|
5 | 5 | import org.bouncycastle.asn1.sec.SECNamedCurves; |
6 | 6 | import org.bouncycastle.asn1.x9.X9ECParameters; |
7 | 7 | import org.bouncycastle.crypto.AsymmetricCipherKeyPair; |
| 8 | +import org.bouncycastle.crypto.SecretWithEncapsulation; |
8 | 9 | import org.bouncycastle.crypto.digests.SHA1Digest; |
9 | 10 | import org.bouncycastle.crypto.generators.ECKeyPairGenerator; |
10 | 11 | import org.bouncycastle.crypto.generators.KDF2BytesGenerator; |
11 | | -import org.bouncycastle.crypto.kems.ECIESKeyEncapsulation; |
| 12 | +import org.bouncycastle.crypto.kems.ECIESKEMExtractor; |
| 13 | +import org.bouncycastle.crypto.kems.ECIESKEMGenerator; |
12 | 14 | import org.bouncycastle.crypto.params.ECDomainParameters; |
13 | 15 | import org.bouncycastle.crypto.params.ECKeyGenerationParameters; |
| 16 | +import org.bouncycastle.crypto.params.ECPrivateKeyParameters; |
14 | 17 | import org.bouncycastle.crypto.params.KeyParameter; |
15 | 18 | import org.bouncycastle.util.test.SimpleTest; |
16 | 19 |
|
@@ -39,90 +42,102 @@ public void performTest() |
39 | 42 | AsymmetricCipherKeyPair keys = ecGen.generateKeyPair(); |
40 | 43 |
|
41 | 44 | // Set ECIES-KEM parameters |
42 | | - ECIESKeyEncapsulation kem; |
| 45 | + ECIESKEMGenerator kemGen; |
| 46 | + ECIESKEMExtractor kemExt; |
43 | 47 | KDF2BytesGenerator kdf = new KDF2BytesGenerator(new SHA1Digest()); |
44 | 48 | SecureRandom rnd = new SecureRandom(); |
45 | 49 | byte[] out = new byte[57]; |
46 | 50 | KeyParameter key1, key2; |
47 | 51 |
|
48 | 52 | // Test basic ECIES-KEM |
49 | | - kem = new ECIESKeyEncapsulation(kdf, rnd); |
| 53 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd); |
50 | 54 |
|
51 | | - kem.init(keys.getPublic()); |
52 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
| 55 | + SecretWithEncapsulation secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 56 | + |
| 57 | + key1 = new KeyParameter(secEnc.getSecret()); |
53 | 58 |
|
54 | | - kem.init(keys.getPrivate()); |
55 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 59 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf); |
| 60 | + |
| 61 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
56 | 62 |
|
57 | 63 | if (!areEqual(key1.getKey(), key2.getKey())) |
58 | 64 | { |
59 | 65 | fail("failed basic test"); |
60 | 66 | } |
61 | 67 |
|
62 | 68 | // Test ECIES-KEM using new cofactor mode |
63 | | - kem = new ECIESKeyEncapsulation(kdf, rnd, true, false, false); |
64 | | - |
65 | | - kem.init(keys.getPublic()); |
66 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
67 | | - |
68 | | - kem.init(keys.getPrivate()); |
69 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 69 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd, true, false, false); |
| 70 | + |
| 71 | + secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 72 | + |
| 73 | + key1 = new KeyParameter(secEnc.getSecret()); |
| 74 | + |
| 75 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf, true, false, false); |
| 76 | + |
| 77 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
70 | 78 |
|
71 | 79 | if (!areEqual(key1.getKey(), key2.getKey())) |
72 | 80 | { |
73 | 81 | fail("failed cofactor test"); |
74 | 82 | } |
75 | | - |
76 | 83 | // Test ECIES-KEM using old cofactor mode |
77 | | - kem = new ECIESKeyEncapsulation(kdf, rnd, false, true, false); |
78 | | - |
79 | | - kem.init(keys.getPublic()); |
80 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
81 | | - |
82 | | - kem.init(keys.getPrivate()); |
83 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 84 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd, false, true, false); |
| 85 | + |
| 86 | + secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 87 | + |
| 88 | + key1 = new KeyParameter(secEnc.getSecret()); |
| 89 | + |
| 90 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf, false, true, false); |
| 91 | + |
| 92 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
84 | 93 |
|
85 | 94 | if (!areEqual(key1.getKey(), key2.getKey())) |
86 | 95 | { |
87 | 96 | fail("failed old cofactor test"); |
88 | 97 | } |
89 | 98 |
|
90 | 99 | // Test ECIES-KEM using single hash mode |
91 | | - kem = new ECIESKeyEncapsulation(kdf, rnd, false, false, true); |
92 | | - |
93 | | - kem.init(keys.getPublic()); |
94 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
95 | | - |
96 | | - kem.init(keys.getPrivate()); |
97 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 100 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd, false, false, true); |
| 101 | + |
| 102 | + secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 103 | + |
| 104 | + key1 = new KeyParameter(secEnc.getSecret()); |
| 105 | + |
| 106 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf, false, false, true); |
| 107 | + |
| 108 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
98 | 109 |
|
99 | 110 | if (!areEqual(key1.getKey(), key2.getKey())) |
100 | 111 | { |
101 | 112 | fail("failed single hash test"); |
102 | 113 | } |
103 | 114 |
|
104 | 115 | // Test ECIES-KEM using new cofactor mode and single hash mode |
105 | | - kem = new ECIESKeyEncapsulation(kdf, rnd, true, false, true); |
106 | | - |
107 | | - kem.init(keys.getPublic()); |
108 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
109 | | - |
110 | | - kem.init(keys.getPrivate()); |
111 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 116 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd, true, false, true); |
| 117 | + |
| 118 | + secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 119 | + |
| 120 | + key1 = new KeyParameter(secEnc.getSecret()); |
| 121 | + |
| 122 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf, true, false, true); |
| 123 | + |
| 124 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
112 | 125 |
|
113 | 126 | if (!areEqual(key1.getKey(), key2.getKey())) |
114 | 127 | { |
115 | 128 | fail("failed cofactor and single hash test"); |
116 | 129 | } |
117 | 130 |
|
118 | 131 | // Test ECIES-KEM using old cofactor mode and single hash mode |
119 | | - kem = new ECIESKeyEncapsulation(kdf, rnd, false, true, true); |
120 | | - |
121 | | - kem.init(keys.getPublic()); |
122 | | - key1 = (KeyParameter)kem.encrypt(out, 128); |
123 | | - |
124 | | - kem.init(keys.getPrivate()); |
125 | | - key2 = (KeyParameter)kem.decrypt(out, 128); |
| 132 | + kemGen = new ECIESKEMGenerator(128 / 8, kdf, rnd, false, true, true); |
| 133 | + |
| 134 | + secEnc = kemGen.generateEncapsulated(keys.getPublic()); |
| 135 | + |
| 136 | + key1 = new KeyParameter(secEnc.getSecret()); |
| 137 | + |
| 138 | + kemExt = new ECIESKEMExtractor((ECPrivateKeyParameters)keys.getPrivate(), 128 / 8, kdf, false, true, true); |
| 139 | + |
| 140 | + key2 = new KeyParameter(kemExt.extractSecret(secEnc.getEncapsulation())); |
126 | 141 |
|
127 | 142 | if (!areEqual(key1.getKey(), key2.getKey())) |
128 | 143 | { |
|
0 commit comments