diff options
author | Sergio Giro <sgiro@google.com> | 2016-02-01 18:52:42 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2016-02-01 18:52:42 +0000 |
commit | 9218edabd1ef9852bc2f13115dcadc81b442dd6c (patch) | |
tree | 8229ff72c8cbb06f49dce3a8382930919fa6fc2b /bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java | |
parent | 9b30eb05e5be69d51881a0d1b31e503e97acd784 (diff) | |
parent | 397d32894b89b506dc318e0f83446187c9b76ebe (diff) | |
download | android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.gz android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.bz2 android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.zip |
Merge "Merge remote-tracking branch 'aosp/upstream-master' into merge-152-from-upstream"
Diffstat (limited to 'bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java')
-rw-r--r-- | bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java | 149 |
1 files changed, 149 insertions, 0 deletions
diff --git a/bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java b/bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java new file mode 100644 index 0000000..96ada14 --- /dev/null +++ b/bcprov/src/main/java/org/bouncycastle/crypto/ec/test/ECTransformationTest.java @@ -0,0 +1,149 @@ +package org.bouncycastle.crypto.ec.test; + +import java.math.BigInteger; +import java.security.SecureRandom; + +import org.bouncycastle.crypto.AsymmetricCipherKeyPair; +import org.bouncycastle.crypto.ec.ECDecryptor; +import org.bouncycastle.crypto.ec.ECElGamalDecryptor; +import org.bouncycastle.crypto.ec.ECElGamalEncryptor; +import org.bouncycastle.crypto.ec.ECEncryptor; +import org.bouncycastle.crypto.ec.ECNewPublicKeyTransform; +import org.bouncycastle.crypto.ec.ECNewRandomnessTransform; +import org.bouncycastle.crypto.ec.ECPair; +import org.bouncycastle.crypto.ec.ECPairTransform; +import org.bouncycastle.crypto.generators.ECKeyPairGenerator; +import org.bouncycastle.crypto.params.ECDomainParameters; +import org.bouncycastle.crypto.params.ECKeyGenerationParameters; +import org.bouncycastle.crypto.params.ECPrivateKeyParameters; +import org.bouncycastle.crypto.params.ECPublicKeyParameters; +import org.bouncycastle.crypto.params.ParametersWithRandom; +import org.bouncycastle.math.ec.ECConstants; +import org.bouncycastle.math.ec.ECCurve; +import org.bouncycastle.math.ec.ECPoint; +import org.bouncycastle.util.encoders.Hex; +import org.bouncycastle.util.test.SimpleTest; + +public class ECTransformationTest + extends SimpleTest +{ + public String getName() + { + return "ECTransformationTest"; + } + + public void performTest() + throws Exception + { + BigInteger n = new BigInteger("6277101735386680763835789423176059013767194773182842284081"); + + ECCurve.Fp curve = new ECCurve.Fp( + new BigInteger("6277101735386680763835789423207666416083908700390324961279"), // q + new BigInteger("fffffffffffffffffffffffffffffffefffffffffffffffc", 16), // a + new BigInteger("64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1", 16), // b + n, ECConstants.ONE); + + ECDomainParameters params = new ECDomainParameters( + curve, + curve.decodePoint(Hex.decode("03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012")), // G + n); + + ECPublicKeyParameters pubKey = new ECPublicKeyParameters( + curve.decodePoint(Hex.decode("0262b12d60690cdcf330babab6e69763b471f994dd702d16a5")), // Q + params); + + ECPrivateKeyParameters priKey = new ECPrivateKeyParameters( + new BigInteger("651056770906015076056810763456358567190100156695615665659"), // d + params); + + + ParametersWithRandom pRandom = new ParametersWithRandom(pubKey, new SecureRandom()); + + doTest(priKey, pRandom, BigInteger.valueOf(20)); + + BigInteger rand = new BigInteger(pubKey.getParameters().getN().bitLength() - 1, new SecureRandom()); + + doTest(priKey, pRandom, rand); + doSameKeyTest(priKey, pRandom, rand); + } + + private void doTest(ECPrivateKeyParameters priKey, ParametersWithRandom pRandom, BigInteger value) + { + ECPoint data = priKey.getParameters().getG().multiply(value); + + ECEncryptor encryptor = new ECElGamalEncryptor(); + + encryptor.init(pRandom); + + ECPair pair = encryptor.encrypt(data); + + ECKeyPairGenerator ecGen = new ECKeyPairGenerator(); + + ecGen.init(new ECKeyGenerationParameters(priKey.getParameters(), new SecureRandom())); + + AsymmetricCipherKeyPair reEncKP = ecGen.generateKeyPair(); + + ECPairTransform ecr = new ECNewPublicKeyTransform(); + + ecr.init(reEncKP.getPublic()); + + ECPair srcPair = pair; + + // re-encrypt the message portion + pair = ecr.transform(srcPair); + + ECDecryptor decryptor = new ECElGamalDecryptor(); + + decryptor.init(priKey); + + // decrypt out the original private key + ECPoint p = decryptor.decrypt(new ECPair(srcPair.getX(), pair.getY())); + + decryptor.init(reEncKP.getPrivate()); + + // decrypt the fully transformed point. + ECPoint result = decryptor.decrypt(new ECPair(pair.getX(), p)); + + if (!data.equals(result)) + { + fail("point pair failed to decrypt back to original"); + } + } + + private void doSameKeyTest(ECPrivateKeyParameters priKey, ParametersWithRandom pRandom, BigInteger value) + { + ECPoint data = priKey.getParameters().getG().multiply(value); + + ECEncryptor encryptor = new ECElGamalEncryptor(); + + encryptor.init(pRandom); + + ECPair pair = encryptor.encrypt(data); + + ECPairTransform ecr = new ECNewRandomnessTransform(); + + ecr.init(pRandom); + + ECPair srcPair = pair; + + // re-encrypt the message portion + pair = ecr.transform(srcPair); + + ECDecryptor decryptor = new ECElGamalDecryptor(); + + decryptor.init(priKey); + + // decrypt the fully transformed point. + ECPoint result = decryptor.decrypt(pair); + + if (!data.equals(result)) + { + fail("point pair failed to decrypt back to original"); + } + } + + public static void main(String[] args) + { + runTest(new ECTransformationTest()); + } +} |