Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
/*
* @author
*
* @version
* 1.0
* @desc
*
* @remark
*
* @see
*
*/
module TestCodec_SignedAndEncryptedMessages {
// LibCommon
import from LibCommon_BasicTypesAndValues all;
import from LibCommon_DataStrings all;
// LibIts
import from IEEE1609dot2BaseTypes language "ASN.1:1997" all;
import from IEEE1609dot2 language "ASN.1:1997" all;
import from EtsiTs103097Module language "ASN.1:1997" all;
// LibItsGeoNetworking
import from LibItsGeoNetworking_EncdecDeclarations all;
import from LibItsGeoNetworking_TypesAndValues all;
import from LibItsGeoNetworking_Templates all;
// LibItsSecurity
import from LibItsSecurity_EncdecDeclarations all;
import from LibItsSecurity_TypesAndValues all;
import from LibItsSecurity_Templates all;
import from LibItsSecurity_Functions all;
import from LibItsSecurity_Pixits all;
// TestCodec
import from TestCodec_TestAndSystem all;
/**
* @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @return The encrypted message
*/
testcase tc_test_hmac_sha256_test1() runs on TCType system TCType {
var octetstring v_k := '0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b'O;
var octetstring v_m := '4869205468657265'O;
var octetstring v_t := 'b0344c61d8db38535ca8afceaf0bf12b'O;
var octetstring v_result := fx_hmac_sha256(v_k, v_m);
if (match(v_t, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @return The encrypted message
*/
testcase tc_test_hmac_sha256_test2() runs on TCType system TCType {
var octetstring v_k := '4a656665'O;
var octetstring v_m := '7768617420646f2079612077616e7420666f72206e6f7468696e673f'O;
var octetstring v_t := '5bdcc146bf60754e6a042426089575c7'O;
var octetstring v_result := fx_hmac_sha256(v_k, v_m);
if (match(v_t, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @return The encrypted message
*/
testcase tc_test_hmac_sha256_test3() runs on TCType system TCType {
var octetstring v_k := 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'O;
var octetstring v_m := 'dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd'O;
var octetstring v_t := '773ea91e36800e46854db8ebd09181a7'O;
var octetstring v_result := fx_hmac_sha256(v_k, v_m);
if (match(v_t, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
* @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @return The encrypted message
*/
testcase tc_test_hmac_sha256_test4() runs on TCType system TCType {
var octetstring v_k := '0102030405060708090a0b0c0d0e0f10111213141516171819'O;
var octetstring v_m := 'cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd'O;
var octetstring v_t := '82558a389a443c0ea4cc819899f2083a'O;
var octetstring v_result := fx_hmac_sha256(v_k, v_m);
if (match(v_t, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D.1
* @return The encrypted message
*/
testcase tc_test_encrypt_aes_128_ccm_test_1() runs on TCType system TCType {
var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O;
var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O;
var octetstring v_pt := '0653B5714D1357F4995BDDACBE10873951A1EBA663718D1AF35D2F0D52C79DE49BE622C4A6D90647BA2B004C3E8AE422FD27063AFA19AD883DCCBD97D98B8B0461B5671E75F19701C24042B8D3AF79B9FF62BC448EF9440B1EA3F7E5C0F4BFEFE3E326E62D5EE4CB4B4CFFF30AD5F49A7981ABF71617245B96E522E1ADD78A'O;
var octetstring v_ct := '5F82B9FCE34B94835395DD89D71FB758D2A3907FBF2FD58994A2B9CF8725AF26F0B23853C27A06E35EE72CAD827713C18FA5DDA971D9BAA7B42A301FF60C6E4AD651C1BB6ED4F25F7D0FF387A11627934CD11F86984EA3AC969DDA9A020AD6424B0D393E3FB4B1119ADF5CDB012A59753E41D47E5E5A8C3A118ED407049B56D53BF56CB38C0B20A2502D1DA70B9761'O;
var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_k, v_n, v_pt);
if (match(v_ct, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_result);
if (match(v_pt, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @return The encrypted message
*/
testcase tc_test_encrypt_aes_128_ccm_test_2() runs on TCType system TCType {
var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O;
var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O;
var octetstring v_pt := 'ACA650CCCCDA604E16A8B54A3335E0BC2FD9444F33E3D9B82AFE6F445357634974F0F1728CF113452321CBE5858304B01D4A14AE7F3B45980EE8033AD2A8599B78C29494C9E5F8945A8CADE3EB5A30D156C0D83271626DADDB650954093443FBAC9701C02E5A973F39C2E1761A4B48C764BF6DB215A54B285A06ECA3AF0A83F7'O;
var octetstring v_ct := 'F5775C416282A339DC66B56F5A3AD0DDACDB3F96EFBD812B4D01F98686B5518B1FA4EBE5E85213E1C7EDE704397EF3536FC8CF3DF4FB52B7870E8EB2FD2FBCD5CF263231D2C09DCAE5C31CDC99E36EFBE5737BF067D58A0A535B242BCBCA2A5604791E183CB0C2E5E851425E11B4E528237F123B5DE8E349DD6D1A4506465F7257001080003872271900D3F39C9661FD'O;
var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_k, v_n, v_pt);
if (match(v_ct, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_result);
if (match(v_pt, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @return The encrypted message
*/
testcase tc_test_encrypt_aes_128_ccm_test_3() runs on TCType system TCType {
var octetstring v_wrong_k := 'A58D5C8F8C9ED9785679E08ABC7C8116'O;
var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O;
var octetstring v_pt := 'ACA650CCCCDA604E16A8B54A3335E0BC2FD9444F33E3D9B82AFE6F445357634974F0F1728CF113452321CBE5858304B01D4A14AE7F3B45980EE8033AD2A8599B78C29494C9E5F8945A8CADE3EB5A30D156C0D83271626DADDB650954093443FBAC9701C02E5A973F39C2E1761A4B48C764BF6DB215A54B285A06ECA3AF0A83F7'O;
var octetstring v_ct := 'F5775C416282A339DC66B56F5A3AD0DDACDB3F96EFBD812B4D01F98686B5518B1FA4EBE5E85213E1C7EDE704397EF3536FC8CF3DF4FB52B7870E8EB2FD2FBCD5CF263231D2C09DCAE5C31CDC99E36EFBE5737BF067D58A0A535B242BCBCA2A5604791E183CB0C2E5E851425E11B4E528237F123B5DE8E349DD6D1A4506465F7257001080003872271900D3F39C9661FD'O;
var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_wrong_k, v_n, v_pt);
if (match(v_ct, v_result)) {
setverdict(fail);
} else {
setverdict(pass);
}
}
testcase tc_test_decrypt_aes_128_ccm_test_1() runs on TCType system TCType {
var octetstring v_k := 'E3EF9D9BDD93E9DCEB48FBF185AE73DA'O;
var octetstring v_n := 'B81E98B758D40D8771DEDD16C6CCA990'O;
var octetstring v_pt := 'D43342EB60491188733B357E215760044218E465DF4D284E54A02DF8331461590BA6BB4E402691414212DBBE3B9CB33E8AF5D0DBDAC698137C4BFD977B0512DBB02F4C183DDBD63FBB43F45AB028BB2725104694D302943CD4E2DED191D96A45B04B5D30F79025F45C9B9BAFA5007B1CB8A721C3FACB9F5A0C622FD2867332B4FDE4'O;
var octetstring v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_pt);
/*if (match(v_ct, v_result)) {
setverdict(fail);
} else {
setverdict(pass);
}*/
}
testcase tc_test_encrypt_aes_128_gcm_test_1() runs on TCType system TCType {
var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O;
var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O;
var octetstring v_pt := '9169155B08B07674CBADF75FB46A7B0D'O;
var octetstring v_ct := 'A6342013D623AD6C5F6882469673AE33'O;
var octetstring v_result := fx_encrypt_aes_128_gcm_test(v_k, v_n, v_pt);
if (match(v_ct, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
v_result := fx_encrypt_aes_128_gcm_test(v_k, v_n, v_result);
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
if (match(v_pt, v_result)) {
setverdict(pass);
} else {
setverdict(fail);
}
}
/**
* @desc Test ECIES encryption using NIST-P256
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_test_encryptWithEciesNistp256WithSha256_1() runs on TCType system TCType {
var Oct32 v_privateEphemeralKey := '1384C31D6982D52BCA3BED8A7E60F52FECDAB44E5C0EA166815A8159E09FFB42'O;
var Oct32 v_publicEphemeralKeyX;
var Oct32 v_publicEphemeralKeyY;
var octetstring v_salt := 'A6B7B52554B4203F7E3ACFDB3A3ED8674EE086CE5906A7CAC2F8A398306D3BE9'O;
var Oct32 v_recipientPrivateKey := '060E41440A4E35154CA0EFCB52412145836AD032833E6BC781E533BF14851085'O;
var Oct32 v_recipientPublicKeyX := '8C5E20FE31935F6FA682A1F6D46E4468534FFEA1A698B14B0B12513EED8DEB11'O;
var Oct32 v_recipientPublicKeyY := '1270FEC2427E6A154DFCAE3368584396C8251A04E2AE7D87B016FF65D22D6F9E'O;
var octetstring v_cyphered_message;
var octetstring v_decyphered_message;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Oct12 v_nonce;
// Cypher text is the symetric encryption key
v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('9169155B08B07674CBADF75FB46A7B0D'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
log("v_cyphered_message=", v_cyphered_message);
if (v_publicEphemeralKeyX != 'F45A99137B1BB2C150D6D8CF7292CA07DA68C003DAA766A9AF7F67F5EE916828'O) {
setverdict(fail, "Wrong public ephemeral key X");
} else if (v_publicEphemeralKeyY != 'F6A25216F44CB64A96C229AE00B479857B3B81C1319FB2ADF0E8DB2681769729'O) {
setverdict(fail, "Wrong public ephemeral key Y");
} else if (v_encrypted_sym_key != 'A6342013D623AD6C5F6882469673AE33'O) {
setverdict(fail, "Wrong encrypted key");
} else if (v_authentication_vector != '80e1d85d30f1bae4ecf1a534a89a0786'O) {
setverdict(fail, "Wrong authentication vector");
} else {
setverdict(pass, "Encryption succeed");
}
v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key);
log("v_decyphered_message=", v_decyphered_message);
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
if ('9169155B08B07674CBADF75FB46A7B0D'O != v_decyphered_message) {
setverdict(fail, "Failed to decrypt");
} else {
setverdict(pass, "Decryption succeed");
}
} // End of testcase tc_test_encryptWithEciesNistp256WithSha256_1
/**
* @desc Test ECIES encryption using NIST-P256
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_test_encryptWithEciesNistp256WithSha256_2() runs on TCType system TCType {
var Oct32 v_privateEphemeralKey := 'D418760F0CB2DCB856BC3C7217AD3AA36DB6742AE1DB655A3D28DF88CBBF84E1'O;
var Oct32 v_publicEphemeralKeyX;
var Oct32 v_publicEphemeralKeyY;
var octetstring v_salt := '9169155B08B07674CBADF75FB46A7B0D'O;
var Oct32 v_recipientPrivateKey := '060E41440A4E35154CA0EFCB52412145836AD032833E6BC781E533BF14851085'O;
var Oct32 v_recipientPublicKeyX := '8C5E20FE31935F6FA682A1F6D46E4468534FFEA1A698B14B0B12513EED8DEB11'O;
var Oct32 v_recipientPublicKeyY := '1270FEC2427E6A154DFCAE3368584396C8251A04E2AE7D87B016FF65D22D6F9E'O;
var octetstring v_cyphered_message;
var octetstring v_decyphered_message;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Oct12 v_nonce;
// Cypher text is the symetric encryption key
v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('9169155B08B07674CBADF75FB46A7B0D'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
log("v_cyphered_message=", v_cyphered_message);
if (v_publicEphemeralKeyX != 'EE9CC7FBD9EDECEA41F7C8BD258E8D2E988E75BD069ADDCA1E5A38E534AC6818'O) {
setverdict(fail, "Wrong public ephemeral key X");
} else if (v_publicEphemeralKeyY != '5AE3C8D9FE0B1FC7438F29417C240F8BF81C358EC1A4D0C6E98D8EDBCC714017'O) {
setverdict(fail, "Wrong public ephemeral key Y");
} else if (v_encrypted_sym_key != '87F98EB59319410C4662A36896050E8C'O) {
setverdict(fail, "Wrong encrypted key");
} else if (v_authentication_vector != 'B172706220E6F234E857C153E87AA534'O) {
setverdict(fail, "Wrong authentication vector");
} else {
setverdict(pass);
}
v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key);
log("v_decyphered_message=", v_decyphered_message);
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
if ('9169155B08B07674CBADF75FB46A7B0D'O != v_decyphered_message) {
setverdict(fail, "Failed to decrypt");
} else {
setverdict(pass, "Decryption succeed");
}
} // End of testcase tc_test_encryptWithEciesNistp256WithSha256_2
/**
* @desc Test ECIES encryption using NIST-P256
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_test_encryptWithEciesNistp256WithSha256_3() runs on TCType system TCType {
var Oct32 v_privateEphemeralKey := '1384C31D6982D52BCA3BED8A7E60F52FECDAB44E5C0EA166815A8159E09FFB42'O;
var Oct32 v_publicEphemeralKeyX;
var Oct32 v_publicEphemeralKeyY;
var octetstring v_salt := '05BED5F867B89F30FE5552DF414B65B9DD4073FC385D14921C641A145AA12051'O; // Wrong value in IEEE Std 1609.2-2017
var Oct32 v_recipientPrivateKey := 'DA5E1D853FCC5D0C162A245B9F29D38EB6059F0DB172FB7FDA6663B925E8C744'O;
var Oct32 v_recipientPublicKeyX := '8008B06FC4C9F9856048DA186E7DC390963D6A424E80B274FB75D12188D7D73F'O;
var Oct32 v_recipientPublicKeyY := '2774FB9600F27D7B3BBB2F7FCD8D2C96D4619EF9B4692C6A7C5733B5BAC8B27D'O;
var octetstring v_cyphered_message;
var octetstring v_decyphered_message;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Oct12 v_nonce;
// Cypher text is the symetric encryption key
v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('687E9757DEBFD87B0C267330C183C7B6'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
log("v_cyphered_message=", v_cyphered_message);
if (v_publicEphemeralKeyX != 'F45A99137B1BB2C150D6D8CF7292CA07DA68C003DAA766A9AF7F67F5EE916828'O) {
setverdict(fail, "Wrong public ephemeral key X");
} else if (v_publicEphemeralKeyY != 'F6A25216F44CB64A96C229AE00B479857B3B81C1319FB2ADF0E8DB2681769729'O) {
setverdict(fail, "Wrong public ephemeral key Y");
} else if (v_encrypted_sym_key != '1F6346EDAEAF57561FC9604FEBEFF44E'O) {
setverdict(fail, "Wrong encrypted key");
} else if (v_authentication_vector != '373c0fa7c52a0798ec36eadfe387c3ef'O) {
setverdict(fail, "Wrong authentication vector");
} else {
setverdict(pass);
}
v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key);
log("v_decyphered_message=", v_decyphered_message);
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
if ('687E9757DEBFD87B0C267330C183C7B6'O != v_decyphered_message) {
setverdict(fail, "Failed to decrypt");
} else {
setverdict(pass, "Decryption succeed");
}
} // End of testcase tc_test_encryptWithEciesNistp256WithSha256_3
/**
* @desc Test ECIES encryption using NIST-P256
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_test_encryptWithEciesNistp256WithSha256_4() runs on TCType system TCType {
var Oct32 v_privateEphemeralKey := '4624A6F9F6BC6BD088A71ED97B3AEE983B5CC2F574F64E96A531D2464137049F'O;
var Oct32 v_publicEphemeralKeyX;
var Oct32 v_publicEphemeralKeyY;
var octetstring v_salt := '05BED5F867B89F30FE5552DF414B65B9DD4073FC385D14921C641A145AA12051'O; // Wrong value in IEEE Std 1609.2-2017
var Oct32 v_recipientPrivateKey := 'DA5E1D853FCC5D0C162A245B9F29D38EB6059F0DB172FB7FDA6663B925E8C744'O;
var Oct32 v_recipientPublicKeyX := '8008B06FC4C9F9856048DA186E7DC390963D6A424E80B274FB75D12188D7D73F'O;
var Oct32 v_recipientPublicKeyY := '2774FB9600F27D7B3BBB2F7FCD8D2C96D4619EF9B4692C6A7C5733B5BAC8B27D'O;
var octetstring v_cyphered_message;
var octetstring v_decyphered_message;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Oct12 v_nonce;
// Cypher text is the symetric encryption key
v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('687E9757DEBFD87B0C267330C183C7B6'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
log("v_cyphered_message=", v_cyphered_message);
if (v_publicEphemeralKeyX != '121AA495C6B2C07A2B2DAEC36BD207D6620D7E6081050DF5DE3E9696868FCDCA'O) {
setverdict(fail, "Wrong public ephemeral key X");
} else if (v_publicEphemeralKeyY != '46C31A1ABEA0BDDAAAAEFBBA3AFDBFF1AC8D196BC313FC130926810C05503950'O) {
setverdict(fail, "Wrong public ephemeral key Y");
} else if (v_encrypted_sym_key != '6CFD13B76436CD0DB70244FAE380CBA1'O) {
setverdict(fail, "Wrong encrypted key");
} else if (v_authentication_vector != 'c8bf18ac796b0b1d3a1256d3a91676c8'O) {
setverdict(fail, "Wrong authentication vector");
} else {
setverdict(pass);
}
v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key);
log("v_decyphered_message=", v_decyphered_message);
if ('687E9757DEBFD87B0C267330C183C7B6'O != v_decyphered_message) {
setverdict(fail, "Failed to decrypt");
} else {
setverdict(pass, "Decryption succeed");
}
} // End of testcase tc_test_encryptWithEciesNistp256WithSha256_4
/**
* @desc Test ECIES encryption using NIST-P256
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_encrypted_signed_message_1() runs on TCType system TCType {
var template (value) EtsiTs103097Data v_signed_data;
var EtsiTs103097Data v_signed_data_dec;
var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O;
var HashedId8 v_digest := '0000000000000000'O;
var template (value) EtsiTs103097Data v_encrypted_data;
var EtsiTs103097Data v_encrypted_data_dec;
var bitstring v_encMsg;
var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY;
var Oct32 v_obuPublicKeyCompressed;
var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY;
var Oct32 v_tsPublicKeyCompressed;
var Oct32 v_publicEphemeralKeyCompressed;
var integer v_ephemeralKeyModeCompressed;
var integer v_obuCompressedMode;
var integer v_tsCompressedMode;
var EccP256CurvePoint v_eccPoint;
var Opaque v_cypheredPayload;
var Oct12 v_nonce;
var HashedId8 v_recipientId;
// Simulate OCU & Test System certificate, OBU and Test system exchange their public key
f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode);
f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode);
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
// The OBU is the sender, the Test System is te receiver
v_signed_data := m_etsiTs103097Data_signed(
m_signedData(
sha256,
m_toBeSignedData(
m_signedDataPayload(
m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed)
),
m_headerInfo_gn(
-,
12345
)
),
{ digest := v_digest },
m_signature_ecdsaNistP256(
m_ecdsaP256Signature(
m_eccP256CurvePoint_x_only(
'08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O
),
'2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O
)
)
)
);
log("v_signed_data = ", v_signed_data);
v_encMsg := encvalue(valueof(v_signed_data));
v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo
// Fill Certificate template with the public compressed keys (canonical form)
if (v_ephemeralKeyModeCompressed == 0) {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed));
} else {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed));
}
v_encrypted_data := m_etsiTs103097Data_encrypted(
m_encryptedData(
{
m_recipientInfo_signedDataRecipInfo(
m_pKRecipientInfo(
v_recipientId,
m_encryptedDataEncryptionKey_eciesNistP256(
m_evciesP256EncryptedKey(
))))
},
m_SymmetricCiphertext_aes128ccm(
m_aesCcmCiphertext(
v_nonce,
v_cypheredPayload
)
)
)
);
log("v_encrypted_data = ", v_encrypted_data);
v_encMsg := encvalue(valueof(v_encrypted_data));
setverdict(pass, "Encoding passed.");
if (decvalue(v_encMsg, v_encrypted_data_dec) != 0) {
} else if (not(match(valueof(v_encrypted_data), v_encrypted_data_dec))) {
setverdict(fail, "Encode/decode mismatch");
stop;
}
setverdict(pass, "Decoding passed.");
} // End of testcase tc_encrypted_signed_message_1
/**
* @desc Test ECIES encryption/decryption using NIST-P256
* The OBU is the sender, the Test System is te receiver
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_decrypted_signed_message_1() runs on TCType system TCType {
var template (value) EtsiTs103097Data v_signed_data;
var EtsiTs103097Data v_signed_data_dec;
var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O;
var HashedId8 v_digest := '0000000000000000'O;
var template (value) EtsiTs103097Data v_encrypted_data;
var EtsiTs103097Data v_decrypted_data;
var bitstring v_encMsg;
var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY;
var Oct32 v_obuPublicKeyCompressed;
var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY;
var Oct32 v_tsPublicKeyCompressed;
var Oct32 v_publicEphemeralKeyCompressed;
var integer v_ephemeralKeyModeCompressed;
var integer v_obuCompressedMode;
var integer v_tsCompressedMode;
var EccP256CurvePoint v_eccPoint;
var Oct16 v_encrypted_sym_key;
var Opaque v_cypheredPayload;
var Oct12 v_nonce;
var HashedId8 v_recipientId;
// Simulate OCU & Test System certificate, OBU and Test system exchange their public key
f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode);
f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode);
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
// The OBU is the sender, the Test System is te receiver
v_signed_data := m_etsiTs103097Data_signed(
m_signedData(
sha256,
m_toBeSignedData(
m_signedDataPayload(
m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed)
),
m_headerInfo_gn(
-,
12345
)
),
{ digest := v_digest },
m_signature_ecdsaNistP256(
m_ecdsaP256Signature(
m_eccP256CurvePoint_x_only(
'08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O
),
'2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O
)
)
)
);
log("v_signed_data = ", v_signed_data);
v_encMsg := encvalue(valueof(v_signed_data));
v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo
// Fill Certificate template with the public compressed keys (canonical form)
if (v_ephemeralKeyModeCompressed == 0) {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed));
} else {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed));
}
v_encrypted_data := m_etsiTs103097Data_encrypted(
m_encryptedData(
{
m_recipientInfo_signedDataRecipInfo(
m_pKRecipientInfo(
v_recipientId,
m_encryptedDataEncryptionKey_eciesNistP256(
m_evciesP256EncryptedKey(
v_encrypted_sym_key,
v_authentication_vector
))))
},
m_SymmetricCiphertext_aes128ccm(
m_aesCcmCiphertext(
v_nonce,
v_cypheredPayload
)
)
)
);
log("v_encrypted_data = ", v_encrypted_data);
if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) {
setverdict(fail, "f_decrypt failed");
log("v_decrypted_data = ", v_decrypted_data);
if (not(match(valueof(v_signed_data), v_decrypted_data))) {
setverdict(fail, "Encode/decode mismatch");
}
setverdict(pass, "Full encryption/decryption passed.");
} // End of testcase tc_decrypted_signed_message_1
/**
* @desc Test ECIES encryption/decryption using NIST-P256
* The OBU is the sender, the Test System is te receiver
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_decrypted_signed_message_2() runs on TCType system TCType {
var template (value) EtsiTs103097Data v_signed_data;
var EtsiTs103097Data v_signed_data_dec;
var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O;
var HashedId8 v_digest := '0000000000000000'O;
var template (value) EtsiTs103097Data v_encrypted_data;
var EtsiTs103097Data v_decrypted_data;
var bitstring v_encMsg;
var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY;
var Oct32 v_obuPublicKeyCompressed;
var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY;
var Oct32 v_tsPublicKeyCompressed;
var Oct32 v_publicEphemeralKeyCompressed;
var integer v_ephemeralKeyModeCompressed;
var integer v_obuCompressedMode;
var integer v_tsCompressedMode;
var EccP256CurvePoint v_eccPoint;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Opaque v_cypheredPayload;
var Oct12 v_nonce;
var HashedId8 v_recipientId;
// Simulate OCU & Test System certificate, OBU and Test system exchange their public key
f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode);
f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode);
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
// The OBU is the sender, the Test System is te receiver
v_signed_data := m_etsiTs103097Data_signed(
m_signedData(
sha256,
m_toBeSignedData(
m_signedDataPayload(
m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed)
),
m_headerInfo_gn(
-,
12345
)
),
{ digest := v_digest },
m_signature_ecdsaNistP256(
m_ecdsaP256Signature(
m_eccP256CurvePoint_x_only(
'08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O
),
'2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O
)
)
)
);
log("v_signed_data = ", v_signed_data);
v_encMsg := encvalue(valueof(v_signed_data));
v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo
// Fill Certificate template with the public compressed keys (canonical form)
if (v_ephemeralKeyModeCompressed == 0) {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed));
} else {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed));
}
v_encrypted_data := m_etsiTs103097Data_encrypted(
m_encryptedData(
{
m_recipientInfo_signedDataRecipInfo(
m_pKRecipientInfo(
v_recipientId,
m_encryptedDataEncryptionKey_eciesNistP256(
m_evciesP256EncryptedKey(
v_encrypted_sym_key,
v_authentication_vector
))))
},
m_SymmetricCiphertext_aes128ccm(
m_aesCcmCiphertext(
v_nonce,
v_cypheredPayload
)
)
)
);
log("v_encrypted_data = ", v_encrypted_data);
if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) {
setverdict(fail, "f_decrypt failed");
stop;
}
log("v_decrypted_data = ", v_decrypted_data);
if (not(match(valueof(v_signed_data), v_decrypted_data))) {
setverdict(fail, "Encode/decode mismatch");
stop;
}
setverdict(pass, "Full encryption/decryption passed.");
} // End of testcase tc_decrypted_signed_message_2
/**
* @desc Test ECIES encryption/decryption using BRAINPOOL-P256
* The OBU is the sender, the Test System is te receiver
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_decrypted_signed_message_3() runs on TCType system TCType {
var template (value) EtsiTs103097Data v_signed_data;
var EtsiTs103097Data v_signed_data_dec;
var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O;
var HashedId8 v_digest := '0000000000000000'O;
var template (value) EtsiTs103097Data v_encrypted_data;
var EtsiTs103097Data v_decrypted_data;
var bitstring v_encMsg;
var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY;
var Oct32 v_obuPublicKeyCompressed;
var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY;
var Oct32 v_tsPublicKeyCompressed;
var Oct32 v_publicEphemeralKeyCompressed;
var integer v_ephemeralKeyModeCompressed;
var integer v_obuCompressedMode;
var integer v_tsCompressedMode;
var EccP256CurvePoint v_eccPoint;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Opaque v_cypheredPayload;
var Oct12 v_nonce;
var HashedId8 v_recipientId;
// Simulate OCU & Test System certificate, OBU and Test system exchange their public key
f_generate_key_pair_brainpoolp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode);
f_generate_key_pair_brainpoolp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode);
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
// The OBU is the sender, the Test System is te receiver
v_signed_data := m_etsiTs103097Data_signed(
m_signedData(
sha256,
m_toBeSignedData(
m_signedDataPayload(
m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed)
),
m_headerInfo_gn(
-,
12345
)
),
{ digest := v_digest },
m_signature_ecdsaBrainpoolP256r1(
m_ecdsaP256Signature(
m_eccP256CurvePoint_x_only(
'08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O
),
'2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O
)
)
)
);
log("v_signed_data = ", v_signed_data);
v_encMsg := encvalue(valueof(v_signed_data));
v_cypheredPayload := f_encryptWithEciesBrainpoolp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo
// Fill Certificate template with the public compressed keys (canonical form)
if (v_ephemeralKeyModeCompressed == 0) {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed));
} else {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed));
}
v_encrypted_data := m_etsiTs103097Data_encrypted(
m_encryptedData(
{
m_recipientInfo_signedDataRecipInfo(
m_pKRecipientInfo(
v_recipientId,
m_encryptedDataEncryptionKey_eciesBrainpoolP256r1(
m_evciesP256EncryptedKey(
v_encrypted_sym_key,
v_authentication_vector
))))
},
m_SymmetricCiphertext_aes128ccm(
m_aesCcmCiphertext(
v_nonce,
v_cypheredPayload
)
)
)
);
log("v_encrypted_data = ", v_encrypted_data);
if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) {
setverdict(fail, "f_decrypt failed");
log("v_decrypted_data = ", v_decrypted_data);
if (not(match(valueof(v_signed_data), v_decrypted_data))) {
setverdict(fail, "Encode/decode mismatch");
}
setverdict(pass, "Full encryption/decryption passed.");
}
} // End of testcase tc_decrypted_signed_message_3
/**
* @desc Test ECIES encryption/decryption using BRAINPOOL-P256
* The Test System is the sender, the OBU is te receiver
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_decrypted_signed_message_4() runs on TCType system TCType {
var template (value) EtsiTs103097Data v_signed_data;
var EtsiTs103097Data v_signed_data_dec;
var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O;
var octetstring v_decrypted_data;
var HashedId8 v_digest := '0000000000000000'O;
var template (value) EtsiTs103097Data v_encrypted_data;
var bitstring v_encMsg;
var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY;
var Oct32 v_obuPublicKeyCompressed;
var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY;
var Oct32 v_tsPublicKeyCompressed;
var Oct32 v_publicEphemeralKeyCompressed;
var integer v_ephemeralKeyModeCompressed;
var integer v_obuCompressedMode;
var integer v_tsCompressedMode;
var EccP256CurvePoint v_eccPoint;
var Oct16 v_authentication_vector;
var Oct16 v_encrypted_sym_key;
var Opaque v_cypheredPayload;
var Oct12 v_nonce;
var HashedId8 v_recipientId;
// Simulate OCU & Test System certificate, OBU and Test system exchange their public key
f_generate_key_pair_brainpoolp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode);
f_generate_key_pair_brainpoolp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode);
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
// The OBU is the sender, the Test System is te receiver
v_signed_data := m_etsiTs103097Data_signed(
m_signedData(
sha256,
m_toBeSignedData(
m_signedDataPayload(
m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed)
),
m_headerInfo_gn(
-,
12345
)
),
{ digest := v_digest },
m_signature_ecdsaBrainpoolP256r1(
m_ecdsaP256Signature(
m_eccP256CurvePoint_x_only(
'08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O
),
'2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O
)
)
)
);
log("v_signed_data = ", v_signed_data);
v_encMsg := encvalue(valueof(v_signed_data));
v_cypheredPayload := f_encryptWithEciesBrainpoolp256WithSha256(bit2oct(v_encMsg), v_obuPublicKeyCompressed, v_obuCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce);
v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo
// Fill Certificate template with the public compressed keys (canonical form)
if (v_ephemeralKeyModeCompressed == 0) {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed));
} else {
v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed));
}
v_encrypted_data := m_etsiTs103097Data_encrypted(
m_encryptedData(
{
m_recipientInfo_signedDataRecipInfo(
m_pKRecipientInfo(
v_recipientId,
m_encryptedDataEncryptionKey_eciesBrainpoolP256r1(
m_evciesP256EncryptedKey(
v_encrypted_sym_key,
v_authentication_vector
))))
},
m_SymmetricCiphertext_aes128ccm(
m_aesCcmCiphertext(
v_nonce,
v_cypheredPayload
)
)
)
);
log("v_encrypted_data = ", v_encrypted_data);
v_decrypted_data := ''O;
/* FIXME v_decrypted_data := f_decryptWithEciesBrainpoolp256WithSha256(
valueof(v_encrypted_data.content.encryptedData.ciphertext.aes128ccm.ccmCiphertext), // The encrypted message
valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.v.uncompressedP256.x), // The public ephemeral key X-coordinate
valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.v.uncompressedP256.y), // The public ephemeral key Y-coordinate
valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.c), // The encrypted symmetric key
valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.t), // The encrypted symmetric key tag
valueof(v_encrypted_data.content.encryptedData.ciphertext.aes128ccm.nonce) // The AES 128 nonce
v_encMsg := oct2bit(v_decrypted_data);
if (decvalue(v_encMsg, v_signed_data_dec) != 0) {
setverdict(fail, "decvalue failed");
stop;
} else {
log("v_decrypted_data = ", v_signed_data_dec);
if (not(match(valueof(v_signed_data), v_signed_data_dec))) {
setverdict(fail, "Encode/decode mismatch");
stop;
}
}
setverdict(pass, "Full encryption/decryption passed.");
} // End of testcase tc_decrypted_signed_message_4
/**
* @desc Test ECIES encryption/decryption using BRAINPOOL-P256
* The Test System is the sender, the OBU is te receiver
* @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES
* @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/
* @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf
* @return The encrypted message
*/
testcase tc_decrypted_signed_message_5() runs on TCType system TCType {
var Oct32 v_private_key := '7FC25917421ED1F5BDA9A19FB662C2801B3C126D977BC1717545E6FB4C303587'O;
var Oct32 v_salt := '10D0B6BE032CE2815E78C5E15CD21F7E75DAA0025C28C06DE6A53B7EFCB18E58'O
var EtsiTs103097Data v_encrypted_data;
var EtsiTs103097Data v_decrypted_data;
var Oct16 v_aes_sym_key;
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
v_encrypted_data := {
protocolVersion := 3,
content := {
encryptedData := {
recipients := {
{
certRecipInfo := {
recipientId := 'E6A53B7EFCB18E58'O,
encKey := {
eciesNistP256 := {
v := {
compressed_y_0 := '6C4A478103B55EEAA083FAC22F5F3BE36F1CE2C9B3E22D44F2E020CB58AA6EA0'O
},
c := 'CC97274B6A28691E714B60CC4EE319ED'O,
t := 'A47EF47E799E3903CBF6499C0AD768C2'O
}
}
}
}
},
ciphertext := {
aes128ccm := {
nonce := 'F6EA838CB04E43F87E9DE6F5'O,
ccmCiphertext := 'F32E3C0E9A041651F2BE28F0A8C5F98A42BAE54CD0A41B055ED9106B45A072550B6AB58569DCE262AD71CC7286CAFDEC58F7EEC28DB1062C306894FADADC2491BBFC629D7E92EA53F617D0503199543ECDD85A1ADFA0F37D1086C643DCA2A5D5F16EC6333889F16B1EEE6EDCCEEBBEDB2D6ECF1425FA4769AA92E6400867B3F82ECBAEB736ED994571CD8B6F1E339C6442763F83386BFA8A9CE9A3A6EDC1E2C8B07D92DC4E2D8DECD87836FE154440AB68BC593F2FB5459B8FCA936571D04D87195840C0DDAB63FEA99CEB81C1AA8892B46017416B744A0DF701C1B2CC32FAD6636272B03C85AA400EFD55A1B56EB0F4A4D79746B646A94ABBAA0A978BE14FBA0BD8C27638CBFD974841D02BFE5EF6152FA115B5B9ABD55CF4A3B1FBE4AC13E5B697AA'O
}
}
}
}
};
if (f_decrypt(v_private_key, v_encrypted_data, v_salt, v_decrypted_data, v_aes_sym_key) == false) {
setverdict(fail, "f_decrypt failed");
} else {
log("v_decrypted_data = ", v_decrypted_data);
setverdict(pass, "Full encryption/decryption passed.");
}
} // End of testcase tc_decrypted_signed_message_5