diff options
| author | Kévin Le Gouguec <kevin.legouguec@airbus.com> | 2018-11-21 08:24:21 +0100 |
|---|---|---|
| committer | Kévin Le Gouguec <kevin.legouguec@airbus.com> | 2018-11-21 08:27:59 +0100 |
| commit | 6e89e68db7aec144cd86f44d130e9ec73449da0f (patch) | |
| tree | 1b6ee606b969b553f339fe30a28841f08b6cfe2c | |
| parent | dc4c7b2f6a571706bdccaf9bd9fae2f9c5554c3c (diff) | |
| download | lilliput-ae-implem-6e89e68db7aec144cd86f44d130e9ec73449da0f.tar.xz | |
Mise à jour des vecteurs de Léo (suite)
J'avais oublié
- de virer le 33ème tour de null et full,
- de mettre à jour les valeurs de random dans le code C
TODO: lire ces valeurs automatiquement depuis le fichier de référence…
4 files changed, 6 insertions, 68 deletions
diff --git a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_full.txt b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_full.txt index 9f7e25b..ef346d2 100644 --- a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_full.txt +++ b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_full.txt @@ -1018,34 +1018,3 @@ Tweakey Schedule Subtweakey : 5d 5d 5d 5d 5d 5d 5d 42 - Round Tweakey 32 - Input Tweakey : - 04 04 04 04 04 04 04 04 - 66 66 66 66 66 66 66 66 - a7 a7 a7 a7 a7 a7 a7 a7 - 67 67 67 67 67 67 67 67 - ff ff ff ff ff ff ff ff - - Post permutation Tweakey : - 04 04 04 04 04 04 04 04 - 66 66 66 66 66 66 66 66 - a7 a7 a7 a7 a7 a7 a7 a7 - 67 67 67 67 67 67 67 67 - ff ff ff ff ff ff ff ff - - Post multiplication Tweakey : - 03 03 03 03 03 03 03 03 - 2a 2a 2a 2a 2a 2a 2a 2a - 1b 1b 1b 1b 1b 1b 1b 1b - ca ca ca ca ca ca ca ca - ff ff ff ff ff ff ff ff - - Extracting Subtweakey round 32 - 03 03 03 03 03 03 03 03 - 2a 2a 2a 2a 2a 2a 2a 2a - 1b 1b 1b 1b 1b 1b 1b 1b - ca ca ca ca ca ca ca ca - ff ff ff ff ff ff ff ff - - Subtweakey : - 07 07 07 07 07 07 07 27 diff --git a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_null.txt b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_null.txt index baee58a..ed7938b 100644 --- a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_null.txt +++ b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_null.txt @@ -1018,34 +1018,3 @@ Tweakey Schedule Subtweakey : 00 00 00 00 00 00 00 1f - Round Tweakey 32 - Input Tweakey : - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - - Post permutation Tweakey : - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - - Post multiplication Tweakey : - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - - Extracting Subtweakey round 32 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 - - Subtweakey : - 00 00 00 00 00 00 00 20 diff --git a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_random.txt b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_random.txt index 09ed87a..f1d5243 100644 --- a/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_random.txt +++ b/crypto_aead/lilliputaei128v1/ref/test/tweakey-ref/tweakey_random.txt @@ -24,7 +24,7 @@ Tweakey Schedule 84 1c 11 81 10 f3 43 a8 Subtweakey : - 1b 80 94 04 bf 7b 54 b4 + 1b 80 94 04 bf 7b 54 b4 Round Tweakey 1 Input Tweakey : diff --git a/crypto_aead/lilliputaei128v1/ref/test/tweakey.c b/crypto_aead/lilliputaei128v1/ref/test/tweakey.c index 4b4d7dd..ddf595b 100644 --- a/crypto_aead/lilliputaei128v1/ref/test/tweakey.c +++ b/crypto_aead/lilliputaei128v1/ref/test/tweakey.c @@ -61,13 +61,13 @@ vector_input VECTORS[] = { { .name = "random", .tweak = { - 0xcf, 0x4c, 0xd4, 0x0b, 0x5e, 0x04, 0x2d, 0x26, - 0xa5, 0x19, 0x5b, 0x52, 0x73, 0xff, 0x12, 0xd2, - 0x39, 0x33, 0x28, 0x90, 0xc5, 0x0e, 0x33, 0x25 + 0xa8, 0x43, 0xf3, 0x10, 0x81, 0x11, 0x1c, 0x84, + 0xdf, 0xf8, 0x2e, 0xfa, 0x90, 0x90, 0x26, 0x21, + 0x7d, 0x8d, 0x43, 0x12, 0x2a, 0xb3, 0xd2, 0x4d }, .key = { - 0xa2, 0x28, 0x13, 0x19, 0x00, 0xd1, 0xf1, 0xf3, - 0xa9, 0xca, 0x44, 0x73, 0x56, 0x16, 0xae, 0xb4, + 0xc1, 0x96, 0xc6, 0x0a, 0x02, 0x73, 0x91, 0x68, + 0x7f, 0xf4, 0x23, 0x4d, 0x3d, 0xd5, 0xf9, 0x9b } } }; |
