密碼庫LibTomCrypt學習記錄——(2.11)分組密碼演算法的工作模式——CTR程式碼示例
以下程式碼實現了CBC的正確性測試(標準測試資料)
說明:
1. 程式碼裡面使用了一個Str2Num函式,它將測試向量中的字串轉為十六進位制位元組資料,可自行實現。
2. 測試向量出處為NIST SP 800-38A (Recommendation for Block Cipher Modes of Operation:Methods and Techniques)
---------------------
#include "tomcrypt.h"
#include "TestMode.h"
typedef struct NistCTRTestVector_st{
char * name;//test vetor name
int keylen;
int msglen;
BYTE * key[1]; // 金鑰
BYTE * IV[1]; // 初始化向量
BYTE * pt[4]; // 明文,暫時最多支援四段明文
BYTE * ct[4]; // 密文,暫時最多支援四段明文
BYTE * nonce[1];
BYTE * associated_data[1];
BYTE * mac[1];
} NistCTRTestVector;
int Test_CTR_AES(void)
{
// 資料來源
// NIST SP 800-38A (Recommendation for Block Cipher Modes of Operation:Methods and Techniques).pdf
NistCTRTestVector vect[] = {
{//vect[0]
/*name*/ "F.5.1.CTR-AES128.Encrypt",
/*keylen*/ 16,
/*msglen*/ 16*4,
/*Key*/ "2b7e151628aed2a6abf7158809cf4f3c",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{// pt
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
},
{//ct
"874d6191b620e3261bef6864990db6ce",
"9806f66b7970fdff8617187bb9fffdff",
"5ae4df3edbd5d35e5b4f09020db03eab",
"1e031dda2fbe03d1792170a0f3009cee"
}
},
//////////////////////////////////////////////////////////////////////////
{//vect[1]
/*name*/ "F.5.2.CTR-AES128.Decrypt",
/*keylen*/ 16,
/*msglen*/ 16*4,
/*Key*/ "2b7e151628aed2a6abf7158809cf4f3c",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{//ct //解密時明文密文相反而已
"874d6191b620e3261bef6864990db6ce",
"9806f66b7970fdff8617187bb9fffdff",
"5ae4df3edbd5d35e5b4f09020db03eab",
"1e031dda2fbe03d1792170a0f3009cee"
},
{// pt //解密時明文密文相反而已
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
}
},
//////////////////////////////////////////////////////////////////////////
{//vect[2]
/*name*/ "F.5.3 CTR-AES192.Encrypt",
/*keylen*/ 24,
/*msglen*/ 16*4,
/*Key*/ "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{// pt
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
},
{//ct
"1abc932417521ca24f2b0459fe7e6e0b",
"090339ec0aa6faefd5ccc2c6f4ce8e94",
"1e36b26bd1ebc670d1bd1d665620abf7",
"4f78a7f6d29809585a97daec58c6b050"
}
},
//////////////////////////////////////////////////////////////////////////
{//vect[3]
/*name*/ "F.5.4 CTR-AES192.Decrypt",
/*keylen*/ 24,
/*msglen*/ 16*4,
/*Key*/ "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{//ct //解密時明文密文相反而已
"1abc932417521ca24f2b0459fe7e6e0b",
"090339ec0aa6faefd5ccc2c6f4ce8e94",
"1e36b26bd1ebc670d1bd1d665620abf7",
"4f78a7f6d29809585a97daec58c6b050"
},
{// pt //解密時明文密文相反而已
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
}
},
//////////////////////////////////////////////////////////////////////////
{//vect[4]
/*name*/ "F.5.5 CTR-AES256.Encrypt",
/*keylen*/ 32,
/*msglen*/ 16*4,
/*Key*/ "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{// pt
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
},
{//ct
"601ec313775789a5b7a7f504bbf3d228",
"f443e3ca4d62b59aca84e990cacaf5c5",
"2b0930daa23de94ce87017ba2d84988d",
"dfc9c58db67aada613c2dd08457941a6"
}
},
//////////////////////////////////////////////////////////////////////////
{//vect[5]
/*name*/ "F.5.6 CTR-AES256.Decrypt",
/*keylen*/ 32,
/*msglen*/ 16*4,
/*Key*/ "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
/*IV */ "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
{//ct //解密時明文密文相反而已
"601ec313775789a5b7a7f504bbf3d228",
"f443e3ca4d62b59aca84e990cacaf5c5",
"2b0930daa23de94ce87017ba2d84988d",
"dfc9c58db67aada613c2dd08457941a6"
},
{// pt //解密時明文密文相反而已
"6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710"
}
}
};
int idx, err, i, res;
BYTE buf[64];
symmetric_CTR ctr;
int keylen, msglen;
BYTE key[32], IV[16], pt[64], ct[64];
/* AES can be under rijndael or aes... try to find it */
if ( register_cipher (&aes_desc) != CRYPT_OK )
{
return CRYPT_INVALID_CIPHER;
}
if ((idx = find_cipher("aes")) == -1)
{
return CRYPT_NOP;
}
for ( i = 0; i < (int)(sizeof(vect)/sizeof(vect[0])); i++ )
{
keylen = vect[i].keylen;
msglen = vect[i].msglen;
Str2Num(vect[i].key, 1, key);
Str2Num(vect[i].IV, 1, IV);
Str2Num(vect[i].pt, 4, pt);
Str2Num(vect[i].ct, 4, ct);
if ((err = ctr_start(idx, IV, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &ctr)) != CRYPT_OK)
{
return err;
}
if ((err = ctr_encrypt( pt, buf, msglen, &ctr)) != CRYPT_OK)
{
return err;
}
ctr_done(&ctr);
res = XMEMCMP(buf, ct, msglen);
printf("Test Vetor : %s pass ? %s \n",vect[i].name, (res == 0)?"Yes":"No" );
}
printf("\nTest CTR AES Finish!\n" );
return CRYPT_OK;
}