| 1 | /*\r |
| 2 | \r |
| 3 | main.c, printing test vectors of reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants\r |
| 4 | \r |
| 5 | Authors: Ruslan Kiianchuk, Ruslan Mordvinov, Roman Oliynykov\r |
| 6 | \r |
| 7 | */\r |
| 8 | \r |
| 9 | #include <stdio.h>\r |
| 10 | #include <memory.h>\r |
| 11 | \r |
| 12 | #include "kalyna.h"\r |
| 13 | #include "transformations.h"\r |
| 14 | \r |
| 15 | void print (int data_size, uint64_t data []);\r |
| 16 | \r |
| 17 | int main(int argc, char** argv) {\r |
| 18 | \r |
| 19 | int i;\r |
| 20 | kalyna_t* ctx22_e = KalynaInit(128, 128);\r |
| 21 | kalyna_t* ctx24_e = KalynaInit(128, 256);\r |
| 22 | kalyna_t* ctx44_e = KalynaInit(256, 256);\r |
| 23 | kalyna_t* ctx48_e = KalynaInit(256, 512);\r |
| 24 | kalyna_t* ctx88_e = KalynaInit(512, 512);\r |
| 25 | \r |
| 26 | uint64_t pt22_e[2] = {0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r |
| 27 | uint64_t ct22_e[2];\r |
| 28 | uint64_t key22_e[2] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL};\r |
| 29 | uint64_t expect22_e[2] = {0x20ac9b777d1cbf81ULL, 0x06add2b439eac9e1ULL};\r |
| 30 | \r |
| 31 | uint64_t pt24_e[2] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL};\r |
| 32 | uint64_t ct24_e[2];\r |
| 33 | uint64_t key24_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r |
| 34 | uint64_t expect24_e[2] = { 0x8a150010093eec58ULL, 0x144f336f16f74811ULL};\r |
| 35 | \r |
| 36 | uint64_t pt44_e[4] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r |
| 37 | uint64_t ct44_e[4];\r |
| 38 | uint64_t key44_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r |
| 39 | uint64_t expect44_e[4] = {0x3521c90e573d6ef6ULL, 0x8c2abddc23e3daaeULL, 0x5a0d6a20ec6339a0ULL, 0x2cd97f61245c3888ULL};\r |
| 40 | \r |
| 41 | uint64_t pt48_e[4] = {0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL};\r |
| 42 | uint64_t ct48_e[4];\r |
| 43 | uint64_t key48_e[8] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,\r |
| 44 | 0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r |
| 45 | uint64_t expect48_e[4] = {0x7ab6b7e6e9906960ULL, 0xb76822d793d8d64bULL, 0x02e1d73c3cc8028eULL, 0xd95dfefda8742efdULL};\r |
| 46 | \r |
| 47 | \r |
| 48 | uint64_t pt88_e[8] = { 0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL,\r |
| 49 | 0x6766656463626160ULL, 0x6f6e6d6c6b6a6968ULL, 0x7776757473727170ULL, 0x7f7e7d7c7b7a7978ULL};\r |
| 50 | uint64_t ct88_e[8];\r |
| 51 | uint64_t key88_e[8] = { 0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,\r |
| 52 | 0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r |
| 53 | uint64_t expect88_e[8] = { 0x6a351c811be3264aULL, 0x1a239605cad61da6ULL, 0xa1f347aa5483ba67ULL, 0xb856eb20c3ee1d3eULL,\r |
| 54 | 0x66ab5b1717f4d095ULL, 0x6cc815bb34f1d62fULL, 0xb7fe6e85266a90cbULL, 0xd9d90d947264bcc5ULL};\r |
| 55 | \r |
| 56 | uint64_t ct22_d[2] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL};\r |
| 57 | uint64_t pt22_d[2];\r |
| 58 | uint64_t key22_d[2] = {0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r |
| 59 | uint64_t expect22_d[2] = {0x84c70c472bef9172ULL, 0xd7da733930c2096fULL};\r |
| 60 | \r |
| 61 | uint64_t ct24_d[2] = {0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};\r |
| 62 | uint64_t pt24_d[2];\r |
| 63 | uint64_t key24_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r |
| 64 | uint64_t expect24_d[2] = {0xe1dffdce56b46df3ULL, 0x96d9ca30705f5bb4ULL};\r |
| 65 | \r |
| 66 | uint64_t ct44_d[4] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};\r |
| 67 | uint64_t pt44_d[4];\r |
| 68 | uint64_t key44_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r |
| 69 | uint64_t expect44_d[4] = {0x864e67967823c57fULL, 0xa34b8b3fb0e9c103ULL, 0xd3c33f2c597c5babULL, 0xe30fb28625d1ed61ULL};\r |
| 70 | \r |
| 71 | uint64_t ct48_d[4] = {0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};\r |
| 72 | uint64_t pt48_d[4];\r |
| 73 | uint64_t key48_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,\r |
| 74 | 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r |
| 75 | uint64_t expect48_d[4] = {0x82d4da67277a3118ULL, 0x078d78a1b907cdbcULL, 0x97845f9e1898705eULL, 0xe06aba796d910b2dULL};\r |
| 76 | \r |
| 77 | uint64_t ct88_d[8] = {0x78797a7b7c7d7e7fULL, 0x7071727374757677ULL, 0x68696a6b6c6d6e6fULL, 0x6061626364656667ULL,\r |
| 78 | 0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};\r |
| 79 | uint64_t pt88_d[8];\r |
| 80 | uint64_t key88_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,\r |
| 81 | 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r |
| 82 | uint64_t expect88_d[8] = {0x5252a025338480ceULL, 0x29d8a9e614d7ea1bULL, 0xbd45a8e90e1e38fdULL, 0xa346fad954450492ULL,\r |
| 83 | 0xf2b13b85dbef7f75ULL, 0x6ae6753b839dff97ULL, 0xdc1b29b5ab5741afULL, 0x22ff5aaa13bb94f0ULL };\r |
| 84 | \r |
| 85 | kalyna_t* ctx22_d = KalynaInit(128, 128);\r |
| 86 | kalyna_t* ctx24_d = KalynaInit(128, 256);\r |
| 87 | kalyna_t* ctx44_d = KalynaInit(256, 256);\r |
| 88 | kalyna_t* ctx48_d = KalynaInit(256, 512);\r |
| 89 | kalyna_t* ctx88_d = KalynaInit(512, 512);\r |
| 90 | \r |
| 91 | // kalyna 22 enc\r |
| 92 | KalynaKeyExpand(key22_e, ctx22_e);\r |
| 93 | \r |
| 94 | printf("\n=============\n");\r |
| 95 | printf("Kalyna (%lu, %lu)\n", ctx22_e->nb * 64, ctx22_e->nk * 64);\r |
| 96 | \r |
| 97 | printf("\n--- ENCIPHERING ---\n");\r |
| 98 | printf("Key:\n");\r |
| 99 | print(ctx22_e->nk, key22_e);\r |
| 100 | \r |
| 101 | printf("Plaintext:\n");\r |
| 102 | print(ctx22_e->nb, pt22_e);\r |
| 103 | \r |
| 104 | KalynaEncipher(pt22_e, ctx22_e, ct22_e);\r |
| 105 | printf("Ciphertext:\n");\r |
| 106 | print(ctx22_e->nb, ct22_e);\r |
| 107 | \r |
| 108 | if (memcmp(ct22_e, expect22_e, sizeof(ct22_e)) != 0) printf("Failed enciphering\n");\r |
| 109 | else printf("Success enciphering\n\n");\r |
| 110 | \r |
| 111 | KalynaDelete(ctx22_e);\r |
| 112 | \r |
| 113 | // kalyna 22 dec\r |
| 114 | KalynaKeyExpand(key22_d, ctx22_d);\r |
| 115 | \r |
| 116 | printf("\n=============\n");\r |
| 117 | printf("Kalyna (%lu, %lu)\n", ctx22_d->nb * 64, ctx22_d->nk * 64);\r |
| 118 | \r |
| 119 | printf("\n--- DECIPHERING ---\n");\r |
| 120 | printf("Key:\n");\r |
| 121 | print(ctx22_d->nk, key22_d);\r |
| 122 | \r |
| 123 | printf("Ciphertext:\n");\r |
| 124 | print(ctx22_d->nb, ct22_d);\r |
| 125 | \r |
| 126 | KalynaDecipher(ct22_d, ctx22_d, pt22_d);\r |
| 127 | printf("Plaintext:\n");\r |
| 128 | print(ctx22_d->nb, pt22_d);\r |
| 129 | \r |
| 130 | if (memcmp(pt22_d, expect22_d, sizeof(pt22_d)) != 0) printf("Failed deciphering\n");\r |
| 131 | else printf("Success deciphering\n\n");\r |
| 132 | \r |
| 133 | KalynaDelete(ctx22_d);\r |
| 134 | \r |
| 135 | // kalyna 24 enc\r |
| 136 | KalynaKeyExpand(key24_e, ctx24_e);\r |
| 137 | \r |
| 138 | printf("\n=============\n");\r |
| 139 | printf("Kalyna (%lu, %lu)\n", ctx24_e->nb * 64, ctx24_e->nk * 64);\r |
| 140 | \r |
| 141 | printf("\n--- ENCIPHERING ---\n");\r |
| 142 | printf("Key:\n");\r |
| 143 | print(ctx24_e->nk, key24_e);\r |
| 144 | \r |
| 145 | printf("Plaintext:\n");\r |
| 146 | print(ctx24_e->nb, pt24_e);\r |
| 147 | \r |
| 148 | KalynaEncipher(pt24_e, ctx24_e, ct24_e);\r |
| 149 | printf("Ciphertext:\n");\r |
| 150 | print(ctx24_e->nb, ct24_e);\r |
| 151 | \r |
| 152 | if (memcmp(ct24_e, expect24_e, sizeof(ct24_e)) != 0) printf("Failed enciphering\n");\r |
| 153 | else printf("Success enciphering\n\n");\r |
| 154 | \r |
| 155 | KalynaDelete(ctx24_e);\r |
| 156 | \r |
| 157 | // kalyna 24 dec\r |
| 158 | KalynaKeyExpand(key24_d, ctx24_d);\r |
| 159 | \r |
| 160 | printf("\n=============\n");\r |
| 161 | printf("Kalyna (%lu, %lu)\n", ctx24_d->nb * 64, ctx24_d->nk * 64);\r |
| 162 | \r |
| 163 | printf("\n--- DECIPHERING ---\n");\r |
| 164 | printf("Key:\n");\r |
| 165 | print(ctx24_d->nk, key24_d);\r |
| 166 | \r |
| 167 | printf("Ciphertext:\n");\r |
| 168 | print(ctx24_d->nb, ct24_d);\r |
| 169 | \r |
| 170 | KalynaDecipher(ct24_d, ctx24_d, pt24_d);\r |
| 171 | printf("Plaintext:\n");\r |
| 172 | print(ctx24_d->nb, pt24_d);\r |
| 173 | \r |
| 174 | if (memcmp(pt24_d, expect24_d, sizeof(pt24_d)) != 0) printf("Failed deciphering\n");\r |
| 175 | else printf("Success deciphering\n\n");\r |
| 176 | \r |
| 177 | KalynaDelete(ctx24_d);\r |
| 178 | \r |
| 179 | // kalyna 44 enc\r |
| 180 | KalynaKeyExpand(key44_e, ctx44_e);\r |
| 181 | \r |
| 182 | printf("\n=============\n");\r |
| 183 | printf("Kalyna (%lu, %lu)\n", ctx44_e->nb * 64, ctx44_e->nk * 64);\r |
| 184 | \r |
| 185 | printf("\n--- ENCIPHERING ---\n");\r |
| 186 | printf("Key:\n");\r |
| 187 | print(ctx44_e->nk, key44_e);\r |
| 188 | \r |
| 189 | printf("Plaintext:\n");\r |
| 190 | print(ctx44_e->nb, pt44_e);\r |
| 191 | \r |
| 192 | KalynaEncipher(pt44_e, ctx44_e, ct44_e);\r |
| 193 | printf("Ciphertext:\n");\r |
| 194 | print(ctx44_e->nb, ct44_e);\r |
| 195 | \r |
| 196 | if (memcmp(ct44_e, expect44_e, sizeof(ct44_e)) != 0) printf("Failed enciphering\n");\r |
| 197 | else printf("Success enciphering\n\n");\r |
| 198 | \r |
| 199 | KalynaDelete(ctx44_e);\r |
| 200 | \r |
| 201 | // kalyna 44 dec\r |
| 202 | KalynaKeyExpand(key44_d, ctx44_d);\r |
| 203 | \r |
| 204 | printf("\n=============\n");\r |
| 205 | printf("Kalyna (%lu, %lu)\n", ctx44_d->nb * 64, ctx44_d->nk * 64);\r |
| 206 | \r |
| 207 | printf("\n--- DECIPHERING ---\n");\r |
| 208 | printf("Key:\n");\r |
| 209 | print(ctx44_d->nk, key44_d);\r |
| 210 | \r |
| 211 | printf("Ciphertext:\n");\r |
| 212 | print(ctx44_d->nb, ct44_d);\r |
| 213 | \r |
| 214 | KalynaDecipher(ct44_d, ctx44_d, pt44_d);\r |
| 215 | printf("Plaintext:\n");\r |
| 216 | print(ctx44_d->nb, pt44_d);\r |
| 217 | \r |
| 218 | if (memcmp(pt44_d, expect44_d, sizeof(pt44_d)) != 0) printf("Failed deciphering\n");\r |
| 219 | else printf("Success deciphering\n\n");\r |
| 220 | \r |
| 221 | KalynaDelete(ctx44_d);\r |
| 222 | \r |
| 223 | // kalyna 48 enc\r |
| 224 | KalynaKeyExpand(key48_e, ctx48_e);\r |
| 225 | \r |
| 226 | printf("\n=============\n");\r |
| 227 | printf("Kalyna (%lu, %lu)\n", ctx48_e->nb * 64, ctx48_e->nk * 64);\r |
| 228 | \r |
| 229 | printf("\n--- ENCIPHERING ---\n");\r |
| 230 | printf("Key:\n");\r |
| 231 | print(ctx48_e->nk, key48_e);\r |
| 232 | \r |
| 233 | printf("Plaintext:\n");\r |
| 234 | print(ctx48_e->nb, pt48_e);\r |
| 235 | \r |
| 236 | KalynaEncipher(pt48_e, ctx48_e, ct48_e);\r |
| 237 | printf("Ciphertext:\n");\r |
| 238 | print(ctx48_e->nb, ct48_e);\r |
| 239 | \r |
| 240 | if (memcmp(ct48_e, expect48_e, sizeof(ct48_e)) != 0) printf("Failed enciphering\n");\r |
| 241 | else printf("Success enciphering\n\n");\r |
| 242 | \r |
| 243 | KalynaDelete(ctx48_e);\r |
| 244 | \r |
| 245 | // kalyna 48 dec\r |
| 246 | KalynaKeyExpand(key48_d, ctx48_d);\r |
| 247 | \r |
| 248 | printf("\n=============\n");\r |
| 249 | printf("Kalyna (%lu, %lu)\n", ctx48_d->nb * 64, ctx48_d->nk * 64);\r |
| 250 | \r |
| 251 | printf("\n--- DECIPHERING ---\n");\r |
| 252 | printf("Key:\n");\r |
| 253 | print(ctx48_d->nk, key48_d);\r |
| 254 | \r |
| 255 | printf("Ciphertext:\n");\r |
| 256 | print(ctx48_d->nb, ct48_d);\r |
| 257 | \r |
| 258 | KalynaDecipher(ct48_d, ctx48_d, pt48_d);\r |
| 259 | printf("Plaintext:\n");\r |
| 260 | print(ctx48_d->nb, pt48_d);\r |
| 261 | \r |
| 262 | if (memcmp(pt48_d, expect48_d, sizeof(pt48_d)) != 0) printf("Failed deciphering\n");\r |
| 263 | else printf("Success deciphering\n\n");\r |
| 264 | \r |
| 265 | KalynaDelete(ctx48_d);\r |
| 266 | \r |
| 267 | // kalyna 88 enc\r |
| 268 | KalynaKeyExpand(key88_e, ctx88_e);\r |
| 269 | \r |
| 270 | printf("\n=============\n");\r |
| 271 | printf("Kalyna (%lu, %lu)\n", ctx88_e->nb * 64, ctx88_e->nk * 64);\r |
| 272 | \r |
| 273 | printf("\n--- ENCIPHERING ---\n");\r |
| 274 | printf("Key:\n");\r |
| 275 | print(ctx88_e->nk, key88_e);\r |
| 276 | \r |
| 277 | printf("Plaintext:\n");\r |
| 278 | print(ctx88_e->nb, pt88_e);\r |
| 279 | \r |
| 280 | KalynaEncipher(pt88_e, ctx88_e, ct88_e);\r |
| 281 | printf("Ciphertext:\n");\r |
| 282 | print(ctx88_e->nb, ct88_e);\r |
| 283 | \r |
| 284 | if (memcmp(ct88_e, expect88_e, sizeof(ct88_e)) != 0) printf("Failed enciphering\n");\r |
| 285 | else printf("Success enciphering\n\n");\r |
| 286 | \r |
| 287 | KalynaDelete(ctx88_e);\r |
| 288 | \r |
| 289 | // kalyna 88 dec\r |
| 290 | KalynaKeyExpand(key88_d, ctx88_d);\r |
| 291 | \r |
| 292 | printf("\n=============\n");\r |
| 293 | printf("Kalyna (%lu, %lu)\n", ctx88_d->nb * 64, ctx88_d->nk * 64);\r |
| 294 | \r |
| 295 | printf("\n--- DECIPHERING ---\n");\r |
| 296 | printf("Key:\n");\r |
| 297 | print(ctx88_d->nk, key88_d);\r |
| 298 | \r |
| 299 | printf("Ciphertext:\n");\r |
| 300 | print(ctx88_d->nb, ct88_d);\r |
| 301 | \r |
| 302 | KalynaDecipher(ct88_d, ctx88_d, pt88_d);\r |
| 303 | printf("Plaintext:\n");\r |
| 304 | print(ctx88_d->nb, pt88_d);\r |
| 305 | \r |
| 306 | if (memcmp(pt88_d, expect88_d, sizeof(pt88_d)) != 0) printf("Failed deciphering\n");\r |
| 307 | else printf("Success deciphering\n\n");\r |
| 308 | \r |
| 309 | KalynaDelete(ctx88_d);\r |
| 310 | \r |
| 311 | return 0;\r |
| 312 | }\r |
| 313 | \r |
| 314 | \r |
| 315 | void print (int data_size, uint64_t data [])\r |
| 316 | {\r |
| 317 | int i;\r |
| 318 | uint8_t * tmp = (uint8_t *) data; \r |
| 319 | for (i = 0; i < data_size * 8; i ++)\r |
| 320 | {\r |
| 321 | if (! (i % 16)) printf (" ");\r |
| 322 | printf ("%02X", (unsigned int) tmp [i]);\r |
| 323 | if (!((i + 1) % 16)) printf ("\n");\r |
| 324 | };\r |
| 325 | printf ("\n");\r |
| 326 | };\r |