x7fefffe0,0x108000,0x100020,-0x7fff7fe0,0,-0x80000000,0x8000,0x108020,-0x7ff00000,0x100020,-0x7fffffe0,0,0x108000,0x8020,-0x7fef8000,-0x7ff00000,0x8020,0,0x108020,-0x7fefffe0,0x100000,-0x7fff7fe0,-0x7ff00000,-0x7fef8000,0x8000,-0x7ff00000,-0x7fff8000,0x20,-0x7fef7fe0,0x108020,0x20,0x8000,-0x80000000,0x8020,-0x7fef8000,0x100000,-0x7fffffe0,0x100020,-0x7fff7fe0,-0x7fffffe0,0x100020,0x108000,0,-0x7fff8000,0x8020,-0x80000000,-0x7fefffe0,-0x7fef7fe0,0x108000);
 var spfunction3=new Array(0x208,0x8020200,0,0x8020008,0x8000200,0,0x20208,0x8000200,0x20008,0x8000008,0x8000008,0x20000,0x8020208,0x20008,0x8020000,0x208,0x8000000,0x8,0x8020200,0x200,0x20200,0x8020000,0x8020008,0x20208,0x8000208,0x20200,0x20000,0x8000208,0x8,0x8020208,0x200,0x8000000,0x8020200,0x8000000,0x20008,0x208,0x20000,0x8020200,0x8000200,0,0x200,0x20008,0x8020208,0x8000200,0x8000008,0x200,0,0x8020008,0x8000208,0x20000,0x8000000,0x8020208,0x8,0x20208,0x20200,0x8000008,0x8020000,0x8000208,0x208,0x8020000,0x20208,0x8,0x8020008,0x20200);
 var spfunction4=new Array(0x802001,0x2081,0x2081,0x80,0x802080,0x800081,0x800001,0x2001,0,0x802000,0x802000,0x802081,0x81,0,0x800080,0x800001,0x1,0x2000,0x800000,0x802001,0x80,0x800000,0x2001,0x2080,0x800081,0x1,0x2080,0x800080,0x2000,0x802080,0x802081,0x81,0x800080,0x800001,0x802000,0x802081,0x81,0,0,0x802000,0x2080,0x800080,0x800081,0x1,0x802001,0x2081,0x2081,0x80,0x802081,0x81,0x1,0x2000,0x800001,0x2001,0x802080,0x800081,0x2001,0x2080,0x800000,0x802001,0x80,0x800000,0x2000,0x802080);
 var spfunction5=new Array(0x100,0x2080100,0x2080000,0x42000100,0x80000,0x100,0x40000000,0x2080000,0x40080100,0x80000,0x2000100,0x40080100,0x42000100,0x42080000,0x80100,0x40000000,0x2000000,0x40080000,0x40080000,0,0x40000100,0x42080100,0x42080100,0x2000100,0x42080000,0x40000100,0,0x42000000,0x2080100,0x2000000,0x42000000,0x80100,0x80000,0x42000100,0x100,0x2000000,0x40000000,0x2080000,0x42000100,0x40080100,0x2000100,0x40000000,0x42080000,0x2080100,0x40080100,0x100,0x2000000,0x42080000,0x42080100,0x80100,0x42000000,0x42080100,0x2080000,0,0x40080000,0x42000000,0x80100,0x2000100,0x40000100,0x80000,0,0x40080000,0x2080100,0x40000100);
 var spfunction6=new Array(0x20000010,0x20400000,0x4000,0x20404010,0x20400000,0x10,0x20404010,0x400000,0x20004000,0x404010,0x400000,0x20000010,0x400010,0x20004000,0x20000000,0x4010,0,0x400010,0x20004010,0x4000,0x404000,0x20004010,0x10,0x20400010,0x20400010,0,0x404010,0x20404000,0x4010,0x404000,0x20404000,0x20000000,0x20004000,0x10,0x20400010,0x404000,0x20404010,0x400000,0x4010,0x20000010,0x400000,0x20004000,0x20000000,0x4010,0x20000010,0x20404010,0x404000,0x20400000,0x404010,0x20404000,0,0x20400010,0x10,0x4000,0x20400000,0x404010,0x4000,0x400010,0x20004010,0,0x20404000,0x20000000,0x400010,0x20004010);
 var spfunction7=new Array(0x200000,0x4200002,0x4000802,0,0x800,0x4000802,0x200802,0x4200800,0x4200802,0x200000,0,0x4000002,0x2,0x4000000,0x4200002,0x802,0x4000800,0x200802,0x200002,0x4000800,0x4000002,0x4200000,0x4200800,0x200002,0x4200000,0x800,0x802,0x4200802,0x200800,0x2,0x4000000,0x200800,0x4000000,0x200800,0x200000,0x4000802,0x4000802,0x4200002,0x4200002,0x2,0x200002,0x4000000,0x4000800,0x200000,0x4200800,0x802,0x200802,0x4200800,0x802,0x4000002,0x4200802,0x4200000,0x200800,0,0x2,0x4200802,0,0x200802,0x4200000,0x800,0x4000002,0x4000800,0x800,0x200002);
 var spfunction8=new Array(0x10001040,0x1000,0x40000,0x10041040,0x10000000,0x10001040,0x40,0x10000000,0x40040,0x10040000,0x10041040,0x41000,0x10041000,0x41040,0x1000,0x40,0x10040000,0x10000040,0x10001000,0x1040,0x41000,0x40040,0x10040040,0x10041000,0x1040,0,0,0x10040040,0x10000040,0x10001000,0x41040,0x40000,0x41040,0x40000,0x10041000,0x1000,0x40,0x10040040,0x1000,0x41040,0x10001000,0x40,0x10000040,0x10040000,0x10040040,0x10000000,0x40000,0x10001040,0,0x10041040,0x40040,0x10000040,0x10040000,0x10001000,0x10001040,0,0x10041040,0x41000,0x41000,0x1040,0x1040,0x40040,0x10000000,0x10041000);

 //create the 16 or 48 subkeys we will need
 var keys=des_createKeys(key);
 var m=0,i,j,temp,temp2,right1,right2,left,right,looping;
 var cbcleft,cbcleft2,cbcright,cbcright2
 var endloop,loopinc;
 var len=message.length;
 var chunk=0;
 //set up the loops for single and triple des
 var iterations=keys.length==32?3 :9;//single or triple des
 if(iterations==3){looping=encrypt?new Array(0,32,2):new Array(30,-2,-2);}
 else{looping=encrypt?new Array(0,32,2,62,30,-2,64,96,2):new Array(94,62,-2,32,64,2,30,-2,-2);}

 message+="\0\0\0\0\0\0\0\0";//pad the message out with null bytes
 //store the result here
 result="";
 tempresult="";

 if(mode==1){//CBC mode
 cbcleft=(iv.charCodeAt(m++)<<24)|(iv.charCodeAt(m++)<<16)|(iv.charCodeAt(m++)<<8)|iv.charCodeAt(m++);
 cbcright=(iv.charCodeAt(m++)<<24)|(iv.charCodeAt(m++)<<16)|(iv.charCodeAt(m++)<<8)|iv.charCodeAt(m++);
 m=0;
 }

 //loop through each 64 bit chunk of the message
 while(m<len){
 if(encrypt){/*加密时按双字节操作*/
 left=(message.charCodeAt(m++)<<16)|message.charCodeAt(m++);
 right=(message.charCodeAt(m++)<<16)|message.charCodeAt(m++);
 }else{
 left=(message.charCodeAt(m++)<<24)|(message.charCodeAt(m++)<<16)|(message.charCodeAt(m++)<<8)|message.charCodeAt(m++);
 right=(message.charCodeAt(m++)<<24)|(message.charCodeAt(m++)<<16)|(message.charCodeAt(m++)<<8)|message.charCodeAt(m++);
 }
 //for Cipher Block Chaining mode,xor the message with the previous result
 if(mode==1){if(encrypt){left^=cbcleft;right^=cbcright;}else{cbcleft2=cbcleft;cbcright2=cbcright;cbcleft=left;cbcright=right;}}

 //first each 64 but chunk of the message must be permuted according to IP
 temp=((left>>>4)^right)&0x0f0f0f0f;right^=temp;left^=(temp<<4);
 temp=((left>>>16)^right)&0x0000ffff;right^=temp;left^=(temp<<16);
 temp=((right>>>2)^left)&0x33333333;left^=temp;right^=(temp<<2);
 temp=((right>>>8)^left)&0x00ff00ff;left^=temp;right^=(temp<<8);
 temp=((left>>>1)^right)&0x55555555;right^=temp;left^=(temp<<1);

 left=((left<<1)|(left>>>31));
 right=((right<<1)|(right>>>31));

 //do this either 1 or 3 times for each chunk of the message
 for(j=0;j<iterations;j+=3){
 endloop=looping[j+1];
 loopinc=looping[j+2];
 //now go through and perform the encryption or decryption
 for(i=looping[j];i!=endloop;i+=loopinc){//for efficiency
 right1=right^keys[i];
 right2=((right>>>4)|(right<<28))^keys[i+1];
 //the result is attained by passing these bytes through the S selection functions
 temp=left;
 left=right;
 right=temp^(spfunction2[(right1>>>24)&0x3f]|spfunction4[(right1>>>16)&0x3f]|spfunction6[(right1>>>8)&0x3f]|spfunction8[right1&0x3f]|spfunction1[(right2>>>24)&0x3f]|spfunction3[(right2>>>16)&0x3f]|spfunction5[(right2>>>8)&0x3f]|spfunction7[right2&0x3f]);
 }
 temp=left;left=right;right=temp;//unreverse left and right
 }//for either 1 or 3 iterations

 //move then each one bit to the right
 left=((left>>>1)|(left<<31));
 right=((right>>>1)|(right<<31));

 //now perform IP-1,which is IP in the opposite direction
 temp=((left>>>1)^right)&0x55555555;right^=temp;left^=(temp<<1);
 temp=((right>>>8)^left)&0x00ff00ff;left^=temp;right^=(temp<<8);
 temp=((right>>>2)^left)&0x33333333;left^=temp;right^=(temp<<2);
 temp=((left>>>16)^right)&0x0000ffff;right^=temp;left^=(temp<<16);
 temp=((left>>>4)^right)&0x0f0f0f0f;right^=temp;left^=(temp<<4);

 //for Cipher Block Chaining mode,xor the message with the previous result
 if(mode==1){if(encrypt){cbcleft=left;cbcright=right;}else{left^=cbcleft2;right^=cbcright2;}}
 if(encrypt){tempresult+=String.fromCharCode((left>>>24),((left>>>16)&0xff),((left>>>8)&0xff),(left&0xff),(right>>>24),((right>>>16)&0xff),((right>>>8)&0xff),(right&0xff));}
 else{tempresult+=String.fromCharCode(((left>>>16)&0xffff), (left&0xffff),((right>>>16)&0xffff), (right&0xffff));}/*解密时输出双字节*/
 encrypt?chunk+=16:chunk+=8;
 if(chunk==512){result+=tempresult;tempresult="";chunk=0;}
 }//for every 8 characters,or 64 bits in the message

 //return the result as an array
 return result+tempresult;
}//end of des

//des_createKeys
//this takes as input a 64 bit key(even though only 56 bits are used)
//as an array of 2 integers,and returns 16 48 bit keys
function des_createKeys(key){
 //declaring this locally speeds things up a bit
 pc2bytes0=new Array(0,0x4,0x20000000,0x20000004,0x10000,0x10004,0x20010000,0x20010004,0x200,0x204,0x20000200,0x20000204,0x10200,0x10204,0x20010200,0x20010204);
 pc2bytes1=new Array(0,0x1,0x100000,0x100001,0x4000000,0x4000001,0x4100000,0x4100001,0x100,0x101,0x100100,0x100101,0x4000100,0x4000101,0x4100100,0x4100101);
 pc2bytes2=new Array(0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808,0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808);
 pc2bytes3=new Array(0,0x200000,0x8000000,0x8200000,0x2000,0x202000,0x8002000,0x8202000,0x20000,0x220000,0x8020000,0x8220000,0x22000,0x222000,0x8022000,0x8222000);
 pc2bytes4=new Array(0,0x40000,0x10,0x40010,0,0x40000,0x10,0x40010,0x1000,0x41000,0x1010,0x41010,0x1000,0x41000,0x1010,0x41010);
 pc2bytes5=new Array(0,0x400,0x20,0x420,0,0x400,0x20,0x420,0x2000000,0x2000400,0x2000020,0x2000420,0x2000000,0x2000400,0x2000020,0x2000420);
 pc2bytes6=new Array(0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002,0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002);
 pc2bytes7=new Array(0,0x10000,0x800,0x10800,0x20000000,0x20010000,0x20000800,0x20010800,0x20000,0x30000,0x20800,0x30800,0x20020000,0x20030000,0x20020800,0x20030800);
 pc2bytes8=new Array(0,0x40000,0,0x40000,0x2,0x40002,0x2,0x40002,0x2000000,0x2040000,0x2000000,0x2040000,0x2000002,0x2040002,0x2000002,0x2040002);
 pc2bytes9=new Array(0,0x10000000,0x8,0x10000008,0,0x10000000,0x8,0x10000008,0x400,0x10000400,0x408,0x10000408,0x400,0x10000400,0x408,0x10000408);
 pc2bytes10=new Array(0,0x20,0,0x20,0x100000,0x100020,0x100000,0x100020,0x2000,0x2020,0x2000,0x2020,0x102000,0x102020,0x102000,0x102020);
 pc2bytes11=new Array(0,0x1000000,0x200,0x1000200,0x200000,0x1200000,0x200200,0x1200200,0x4000000,0x5000000,0x4000200,0x5000200,0x4200000,0x5200000,0x4200200,0x5200200);
 pc2bytes12=new Array(0,0x1000,0x8000000,0x8001000,0x80000,0x81000,0x8080000,0x8081000,0x10,0x1010,0x8000010,0x8001010,0x80010,0x81010,0x8080010,0x8081010);
 pc2bytes13=new Array(0,0x4,0x100,0x104,0,0x4,0x100,0x104,0x1,0x5,0x101,0x105,0x1,0x5,0x101,0x105);

 //how many iterations(1 for des,3 for triple des)
 var iterations=key.length>=24?3 :1;
 //stores the return keys
 var keys=new Array(32 * iterations);
 //now define the left shifts which need to be done
 var shifts=new Array(0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0);
 //other variables
 var lefttemp,righttemp,m=0,n=0,temp;

 for(var j=0;j<iterations;j++){//either 1 or 3 iterations
 left=(key.charCodeAt(m++)<<24)|(key.charCodeAt(m++)<<16)|(key.charCodeAt(m++)<<8)|key.charCodeAt(m++);
 right=(key.charCodeAt(m++)<<24)|(key.charCodeAt(m++)<<16)|(key.charCodeAt(m++)<<8)|key.charCodeAt(m++);

 temp=((left>>>4)^right)&0x0f0f0f0f;right^=temp;left^=(temp<<4);
 temp=((right>>>-16)^left)&0x0000ffff;left^=temp;right^=(temp<<-16);
 temp=((left>>>2)^right)&0x33333333;right^=temp;left^=(temp<<2);
 temp=((right>>>-16)^left)&0x0000ffff;left^=temp;right^=(temp<<-16);
 temp=((left>>>1)^right)&0x55555555;right^=temp;left^=(temp<<1);
 temp=((right>>>8)^left)&0x00ff00ff;left^=temp;right^=(temp<<8);
 temp=((left>>>1)^right)&0x55555555;right^=temp;left^=(temp<<1);

 //the right side needs to be shifted and to get the last four bits of the left side
 temp=(left<<8)|((right>>>20)&0x000000f0);
 //left needs to be put upside down
 left=(right<<24)|((right<<8)&0xff0000)|((right>>>8)&0xff00)|((right>>>24)&0xf0);
 right=temp;

 //now go through and perform these shifts on the left and right keys
 for(i=0;i<shifts.length;i++){
 //shift the keys either one or two bits to the left
 if(shifts[i]){left=(left<<2)|(left>>>26);right=(right<<2)|(right>>>26);}
 else{left=(left<<1)|(left>>>27);right=(right<<1)|(right>>>27);}
 left&=-0xf;right&=-0xf;

 //now apply PC-2,in such a way that E is easier when encrypting or decrypting
 //this conversion will look like PC-2 except only the last 6 bits of each byte are used
 //rather than 48 consecutive bits and the order of lines will be according to
 //how the S selection functions will be applied:S2,S4,S6,S8,S1,S3,S5,S7
 lefttemp=pc2bytes0[left>>>28]|pc2bytes1[(left>>>24)&0xf]
|pc2bytes2[(left>>>20)&0xf]|pc2bytes3[(left>>>16)&0xf]
|pc2bytes4[(left>>>12)&0xf]|pc2bytes5[(left>>>8)&0xf]
|pc2bytes6[(left>>>4)&0xf];
 righttemp=pc2bytes7[right>>>28]|pc2bytes8[(right>>>24)&0xf]
|pc2bytes9[(right>>>20)&0xf]|pc2bytes10[(right>>>16)&0xf]
|pc2bytes11[(right>>>12)&0xf]|pc2bytes12[(right>>>8)&0xf]
|pc2bytes13[(right>>>4)&0xf];
 temp=((righttemp>>>16)^lefttemp)&0x0000ffff;
 keys[n++]=lefttemp^temp;keys[n++]=righttemp^(temp<<16);
 }
 }//for each iterations
 //return the keys we"ve created
 return keys;
}//end of des_createKeys

////////////////////////////// 测试 //////////////////////////////

function stringToHex(s){
 var r="";
 var hexes=new Array("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
 for(var i=0;i<(s.length);i++){r+=hexes[s.charCodeAt(i)>>4]+hexes[s.charCodeAt(i)&0xf];}
 return r;
}
function HexTostring(s){
 var r="";
 for(var i=0;i<s.length;i+=2){
 var sxx=parseInt(s.substring(i,i+2),16);
 r+=String.fromCharCode(sxx);}
 return r;
}

function needkey(){
if(document.encme.deskey.value==""){var tk=window.prompt("请设定密码!","");if(tk){document.encme.deskey.value=tk; return true;}else return false;}
else return true;
}

function encMe(){
if(!needkey())return;
var k=document.encme.deskey.value;
var s=document.encme.inps.value;
document.encme.outs.value=stringToHex(des(k,s,1,0));
}

function uncMe(){
if(!needkey())return;
var s=document.encme.outs.value;
document.encme.inps.value=des(document.encme.deskey.value,HexTostring(s),0,0);
}

//-->
</script>
<style type="text/css">
</style>
</head>
<body>
<table border=0>
<form name="encme">
<tr><td>原
<br />
文</td><td>
<textarea name="inps" cols="50" rows="10"></textarea>
</td></tr>
<tr><td>
密
<br />
码</td><td>
<input type="password" name="deskey" maxlength="100" size="16" value="">
<input type="button" onclick="javascript:encMe()" value="&#8595;加密&#8595;">
<input type="button" onclick="javascript:uncMe()" value="&#8593;解密&#8593;">
</td></tr>
<tr><td>
密
<br />
文</td><td>
<textarea name="outs" cols="50" rows="10"></textarea>
</td></tr>
</form>
</table>
</body>
</html>

 

 

0
0
分享到:
评论

相关推荐

    高比例可再生能源电力系统的调峰成本量化与分摊模型——基于Matlab、Yalmip和Cplex的优化研究

    内容概要:本文探讨了高比例可再生能源接入对电力系统调峰能力的影响,提出了一种基于净负荷波动的调峰成本量化与分摊模型。首先,通过将负荷和可再生能源出力曲线转换为无波动的均值线,构建了无调峰需求的替代场景。接着,建立了含深度调峰和抽水蓄能的调度优化模型,用于计算不同场景下的调峰成本。通过比较有无调峰需求两种场景下的系统调峰成本,确定了单一主体导致的边际调峰成本,并采用Shapley值方法合理分摊调峰成本。研究表明,该模型可以有效反映各主体的调峰成本或贡献,有助于促进可再生能源的消纳和电力系统的稳定运行。 适合人群:从事电力系统规划、运营管理和可再生能源研究的专业人士,以及关注能源政策和技术发展的研究人员。 使用场景及目标:适用于评估和优化高比例可再生能源接入条件下的电力系统调峰成本,旨在提高电力系统的灵活性和经济性,同时促进可再生能源的有效利用。 其他说明:该模型需要根据实际情况进行调整和优化,以适应不同地区的电力市场特点和技术水平。

    ABB机器人与博图V16 Profinet通讯及外部启动配置详解

    内容概要:本文详细介绍了如何使用博图V16进行ABB机器人的外部启动及其与西门子设备的Profinet通讯配置。首先概述了ABB机器人和博图V16的基本概念,接着深入讲解了外部启动的重要性和实现方式,重点介绍了FB功能块的应用,以及Profinet通讯的具体配置步骤。文中还强调了GSD文件的作用,用于描述机器人的属性和行为,最后讨论了硬件配置的要求和注意事项,特别是对dsqc1030或dsqc652板卡的支持和888-2或888-3选项的需求。 适合人群:从事工业自动化领域的工程师和技术人员,尤其是那些负责机器人集成和编程的专业人士。 使用场景及目标:适用于需要将ABB机器人与西门子设备通过Profinet网络进行通讯并实现外部启动的项目。目标是提高自动化生产线的灵活性和效率,确保机器人和PLC之间的无缝协作。 其他说明:本文不仅提供了理论指导,还包含了实际操作中的关键细节,有助于读者快速掌握相关技能并在实践中应用。

    scratch少儿编程逻辑思维游戏源码-3D环境.zip

    scratch少儿编程逻辑思维游戏源码-3D环境.zip

    少儿编程scratch项目源代码文件案例素材-泼溅猫.zip

    少儿编程scratch项目源代码文件案例素材-泼溅猫.zip

    新能源领域基于EMD-ARMA的风光出力预测方法及其应用

    内容概要:本文介绍了基于EMD-ARMA的组合风光出力预测方法,详细阐述了经验模态分解(EMD)和自回归移动平均(ARMA)模型的应用步骤。首先,通过EMD将原始发电数据分解为多个本征模态函数(IMF),然后用ARMA模型对各IMF分量进行建模和预测,最后将预测结果叠加重构,获得最终的风光功率预测值。文中还提供了简化的Python代码示例,帮助读者理解和实现该方法。 适合人群:从事新能源研究和技术开发的专业人士,尤其是对风光发电预测感兴趣的科研人员和工程师。 使用场景及目标:适用于需要提高风光发电预测精度的项目,旨在通过先进的数学模型优化电力调度和资源配置。 其他说明:本文提供的代码示例仅用于教学目的,实际应用中需根据具体情况调整和完善。此外,建议在实践中参考更多专业文献和寻求专家意见以确保预测模型的准确性和可靠性。

    scratch少儿编程逻辑思维游戏源码-scratch RPG 战斗.zip

    scratch少儿编程逻辑思维游戏源码-scratch RPG 战斗.zip

    scratch少儿编程逻辑思维游戏源码-窗户冒险.zip

    scratch少儿编程逻辑思维游戏源码-窗户冒险.zip

    scratch少儿编程逻辑思维游戏源码-FC经典游戏 沙罗曼蛇.zip

    scratch少儿编程逻辑思维游戏源码-FC经典游戏 沙罗曼蛇.zip

    少儿编程scratch项目源代码文件案例素材-跑酷版《我的世界》.zip

    少儿编程scratch项目源代码文件案例素材-跑酷版《我的世界》.zip

    scratch少儿编程逻辑思维游戏源码-抜刀.zip

    scratch少儿编程逻辑思维游戏源码-抜刀.zip

    永磁同步电机无传感器控制:基于反电动势估计的扰动观测器设计与应用

    内容概要:本文介绍了永磁同步电机(PMSM)无位置传感器控制的一种创新方法,重点探讨了通过反电动势估计和扰动观测器增益设计来实现转子位置的精确估算。该方法避免了传统的PLL等位置观测器,仅需一次反正切计算即可获得转子位置,极大简化了系统复杂度。此外,模型控制器采用离散域设计,便于参数调整和适应不同电机参数。文中还提供了具体的Python代码示例,展示了从初始化电机参数到主循环控制的具体实现步骤。 适合人群:从事电机控制系统设计的研究人员和技术工程师,尤其是关注永磁同步电机无传感器控制领域的专业人士。 使用场景及目标:适用于需要简化调试流程、提高系统灵活性和适应多种电机参数的应用场景。主要目标是在保持高性能的同时降低硬件成本和系统复杂性。 其他说明:该方法不仅简化了调试过程,还提高了系统的鲁棒性和可靠性,特别适合于工业自动化、机器人技术和电动汽车等领域。

    汽车制动系统中双腔制动主缸的精细化建模与Simulink-Amesim联合仿真验证

    内容概要:本文深入探讨了乘用车双腔制动主缸的精细化建模及其在Simulink和Amesim中的联合仿真验证。文章首先介绍了双腔制动主缸的物理结构和动力学方程,特别是考虑了液压特性和机械传动的耦合关系。接着,作者详细描述了如何在Simulink中实现这些模型,并通过S函数处理变步长积分问题,确保仿真精度。此外,还讨论了联合仿真过程中遇到的数据交换频率问题,并提出了使用二阶保持器来补偿相位滞后的解决方案。最终,通过对不同推杆力输入条件下的仿真结果对比,验证了精细化模型的有效性和稳定性。 适合人群:从事汽车制动系统研究的技术人员、高校相关专业师生、对车辆动力学仿真感兴趣的工程师。 使用场景及目标:①帮助研究人员更好地理解和掌握双腔制动主缸的工作原理;②为后续更复杂的整车制动系统仿真提供可靠的子系统模型;③提高仿真精度,减少因模型简化带来的误差。 其他说明:文中提供了详细的建模步骤、公式推导、代码实现以及仿真结果对比,附带完整视频教程和参考资料,便于初学者学习。同时强调了实际应用中需要注意的关键细节,如流量计算、数据交换频率调整等。

    scratch少儿编程逻辑思维游戏源码-Scratch版Windows11.zip

    scratch少儿编程逻辑思维游戏源码-Scratch版Windows11.zip

    少儿编程scratch项目源代码文件案例素材-青蛙.zip

    少儿编程scratch项目源代码文件案例素材-青蛙.zip

    基于Matlab Simulink的光伏交直流混合微电网离网模式双下垂控制仿真模型研究

    内容概要:本文详细介绍了光伏交直流混合微电网在离网(孤岛)模式下的双下垂控制仿真模型。该模型利用Matlab/Simulink工具进行构建和仿真,涵盖了直流微电网、交流微电网以及互联变换器(ILC)的结构和控制策略。直流微电网采用电压电流双闭环下垂控制,交流微电网则通过恒压控制和下垂控制来维持稳定的频率和电压。ILC采用双下垂控制策略,通过归一化处理和偏差调整,使得交流母线频率和直流母线电压趋于一致。此外,模型还包括采样保持、坐标变换、功率滤波、SVPWM等辅助环节,以确保系统的稳定运行和高效能量管理。实验结果显示,在负载突增的情况下,系统依然能够保持良好的波形质量和稳定性。 适合人群:对微电网控制系统感兴趣的科研人员、电力工程技术人员及高校师生。 使用场景及目标:适用于研究和验证光伏交直流混合微电网在离网模式下的控制策略,特别是双下垂控制的应用效果。目标是提升微电网的稳定性和能量管理效率。 其他说明:仿真环境为Matlab2020b及以上版本,部分模块仅支持高版本软件。对于希望深入了解双下垂控制机制的研究者,可以通过进一步的学习和交流获得更多信息。

    基于EKF的INS-GPS松组合导航:15状态NED坐标系下的精准定位技术

    内容概要:本文详细介绍了基于扩展卡尔曼滤波器(EKF)的INS(惯性测量单元)和GPS(全球定位系统)松组合导航技术。首先解释了为何需要松组合导航,即通过融合INS和GPS的优势,提高定位的稳定性和准确性。接着阐述了15状态下的EKF融合方法,涵盖速度、姿态、位置等多个系统动态参数的估计与更新。然后讨论了NED(北东地)坐标系的应用及其带来的直观物理意义。最后提供了简化的Python代码片段,演示了如何在EKF中融合INS和GPS数据,以获得连续、稳定的导航结果。 适合人群:从事导航技术研发的专业人士,尤其是对EKF、INS、GPS以及多传感器数据融合感兴趣的工程师和技术研究人员。 使用场景及目标:适用于需要高精度、高可靠性定位系统的应用场景,如自动驾驶汽车、无人机飞行控制系统等。目标是通过融合INS和GPS数据,克服单一传感器的局限性,提升整个导航系统的性能。 其他说明:文中提供的代码仅为概念验证性质,实际工程应用中还需考虑更多复杂的因素和优化措施。

    三相逆变器孤岛运行的双闭环控制策略及LCL滤波电路仿真实现

    内容概要:本文详细介绍了基于MATLAB Simulink平台的三相逆变器稳压控制仿真模型,重点探讨了孤岛运行环境下的电压电流双闭环控制策略及其LCL滤波电路的应用。首先,通过对主电路电流电压的采样并进行Park和Clark变换,将数据转换为dq坐标系下的电流电压值,然后输入双闭环控制系统进行精确调节。接着,通过反变换回到abc坐标系,并利用PWM调制对逆变器进行控制,最终实现了电压电流的稳定输出。文中还提供了简化的Matlab代码片段,展示了关键步骤的具体实现方法。此外,作者通过多次仿真实验验证了该控制策略的有效性和鲁棒性。 适合人群:从事电力电子、自动化控制领域的研究人员和技术人员,尤其是对逆变器控制策略感兴趣的读者。 使用场景及目标:适用于需要深入了解三相逆变器在孤岛运行环境下的稳压控制机制的研究人员和技术人员。目标是掌握电压电流双闭环控制策略以及LCL滤波电路的设计与应用,提高逆变器系统的稳定性和可靠性。 其他说明:本文不仅提供了理论分析,还包括具体的仿真模型和代码示例,有助于读者更好地理解和实践相关技术。

    少儿编程scratch项目源代码文件案例素材-七龙珠RPG 测试.zip

    少儿编程scratch项目源代码文件案例素材-七龙珠RPG 测试.zip

    scratch少儿编程逻辑思维游戏源码-城市世界.zip

    scratch少儿编程逻辑思维游戏源码-城市世界.zip

    少儿编程scratch项目源代码文件案例素材-黏糊糊的圣诞节.zip

    少儿编程scratch项目源代码文件案例素材-黏糊糊的圣诞节.zip

Global site tag (gtag.js) - Google Analytics