SHA(安全散列算法)简介
SHA(Secure Hash Algorithm)是由美国国家安全局(NSA)设计的一系列密码散列函数,用于将任意长度的数据转换为固定长度的散列值。SHA家族包括SHA-1、SHA-2(含SHA-256、SHA-384、SHA-512等)和SHA-3,广泛应用于数据完整性验证、数字签名和密码学安全领域。
SHA算法的主要特性
- 确定性:相同的输入始终生成相同的散列值。
- 不可逆性:无法从散列值反推原始数据。
- 雪崩效应:输入的微小变化会导致输出散列值显著不同。
- 抗碰撞性:难以找到两个不同输入产生相同的散列值。
常见SHA算法及其区别
SHA-1
- 输出长度:160位(20字节)。
- 安全性:已不推荐用于安全场景,因存在理论碰撞攻击风险。
SHA-2
- 包含多个变体:
- SHA-256:输出256位(32字节),最常用。
- SHA-384:输出384位(48字节)。
- SHA-512:输出512位(64字节)。
- 安全性:目前广泛使用,未发现有效攻击。
SHA-3
- 基于Keccak算法,与SHA-2结构不同。
- 输出长度可选(224、256、384、512位)。
- 设计上更抗未来潜在攻击。
SHA的应用场景
- 数据完整性校验:验证文件或传输数据是否被篡改(如软件下载校验)。
- 密码存储:结合盐值(salt)存储用户密码散列值。
- 区块链:比特币等加密货币使用SHA-256计算区块哈希。
- 数字签名:生成消息摘要以进行签名验证。
本篇代码不包含sha-3
sha.h
#ifndef __SHA__
#define __SHA__#include <stdint.h>void sha128(const uint8_t* data, size_t len, uint8_t digest[16]);void sha224(const uint8_t* data, size_t len, uint8_t digest[28]);void sha256_full(const uint8_t* data, size_t len, uint8_t digest[32]);void sha384(const uint8_t* data, size_t len, uint8_t digest[48]);void sha512_full(const uint8_t* data, size_t len, uint8_t digest[64]);void sha192(const uint8_t* data, size_t len, uint8_t digest[24]);#endif
sha.cpp
#include "stdio.h"
#include "string.h"
#include "stdlib.h"
#include "sha.h"// ======================== 通用工具函数 ========================
#define ROTL(x, n) (((x) << (n)) | ((x) >> (32 - (n)))) // 32位循环左移
#define ROTR(x, n) (((x) >> (n)) | ((x) << (32 - (n))))
#define ROTL64(x, n) (((x) << (n)) | ((x) >> (64 - (n)))) // 循环左移
#define ROTR64(x, n) (((x) >> (n)) | ((x) << (64 - (n)))) // 循环右移// 内存反转(大端序处理)
void mem_reverse(uint8_t *buf, size_t len) {for (size_t i = 0; i < len / 2; i++) {uint8_t tmp = buf[i];buf[i] = buf[len - 1 - i];buf[len - 1 - i] = tmp;}
}// ======================== SHA-1 (160位) ========================
void sha1(const uint8_t *data, size_t len, uint8_t digest[20]) {// 初始化哈希值uint32_t h[5] = {0x67452301, 0xEFCDAB89, 0x98BADCFE, 0x10325476, 0xC3D2E1F0};uint64_t bit_len = len * 8;size_t new_len = ((len + 8) / 64 + 1) * 64;uint8_t *msg = (uint8_t*)calloc(new_len, 1);memcpy(msg, data, len);msg[len] = 0x80; // 添加填充位// 添加长度信息(大端序)memcpy(msg + new_len - 8, &bit_len, 8);mem_reverse(msg + new_len - 8, 8);// 处理每个512位块for (size_t i = 0; i < new_len; i += 64) {uint32_t w[80] = {0};for (int t = 0; t < 16; t++) memcpy(&w[t], msg + i + t * 4, 4);// 扩展消息for (int t = 16; t < 80; t++) w[t] = ROTL(w[t-3] ^ w[t-8] ^ w[t-14] ^ w[t-16], 1);uint32_t a = h[0], b = h[1], c = h[2], d = h[3], e = h[4];// 主循环for (int t = 0; t < 80; t++) {uint32_t f, k;if (t < 20) {f = (b & c) | ((~b) & d);k = 0x5A827999;} else if (t < 40) {f = b ^ c ^ d;k = 0x6ED9EBA1;} else if (t < 60) {f = (b & c) | (b & d) | (c & d);k = 0x8F1BBCDC;} else {f = b ^ c ^ d;k = 0xCA62C1D6;}uint32_t temp = ROTL(a, 5) + f + e + k + w[t];e = d; d = c; c = ROTL(b, 30); b = a; a = temp;}h[0] += a; h[1] += b; h[2] += c; h[3] += d; h[4] += e;}free(msg);// 输出到digest(大端序)for (int i = 0; i < 5; i++) {mem_reverse((uint8_t*)&h[i], 4);memcpy(digest + i * 4, &h[i], 4);}
}// ======================== SHA-256/224 ========================
void sha256(const uint8_t *data, size_t len, uint8_t digest[32], int is224) {// 初始化哈希值uint32_t h[8] = {0x6A09E667, 0xBB67AE85, 0x3C6EF372, 0xA54FF53A,0x510E527F, 0x9B05688C, 0x1F83D9AB, 0x5BE0CD19};if (is224) {h[0] = 0xC1059ED8; h[1] = 0x367CD507; h[2] = 0x3070DD17; h[3] = 0xF70E5939;h[4] = 0xFFC00B31; h[5] = 0x68581511; h[6] = 0x64F98FA7; h[7] = 0xBEFA4FA4;}// 常量表const uint32_t k[64] = {0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5, 0x3956C25B, 0x59F111F1, 0x923F82A4, 0xAB1C5ED5,0xD807AA98, 0x12835B01, 0x243185BE, 0x550C7DC3, 0x72BE5D74, 0x80DEB1FE, 0x9BDC06A7, 0xC19BF174,0xE49B69C1, 0xEFBE4786, 0x0FC19DC6, 0x240CA1CC, 0x2DE92C6F, 0x4A7484AA, 0x5CB0A9DC, 0x76F988DA,0x983E5152, 0xA831C66D, 0xB00327C8, 0xBF597FC7, 0xC6E00BF3, 0xD5A79147, 0x06CA6351, 0x14292967,0x27B70A85, 0x2E1B2138, 0x4D2C6DFC, 0x53380D13, 0x650A7354, 0x766A0ABB, 0x81C2C92E, 0x92722C85,0xA2BFE8A1, 0xA81A664B, 0xC24B8B70, 0xC76C51A3, 0xD192E819, 0xD6990624, 0xF40E3585, 0x106AA070,0x19A4C116, 0x1E376C08, 0x2748774C, 0x34B0BCB5, 0x391C0CB3, 0x4ED8AA4A, 0x5B9CCA4F, 0x682E6FF3,0x748F82EE, 0x78A5636F, 0x84C87814, 0x8CC70208, 0x90BEFFFA, 0xA4506CEB, 0xBEF9A3F7, 0xC67178F2};// 预处理(填充)uint64_t bit_len = len * 8;size_t new_len = ((len + 8) / 64 + 1) * 64;uint8_t *msg = (uint8_t *)calloc(new_len, 1);memcpy(msg, data, len);msg[len] = 0x80;memcpy(msg + new_len - 8, &bit_len, 8);mem_reverse(msg + new_len - 8, 8);// 处理每个512位块for (size_t i = 0; i < new_len; i += 64) {uint32_t w[64] = {0};for (int t = 0; t < 16; t++) {memcpy(&w[t], msg + i + t * 4, 4);mem_reverse((uint8_t*)&w[t], 4); // 转大端序}// 扩展消息for (int t = 16; t < 64; t++) {uint32_t s0 = ROTR(w[t-15], 7) ^ ROTR(w[t-15], 18) ^ (w[t-15] >> 3);uint32_t s1 = ROTR(w[t-2], 17) ^ ROTR(w[t-2], 19) ^ (w[t-2] >> 10);w[t] = w[t-16] + s0 + w[t-7] + s1;}uint32_t a = h[0], b = h[1], c = h[2], d = h[3];uint32_t e = h[4], f = h[5], g = h[6], h_val = h[7];// 主循环for (int t = 0; t < 64; t++) {uint32_t S1 = ROTR(e, 6) ^ ROTR(e, 11) ^ ROTR(e, 25);uint32_t ch = (e & f) ^ ((~e) & g);uint32_t temp1 = h_val + S1 + ch + k[t] + w[t];uint32_t S0 = ROTR(a, 2) ^ ROTR(a, 13) ^ ROTR(a, 22);uint32_t maj = (a & b) ^ (a & c) ^ (b & c);uint32_t temp2 = S0 + maj;h_val = g; g = f; f = e; e = d + temp1;d = c; c = b; b = a; a = temp1 + temp2;}h[0] += a; h[1] += b; h[2] += c; h[3] += d;h[4] += e; h[5] += f; h[6] += g; h[7] += h_val;}free(msg);// 输出结果for (int i = 0; i < (is224 ? 7 : 8); i++) {mem_reverse((uint8_t*)&h[i], 4);memcpy(digest + i * 4, &h[i], 4);}
}// ======================== SHA-512/384 ========================
void sha512(const uint8_t *data, size_t len, uint8_t digest[64], int is384) {// 初始化哈希值uint64_t h[8] = {0x6A09E667F3BCC908, 0xBB67AE8584CAA73B, 0x3C6EF372FE94F82B, 0xA54FF53A5F1D36F1,0x510E527FADE682D1, 0x9B05688C2B3E6C1F, 0x1F83D9ABFB41BD6B, 0x5BE0CD19137E2179};if (is384) {h[0] = 0xCBBB9D5DC1059ED8; h[1] = 0x629A292A367CD507; h[2] = 0x9159015A3070DD17;h[3] = 0x152FECD8F70E5939; h[4] = 0x67332667FFC00B31; h[5] = 0x8EB44A8768581511;h[6] = 0xDB0C2E0D64F98FA7; h[7] = 0x47B5481DBEFA4FA4;}// 常量表const uint64_t k[80] = {0x428A2F98D728AE22, 0x7137449123EF65CD, 0xB5C0FBCFEC4D3B2F, 0xE9B5DBA58189DBBC,0x3956C25BF348B538, 0x59F111F1B605D019, 0x923F82A4AF194F9B, 0xAB1C5ED5DA6D8118,0xD807AA98A3030242, 0x12835B0145706FBE, 0x243185BE4EE4B28C, 0x550C7DC3D5FFB4E2,0x72BE5D74F27B896F, 0x80DEB1FE3B1696B1, 0x9BDC06A725C71235, 0xC19BF174CF692694,0xE49B69C19EF14AD2, 0xEFBE4786384F25E3, 0x0FC19DC68B8CD5B5, 0x240CA1CC77AC9C65,0x2DE92C6F592B0275, 0x4A7484AA6EA6E483, 0x5CB0A9DCBD41FBD4, 0x76F988DA831153B5,0x983E5152EE66DFAB, 0xA831C66D2DB43210, 0xB00327C898FB213F, 0xBF597FC7BEEF0EE4,0xC6E00BF33DA88FC2, 0xD5A79147930AA725, 0x06CA6351E003826F, 0x142929670A0E6E70,0x27B70A8546D22FFC, 0x2E1B21385C26C926, 0x4D2C6DFC5AC42AED, 0x53380D139D95B3DF,0x650A73548BAF63DE, 0x766A0ABB3C77B2A8, 0x81C2C92E47EDAEE6, 0x92722C851482353B,0xA2BFE8A14CF10364, 0xA81A664BBC423001, 0xC24B8B70D0F89791, 0xC76C51A30654BE30,0xD192E819D6EF5218, 0xD69906245565A910, 0xF40E35855771202A, 0x106AA07032BBD1B8,0x19A4C116B8D2D0C8, 0x1E376C085141AB53, 0x2748774CDF8EEB99, 0x34B0BCB5E19B48A8,0x391C0CB3C5C95A63, 0x4ED8AA4AE3418ACB, 0x5B9CCA4F7763E373, 0x682E6FF3D6B2B8A3,0x748F82EE5DEFB2FC, 0x78A5636F43172F60, 0x84C87814A1F0AB72, 0x8CC702081A6439EC,0x90BEFFFA23631E28, 0xA4506CEBDE82BDE9, 0xBEF9A3F7B2C67915, 0xC67178F2E372532B,0xCA273ECEEA26619C, 0xD186B8C721C0C207, 0xEADA7DD6CDE0EB1E, 0xF57D4F7FEE6ED178,0x06F067AA72176FBA, 0x0A637DC5A2C898A6, 0x113F9804BEF90DAE, 0x1B710B35131C471B,0x28DB77F523047D84, 0x32CAAB7B40C72493, 0x3C9EBE0A15C9BEBC, 0x431D67C49C100D4C,0x4CC5D4BECB3E42B6, 0x597F299CFC657E2A, 0x5FCB6FAB3AD6FAEC, 0x6C44198C4A475817};// 预处理(填充)uint64_t bit_len = len * 8;size_t new_len = ((len + 16) / 128 + 1) * 128;uint8_t *msg = (uint8_t*)calloc(new_len, 1);memcpy(msg, data, len);msg[len] = 0x80;memcpy(msg + new_len - 16, &bit_len, 8); // 长度存储在后128位的最后16字节中mem_reverse(msg + new_len - 16, 8);// 处理每个1024位块for (size_t i = 0; i < new_len; i += 128) {uint64_t w[80] = {0};for (int t = 0; t < 16; t++) {memcpy(&w[t], msg + i + t * 8, 8);mem_reverse((uint8_t*)&w[t], 8); // 转大端序}// 扩展消息for (int t = 16; t < 80; t++) {uint64_t s0 = ROTR64(w[t-15], 1) ^ ROTR64(w[t-15], 8) ^ (w[t-15] >> 7);uint64_t s1 = ROTR64(w[t-2], 19) ^ ROTR64(w[t-2], 61) ^ (w[t-2] >> 6);w[t] = w[t-16] + s0 + w[t-7] + s1;}uint64_t a = h[0], b = h[1], c = h[2], d = h[3];uint64_t e = h[4], f = h[5], g = h[6], h_val = h[7];// 主循环for (int t = 0; t < 80; t++) {uint64_t S1 = ROTR64(e, 14) ^ ROTR64(e, 18) ^ ROTR64(e, 41);uint64_t ch = (e & f) ^ ((~e) & g);uint64_t temp1 = h_val + S1 + ch + k[t] + w[t];uint64_t S0 = ROTR64(a, 28) ^ ROTR64(a, 34) ^ ROTR64(a, 39);uint64_t maj = (a & b) ^ (a & c) ^ (b & c);uint64_t temp2 = S0 + maj;h_val = g; g = f; f = e; e = d + temp1;d = c; c = b; b = a; a = temp1 + temp2;}h[0] += a; h[1] += b; h[2] += c; h[3] += d;h[4] += e; h[5] += f; h[6] += g; h[7] += h_val;}free(msg);// 输出结果for (int i = 0; i < (is384 ? 6 : 8); i++) {mem_reverse((uint8_t*)&h[i], 8);memcpy(digest + i * 8, &h[i], 8);}
}// ======================== 用户接口函数 ========================
void sha128(const uint8_t *data, size_t len, uint8_t digest[16]) {uint8_t full_digest[20];sha1(data, len, full_digest);memcpy(digest, full_digest, 16); // 截取前128位
}void sha224(const uint8_t *data, size_t len, uint8_t digest[28]) {sha256(data, len, digest, 1);
}void sha256_full(const uint8_t *data, size_t len, uint8_t digest[32]) {sha256(data, len, digest, 0);
}void sha384(const uint8_t *data, size_t len, uint8_t digest[48]) {sha512(data, len, digest, 1);
}void sha512_full(const uint8_t *data, size_t len, uint8_t digest[64]) {sha512(data, len, digest, 0);
}void sha192(const uint8_t *data, size_t len, uint8_t digest[24]) {uint8_t full_digest[64];sha512_full(data, len, full_digest);memcpy(digest, full_digest, 24); // 截取前192位
}