Fixed Key Expansion + Removed Tests

Key Expansion should now be able to return the correct keys.
Removed JUnit tests for the final release
This commit is contained in:
Phil-Schmidt 2017-11-27 02:43:19 +01:00
parent f93100c434
commit 96d78e641e
2 changed files with 27 additions and 100 deletions

View File

@ -242,26 +242,38 @@ public class AES {
new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"), new BigInteger("0"),
new BigInteger("0"), new BigInteger("0"), }; new BigInteger("0"), new BigInteger("0"), };
// initialize rcon iteration
int rconCounter = 1;
for (int i = 1; i < 11; i++) { for (int i = 1; i < 11; i++) {
// get the previous 32 bits the key // get the previous 32 bits the key
BigInteger t = roundKeys[i - 1].remainder(new BigInteger("100000000", 16)); BigInteger t = roundKeys[i - 1].remainder(new BigInteger("100000000", 16));
// initialize rcon iteration // split previous key into 8-bit segments
int rconCounter = 1; BigInteger[] prevKey = {
roundKeys[i - 1].remainder(new BigInteger("100000000", 16)),
roundKeys[i - 1].remainder(new BigInteger("10000000000000000", 16)).divide(new BigInteger("100000000", 16)),
roundKeys[i - 1].remainder(new BigInteger("1000000000000000000000000", 16)).divide(new BigInteger("10000000000000000", 16)),
roundKeys[i - 1].divide(new BigInteger("1000000000000000000000000", 16)),
};
// schedule core // run schedule core
t = scheduleCore(t, rconCounter); t = scheduleCore(t, rconCounter);
rconCounter += 1; rconCounter += 1;
BigInteger t1 = t.multiply(new BigInteger("100000000", 16));
BigInteger t2 = t.multiply(new BigInteger("10000000000000000", 16));
BigInteger t3 = t.multiply(new BigInteger("1000000000000000000000000", 16));
t = t.add(t1).add(t2).add(t3);
BigInteger xorMask = roundKeys[i - 1].divide(new BigInteger("100000000", 16)); // Calculate partial round key
xorMask = xorMask.multiply(new BigInteger("100000000", 16)); BigInteger t0 = t.xor(prevKey[3]);
t = t.xor(xorMask); BigInteger t1 = t0.xor(prevKey[2]);
roundKeys[i] = t; BigInteger t2 = t1.xor(prevKey[1]);
BigInteger t3 = t2.xor(prevKey[0]);
// Join round key segments
t2 = t2.multiply(new BigInteger("100000000", 16));
t1 = t1.multiply(new BigInteger("10000000000000000", 16));
t0 = t0.multiply(new BigInteger("1000000000000000000000000", 16));
roundKeys[i] = t0.add(t1).add(t2).add(t3);
} }
return roundKeys; return roundKeys;
@ -511,11 +523,13 @@ public class AES {
public static void main(String[] args) { public static void main(String[] args) {
boolean encrypt = false; boolean encrypt = false;
BigInteger key = new BigInteger("f0f1f2f3f4f5f6f708090a0b0c0d0e0f", 16); BigInteger key = new BigInteger("0", 16);
BigInteger plaintext = new BigInteger("0", 16); BigInteger plaintext = new BigInteger("0", 16);
BigInteger ciphertext = new BigInteger("adcfc0ed15292419cb796167bc02b669", 16); BigInteger ciphertext = new BigInteger("adcfc0ed15292419cb796167bc02b669", 16);
BigInteger output; BigInteger output;
System.out.println(keyExpansion(key)[2].xor(new BigInteger("9b9898c9f9fbfbaa9b9898c9f9fbfbaa",16)).toString(16));
if (encrypt) { if (encrypt) {
output = encrypt(plaintext, key); output = encrypt(plaintext, key);
} else { } else {

View File

@ -1,87 +0,0 @@
package ciphers;
import static org.junit.Assert.*;
import java.math.BigInteger;
import org.junit.Test;
public class AESTest {
@Test
public void testSubBytes() {
BigInteger x = new BigInteger("00ff01ff02ff03ff04ff05ff06ff07ff",16);
BigInteger expected = new BigInteger("63167c1677167b16f2166b166f16c516",16);
assertEquals(expected,AES.subBytes(x));
}
@Test
public void testSubBytesDec() {
BigInteger x = new BigInteger("63167c1677167b16f2166b166f16c516",16);
BigInteger expected = new BigInteger("00ff01ff02ff03ff04ff05ff06ff07ff",16);
assertEquals(expected,AES.subBytesDec(x));
}
@Test
public void testShiftRows() {
BigInteger x = new BigInteger("00102030011121310212223203132333",16);
BigInteger expected = new BigInteger("00112233011223300213203103102132",16);
assertEquals(expected,AES.shiftRows(x));
}
@Test
public void testShiftRowsDec() {
BigInteger x = new BigInteger("00112233011223300213203103102132",16);
BigInteger expected = new BigInteger("00102030011121310212223203132333",16);
assertEquals(expected,AES.shiftRowsDec(x));
}
@Test
public void testMixColumns() {
BigInteger x = new BigInteger("db135345f20a225c010101012d26314c",16);
BigInteger expected = new BigInteger("8e4da1bc9fdc589d010101014d7ebdf8",16);
assertEquals(expected,AES.mixColumns(x));
}
@Test
public void testMixColumnsDec() {
BigInteger x = new BigInteger("8e4da1bc9fdc589d010101014d7ebdf8",16);
BigInteger expected = new BigInteger("db135345f20a225c010101012d26314c",16);
assertEquals(expected,AES.mixColumnsDec(x));
}
@Test
public void testEncryptAndDecryptCorrectKey() {
// Plaintext/Ciphertext pairing with correct key
BigInteger key = new BigInteger("f0f1f2f3f4f5f6f708090a0b0c0d0e0f", 16);
BigInteger plaintext = new BigInteger("e9870a476d8d0bc43abde33cba26747e", 16);
BigInteger ciphertext = new BigInteger("adcfc0ed15292419cb796167bc02b669", 16);
BigInteger encryptedPlaintext = AES.encrypt(plaintext,key);
BigInteger decryptedCiphertext = AES.decrypt(ciphertext,key);
assertEquals(plaintext,decryptedCiphertext);
assertEquals(ciphertext,encryptedPlaintext);
}
@Test
public void testEncryptAndDecryptWrongKey() {
// Plaintext/Ciphertext Pairing with incorrect key
BigInteger key = new BigInteger("f4f1f2f3f4f5f6f708090a0b0c0d0e0f", 16);
BigInteger plaintext = new BigInteger("e9870a476d8d0bc43abde33cba26747e", 16);
BigInteger ciphertext = new BigInteger("adcfc0ed15292419cb796167bc02b669", 16);
BigInteger encryptedPlaintext = AES.encrypt(plaintext,key);
BigInteger decryptedCiphertext = AES.decrypt(plaintext,key);
assertNotEquals(plaintext,decryptedCiphertext);
assertNotEquals(ciphertext,encryptedPlaintext);
}
}