3 main.c, printing test vectors of reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants
\r
5 Authors: Ruslan Kiianchuk, Ruslan Mordvinov, Roman Oliynykov
\r
13 #include "transformations.h"
\r
15 void print (int data_size, uint64_t data []);
\r
17 int main(int argc, char** argv) {
\r
20 kalyna_t* ctx22_e = KalynaInit(128, 128);
\r
21 kalyna_t* ctx24_e = KalynaInit(128, 256);
\r
22 kalyna_t* ctx44_e = KalynaInit(256, 256);
\r
23 kalyna_t* ctx48_e = KalynaInit(256, 512);
\r
24 kalyna_t* ctx88_e = KalynaInit(512, 512);
\r
26 uint64_t pt22_e[2] = {0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};
\r
28 uint64_t key22_e[2] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL};
\r
29 uint64_t expect22_e[2] = {0x20ac9b777d1cbf81ULL, 0x06add2b439eac9e1ULL};
\r
31 uint64_t pt24_e[2] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL};
\r
33 uint64_t key24_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};
\r
34 uint64_t expect24_e[2] = { 0x8a150010093eec58ULL, 0x144f336f16f74811ULL};
\r
36 uint64_t pt44_e[4] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};
\r
38 uint64_t key44_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};
\r
39 uint64_t expect44_e[4] = {0x3521c90e573d6ef6ULL, 0x8c2abddc23e3daaeULL, 0x5a0d6a20ec6339a0ULL, 0x2cd97f61245c3888ULL};
\r
41 uint64_t pt48_e[4] = {0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL};
\r
43 uint64_t key48_e[8] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,
\r
44 0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};
\r
45 uint64_t expect48_e[4] = {0x7ab6b7e6e9906960ULL, 0xb76822d793d8d64bULL, 0x02e1d73c3cc8028eULL, 0xd95dfefda8742efdULL};
\r
48 uint64_t pt88_e[8] = { 0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL,
\r
49 0x6766656463626160ULL, 0x6f6e6d6c6b6a6968ULL, 0x7776757473727170ULL, 0x7f7e7d7c7b7a7978ULL};
\r
51 uint64_t key88_e[8] = { 0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,
\r
52 0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};
\r
53 uint64_t expect88_e[8] = { 0x6a351c811be3264aULL, 0x1a239605cad61da6ULL, 0xa1f347aa5483ba67ULL, 0xb856eb20c3ee1d3eULL,
\r
54 0x66ab5b1717f4d095ULL, 0x6cc815bb34f1d62fULL, 0xb7fe6e85266a90cbULL, 0xd9d90d947264bcc5ULL};
\r
56 uint64_t ct22_d[2] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL};
\r
58 uint64_t key22_d[2] = {0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};
\r
59 uint64_t expect22_d[2] = {0x84c70c472bef9172ULL, 0xd7da733930c2096fULL};
\r
61 uint64_t ct24_d[2] = {0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};
\r
63 uint64_t key24_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};
\r
64 uint64_t expect24_d[2] = {0xe1dffdce56b46df3ULL, 0x96d9ca30705f5bb4ULL};
\r
66 uint64_t ct44_d[4] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};
\r
68 uint64_t key44_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};
\r
69 uint64_t expect44_d[4] = {0x864e67967823c57fULL, 0xa34b8b3fb0e9c103ULL, 0xd3c33f2c597c5babULL, 0xe30fb28625d1ed61ULL};
\r
71 uint64_t ct48_d[4] = {0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};
\r
73 uint64_t key48_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,
\r
74 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};
\r
75 uint64_t expect48_d[4] = {0x82d4da67277a3118ULL, 0x078d78a1b907cdbcULL, 0x97845f9e1898705eULL, 0xe06aba796d910b2dULL};
\r
77 uint64_t ct88_d[8] = {0x78797a7b7c7d7e7fULL, 0x7071727374757677ULL, 0x68696a6b6c6d6e6fULL, 0x6061626364656667ULL,
\r
78 0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};
\r
80 uint64_t key88_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,
\r
81 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};
\r
82 uint64_t expect88_d[8] = {0x5252a025338480ceULL, 0x29d8a9e614d7ea1bULL, 0xbd45a8e90e1e38fdULL, 0xa346fad954450492ULL,
\r
83 0xf2b13b85dbef7f75ULL, 0x6ae6753b839dff97ULL, 0xdc1b29b5ab5741afULL, 0x22ff5aaa13bb94f0ULL };
\r
85 kalyna_t* ctx22_d = KalynaInit(128, 128);
\r
86 kalyna_t* ctx24_d = KalynaInit(128, 256);
\r
87 kalyna_t* ctx44_d = KalynaInit(256, 256);
\r
88 kalyna_t* ctx48_d = KalynaInit(256, 512);
\r
89 kalyna_t* ctx88_d = KalynaInit(512, 512);
\r
92 KalynaKeyExpand(key22_e, ctx22_e);
\r
94 printf("\n=============\n");
\r
95 printf("Kalyna (%lu, %lu)\n", ctx22_e->nb * 64, ctx22_e->nk * 64);
\r
97 printf("\n--- ENCIPHERING ---\n");
\r
99 print(ctx22_e->nk, key22_e);
\r
101 printf("Plaintext:\n");
\r
102 print(ctx22_e->nb, pt22_e);
\r
104 KalynaEncipher(pt22_e, ctx22_e, ct22_e);
\r
105 printf("Ciphertext:\n");
\r
106 print(ctx22_e->nb, ct22_e);
\r
108 if (memcmp(ct22_e, expect22_e, sizeof(ct22_e)) != 0) printf("Failed enciphering\n");
\r
109 else printf("Success enciphering\n\n");
\r
111 KalynaDelete(ctx22_e);
\r
114 KalynaKeyExpand(key22_d, ctx22_d);
\r
116 printf("\n=============\n");
\r
117 printf("Kalyna (%lu, %lu)\n", ctx22_d->nb * 64, ctx22_d->nk * 64);
\r
119 printf("\n--- DECIPHERING ---\n");
\r
121 print(ctx22_d->nk, key22_d);
\r
123 printf("Ciphertext:\n");
\r
124 print(ctx22_d->nb, ct22_d);
\r
126 KalynaDecipher(ct22_d, ctx22_d, pt22_d);
\r
127 printf("Plaintext:\n");
\r
128 print(ctx22_d->nb, pt22_d);
\r
130 if (memcmp(pt22_d, expect22_d, sizeof(pt22_d)) != 0) printf("Failed deciphering\n");
\r
131 else printf("Success deciphering\n\n");
\r
133 KalynaDelete(ctx22_d);
\r
136 KalynaKeyExpand(key24_e, ctx24_e);
\r
138 printf("\n=============\n");
\r
139 printf("Kalyna (%lu, %lu)\n", ctx24_e->nb * 64, ctx24_e->nk * 64);
\r
141 printf("\n--- ENCIPHERING ---\n");
\r
143 print(ctx24_e->nk, key24_e);
\r
145 printf("Plaintext:\n");
\r
146 print(ctx24_e->nb, pt24_e);
\r
148 KalynaEncipher(pt24_e, ctx24_e, ct24_e);
\r
149 printf("Ciphertext:\n");
\r
150 print(ctx24_e->nb, ct24_e);
\r
152 if (memcmp(ct24_e, expect24_e, sizeof(ct24_e)) != 0) printf("Failed enciphering\n");
\r
153 else printf("Success enciphering\n\n");
\r
155 KalynaDelete(ctx24_e);
\r
158 KalynaKeyExpand(key24_d, ctx24_d);
\r
160 printf("\n=============\n");
\r
161 printf("Kalyna (%lu, %lu)\n", ctx24_d->nb * 64, ctx24_d->nk * 64);
\r
163 printf("\n--- DECIPHERING ---\n");
\r
165 print(ctx24_d->nk, key24_d);
\r
167 printf("Ciphertext:\n");
\r
168 print(ctx24_d->nb, ct24_d);
\r
170 KalynaDecipher(ct24_d, ctx24_d, pt24_d);
\r
171 printf("Plaintext:\n");
\r
172 print(ctx24_d->nb, pt24_d);
\r
174 if (memcmp(pt24_d, expect24_d, sizeof(pt24_d)) != 0) printf("Failed deciphering\n");
\r
175 else printf("Success deciphering\n\n");
\r
177 KalynaDelete(ctx24_d);
\r
180 KalynaKeyExpand(key44_e, ctx44_e);
\r
182 printf("\n=============\n");
\r
183 printf("Kalyna (%lu, %lu)\n", ctx44_e->nb * 64, ctx44_e->nk * 64);
\r
185 printf("\n--- ENCIPHERING ---\n");
\r
187 print(ctx44_e->nk, key44_e);
\r
189 printf("Plaintext:\n");
\r
190 print(ctx44_e->nb, pt44_e);
\r
192 KalynaEncipher(pt44_e, ctx44_e, ct44_e);
\r
193 printf("Ciphertext:\n");
\r
194 print(ctx44_e->nb, ct44_e);
\r
196 if (memcmp(ct44_e, expect44_e, sizeof(ct44_e)) != 0) printf("Failed enciphering\n");
\r
197 else printf("Success enciphering\n\n");
\r
199 KalynaDelete(ctx44_e);
\r
202 KalynaKeyExpand(key44_d, ctx44_d);
\r
204 printf("\n=============\n");
\r
205 printf("Kalyna (%lu, %lu)\n", ctx44_d->nb * 64, ctx44_d->nk * 64);
\r
207 printf("\n--- DECIPHERING ---\n");
\r
209 print(ctx44_d->nk, key44_d);
\r
211 printf("Ciphertext:\n");
\r
212 print(ctx44_d->nb, ct44_d);
\r
214 KalynaDecipher(ct44_d, ctx44_d, pt44_d);
\r
215 printf("Plaintext:\n");
\r
216 print(ctx44_d->nb, pt44_d);
\r
218 if (memcmp(pt44_d, expect44_d, sizeof(pt44_d)) != 0) printf("Failed deciphering\n");
\r
219 else printf("Success deciphering\n\n");
\r
221 KalynaDelete(ctx44_d);
\r
224 KalynaKeyExpand(key48_e, ctx48_e);
\r
226 printf("\n=============\n");
\r
227 printf("Kalyna (%lu, %lu)\n", ctx48_e->nb * 64, ctx48_e->nk * 64);
\r
229 printf("\n--- ENCIPHERING ---\n");
\r
231 print(ctx48_e->nk, key48_e);
\r
233 printf("Plaintext:\n");
\r
234 print(ctx48_e->nb, pt48_e);
\r
236 KalynaEncipher(pt48_e, ctx48_e, ct48_e);
\r
237 printf("Ciphertext:\n");
\r
238 print(ctx48_e->nb, ct48_e);
\r
240 if (memcmp(ct48_e, expect48_e, sizeof(ct48_e)) != 0) printf("Failed enciphering\n");
\r
241 else printf("Success enciphering\n\n");
\r
243 KalynaDelete(ctx48_e);
\r
246 KalynaKeyExpand(key48_d, ctx48_d);
\r
248 printf("\n=============\n");
\r
249 printf("Kalyna (%lu, %lu)\n", ctx48_d->nb * 64, ctx48_d->nk * 64);
\r
251 printf("\n--- DECIPHERING ---\n");
\r
253 print(ctx48_d->nk, key48_d);
\r
255 printf("Ciphertext:\n");
\r
256 print(ctx48_d->nb, ct48_d);
\r
258 KalynaDecipher(ct48_d, ctx48_d, pt48_d);
\r
259 printf("Plaintext:\n");
\r
260 print(ctx48_d->nb, pt48_d);
\r
262 if (memcmp(pt48_d, expect48_d, sizeof(pt48_d)) != 0) printf("Failed deciphering\n");
\r
263 else printf("Success deciphering\n\n");
\r
265 KalynaDelete(ctx48_d);
\r
268 KalynaKeyExpand(key88_e, ctx88_e);
\r
270 printf("\n=============\n");
\r
271 printf("Kalyna (%lu, %lu)\n", ctx88_e->nb * 64, ctx88_e->nk * 64);
\r
273 printf("\n--- ENCIPHERING ---\n");
\r
275 print(ctx88_e->nk, key88_e);
\r
277 printf("Plaintext:\n");
\r
278 print(ctx88_e->nb, pt88_e);
\r
280 KalynaEncipher(pt88_e, ctx88_e, ct88_e);
\r
281 printf("Ciphertext:\n");
\r
282 print(ctx88_e->nb, ct88_e);
\r
284 if (memcmp(ct88_e, expect88_e, sizeof(ct88_e)) != 0) printf("Failed enciphering\n");
\r
285 else printf("Success enciphering\n\n");
\r
287 KalynaDelete(ctx88_e);
\r
290 KalynaKeyExpand(key88_d, ctx88_d);
\r
292 printf("\n=============\n");
\r
293 printf("Kalyna (%lu, %lu)\n", ctx88_d->nb * 64, ctx88_d->nk * 64);
\r
295 printf("\n--- DECIPHERING ---\n");
\r
297 print(ctx88_d->nk, key88_d);
\r
299 printf("Ciphertext:\n");
\r
300 print(ctx88_d->nb, ct88_d);
\r
302 KalynaDecipher(ct88_d, ctx88_d, pt88_d);
\r
303 printf("Plaintext:\n");
\r
304 print(ctx88_d->nb, pt88_d);
\r
306 if (memcmp(pt88_d, expect88_d, sizeof(pt88_d)) != 0) printf("Failed deciphering\n");
\r
307 else printf("Success deciphering\n\n");
\r
309 KalynaDelete(ctx88_d);
\r
315 void print (int data_size, uint64_t data [])
\r
318 uint8_t * tmp = (uint8_t *) data;
\r
319 for (i = 0; i < data_size * 8; i ++)
\r
321 if (! (i % 16)) printf (" ");
\r
322 printf ("%02X", (unsigned int) tmp [i]);
\r
323 if (!((i + 1) % 16)) printf ("\n");
\r