Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 1 | Test vectors |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 2 | ============ |
| 3 | |
| 4 | Testing the correctness of the primitives implemented in each ``cryptography`` |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 5 | backend requires trusted test vectors. Where possible these vectors are |
| 6 | obtained from official sources such as `NIST`_ or `IETF`_ RFCs. When this is |
| 7 | not possible ``cryptography`` has chosen to create a set of custom vectors |
| 8 | using an official vector file as input to verify consistency between |
| 9 | implemented backends. |
| 10 | |
| 11 | Vectors are kept in the `cryptography_vectors` package rather than within our |
| 12 | main test suite. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 13 | |
| 14 | Sources |
| 15 | ------- |
| 16 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 17 | Asymmetric ciphers |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 18 | ~~~~~~~~~~~~~~~~~~ |
| 19 | |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 20 | * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/ |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 21 | and ftp://ftp.rsa.com/pub/rsalabs/tmp/). |
Paul Kehrer | 7f0039c | 2014-03-03 22:32:11 -0400 | [diff] [blame] | 22 | * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_. |
Alex Stapleton | 07c6a39 | 2014-04-02 11:05:30 +0100 | [diff] [blame] | 23 | * FIPS 186-2 and FIPS 186-3 DSA test vectors from `NIST CAVP`_. |
| 24 | * FIPS 186-2 and FIPS 186-3 ECDSA test vectors from `NIST CAVP`_. |
Alex Stapleton | 23fef0a | 2014-07-13 13:57:24 +0100 | [diff] [blame] | 25 | * DH and ECDH test vectors from `NIST CAVP`_. |
Alex Stapleton | 833a8ea | 2014-04-02 14:50:56 +0100 | [diff] [blame] | 26 | * Ed25519 test vectors from the `Ed25519 website_`. |
Alex Stapleton | e7da0ab | 2014-03-02 14:04:33 +0000 | [diff] [blame] | 27 | * OpenSSL PEM RSA serialization vectors from the `OpenSSL example key`_ and |
| 28 | `GnuTLS key parsing tests`_. |
| 29 | * OpenSSL PEM DSA serialization vectors from the `GnuTLS example keys`_. |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 30 | * PKCS #8 PEM serialization vectors from |
| 31 | |
michael-hart | 59f7219 | 2014-09-24 11:31:20 +0100 | [diff] [blame^] | 32 | * GnuTLS: `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_, `unenc-rsa-pkcs8.pem`_, |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 33 | `pkcs12_s2k_pem.c`_. |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 34 | * `Botan's ECC private keys`_. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 35 | |
| 36 | Hashes |
| 37 | ~~~~~~ |
| 38 | |
| 39 | * MD5 from :rfc:`1321`. |
| 40 | * RIPEMD160 from the `RIPEMD website`_. |
| 41 | * SHA1 from `NIST CAVP`_. |
| 42 | * SHA2 (224, 256, 384, 512) from `NIST CAVP`_. |
| 43 | * Whirlpool from the `Whirlpool website`_. |
| 44 | |
| 45 | HMAC |
| 46 | ~~~~ |
| 47 | |
| 48 | * HMAC-MD5 from :rfc:`2202`. |
| 49 | * HMAC-SHA1 from :rfc:`2202`. |
| 50 | * HMAC-RIPEMD160 from :rfc:`2286`. |
| 51 | * HMAC-SHA2 (224, 256, 384, 512) from :rfc:`4231`. |
| 52 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 53 | Key derivation functions |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 54 | ~~~~~~~~~~~~~~~~~~~~~~~~ |
| 55 | |
| 56 | * HKDF (SHA1, SHA256) from :rfc:`5869`. |
| 57 | * PBKDF2 (HMAC-SHA1) from :rfc:`6070`. |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 58 | * scrypt from the `draft RFC`_. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 59 | |
| 60 | Recipes |
| 61 | ~~~~~~~ |
| 62 | |
| 63 | * Fernet from its `specification repository`_. |
| 64 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 65 | Symmetric ciphers |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 66 | ~~~~~~~~~~~~~~~~~ |
| 67 | |
Paul Kehrer | e547d8f | 2014-02-15 21:37:52 -0600 | [diff] [blame] | 68 | * AES (CBC, CFB, ECB, GCM, OFB) from `NIST CAVP`_. |
| 69 | * AES CTR from :rfc:`3686`. |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 70 | * 3DES (CBC, CFB, ECB, OFB) from `NIST CAVP`_. |
| 71 | * ARC4 from :rfc:`6229`. |
| 72 | * Blowfish (CBC, CFB, ECB, OFB) from `Bruce Schneier's vectors`_. |
| 73 | * Camellia (ECB) from NTT's `Camellia page`_ as linked by `CRYPTREC`_. |
| 74 | * Camellia (CBC, CFB, OFB) from `OpenSSL's test vectors`_. |
| 75 | * CAST5 (ECB) from :rfc:`2144`. |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 76 | * CAST5 (CBC, CFB, OFB) generated by this project. |
| 77 | See: :doc:`/development/custom-vectors/cast5` |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 78 | * IDEA (ECB) from the `NESSIE IDEA vectors`_ created by `NESSIE`_. |
| 79 | * IDEA (CBC, CFB, OFB) generated by this project. |
| 80 | See: :doc:`/development/custom-vectors/idea` |
Paul Kehrer | 1d0f973 | 2014-04-08 08:44:25 -0500 | [diff] [blame] | 81 | * SEED (ECB) from :rfc:`4269`. |
Paul Kehrer | f0e12ac | 2014-04-08 08:59:40 -0500 | [diff] [blame] | 82 | * SEED (CBC) from :rfc:`4196`. |
Paul Kehrer | 6d8f9b0 | 2014-04-08 09:17:02 -0500 | [diff] [blame] | 83 | * SEED (CFB, OFB) generated by this project. |
| 84 | See: :doc:`/development/custom-vectors/seed` |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 85 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 86 | Two factor authentication |
Ayrx | 933dd68 | 2014-02-18 23:26:11 +0800 | [diff] [blame] | 87 | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 88 | |
| 89 | * HOTP from :rfc:`4226` |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 90 | * TOTP from :rfc:`6238` (Note that an `errata`_ for the test vectors in RFC |
| 91 | 6238 exists) |
Ayrx | 933dd68 | 2014-02-18 23:26:11 +0800 | [diff] [blame] | 92 | |
Ayrx | 1d6b77b | 2014-04-10 23:11:03 +0800 | [diff] [blame] | 93 | CMAC |
| 94 | ~~~~ |
| 95 | |
Ayrx | fa52e6a | 2014-04-14 22:26:21 +0800 | [diff] [blame] | 96 | * AES-128, AES-192, AES-256, 3DES from `NIST SP-800-38B`_ |
Ayrx | 1d6b77b | 2014-04-10 23:11:03 +0800 | [diff] [blame] | 97 | |
Alex Stapleton | c5fffd3 | 2014-03-18 15:29:00 +0000 | [diff] [blame] | 98 | Creating test vectors |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 99 | --------------------- |
| 100 | |
| 101 | When official vectors are unavailable ``cryptography`` may choose to build |
michael-hart | 59f7219 | 2014-09-24 11:31:20 +0100 | [diff] [blame^] | 102 | its own using existing vectors as source material. |
| 103 | |
| 104 | Current custom vectors |
| 105 | ~~~~~~~~~~~~~~~~~~~~~~ |
| 106 | |
| 107 | * ec_private_key.pem - Contains an Elliptic Curve key generated by OpenSSL |
| 108 | from the curve secp256r1. |
| 109 | * ec_private_key_encrypted.pem - Contains the same Elliptic Curve key as |
| 110 | ec_private_key.pem, except that it is encrypted with AES-256 with the |
| 111 | password "123456". |
| 112 | * ec_public_key.pem - Contains the public key corresponding to |
| 113 | ec_private_key.pem, generated using OpenSSL. |
| 114 | * rsa_private_key.pem - Contains an RSA 2048 bit key generated using |
| 115 | OpenSSL, protected by the secret "123456" with DES3 encryption. |
| 116 | * rsa_public_key.pem - Contains an RSA 2048 bit public generated using |
| 117 | OpenSSL from rsa_private_key.pem. |
| 118 | * dsaparam.pem - Contains 2048-bit DSA parameters generated using OpenSSL; |
| 119 | contains no keys. |
| 120 | * dsa_private_key.pem - Contains a DSA 2048 bit key generated using |
| 121 | OpenSSL from the parameters in dsaparam.pem, protected by the secret |
| 122 | "123456" with DES3 encryption. |
| 123 | * dsa_public_key.pem - Contains a DSA 2048 bit key generated using OpenSSL |
| 124 | from dsa_private_key.pem. |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 125 | |
| 126 | .. toctree:: |
| 127 | :maxdepth: 1 |
| 128 | |
| 129 | custom-vectors/cast5 |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 130 | custom-vectors/idea |
Paul Kehrer | 6d8f9b0 | 2014-04-08 09:17:02 -0500 | [diff] [blame] | 131 | custom-vectors/seed |
Paul Kehrer | cf6ffb5 | 2014-02-12 16:17:04 -0600 | [diff] [blame] | 132 | |
| 133 | If official test vectors appear in the future the custom generated vectors |
| 134 | should be discarded. |
| 135 | |
| 136 | Any vectors generated by this method must also be prefixed with the following |
| 137 | header format (substituting the correct information): |
| 138 | |
| 139 | .. code-block:: python |
| 140 | |
| 141 | # CAST5 CBC vectors built for https://github.com/pyca/cryptography |
| 142 | # Derived from the AESVS MMT test data for CBC |
| 143 | # Verified against the CommonCrypto and Go crypto packages |
| 144 | # Key Length : 128 |
| 145 | |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 146 | .. _`NIST`: http://www.nist.gov/ |
| 147 | .. _`IETF`: https://www.ietf.org/ |
| 148 | .. _`NIST CAVP`: http://csrc.nist.gov/groups/STM/cavp/ |
| 149 | .. _`Bruce Schneier's vectors`: https://www.schneier.com/code/vectors.txt |
| 150 | .. _`Camellia page`: http://info.isl.ntt.co.jp/crypt/eng/camellia/ |
| 151 | .. _`CRYPTREC`: http://www.cryptrec.go.jp |
| 152 | .. _`OpenSSL's test vectors`: https://github.com/openssl/openssl/blob/97cf1f6c2854a3a955fd7dd3a1f113deba00c9ef/crypto/evp/evptests.txt#L232 |
| 153 | .. _`RIPEMD website`: http://homes.esat.kuleuven.be/~bosselae/ripemd160.html |
| 154 | .. _`Whirlpool website`: http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html |
Alex Gaynor | 75e72ea | 2014-03-01 12:18:27 -0800 | [diff] [blame] | 155 | .. _`draft RFC`: https://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01 |
Paul Kehrer | 1681a69 | 2014-02-11 23:43:51 -0600 | [diff] [blame] | 156 | .. _`Specification repository`: https://github.com/fernet/spec |
Ayrx | 933dd68 | 2014-02-18 23:26:11 +0800 | [diff] [blame] | 157 | .. _`errata`: http://www.rfc-editor.org/errata_search.php?rfc=6238 |
Alex Stapleton | e7da0ab | 2014-03-02 14:04:33 +0000 | [diff] [blame] | 158 | .. _`OpenSSL example key`: http://git.openssl.org/gitweb/?p=openssl.git;a=blob;f=test/testrsa.pem;h=aad21067a8f7cb93a52a511eb9162fd83be39135;hb=66e8211c0b1347970096e04b18aa52567c325200 |
| 159 | .. _`GnuTLS key parsing tests`: https://gitorious.org/gnutls/gnutls/commit/f16ef39ef0303b02d7fa590a37820440c466ce8d |
michael-hart | 59f7219 | 2014-09-24 11:31:20 +0100 | [diff] [blame^] | 160 | .. _`enc-rsa-pkcs8.pem`: https://gitorious.org/gnutls/gnutls/source/f8d943b38bf74eaaa11d396112daf43cb8aa82ae:tests/pkcs8-decode/encpkcs8.pem |
| 161 | .. _`enc2-rsa-pkcs8.pem`: https://gitorious.org/gnutls/gnutls/source/f8d943b38bf74eaaa11d396112daf43cb8aa82ae:tests/pkcs8-decode/enc2pkcs8.pem |
| 162 | .. _`unenc-rsa-pkcs8.pem`: https://gitorious.org/gnutls/gnutls/source/f8d943b38bf74eaaa11d396112daf43cb8aa82ae:tests/pkcs8-decode/unencpkcs8.pem |
Alex Stapleton | abec8a1 | 2014-02-22 16:33:24 +0000 | [diff] [blame] | 163 | .. _`pkcs12_s2k_pem.c`: https://gitorious.org/gnutls/gnutls/source/f8d943b38bf74eaaa11d396112daf43cb8aa82ae:tests/pkcs12_s2k_pem.c |
| 164 | .. _`Botan's ECC private keys`: https://github.com/randombit/botan/tree/4917f26a2b154e841cd27c1bcecdd41d2bdeb6ce/src/tests/data/ecc |
Alex Stapleton | e7da0ab | 2014-03-02 14:04:33 +0000 | [diff] [blame] | 165 | .. _`GnuTLS example keys`: https://gitorious.org/gnutls/gnutls/commit/ad2061deafdd7db78fd405f9d143b0a7c579da7b |
Paul Kehrer | b09622c | 2014-02-16 19:32:04 -0600 | [diff] [blame] | 166 | .. _`NESSIE IDEA vectors`: https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/idea/Idea-128-64.verified.test-vectors |
| 167 | .. _`NESSIE`: https://en.wikipedia.org/wiki/NESSIE |
Alex Stapleton | 833a8ea | 2014-04-02 14:50:56 +0100 | [diff] [blame] | 168 | .. _`Ed25519 website`: http://ed25519.cr.yp.to/software.html |
Ayrx | 40afce0 | 2014-04-13 19:17:52 +0800 | [diff] [blame] | 169 | .. _`NIST SP-800-38B`: http://csrc.nist.gov/publications/nistpubs/800-38B/Updated_CMAC_Examples.pdf |