4 * A test class for ECBMode
\r
5 * Copyright (c) 2007 Henri Torgemane
\r
7 * See LICENSE.txt for full license information.
\r
9 package com.hurlant.crypto.tests
\r
11 import com.hurlant.crypto.symmetric.AESKey;
\r
12 import com.hurlant.crypto.symmetric.ECBMode;
\r
13 import com.hurlant.crypto.symmetric.NullPad;
\r
14 import com.hurlant.crypto.symmetric.XTeaKey;
\r
15 import com.hurlant.util.Hex;
\r
17 import flash.utils.ByteArray;
\r
19 public class ECBModeTest extends TestCase
\r
21 public function ECBModeTest(h:ITestHarness) {
\r
22 super(h, "ECBMode Test");
\r
23 runTest(testAES,"ECB AES Test Vectors");
\r
24 runTest(testXTea,"ECB XTea Test Vectors");
\r
25 runTest(testECB_AES128,"ECB AES-128 Test Vectors");
\r
26 runTest(testECB_AES192,"ECB AES-192 Test Vectors");
\r
27 runTest(testECB_AES256,"ECB AES-256 Test Vectors");
\r
31 * For now the main goal is to show we can decrypt what we encrypt in this mode.
\r
32 * Eventually, this should get correlated with some well known vectors.
\r
33 * yay. found hawt test vectors: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
\r
35 public function testECB_AES128():void {
\r
36 var key:ByteArray = Hex.toArray("2b7e151628aed2a6abf7158809cf4f3c");
\r
37 var pt:ByteArray = Hex.toArray(
\r
38 "6bc1bee22e409f96e93d7e117393172a" +
\r
39 "ae2d8a571e03ac9c9eb76fac45af8e51" +
\r
40 "30c81c46a35ce411e5fbc1191a0a52ef" +
\r
41 "f69f2445df4f9b17ad2b417be66c3710");
\r
42 var ct:ByteArray = Hex.toArray(
\r
43 "3ad77bb40d7a3660a89ecaf32466ef97" +
\r
44 "f5d3d58503b9699de785895a96fdbaaf" +
\r
45 "43b1cd7f598ece23881b00e3ed030688" +
\r
46 "7b0c785e27e8ad3f8223207104725dd4");
\r
47 var ecb:ECBMode = new ECBMode(new AESKey(key), new NullPad);
\r
48 var src:ByteArray = new ByteArray;
\r
51 assert("ECB_AES128 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
\r
53 assert("ECB_AES128 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
\r
55 public function testECB_AES192():void {
\r
56 var key:ByteArray = Hex.toArray("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b");
\r
57 var pt:ByteArray = Hex.toArray(
\r
58 "6bc1bee22e409f96e93d7e117393172a" +
\r
59 "ae2d8a571e03ac9c9eb76fac45af8e51" +
\r
60 "30c81c46a35ce411e5fbc1191a0a52ef" +
\r
61 "f69f2445df4f9b17ad2b417be66c3710");
\r
62 var ct:ByteArray = Hex.toArray(
\r
63 "bd334f1d6e45f25ff712a214571fa5cc" +
\r
64 "974104846d0ad3ad7734ecb3ecee4eef" +
\r
65 "ef7afd2270e2e60adce0ba2face6444e" +
\r
66 "9a4b41ba738d6c72fb16691603c18e0e");
\r
67 var ecb:ECBMode = new ECBMode(new AESKey(key), new NullPad);
\r
68 var src:ByteArray = new ByteArray;
\r
71 assert("ECB_AES192 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
\r
73 assert("ECB_AES192 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
\r
75 public function testECB_AES256():void {
\r
76 var key:ByteArray = Hex.toArray(
\r
77 "603deb1015ca71be2b73aef0857d7781" +
\r
78 "1f352c073b6108d72d9810a30914dff4");
\r
79 var pt:ByteArray = Hex.toArray(
\r
80 "6bc1bee22e409f96e93d7e117393172a" +
\r
81 "ae2d8a571e03ac9c9eb76fac45af8e51" +
\r
82 "30c81c46a35ce411e5fbc1191a0a52ef" +
\r
83 "f69f2445df4f9b17ad2b417be66c3710");
\r
84 var ct:ByteArray = Hex.toArray(
\r
85 "f3eed1bdb5d2a03c064b5a7e3db181f8" +
\r
86 "591ccb10d410ed26dc5ba74a31362870" +
\r
87 "b6ed21b99ca6f4f9f153e7b1beafed1d" +
\r
88 "23304b7a39f9f3ff067d8d8f9e24ecc7");
\r
89 var ecb:ECBMode = new ECBMode(new AESKey(key), new NullPad);
\r
90 var src:ByteArray = new ByteArray;
\r
93 assert("ECB_AES256 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
\r
95 assert("ECB_AES256 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
\r
97 // crappier, older testing. keeping around for no good reason.
\r
98 public function testAES():void {
\r
100 "00010203050607080A0B0C0D0F101112",
\r
101 "14151617191A1B1C1E1F202123242526"];
\r
103 "506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359",
\r
104 "5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B"];
\r
106 "D8F532538289EF7D06B506A4FD5BE9C9D8F532538289EF7D06B506A4FD5BE9C9D8F532538289EF7D06B506A4FD5BE9C96DE5F607AB7EB8202F3957703B04E8B5",
\r
107 "59AB30F4D4EE6E4FF9907EF65B1FB68C59AB30F4D4EE6E4FF9907EF65B1FB68C59AB30F4D4EE6E4FF9907EF65B1FB68C2993487785CB1CFDA6BB4F0F345F76C7"];
\r
109 for (var i:uint=0;i<keys.length;i++) {
\r
110 var key:ByteArray = Hex.toArray(keys[i]);
\r
111 var pt:ByteArray = Hex.toArray(pts[i]);
\r
112 var aes:AESKey = new AESKey(key);
\r
113 var ecb:ECBMode = new ECBMode(aes);
\r
115 var str:String = Hex.fromArray(pt).toUpperCase();
\r
116 assert("comparing "+cts[i]+" to "+str, cts[i]==str);
\r
119 str = Hex.fromArray(pt).toUpperCase();
\r
120 assert("comparing "+pts[i]+" to "+str, pts[i]==str);
\r
123 public function testXTea():void {
\r
125 "00000000000000000000000000000000",
\r
126 "2b02056806144976775d0e266c287843"];
\r
128 "0000000000000000000000000000000000000000000000000000000000000000",
\r
129 "74657374206d652e74657374206d652e74657374206d652e74657374206d652e"];
\r
131 "2dc7e8d3695b05382dc7e8d3695b05382dc7e8d3695b05382dc7e8d3695b053820578a874233632d",
\r
132 "79095821381987837909582138198783790958213819878379095821381987830e4dc3c48b2edf32"];
\r
133 // self-fullfilling vectors.
\r
134 // oh well, at least I can decrypt what I produce. :(
\r
136 for (var i:uint=0;i<keys.length;i++) {
\r
137 var key:ByteArray = Hex.toArray(keys[i]);
\r
138 var pt:ByteArray = Hex.toArray(pts[i]);
\r
139 var tea:XTeaKey = new XTeaKey(key);
\r
140 var ecb:ECBMode = new ECBMode(tea);
\r
142 var str:String = Hex.fromArray(pt);
\r
143 assert("comparing "+cts[i]+" to "+str, cts[i]==str);
\r
144 // now go back to plaintext.
\r
146 str = Hex.fromArray(pt);
\r
147 assert("comparing "+pts[i]+" to "+str, pts[i]==str);
\r