/* main-noekeon-test.c */ /* This file is part of the Crypto-avr-lib/microcrypt-lib. Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ /* * serpent test-suit * */ #include "config.h" #include "serial-tools.h" #include "uart.h" #include "debug.h" #include "noekeon.h" #include "nessie_bc_test.h" #include "cli.h" #include "performance_test.h" #include #include #include char* cipher_name = "Noekeon"; /***************************************************************************** * additional validation-functions * *****************************************************************************/ void noekeon_genctx_dummy(uint8_t* key, uint16_t keysize, void* ctx){ noekeon_init(key, ctx); } void testrun_nessie_noekeon_indirect(void){ char str[strlen(cipher_name)+10]; strcpy(str, cipher_name); strcat(str, "-indirect"); nessie_bc_ctx.blocksize_B = 16; nessie_bc_ctx.keysize_b = 128; nessie_bc_ctx.name = str; nessie_bc_ctx.ctx_size_B = sizeof(noekeon_ctx_t); nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)noekeon_enc; nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)noekeon_dec; nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)noekeon_genctx_dummy; nessie_bc_run(); } void noekeon_genctx_dummy_direct(uint8_t* key, uint16_t keysize, void* ctx){ memcpy(ctx, key, 16); } void testrun_nessie_noekeon_direct(void){ char str[strlen(cipher_name)+10]; strcpy(str, cipher_name); strcat(str, "-Direct"); nessie_bc_ctx.blocksize_B = 16; nessie_bc_ctx.keysize_b = 128; nessie_bc_ctx.name = str; nessie_bc_ctx.ctx_size_B = sizeof(noekeon_ctx_t); nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)noekeon_enc; nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)noekeon_dec; nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)noekeon_genctx_dummy_direct; nessie_bc_run(); } void testrun_nessie_noekeon(void){ testrun_nessie_noekeon_direct(); testrun_nessie_noekeon_indirect(); } void testrun_stdtest_rundirect(void* data, void* key){ uart_putstr_P(PSTR("\r\n ")); uart_putstr_P(PSTR("k = ")); uart_hexdump(key,16); uart_putstr_P(PSTR("\r\n ")); uart_putstr_P(PSTR("a = ")); uart_hexdump(data,16); noekeon_enc(data, key); uart_putstr_P(PSTR("\r\nafter NESSIEencrypt, b = ")); uart_hexdump(data,16); noekeon_dec(data, key); uart_putstr_P(PSTR("\r\nafter NESSIEdecrypt, a?= ")); uart_hexdump(data,16); uart_putstr_P(PSTR("\r\n")); } void testrun_stdtest_runindirect(void* data, void* key){ noekeon_ctx_t ctx; uart_putstr_P(PSTR("\r\n ")); uart_putstr_P(PSTR("k = ")); uart_hexdump(key,16); uart_putstr_P(PSTR("\r\n ")); uart_putstr_P(PSTR("a = ")); uart_hexdump(data,16); noekeon_init(key, &ctx); noekeon_enc(data, &ctx); uart_putstr_P(PSTR("\r\nafter NESSIEencrypt, b = ")); uart_hexdump(data,16); noekeon_dec(data, &ctx); uart_putstr_P(PSTR("\r\nafter NESSIEdecrypt, a?= ")); uart_hexdump(data,16); uart_putstr_P(PSTR("\r\n")); } void testrun_stdtest_noekeon(void){ uint8_t key[16], data[16]; uint8_t key3[16]; noekeon_ctx_t ctx; uart_putstr_P(PSTR("\r\nTest vectors for block cipher Noekeon in Indirect-Key Mode:\r\n")); memset(key, 0, 16); memset(data, 0, 16); testrun_stdtest_runindirect(data, key); memset(key, 0xFF, 16); memset(data, 0xFF, 16); testrun_stdtest_runindirect(data, key); memset(key, 0, 16); memset(data, 0, 16); noekeon_init(key, &ctx); noekeon_enc(data, &ctx); memcpy(key3, data, 16); memset(key, 0xFF, 16); memset(data, 0xFF, 16); noekeon_init(key, &ctx); noekeon_enc(data, &ctx); testrun_stdtest_runindirect(data, key3); uart_putstr_P(PSTR("\r\nTest vectors for block cipher Noekeon in Direct-Key Mode:\r\n")); memset(key, 0, 16); memset(data, 0, 16); testrun_stdtest_rundirect(data, key); memset(key, 0xFF, 16); memset(data, 0xFF, 16); testrun_stdtest_rundirect(data, key); memset(key, 0, 16); memset(data, 0, 16); noekeon_enc(data, key); memcpy(key3, data, 16); memset(key, 0xFF, 16); memset(data, 0xFF, 16); noekeon_enc(data, key); testrun_stdtest_rundirect(data, key3); } void testrun_performance_noekeon(void){ uint64_t t; char str[16]; uint8_t key[16], data[16]; noekeon_ctx_t ctx; calibrateTimer(); print_overhead(); memset(key, 0, 16); memset(data, 0, 16); startTimer(1); noekeon_init(key, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tctx-gen time: ")); ultoa((unsigned long)t, str, 10); uart_putstr(str); startTimer(1); noekeon_enc(data, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tencrypt time: ")); ultoa((unsigned long)t, str, 10); uart_putstr(str); startTimer(1); noekeon_dec(data, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tdecrypt time: ")); ultoa((unsigned long)t, str, 10); uart_putstr(str); uart_putstr_P(PSTR("\r\n")); } /***************************************************************************** * main * *****************************************************************************/ int main (void){ char str[20]; DEBUG_INIT(); uart_putstr("\r\n"); uart_putstr_P(PSTR("\r\n\r\nCrypto-VS (")); uart_putstr(cipher_name); uart_putstr_P(PSTR(")\r\nloaded and running\r\n")); PGM_P u = PSTR("nessie\0test\0direct\0indirect\0performance\0"); void_fpt v[] = {testrun_nessie_noekeon, testrun_stdtest_noekeon, testrun_nessie_noekeon_direct, testrun_nessie_noekeon_indirect, testrun_performance_noekeon}; while(1){ if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;} if(execcommand_d0_P(str, u, v)<0){ uart_putstr_P(PSTR("\r\nunknown command\r\n")); } continue; error: uart_putstr("ERROR\r\n"); } }