/* * @author * * @version * 1.0 * @desc * * @remark * * @see * */ module TestCodec_SignedAndEncryptedMessages { // LibCommon import from LibCommon_BasicTypesAndValues all; import from LibCommon_DataStrings all; // LibIts import from IEEE1609dot2BaseTypes language "ASN.1:1997" all; import from IEEE1609dot2 language "ASN.1:1997" all; import from EtsiTs103097Module language "ASN.1:1997" all; // LibItsGeoNetworking import from LibItsGeoNetworking_EncdecDeclarations all; import from LibItsGeoNetworking_TypesAndValues all; import from LibItsGeoNetworking_Templates all; // LibItsSecurity import from LibItsSecurity_EncdecDeclarations all; import from LibItsSecurity_TypesAndValues all; import from LibItsSecurity_Templates all; import from LibItsSecurity_Functions all; import from LibItsSecurity_Pixits all; // TestCodec import from TestCodec_TestAndSystem all; /** * @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @return The encrypted message */ testcase tc_test_hmac_sha256_test1() runs on TCType system TCType { var octetstring v_k := '0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b'O; var octetstring v_m := '4869205468657265'O; var octetstring v_t := 'b0344c61d8db38535ca8afceaf0bf12b'O; var octetstring v_result := fx_hmac_sha256(v_k, v_m); if (match(v_t, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D * @return The encrypted message */ testcase tc_test_hmac_sha256_test2() runs on TCType system TCType { var octetstring v_k := '4a656665'O; var octetstring v_m := '7768617420646f2079612077616e7420666f72206e6f7468696e673f'O; var octetstring v_t := '5bdcc146bf60754e6a042426089575c7'O; var octetstring v_result := fx_hmac_sha256(v_k, v_m); if (match(v_t, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D * @return The encrypted message */ testcase tc_test_hmac_sha256_test3() runs on TCType system TCType { var octetstring v_k := 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'O; var octetstring v_m := 'dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd'O; var octetstring v_t := '773ea91e36800e46854db8ebd09181a7'O; var octetstring v_result := fx_hmac_sha256(v_k, v_m); if (match(v_t, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test HMAC-SH256 using test vectors provided by IEEE Std 1609.2-2017 Annex D * @return The encrypted message */ testcase tc_test_hmac_sha256_test4() runs on TCType system TCType { var octetstring v_k := '0102030405060708090a0b0c0d0e0f10111213141516171819'O; var octetstring v_m := 'cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd'O; var octetstring v_t := '82558a389a443c0ea4cc819899f2083a'O; var octetstring v_result := fx_hmac_sha256(v_k, v_m); if (match(v_t, v_result)) { setverdict(pass); } else { setverdict(fail); } } testcase tc_test_hmac_sha256_test5() runs on TCType system TCType { var octetstring v_k := '9f997cf14bc68d4007c5cfd35ea64d9cec802dde70e6128b074d4f465d1d322b'O; var octetstring v_m := 'f9294b8dc221aab77685399656db2f82711bc1b5703aeb5797578863b5177f6b'O; var octetstring v_t := 'FEACBAB2F71A8FA882BF2832A19581ED'O; var octetstring v_result := fx_hmac_sha256(v_k, v_m); log("v_result= ", v_result); if (match(v_t, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D.1 * @return The encrypted message */ testcase tc_test_encrypt_aes_128_ccm_test_1() runs on TCType system TCType { var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O; var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O; var octetstring v_pt := '0653B5714D1357F4995BDDACBE10873951A1EBA663718D1AF35D2F0D52C79DE49BE622C4A6D90647BA2B004C3E8AE422FD27063AFA19AD883DCCBD97D98B8B0461B5671E75F19701C24042B8D3AF79B9FF62BC448EF9440B1EA3F7E5C0F4BFEFE3E326E62D5EE4CB4B4CFFF30AD5F49A7981ABF71617245B96E522E1ADD78A'O; var octetstring v_ct := '5F82B9FCE34B94835395DD89D71FB758D2A3907FBF2FD58994A2B9CF8725AF26F0B23853C27A06E35EE72CAD827713C18FA5DDA971D9BAA7B42A301FF60C6E4AD651C1BB6ED4F25F7D0FF387A11627934CD11F86984EA3AC969DDA9A020AD6424B0D393E3FB4B1119ADF5CDB012A59753E41D47E5E5A8C3A118ED407049B56D53BF56CB38C0B20A2502D1DA70B9761'O; var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_k, v_n, v_pt); if (match(v_ct, v_result)) { setverdict(pass); } else { setverdict(fail); } v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_result); if (match(v_pt, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D * @return The encrypted message */ testcase tc_test_encrypt_aes_128_ccm_test_2() runs on TCType system TCType { var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O; var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O; var octetstring v_pt := 'ACA650CCCCDA604E16A8B54A3335E0BC2FD9444F33E3D9B82AFE6F445357634974F0F1728CF113452321CBE5858304B01D4A14AE7F3B45980EE8033AD2A8599B78C29494C9E5F8945A8CADE3EB5A30D156C0D83271626DADDB650954093443FBAC9701C02E5A973F39C2E1761A4B48C764BF6DB215A54B285A06ECA3AF0A83F7'O; var octetstring v_ct := 'F5775C416282A339DC66B56F5A3AD0DDACDB3F96EFBD812B4D01F98686B5518B1FA4EBE5E85213E1C7EDE704397EF3536FC8CF3DF4FB52B7870E8EB2FD2FBCD5CF263231D2C09DCAE5C31CDC99E36EFBE5737BF067D58A0A535B242BCBCA2A5604791E183CB0C2E5E851425E11B4E528237F123B5DE8E349DD6D1A4506465F7257001080003872271900D3F39C9661FD'O; var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_k, v_n, v_pt); if (match(v_ct, v_result)) { setverdict(pass); } else { setverdict(fail); } v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_result); if (match(v_pt, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test AES 128 CCM using test vectors provided by IEEE Std 1609.2-2017 Annex D * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @return The encrypted message */ testcase tc_test_encrypt_aes_128_ccm_test_3() runs on TCType system TCType { var octetstring v_wrong_k := 'A58D5C8F8C9ED9785679E08ABC7C8116'O; var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O; var octetstring v_pt := 'ACA650CCCCDA604E16A8B54A3335E0BC2FD9444F33E3D9B82AFE6F445357634974F0F1728CF113452321CBE5858304B01D4A14AE7F3B45980EE8033AD2A8599B78C29494C9E5F8945A8CADE3EB5A30D156C0D83271626DADDB650954093443FBAC9701C02E5A973F39C2E1761A4B48C764BF6DB215A54B285A06ECA3AF0A83F7'O; var octetstring v_ct := 'F5775C416282A339DC66B56F5A3AD0DDACDB3F96EFBD812B4D01F98686B5518B1FA4EBE5E85213E1C7EDE704397EF3536FC8CF3DF4FB52B7870E8EB2FD2FBCD5CF263231D2C09DCAE5C31CDC99E36EFBE5737BF067D58A0A535B242BCBCA2A5604791E183CB0C2E5E851425E11B4E528237F123B5DE8E349DD6D1A4506465F7257001080003872271900D3F39C9661FD'O; var octetstring v_result := fx_encrypt_aes_128_ccm_test(v_wrong_k, v_n, v_pt); if (match(v_ct, v_result)) { setverdict(fail); } else { setverdict(pass); } } testcase tc_test_decrypt_aes_128_ccm_test_1() runs on TCType system TCType { var octetstring v_k := 'E3EF9D9BDD93E9DCEB48FBF185AE73DA'O; var octetstring v_n := 'B81E98B758D40D8771DEDD16C6CCA990'O; var octetstring v_pt := 'D43342EB60491188733B357E215760044218E465DF4D284E54A02DF8331461590BA6BB4E402691414212DBBE3B9CB33E8AF5D0DBDAC698137C4BFD977B0512DBB02F4C183DDBD63FBB43F45AB028BB2725104694D302943CD4E2DED191D96A45B04B5D30F79025F45C9B9BAFA5007B1CB8A721C3FACB9F5A0C622FD2867332B4FDE4'O; var octetstring v_result := fx_decrypt_aes_128_ccm_test(v_k, v_n, v_pt); /*if (match(v_ct, v_result)) { setverdict(fail); } else { setverdict(pass); }*/ } testcase tc_test_encrypt_aes_128_gcm_test_1() runs on TCType system TCType { var octetstring v_k := 'E58D5C8F8C9ED9785679E08ABC7C8116'O; var octetstring v_n := 'A9F593C09EAEEA8BF0C1CF6A'O; var octetstring v_pt := '9169155B08B07674CBADF75FB46A7B0D'O; var octetstring v_ct := 'A6342013D623AD6C5F6882469673AE33'O; var octetstring v_result := fx_encrypt_aes_128_gcm_test(v_k, v_n, v_pt); if (match(v_ct, v_result)) { setverdict(pass); } else { setverdict(fail); } v_result := fx_encrypt_aes_128_gcm_test(v_k, v_n, v_result); if (match(v_pt, v_result)) { setverdict(pass); } else { setverdict(fail); } } /** * @desc Test ECIES encryption using NIST-P256 * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_test_encryptWithEciesNistp256WithSha256_1() runs on TCType system TCType { var Oct32 v_privateEphemeralKey := '1384C31D6982D52BCA3BED8A7E60F52FECDAB44E5C0EA166815A8159E09FFB42'O; var Oct32 v_publicEphemeralKeyX; var Oct32 v_publicEphemeralKeyY; var octetstring v_salt := 'A6B7B52554B4203F7E3ACFDB3A3ED8674EE086CE5906A7CAC2F8A398306D3BE9'O; var Oct32 v_recipientPrivateKey := '060E41440A4E35154CA0EFCB52412145836AD032833E6BC781E533BF14851085'O; var Oct32 v_recipientPublicKeyX := '8C5E20FE31935F6FA682A1F6D46E4468534FFEA1A698B14B0B12513EED8DEB11'O; var Oct32 v_recipientPublicKeyY := '1270FEC2427E6A154DFCAE3368584396C8251A04E2AE7D87B016FF65D22D6F9E'O; var octetstring v_cyphered_message; var octetstring v_decyphered_message; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Oct12 v_nonce; // Cypher text is the symetric encryption key v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('9169155B08B07674CBADF75FB46A7B0D'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); log("v_cyphered_message=", v_cyphered_message); if (v_publicEphemeralKeyX != 'F45A99137B1BB2C150D6D8CF7292CA07DA68C003DAA766A9AF7F67F5EE916828'O) { setverdict(fail, "Wrong public ephemeral key X"); } else if (v_publicEphemeralKeyY != 'F6A25216F44CB64A96C229AE00B479857B3B81C1319FB2ADF0E8DB2681769729'O) { setverdict(fail, "Wrong public ephemeral key Y"); } else if (v_encrypted_sym_key != 'A6342013D623AD6C5F6882469673AE33'O) { setverdict(fail, "Wrong encrypted key"); } else if (v_authentication_vector != '80e1d85d30f1bae4ecf1a534a89a0786'O) { setverdict(fail, "Wrong authentication vector"); } else { setverdict(pass, "Encryption succeed"); } v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key); log("v_decyphered_message=", v_decyphered_message); log("v_aes_sym_key = ", v_aes_sym_key); if ('9169155B08B07674CBADF75FB46A7B0D'O != v_decyphered_message) { setverdict(fail, "Failed to decrypt"); } else { setverdict(pass, "Decryption succeed"); } } // End of testcase tc_test_encryptWithEciesNistp256WithSha256_1 /** * @desc Test ECIES encryption using NIST-P256 * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_test_encryptWithEciesNistp256WithSha256_2() runs on TCType system TCType { var Oct32 v_privateEphemeralKey := 'D418760F0CB2DCB856BC3C7217AD3AA36DB6742AE1DB655A3D28DF88CBBF84E1'O; var Oct32 v_publicEphemeralKeyX; var Oct32 v_publicEphemeralKeyY; var octetstring v_salt := '9169155B08B07674CBADF75FB46A7B0D'O; var Oct32 v_recipientPrivateKey := '060E41440A4E35154CA0EFCB52412145836AD032833E6BC781E533BF14851085'O; var Oct32 v_recipientPublicKeyX := '8C5E20FE31935F6FA682A1F6D46E4468534FFEA1A698B14B0B12513EED8DEB11'O; var Oct32 v_recipientPublicKeyY := '1270FEC2427E6A154DFCAE3368584396C8251A04E2AE7D87B016FF65D22D6F9E'O; var octetstring v_cyphered_message; var octetstring v_decyphered_message; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Oct12 v_nonce; // Cypher text is the symetric encryption key v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('9169155B08B07674CBADF75FB46A7B0D'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); log("v_cyphered_message=", v_cyphered_message); if (v_publicEphemeralKeyX != 'EE9CC7FBD9EDECEA41F7C8BD258E8D2E988E75BD069ADDCA1E5A38E534AC6818'O) { setverdict(fail, "Wrong public ephemeral key X"); } else if (v_publicEphemeralKeyY != '5AE3C8D9FE0B1FC7438F29417C240F8BF81C358EC1A4D0C6E98D8EDBCC714017'O) { setverdict(fail, "Wrong public ephemeral key Y"); } else if (v_encrypted_sym_key != '87F98EB59319410C4662A36896050E8C'O) { setverdict(fail, "Wrong encrypted key"); } else if (v_authentication_vector != 'B172706220E6F234E857C153E87AA534'O) { setverdict(fail, "Wrong authentication vector"); } else { setverdict(pass); } v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key); log("v_decyphered_message=", v_decyphered_message); log("v_aes_sym_key = ", v_aes_sym_key); if ('9169155B08B07674CBADF75FB46A7B0D'O != v_decyphered_message) { setverdict(fail, "Failed to decrypt"); } else { setverdict(pass, "Decryption succeed"); } } // End of testcase tc_test_encryptWithEciesNistp256WithSha256_2 /** * @desc Test ECIES encryption using NIST-P256 * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_test_encryptWithEciesNistp256WithSha256_3() runs on TCType system TCType { var Oct32 v_privateEphemeralKey := '1384C31D6982D52BCA3BED8A7E60F52FECDAB44E5C0EA166815A8159E09FFB42'O; var Oct32 v_publicEphemeralKeyX; var Oct32 v_publicEphemeralKeyY; var octetstring v_salt := '05BED5F867B89F30FE5552DF414B65B9DD4073FC385D14921C641A145AA12051'O; // Wrong value in IEEE Std 1609.2-2017 var Oct32 v_recipientPrivateKey := 'DA5E1D853FCC5D0C162A245B9F29D38EB6059F0DB172FB7FDA6663B925E8C744'O; var Oct32 v_recipientPublicKeyX := '8008B06FC4C9F9856048DA186E7DC390963D6A424E80B274FB75D12188D7D73F'O; var Oct32 v_recipientPublicKeyY := '2774FB9600F27D7B3BBB2F7FCD8D2C96D4619EF9B4692C6A7C5733B5BAC8B27D'O; var octetstring v_cyphered_message; var octetstring v_decyphered_message; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Oct12 v_nonce; // Cypher text is the symetric encryption key v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('687E9757DEBFD87B0C267330C183C7B6'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); log("v_cyphered_message=", v_cyphered_message); if (v_publicEphemeralKeyX != 'F45A99137B1BB2C150D6D8CF7292CA07DA68C003DAA766A9AF7F67F5EE916828'O) { setverdict(fail, "Wrong public ephemeral key X"); } else if (v_publicEphemeralKeyY != 'F6A25216F44CB64A96C229AE00B479857B3B81C1319FB2ADF0E8DB2681769729'O) { setverdict(fail, "Wrong public ephemeral key Y"); } else if (v_encrypted_sym_key != '1F6346EDAEAF57561FC9604FEBEFF44E'O) { setverdict(fail, "Wrong encrypted key"); } else if (v_authentication_vector != '373c0fa7c52a0798ec36eadfe387c3ef'O) { setverdict(fail, "Wrong authentication vector"); } else { setverdict(pass); } v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key); log("v_decyphered_message=", v_decyphered_message); log("v_aes_sym_key = ", v_aes_sym_key); if ('687E9757DEBFD87B0C267330C183C7B6'O != v_decyphered_message) { setverdict(fail, "Failed to decrypt"); } else { setverdict(pass, "Decryption succeed"); } } // End of testcase tc_test_encryptWithEciesNistp256WithSha256_3 /** * @desc Test ECIES encryption using NIST-P256 * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_test_encryptWithEciesNistp256WithSha256_4() runs on TCType system TCType { var Oct32 v_privateEphemeralKey := '4624A6F9F6BC6BD088A71ED97B3AEE983B5CC2F574F64E96A531D2464137049F'O; var Oct32 v_publicEphemeralKeyX; var Oct32 v_publicEphemeralKeyY; var octetstring v_salt := '05BED5F867B89F30FE5552DF414B65B9DD4073FC385D14921C641A145AA12051'O; // Wrong value in IEEE Std 1609.2-2017 var Oct32 v_recipientPrivateKey := 'DA5E1D853FCC5D0C162A245B9F29D38EB6059F0DB172FB7FDA6663B925E8C744'O; var Oct32 v_recipientPublicKeyX := '8008B06FC4C9F9856048DA186E7DC390963D6A424E80B274FB75D12188D7D73F'O; var Oct32 v_recipientPublicKeyY := '2774FB9600F27D7B3BBB2F7FCD8D2C96D4619EF9B4692C6A7C5733B5BAC8B27D'O; var octetstring v_cyphered_message; var octetstring v_decyphered_message; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Oct12 v_nonce; // Cypher text is the symetric encryption key v_cyphered_message := fx_test_encryptWithEciesNistp256WithSha256('687E9757DEBFD87B0C267330C183C7B6'O, v_privateEphemeralKey, v_recipientPublicKeyX, v_recipientPublicKeyY, v_salt, v_publicEphemeralKeyX, v_publicEphemeralKeyY, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); log("v_cyphered_message=", v_cyphered_message); if (v_publicEphemeralKeyX != '121AA495C6B2C07A2B2DAEC36BD207D6620D7E6081050DF5DE3E9696868FCDCA'O) { setverdict(fail, "Wrong public ephemeral key X"); } else if (v_publicEphemeralKeyY != '46C31A1ABEA0BDDAAAAEFBBA3AFDBFF1AC8D196BC313FC130926810C05503950'O) { setverdict(fail, "Wrong public ephemeral key Y"); } else if (v_encrypted_sym_key != '6CFD13B76436CD0DB70244FAE380CBA1'O) { setverdict(fail, "Wrong encrypted key"); } else if (v_authentication_vector != 'c8bf18ac796b0b1d3a1256d3a91676c8'O) { setverdict(fail, "Wrong authentication vector"); } else { setverdict(pass); } v_decyphered_message := fx_decryptWithEciesNistp256WithSha256(v_cyphered_message, v_recipientPrivateKey, v_publicEphemeralKeyX, 1, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_aes_sym_key); log("v_decyphered_message=", v_decyphered_message); log("v_aes_sym_key = ", v_aes_sym_key); if ('687E9757DEBFD87B0C267330C183C7B6'O != v_decyphered_message) { setverdict(fail, "Failed to decrypt"); } else { setverdict(pass, "Decryption succeed"); } } // End of testcase tc_test_encryptWithEciesNistp256WithSha256_4 /** * @desc Test ECIES encryption using NIST-P256 * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_encrypted_signed_message_1() runs on TCType system TCType { var template (value) EtsiTs103097Data v_signed_data; var EtsiTs103097Data v_signed_data_dec; var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O; var HashedId8 v_digest := '0000000000000000'O; var template (value) EtsiTs103097Data v_encrypted_data; var EtsiTs103097Data v_encrypted_data_dec; var bitstring v_encMsg; var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY; var Oct32 v_obuPublicKeyCompressed; var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY; var Oct32 v_tsPublicKeyCompressed; var Oct32 v_publicEphemeralKeyCompressed; var integer v_ephemeralKeyModeCompressed; var integer v_obuCompressedMode; var integer v_tsCompressedMode; var EccP256CurvePoint v_eccPoint; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Opaque v_cypheredPayload; var Oct12 v_nonce; var HashedId8 v_recipientId; // Simulate OCU & Test System certificate, OBU and Test system exchange their public key f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode); f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode); // The OBU is the sender, the Test System is te receiver v_signed_data := m_etsiTs103097Data_signed( m_signedData( sha256, m_toBeSignedData( m_signedDataPayload( m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed) ), m_headerInfo_gn( -, 12345 ) ), { digest := v_digest }, m_signature_ecdsaNistP256( m_ecdsaP256Signature( m_eccP256CurvePoint_x_only( '08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O ), '2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O ) ) ) ); log("v_signed_data = ", v_signed_data); v_encMsg := encvalue(valueof(v_signed_data)); v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo // Fill Certificate template with the public compressed keys (canonical form) if (v_ephemeralKeyModeCompressed == 0) { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed)); } else { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed)); } v_encrypted_data := m_etsiTs103097Data_encrypted( m_encryptedData( { m_recipientInfo_signedDataRecipInfo( m_pKRecipientInfo( v_recipientId, m_encryptedDataEncryptionKey_eciesNistP256( m_evciesP256EncryptedKey( v_eccPoint, v_encrypted_sym_key, v_authentication_vector )))) }, m_SymmetricCiphertext_aes128ccm( m_aesCcmCiphertext( v_nonce, v_cypheredPayload ) ) ) ); log("v_encrypted_data = ", v_encrypted_data); v_encMsg := encvalue(valueof(v_encrypted_data)); setverdict(pass, "Encoding passed."); if (decvalue(v_encMsg, v_encrypted_data_dec) != 0) { setverdict(fail, "decvalue failed"); stop; } else if (not(match(valueof(v_encrypted_data), v_encrypted_data_dec))) { setverdict(fail, "Encode/decode mismatch"); stop; } setverdict(pass, "Decoding passed."); } // End of testcase tc_encrypted_signed_message_1 /** * @desc Test ECIES encryption/decryption using NIST-P256 * The OBU is the sender, the Test System is te receiver * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_decrypted_signed_message_1() runs on TCType system TCType { var template (value) EtsiTs103097Data v_signed_data; var EtsiTs103097Data v_signed_data_dec; var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O; var HashedId8 v_digest := '0000000000000000'O; var template (value) EtsiTs103097Data v_encrypted_data; var EtsiTs103097Data v_decrypted_data; var bitstring v_encMsg; var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY; var Oct32 v_obuPublicKeyCompressed; var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY; var Oct32 v_tsPublicKeyCompressed; var Oct32 v_publicEphemeralKeyCompressed; var integer v_ephemeralKeyModeCompressed; var integer v_obuCompressedMode; var integer v_tsCompressedMode; var EccP256CurvePoint v_eccPoint; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Opaque v_cypheredPayload; var Oct12 v_nonce; var HashedId8 v_recipientId; // Simulate OCU & Test System certificate, OBU and Test system exchange their public key f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode); f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode); // The OBU is the sender, the Test System is te receiver v_signed_data := m_etsiTs103097Data_signed( m_signedData( sha256, m_toBeSignedData( m_signedDataPayload( m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed) ), m_headerInfo_gn( -, 12345 ) ), { digest := v_digest }, m_signature_ecdsaNistP256( m_ecdsaP256Signature( m_eccP256CurvePoint_x_only( '08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O ), '2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O ) ) ) ); log("v_signed_data = ", v_signed_data); v_encMsg := encvalue(valueof(v_signed_data)); v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo // Fill Certificate template with the public compressed keys (canonical form) if (v_ephemeralKeyModeCompressed == 0) { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed)); } else { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed)); } v_encrypted_data := m_etsiTs103097Data_encrypted( m_encryptedData( { m_recipientInfo_signedDataRecipInfo( m_pKRecipientInfo( v_recipientId, m_encryptedDataEncryptionKey_eciesNistP256( m_evciesP256EncryptedKey( v_eccPoint, v_encrypted_sym_key, v_authentication_vector )))) }, m_SymmetricCiphertext_aes128ccm( m_aesCcmCiphertext( v_nonce, v_cypheredPayload ) ) ) ); log("v_encrypted_data = ", v_encrypted_data); if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) { setverdict(fail, "f_decrypt failed"); } else { log("v_decrypted_data = ", v_decrypted_data); if (not(match(valueof(v_signed_data), v_decrypted_data))) { setverdict(fail, "Encode/decode mismatch"); } setverdict(pass, "Full encryption/decryption passed."); } } // End of testcase tc_decrypted_signed_message_1 /** * @desc Test ECIES encryption/decryption using NIST-P256 * The OBU is the sender, the Test System is te receiver * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_decrypted_signed_message_2() runs on TCType system TCType { var template (value) EtsiTs103097Data v_signed_data; var EtsiTs103097Data v_signed_data_dec; var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O; var HashedId8 v_digest := '0000000000000000'O; var template (value) EtsiTs103097Data v_encrypted_data; var EtsiTs103097Data v_decrypted_data; var bitstring v_encMsg; var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY; var Oct32 v_obuPublicKeyCompressed; var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY; var Oct32 v_tsPublicKeyCompressed; var Oct32 v_publicEphemeralKeyCompressed; var integer v_ephemeralKeyModeCompressed; var integer v_obuCompressedMode; var integer v_tsCompressedMode; var EccP256CurvePoint v_eccPoint; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Opaque v_cypheredPayload; var Oct12 v_nonce; var HashedId8 v_recipientId; // Simulate OCU & Test System certificate, OBU and Test system exchange their public key f_generate_key_pair_nistp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode); f_generate_key_pair_nistp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode); // The OBU is the sender, the Test System is te receiver v_signed_data := m_etsiTs103097Data_signed( m_signedData( sha256, m_toBeSignedData( m_signedDataPayload( m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed) ), m_headerInfo_gn( -, 12345 ) ), { digest := v_digest }, m_signature_ecdsaNistP256( m_ecdsaP256Signature( m_eccP256CurvePoint_x_only( '08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O ), '2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O ) ) ) ); log("v_signed_data = ", v_signed_data); v_encMsg := encvalue(valueof(v_signed_data)); v_cypheredPayload := f_encryptWithEciesNistp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo // Fill Certificate template with the public compressed keys (canonical form) if (v_ephemeralKeyModeCompressed == 0) { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed)); } else { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed)); } v_encrypted_data := m_etsiTs103097Data_encrypted( m_encryptedData( { m_recipientInfo_signedDataRecipInfo( m_pKRecipientInfo( v_recipientId, m_encryptedDataEncryptionKey_eciesNistP256( m_evciesP256EncryptedKey( v_eccPoint, v_encrypted_sym_key, v_authentication_vector )))) }, m_SymmetricCiphertext_aes128ccm( m_aesCcmCiphertext( v_nonce, v_cypheredPayload ) ) ) ); log("v_encrypted_data = ", v_encrypted_data); if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) { setverdict(fail, "f_decrypt failed"); stop; } log("v_decrypted_data = ", v_decrypted_data); if (not(match(valueof(v_signed_data), v_decrypted_data))) { setverdict(fail, "Encode/decode mismatch"); stop; } setverdict(pass, "Full encryption/decryption passed."); } // End of testcase tc_decrypted_signed_message_2 /** * @desc Test ECIES encryption/decryption using BRAINPOOL-P256 * The OBU is the sender, the Test System is te receiver * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_decrypted_signed_message_3() runs on TCType system TCType { var template (value) EtsiTs103097Data v_signed_data; var EtsiTs103097Data v_signed_data_dec; var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O; var HashedId8 v_digest := '0000000000000000'O; var template (value) EtsiTs103097Data v_encrypted_data; var EtsiTs103097Data v_decrypted_data; var bitstring v_encMsg; var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY; var Oct32 v_obuPublicKeyCompressed; var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY; var Oct32 v_tsPublicKeyCompressed; var Oct32 v_publicEphemeralKeyCompressed; var integer v_ephemeralKeyModeCompressed; var integer v_obuCompressedMode; var integer v_tsCompressedMode; var EccP256CurvePoint v_eccPoint; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Opaque v_cypheredPayload; var Oct12 v_nonce; var HashedId8 v_recipientId; // Simulate OCU & Test System certificate, OBU and Test system exchange their public key f_generate_key_pair_brainpoolp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode); f_generate_key_pair_brainpoolp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode); // The OBU is the sender, the Test System is te receiver v_signed_data := m_etsiTs103097Data_signed( m_signedData( sha256, m_toBeSignedData( m_signedDataPayload( m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed) ), m_headerInfo_gn( -, 12345 ) ), { digest := v_digest }, m_signature_ecdsaBrainpoolP256r1( m_ecdsaP256Signature( m_eccP256CurvePoint_x_only( '08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O ), '2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O ) ) ) ); log("v_signed_data = ", v_signed_data); v_encMsg := encvalue(valueof(v_signed_data)); v_cypheredPayload := f_encryptWithEciesBrainpoolp256WithSha256(bit2oct(v_encMsg), v_tsPublicKeyCompressed, v_tsCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo // Fill Certificate template with the public compressed keys (canonical form) if (v_ephemeralKeyModeCompressed == 0) { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed)); } else { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed)); } v_encrypted_data := m_etsiTs103097Data_encrypted( m_encryptedData( { m_recipientInfo_signedDataRecipInfo( m_pKRecipientInfo( v_recipientId, m_encryptedDataEncryptionKey_eciesBrainpoolP256r1( m_evciesP256EncryptedKey( v_eccPoint, v_encrypted_sym_key, v_authentication_vector )))) }, m_SymmetricCiphertext_aes128ccm( m_aesCcmCiphertext( v_nonce, v_cypheredPayload ) ) ) ); log("v_encrypted_data = ", v_encrypted_data); if (f_decrypt(v_tsPrivateKey, valueof(v_encrypted_data), ''O, v_decrypted_data, v_aes_sym_key) == false) { setverdict(fail, "f_decrypt failed"); } else { log("v_decrypted_data = ", v_decrypted_data); if (not(match(valueof(v_signed_data), v_decrypted_data))) { setverdict(fail, "Encode/decode mismatch"); } setverdict(pass, "Full encryption/decryption passed."); } } // End of testcase tc_decrypted_signed_message_3 /** * @desc Test ECIES encryption/decryption using BRAINPOOL-P256 * The Test System is the sender, the OBU is te receiver * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_decrypted_signed_message_4() runs on TCType system TCType { var template (value) EtsiTs103097Data v_signed_data; var EtsiTs103097Data v_signed_data_dec; var octetstring v_raw_payload_to_be_signed := 'CAFFEDECA0000001'O; var octetstring v_decrypted_data; var HashedId8 v_digest := '0000000000000000'O; var template (value) EtsiTs103097Data v_encrypted_data; var bitstring v_encMsg; var Oct32 v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY; var Oct32 v_obuPublicKeyCompressed; var Oct32 v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY; var Oct32 v_tsPublicKeyCompressed; var Oct32 v_publicEphemeralKeyCompressed; var integer v_ephemeralKeyModeCompressed; var integer v_obuCompressedMode; var integer v_tsCompressedMode; var EccP256CurvePoint v_eccPoint; var Oct16 v_authentication_vector; var Oct16 v_aes_sym_key; var Oct16 v_encrypted_sym_key; var Opaque v_cypheredPayload; var Oct12 v_nonce; var HashedId8 v_recipientId; // Simulate OCU & Test System certificate, OBU and Test system exchange their public key f_generate_key_pair_brainpoolp256(v_obuPrivateKey, v_obuPublicKeyX, v_obuPublicKeyY, v_obuPublicKeyCompressed, v_obuCompressedMode); f_generate_key_pair_brainpoolp256(v_tsPrivateKey, v_tsPublicKeyX, v_tsPublicKeyY, v_tsPublicKeyCompressed, v_tsCompressedMode); // The OBU is the sender, the Test System is te receiver v_signed_data := m_etsiTs103097Data_signed( m_signedData( sha256, m_toBeSignedData( m_signedDataPayload( m_etsiTs103097Data_unsecured(v_raw_payload_to_be_signed) ), m_headerInfo_gn( -, 12345 ) ), { digest := v_digest }, m_signature_ecdsaBrainpoolP256r1( m_ecdsaP256Signature( m_eccP256CurvePoint_x_only( '08B2030104020A0D010C0105C0F80BB1460239348D17405C1A845151D4061200'O ), '2617CF4E6B25097F03F502AD0C6F2F125974700D31A60FD1EF12040E4D8231AB'O ) ) ) ); log("v_signed_data = ", v_signed_data); v_encMsg := encvalue(valueof(v_signed_data)); v_cypheredPayload := f_encryptWithEciesBrainpoolp256WithSha256(bit2oct(v_encMsg), v_obuPublicKeyCompressed, v_obuCompressedMode, ''O, v_publicEphemeralKeyCompressed, v_ephemeralKeyModeCompressed, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce); v_recipientId := f_HashedId8FromSha256(f_hashWithSha256(bit2oct(v_encMsg))); // IEEE Std 1609.2a-2017 Clause 6.3.34 PKRecipientInfo // Fill Certificate template with the public compressed keys (canonical form) if (v_ephemeralKeyModeCompressed == 0) { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicEphemeralKeyCompressed)); } else { v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicEphemeralKeyCompressed)); } v_encrypted_data := m_etsiTs103097Data_encrypted( m_encryptedData( { m_recipientInfo_signedDataRecipInfo( m_pKRecipientInfo( v_recipientId, m_encryptedDataEncryptionKey_eciesBrainpoolP256r1( m_evciesP256EncryptedKey( v_eccPoint, v_encrypted_sym_key, v_authentication_vector )))) }, m_SymmetricCiphertext_aes128ccm( m_aesCcmCiphertext( v_nonce, v_cypheredPayload ) ) ) ); log("v_encrypted_data = ", v_encrypted_data); v_decrypted_data := ''O; /* FIXME v_decrypted_data := f_decryptWithEciesBrainpoolp256WithSha256( valueof(v_encrypted_data.content.encryptedData.ciphertext.aes128ccm.ccmCiphertext), // The encrypted message v_obuPrivateKey, valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.v.uncompressedP256.x), // The public ephemeral key X-coordinate valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.v.uncompressedP256.y), // The public ephemeral key Y-coordinate valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.c), // The encrypted symmetric key valueof(v_encrypted_data.content.encryptedData.recipients[0].signedDataRecipInfo.encKey.eciesBrainpoolP256r1.t), // The encrypted symmetric key tag valueof(v_encrypted_data.content.encryptedData.ciphertext.aes128ccm.nonce) // The AES 128 nonce );*/ v_encMsg := oct2bit(v_decrypted_data); if (decvalue(v_encMsg, v_signed_data_dec) != 0) { setverdict(fail, "decvalue failed"); stop; } else { log("v_decrypted_data = ", v_signed_data_dec); if (not(match(valueof(v_signed_data), v_signed_data_dec))) { setverdict(fail, "Encode/decode mismatch"); stop; } } setverdict(pass, "Full encryption/decryption passed."); } // End of testcase tc_decrypted_signed_message_4 /** * @desc Test ECIES encryption/decryption using BRAINPOOL-P256 * The Test System is the sender, the OBU is te receiver * @see IEEE Std 1609.2-2017 Clause 5.3.5 Public key encryption algorithms: ECIES * @see https://www.nominet.uk/researchblog/how-elliptic-curve-cryptography-encryption-works/ * @see http://digital.csic.es/bitstream/10261/32671/1/V2-I2-P7-13.pdf * @return The encrypted message */ testcase tc_decrypted_signed_message_5() runs on TCType system TCType { var Oct32 v_private_key := '7FC25917421ED1F5BDA9A19FB662C2801B3C126D977BC1717545E6FB4C303587'O; var Oct32 v_salt := '10D0B6BE032CE2815E78C5E15CD21F7E75DAA0025C28C06DE6A53B7EFCB18E58'O var EtsiTs103097Data v_encrypted_data; var EtsiTs103097Data v_decrypted_data; var Oct16 v_aes_sym_key; v_encrypted_data := { protocolVersion := 3, content := { encryptedData := { recipients := { { certRecipInfo := { recipientId := 'E6A53B7EFCB18E58'O, encKey := { eciesNistP256 := { v := { compressed_y_0 := '6C4A478103B55EEAA083FAC22F5F3BE36F1CE2C9B3E22D44F2E020CB58AA6EA0'O }, c := 'CC97274B6A28691E714B60CC4EE319ED'O, t := 'A47EF47E799E3903CBF6499C0AD768C2'O } } } } }, ciphertext := { aes128ccm := { nonce := 'F6EA838CB04E43F87E9DE6F5'O, ccmCiphertext := 'F32E3C0E9A041651F2BE28F0A8C5F98A42BAE54CD0A41B055ED9106B45A072550B6AB58569DCE262AD71CC7286CAFDEC58F7EEC28DB1062C306894FADADC2491BBFC629D7E92EA53F617D0503199543ECDD85A1ADFA0F37D1086C643DCA2A5D5F16EC6333889F16B1EEE6EDCCEEBBEDB2D6ECF1425FA4769AA92E6400867B3F82ECBAEB736ED994571CD8B6F1E339C6442763F83386BFA8A9CE9A3A6EDC1E2C8B07D92DC4E2D8DECD87836FE154440AB68BC593F2FB5459B8FCA936571D04D87195840C0DDAB63FEA99CEB81C1AA8892B46017416B744A0DF701C1B2CC32FAD6636272B03C85AA400EFD55A1B56EB0F4A4D79746B646A94ABBAA0A978BE14FBA0BD8C27638CBFD974841D02BFE5EF6152FA115B5B9ABD55CF4A3B1FBE4AC13E5B697AA'O } } } } }; if (f_decrypt(v_private_key, v_encrypted_data, v_salt, v_decrypted_data, v_aes_sym_key) == false) { setverdict(fail, "f_decrypt failed"); } else { log("v_decrypted_data = ", v_decrypted_data); log("v_aes_sym_key = ", v_aes_sym_key); setverdict(pass, "Full encryption/decryption passed."); } } // End of testcase tc_decrypted_signed_message_5 control { execute(tc_test_hmac_sha256_test1()); execute(tc_test_hmac_sha256_test2()); execute(tc_test_hmac_sha256_test3()); execute(tc_test_hmac_sha256_test4()); execute(tc_test_encrypt_aes_128_ccm_test_1()); execute(tc_test_encrypt_aes_128_ccm_test_2()); execute(tc_test_encrypt_aes_128_ccm_test_3()); execute(tc_test_encrypt_aes_128_gcm_test_1()); execute(tc_test_encryptWithEciesNistp256WithSha256_1()); execute(tc_test_encryptWithEciesNistp256WithSha256_2()); execute(tc_test_encryptWithEciesNistp256WithSha256_3()); execute(tc_test_encryptWithEciesNistp256WithSha256_4()); execute(tc_encrypted_signed_message_1()); execute(tc_decrypted_signed_message_2()); execute(tc_decrypted_signed_message_3()); execute(tc_decrypted_signed_message_4()); execute(tc_decrypted_signed_message_5()); } } // End of module TestCodec_SignedAndEncryptedMessages