chiark / gitweb /
kalyna-python.c, setup.py: Actually implement the bindings.
[kalyna-python] / ref / main.c
1 /*\r
2 \r
3 main.c, printing test vectors of reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants\r
4 \r
5 Authors: Ruslan Kiianchuk, Ruslan Mordvinov, Roman Oliynykov\r
6 \r
7 */\r
8 \r
9 #include <stdio.h>\r
10 #include <memory.h>\r
11 \r
12 #include "kalyna.h"\r
13 #include "transformations.h"\r
14 \r
15 void print (int data_size, uint64_t data []);\r
16 \r
17 int main(int argc, char** argv) {\r
18    \r
19         int i;\r
20         kalyna_t* ctx22_e = KalynaInit(128, 128);\r
21         kalyna_t* ctx24_e = KalynaInit(128, 256);\r
22         kalyna_t* ctx44_e = KalynaInit(256, 256);\r
23         kalyna_t* ctx48_e = KalynaInit(256, 512);\r
24         kalyna_t* ctx88_e = KalynaInit(512, 512);\r
25 \r
26     uint64_t pt22_e[2] = {0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r
27         uint64_t ct22_e[2];\r
28     uint64_t key22_e[2] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL};\r
29     uint64_t expect22_e[2] = {0x20ac9b777d1cbf81ULL, 0x06add2b439eac9e1ULL};\r
30 \r
31     uint64_t pt24_e[2] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL};\r
32         uint64_t ct24_e[2];\r
33     uint64_t key24_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r
34     uint64_t expect24_e[2] = { 0x8a150010093eec58ULL, 0x144f336f16f74811ULL};\r
35 \r
36     uint64_t pt44_e[4] = {0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r
37         uint64_t ct44_e[4];\r
38     uint64_t key44_e[4] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL};\r
39     uint64_t expect44_e[4] = {0x3521c90e573d6ef6ULL, 0x8c2abddc23e3daaeULL, 0x5a0d6a20ec6339a0ULL, 0x2cd97f61245c3888ULL};\r
40 \r
41     uint64_t pt48_e[4] = {0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL};\r
42         uint64_t ct48_e[4];\r
43     uint64_t key48_e[8] = {0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,\r
44                                                         0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r
45     uint64_t expect48_e[4] = {0x7ab6b7e6e9906960ULL, 0xb76822d793d8d64bULL, 0x02e1d73c3cc8028eULL, 0xd95dfefda8742efdULL};\r
46 \r
47 \r
48     uint64_t pt88_e[8] = {  0x4746454443424140ULL, 0x4f4e4d4c4b4a4948ULL, 0x5756555453525150ULL, 0x5f5e5d5c5b5a5958ULL,\r
49                                                                         0x6766656463626160ULL, 0x6f6e6d6c6b6a6968ULL, 0x7776757473727170ULL, 0x7f7e7d7c7b7a7978ULL};\r
50         uint64_t ct88_e[8];\r
51     uint64_t key88_e[8] = {             0x0706050403020100ULL, 0x0f0e0d0c0b0a0908ULL, 0x1716151413121110ULL, 0x1f1e1d1c1b1a1918ULL,\r
52                                                                         0x2726252423222120ULL, 0x2f2e2d2c2b2a2928ULL, 0x3736353433323130ULL, 0x3f3e3d3c3b3a3938ULL};\r
53     uint64_t expect88_e[8] = {     0x6a351c811be3264aULL, 0x1a239605cad61da6ULL, 0xa1f347aa5483ba67ULL, 0xb856eb20c3ee1d3eULL,\r
54                                                                         0x66ab5b1717f4d095ULL, 0x6cc815bb34f1d62fULL, 0xb7fe6e85266a90cbULL, 0xd9d90d947264bcc5ULL};\r
55 \r
56         uint64_t ct22_d[2] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL};\r
57         uint64_t pt22_d[2];\r
58     uint64_t key22_d[2] = {0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r
59     uint64_t expect22_d[2] = {0x84c70c472bef9172ULL, 0xd7da733930c2096fULL};\r
60 \r
61         uint64_t ct24_d[2] = {0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};\r
62         uint64_t pt24_d[2];\r
63     uint64_t key24_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r
64     uint64_t expect24_d[2] = {0xe1dffdce56b46df3ULL, 0x96d9ca30705f5bb4ULL};\r
65 \r
66         uint64_t ct44_d[4] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL};\r
67         uint64_t pt44_d[4];\r
68     uint64_t key44_d[4] = {0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r
69     uint64_t expect44_d[4] = {0x864e67967823c57fULL, 0xa34b8b3fb0e9c103ULL, 0xd3c33f2c597c5babULL, 0xe30fb28625d1ed61ULL};\r
70 \r
71         uint64_t ct48_d[4] = {0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};\r
72         uint64_t pt48_d[4];\r
73     uint64_t key48_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,\r
74                                                 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r
75     uint64_t expect48_d[4] = {0x82d4da67277a3118ULL, 0x078d78a1b907cdbcULL, 0x97845f9e1898705eULL, 0xe06aba796d910b2dULL};\r
76 \r
77         uint64_t ct88_d[8] = {0x78797a7b7c7d7e7fULL, 0x7071727374757677ULL, 0x68696a6b6c6d6e6fULL, 0x6061626364656667ULL,\r
78                                                 0x58595a5b5c5d5e5fULL, 0x5051525354555657ULL, 0x48494a4b4c4d4e4fULL, 0x4041424344454647ULL};\r
79         uint64_t pt88_d[8];\r
80     uint64_t key88_d[8] = {0x38393a3b3c3d3e3fULL, 0x3031323334353637ULL, 0x28292a2b2c2d2e2fULL, 0x2021222324252627ULL,\r
81                                                 0x18191a1b1c1d1e1fULL, 0x1011121314151617ULL, 0x08090a0b0c0d0e0fULL, 0x0001020304050607ULL};\r
82     uint64_t expect88_d[8] = {0x5252a025338480ceULL, 0x29d8a9e614d7ea1bULL, 0xbd45a8e90e1e38fdULL, 0xa346fad954450492ULL,\r
83                                                 0xf2b13b85dbef7f75ULL, 0x6ae6753b839dff97ULL, 0xdc1b29b5ab5741afULL, 0x22ff5aaa13bb94f0ULL };\r
84 \r
85         kalyna_t* ctx22_d = KalynaInit(128, 128);\r
86         kalyna_t* ctx24_d = KalynaInit(128, 256);\r
87         kalyna_t* ctx44_d = KalynaInit(256, 256);\r
88         kalyna_t* ctx48_d = KalynaInit(256, 512);\r
89         kalyna_t* ctx88_d = KalynaInit(512, 512);\r
90 \r
91         // kalyna 22 enc\r
92         KalynaKeyExpand(key22_e, ctx22_e);\r
93 \r
94     printf("\n=============\n");\r
95     printf("Kalyna (%lu, %lu)\n", ctx22_e->nb * 64, ctx22_e->nk * 64);\r
96    \r
97         printf("\n--- ENCIPHERING ---\n");\r
98     printf("Key:\n");\r
99     print(ctx22_e->nk, key22_e);\r
100 \r
101     printf("Plaintext:\n");\r
102     print(ctx22_e->nb, pt22_e);\r
103 \r
104     KalynaEncipher(pt22_e, ctx22_e, ct22_e);\r
105     printf("Ciphertext:\n");\r
106     print(ctx22_e->nb, ct22_e);\r
107 \r
108         if (memcmp(ct22_e, expect22_e, sizeof(ct22_e)) != 0) printf("Failed enciphering\n");\r
109         else printf("Success enciphering\n\n");\r
110 \r
111         KalynaDelete(ctx22_e);\r
112 \r
113         // kalyna 22 dec\r
114         KalynaKeyExpand(key22_d, ctx22_d);\r
115 \r
116     printf("\n=============\n");\r
117     printf("Kalyna (%lu, %lu)\n", ctx22_d->nb * 64, ctx22_d->nk * 64);\r
118    \r
119         printf("\n--- DECIPHERING ---\n");\r
120     printf("Key:\n");\r
121     print(ctx22_d->nk, key22_d);\r
122 \r
123         printf("Ciphertext:\n");\r
124     print(ctx22_d->nb, ct22_d);\r
125 \r
126         KalynaDecipher(ct22_d, ctx22_d, pt22_d);\r
127     printf("Plaintext:\n");\r
128     print(ctx22_d->nb, pt22_d);\r
129 \r
130         if (memcmp(pt22_d, expect22_d, sizeof(pt22_d)) != 0) printf("Failed deciphering\n");\r
131         else printf("Success deciphering\n\n");\r
132 \r
133         KalynaDelete(ctx22_d);\r
134         \r
135         // kalyna 24 enc\r
136         KalynaKeyExpand(key24_e, ctx24_e);\r
137 \r
138     printf("\n=============\n");\r
139     printf("Kalyna (%lu, %lu)\n", ctx24_e->nb * 64, ctx24_e->nk * 64);\r
140 \r
141     printf("\n--- ENCIPHERING ---\n");\r
142     printf("Key:\n");\r
143     print(ctx24_e->nk, key24_e);\r
144 \r
145     printf("Plaintext:\n");\r
146     print(ctx24_e->nb, pt24_e);\r
147 \r
148     KalynaEncipher(pt24_e, ctx24_e, ct24_e);\r
149     printf("Ciphertext:\n");\r
150     print(ctx24_e->nb, ct24_e);\r
151 \r
152         if (memcmp(ct24_e, expect24_e, sizeof(ct24_e)) != 0) printf("Failed enciphering\n");\r
153         else printf("Success enciphering\n\n");\r
154 \r
155         KalynaDelete(ctx24_e);\r
156 \r
157         // kalyna 24 dec\r
158         KalynaKeyExpand(key24_d, ctx24_d);\r
159 \r
160     printf("\n=============\n");\r
161     printf("Kalyna (%lu, %lu)\n", ctx24_d->nb * 64, ctx24_d->nk * 64);\r
162    \r
163         printf("\n--- DECIPHERING ---\n");\r
164     printf("Key:\n");\r
165     print(ctx24_d->nk, key24_d);\r
166 \r
167         printf("Ciphertext:\n");\r
168     print(ctx24_d->nb, ct24_d);\r
169 \r
170         KalynaDecipher(ct24_d, ctx24_d, pt24_d);\r
171     printf("Plaintext:\n");\r
172     print(ctx24_d->nb, pt24_d);\r
173 \r
174         if (memcmp(pt24_d, expect24_d, sizeof(pt24_d)) != 0) printf("Failed deciphering\n");\r
175         else printf("Success deciphering\n\n");\r
176 \r
177         KalynaDelete(ctx24_d);\r
178 \r
179         // kalyna 44 enc\r
180         KalynaKeyExpand(key44_e, ctx44_e);\r
181 \r
182     printf("\n=============\n");\r
183     printf("Kalyna (%lu, %lu)\n", ctx44_e->nb * 64, ctx44_e->nk * 64);\r
184 \r
185     printf("\n--- ENCIPHERING ---\n");\r
186     printf("Key:\n");\r
187     print(ctx44_e->nk, key44_e);\r
188 \r
189     printf("Plaintext:\n");\r
190     print(ctx44_e->nb, pt44_e);\r
191 \r
192     KalynaEncipher(pt44_e, ctx44_e, ct44_e);\r
193     printf("Ciphertext:\n");\r
194     print(ctx44_e->nb, ct44_e);\r
195 \r
196         if (memcmp(ct44_e, expect44_e, sizeof(ct44_e)) != 0) printf("Failed enciphering\n");\r
197         else printf("Success enciphering\n\n");\r
198 \r
199         KalynaDelete(ctx44_e);\r
200 \r
201         // kalyna 44 dec\r
202         KalynaKeyExpand(key44_d, ctx44_d);\r
203 \r
204     printf("\n=============\n");\r
205     printf("Kalyna (%lu, %lu)\n", ctx44_d->nb * 64, ctx44_d->nk * 64);\r
206    \r
207         printf("\n--- DECIPHERING ---\n");\r
208     printf("Key:\n");\r
209     print(ctx44_d->nk, key44_d);\r
210 \r
211         printf("Ciphertext:\n");\r
212     print(ctx44_d->nb, ct44_d);\r
213 \r
214         KalynaDecipher(ct44_d, ctx44_d, pt44_d);\r
215     printf("Plaintext:\n");\r
216     print(ctx44_d->nb, pt44_d);\r
217 \r
218         if (memcmp(pt44_d, expect44_d, sizeof(pt44_d)) != 0) printf("Failed deciphering\n");\r
219         else printf("Success deciphering\n\n");\r
220 \r
221         KalynaDelete(ctx44_d);\r
222 \r
223         // kalyna 48 enc\r
224         KalynaKeyExpand(key48_e, ctx48_e);\r
225 \r
226     printf("\n=============\n");\r
227     printf("Kalyna (%lu, %lu)\n", ctx48_e->nb * 64, ctx48_e->nk * 64);\r
228    \r
229     printf("\n--- ENCIPHERING ---\n");\r
230     printf("Key:\n");\r
231     print(ctx48_e->nk, key48_e);\r
232 \r
233     printf("Plaintext:\n");\r
234     print(ctx48_e->nb, pt48_e);\r
235 \r
236     KalynaEncipher(pt48_e, ctx48_e, ct48_e);\r
237     printf("Ciphertext:\n");\r
238     print(ctx48_e->nb, ct48_e);\r
239 \r
240         if (memcmp(ct48_e, expect48_e, sizeof(ct48_e)) != 0) printf("Failed enciphering\n");\r
241         else printf("Success enciphering\n\n");\r
242 \r
243         KalynaDelete(ctx48_e);\r
244 \r
245         // kalyna 48 dec\r
246         KalynaKeyExpand(key48_d, ctx48_d);\r
247 \r
248     printf("\n=============\n");\r
249     printf("Kalyna (%lu, %lu)\n", ctx48_d->nb * 64, ctx48_d->nk * 64);\r
250    \r
251         printf("\n--- DECIPHERING ---\n");\r
252     printf("Key:\n");\r
253     print(ctx48_d->nk, key48_d);\r
254 \r
255         printf("Ciphertext:\n");\r
256     print(ctx48_d->nb, ct48_d);\r
257 \r
258         KalynaDecipher(ct48_d, ctx48_d, pt48_d);\r
259     printf("Plaintext:\n");\r
260     print(ctx48_d->nb, pt48_d);\r
261 \r
262         if (memcmp(pt48_d, expect48_d, sizeof(pt48_d)) != 0) printf("Failed deciphering\n");\r
263         else printf("Success deciphering\n\n");\r
264 \r
265         KalynaDelete(ctx48_d);\r
266 \r
267         // kalyna 88 enc\r
268         KalynaKeyExpand(key88_e, ctx88_e);\r
269 \r
270     printf("\n=============\n");\r
271     printf("Kalyna (%lu, %lu)\n", ctx88_e->nb * 64, ctx88_e->nk * 64);\r
272 \r
273     printf("\n--- ENCIPHERING ---\n");\r
274     printf("Key:\n");\r
275     print(ctx88_e->nk, key88_e);\r
276 \r
277     printf("Plaintext:\n");\r
278     print(ctx88_e->nb, pt88_e);\r
279 \r
280     KalynaEncipher(pt88_e, ctx88_e, ct88_e);\r
281     printf("Ciphertext:\n");\r
282     print(ctx88_e->nb, ct88_e);\r
283 \r
284         if (memcmp(ct88_e, expect88_e, sizeof(ct88_e)) != 0) printf("Failed enciphering\n");\r
285         else printf("Success enciphering\n\n");\r
286 \r
287         KalynaDelete(ctx88_e);\r
288 \r
289         // kalyna 88 dec\r
290         KalynaKeyExpand(key88_d, ctx88_d);\r
291 \r
292     printf("\n=============\n");\r
293     printf("Kalyna (%lu, %lu)\n", ctx88_d->nb * 64, ctx88_d->nk * 64);\r
294    \r
295         printf("\n--- DECIPHERING ---\n");\r
296     printf("Key:\n");\r
297     print(ctx88_d->nk, key88_d);\r
298 \r
299         printf("Ciphertext:\n");\r
300     print(ctx88_d->nb, ct88_d);\r
301 \r
302         KalynaDecipher(ct88_d, ctx88_d, pt88_d);\r
303     printf("Plaintext:\n");\r
304     print(ctx88_d->nb, pt88_d);\r
305 \r
306         if (memcmp(pt88_d, expect88_d, sizeof(pt88_d)) != 0) printf("Failed deciphering\n");\r
307         else printf("Success deciphering\n\n");\r
308 \r
309         KalynaDelete(ctx88_d);\r
310 \r
311     return 0;\r
312 }\r
313 \r
314 \r
315 void print (int data_size, uint64_t data [])\r
316 {\r
317         int i;\r
318         uint8_t * tmp = (uint8_t *) data; \r
319         for (i = 0; i < data_size * 8; i ++)\r
320         {\r
321                 if (! (i % 16)) printf ("    ");\r
322                 printf ("%02X", (unsigned int) tmp [i]);\r
323                 if (!((i + 1) % 16)) printf ("\n");\r
324         };\r
325         printf ("\n");\r
326 };\r