dsatest.java

来自「内容:基于jdk1.4的加密算法的具体实现」· Java 代码 · 共 551 行 · 第 1/2 页

JAVA
551
字号
package org.bouncycastle.jce.provider.test;import java.io.ByteArrayInputStream;import java.io.IOException;import java.math.BigInteger;import java.security.AlgorithmParameterGenerator;import java.security.AlgorithmParameters;import java.security.KeyFactory;import java.security.KeyPair;import java.security.KeyPairGenerator;import java.security.PrivateKey;import java.security.PublicKey;import java.security.SecureRandom;import java.security.Security;import java.security.Signature;import java.security.interfaces.DSAPrivateKey;import java.security.interfaces.DSAPublicKey;import java.security.spec.DSAParameterSpec;import java.security.spec.PKCS8EncodedKeySpec;import java.security.spec.X509EncodedKeySpec;import org.bouncycastle.asn1.ASN1InputStream;import org.bouncycastle.asn1.ASN1Sequence;import org.bouncycastle.asn1.DERInteger;import org.bouncycastle.jce.provider.BouncyCastleProvider;import org.bouncycastle.jce.spec.ECParameterSpec;import org.bouncycastle.jce.spec.ECPrivateKeySpec;import org.bouncycastle.jce.spec.ECPublicKeySpec;import org.bouncycastle.math.ec.ECCurve;import org.bouncycastle.util.BigIntegers;import org.bouncycastle.util.encoders.Hex;import org.bouncycastle.util.test.FixedSecureRandom;import org.bouncycastle.util.test.SimpleTest;public class DSATest    extends SimpleTest{    byte[] k1 = Hex.decode("d5014e4b60ef2ba8b6211b4062ba3224e0427dd3");    byte[] k2 = Hex.decode("345e8d05c075c3a508df729a1685690e68fcfb8c8117847e89063bca1f85d968fd281540b6e13bd1af989a1fbf17e06462bf511f9d0b140fb48ac1b1baa5bded");    SecureRandom    random = new FixedSecureRandom(new byte[][] { k1, k2 });        public void testCompat()        throws Exception    {        Signature           s = Signature.getInstance("DSA", "SUN");        KeyPairGenerator    g = KeyPairGenerator.getInstance("DSA", "SUN");        byte[]              data = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 };                g.initialize(512, new SecureRandom());                KeyPair p = g.generateKeyPair();                PrivateKey  sKey = p.getPrivate();        PublicKey   vKey = p.getPublic();                //        // sign SUN - verify with BC         //        s.initSign(sKey);                s.update(data);                byte[]  sigBytes = s.sign();                s = Signature.getInstance("DSA", "BC");                s.initVerify(vKey);                s.update(data);                if (!s.verify(sigBytes))        {            fail("SUN -> BC verification failed");        }                //        // sign BC - verify with SUN        //                s.initSign(sKey);                s.update(data);                sigBytes = s.sign();                s = Signature.getInstance("DSA", "SUN");                s.initVerify(vKey);                s.update(data);                if (!s.verify(sigBytes))        {            fail("BC -> SUN verification failed");        }                //        // key encoding test - BC decoding Sun keys        //        KeyFactory          f = KeyFactory.getInstance("DSA", "BC");        X509EncodedKeySpec  x509s = new X509EncodedKeySpec(vKey.getEncoded());        DSAPublicKey        k1 = (DSAPublicKey)f.generatePublic(x509s);                if (!k1.getY().equals(((DSAPublicKey)vKey).getY()))        {            fail("public number not decoded properly");        }                if (!k1.getParams().getG().equals(((DSAPublicKey)vKey).getParams().getG()))        {            fail("public generator not decoded properly");        }                if (!k1.getParams().getP().equals(((DSAPublicKey)vKey).getParams().getP()))        {            fail("public p value not decoded properly");        }                if (!k1.getParams().getQ().equals(((DSAPublicKey)vKey).getParams().getQ()))        {            fail("public q value not decoded properly");        }                PKCS8EncodedKeySpec  pkcs8 = new PKCS8EncodedKeySpec(sKey.getEncoded());        DSAPrivateKey        k2 = (DSAPrivateKey)f.generatePrivate(pkcs8);                if (!k2.getX().equals(((DSAPrivateKey)sKey).getX()))        {            fail("private number not decoded properly");        }                if (!k2.getParams().getG().equals(((DSAPrivateKey)sKey).getParams().getG()))        {            fail("private generator not decoded properly");        }                if (!k2.getParams().getP().equals(((DSAPrivateKey)sKey).getParams().getP()))        {            fail("private p value not decoded properly");        }                if (!k2.getParams().getQ().equals(((DSAPrivateKey)sKey).getParams().getQ()))        {            fail("private q value not decoded properly");        }                //        // key decoding test - SUN decoding BC keys        //         f = KeyFactory.getInstance("DSA", "SUN");        x509s = new X509EncodedKeySpec(k1.getEncoded());                vKey = (DSAPublicKey)f.generatePublic(x509s);                if (!k1.getY().equals(((DSAPublicKey)vKey).getY()))        {            fail("public number not decoded properly");        }                if (!k1.getParams().getG().equals(((DSAPublicKey)vKey).getParams().getG()))        {            fail("public generator not decoded properly");        }                if (!k1.getParams().getP().equals(((DSAPublicKey)vKey).getParams().getP()))        {            fail("public p value not decoded properly");        }                if (!k1.getParams().getQ().equals(((DSAPublicKey)vKey).getParams().getQ()))        {            fail("public q value not decoded properly");        }                pkcs8 = new PKCS8EncodedKeySpec(k2.getEncoded());        sKey = (DSAPrivateKey)f.generatePrivate(pkcs8);                if (!k2.getX().equals(((DSAPrivateKey)sKey).getX()))        {            fail("private number not decoded properly");        }                if (!k2.getParams().getG().equals(((DSAPrivateKey)sKey).getParams().getG()))        {            fail("private generator not decoded properly");        }                if (!k2.getParams().getP().equals(((DSAPrivateKey)sKey).getParams().getP()))        {            fail("private p value not decoded properly");        }                if (!k2.getParams().getQ().equals(((DSAPrivateKey)sKey).getParams().getQ()))        {            fail("private q value not decoded properly");        }                //    }    /**     * X9.62 - 1998,<br>     * J.3.2, Page 155, ECDSA over the field Fp<br>     * an example with 239 bit prime     */    private void testECDSA239bitPrime()        throws Exception    {        BigInteger r = new BigInteger("308636143175167811492622547300668018854959378758531778147462058306432176");        BigInteger s = new BigInteger("323813553209797357708078776831250505931891051755007842781978505179448783");        byte[] kData = BigIntegers.asUnsignedByteArray(new BigInteger("700000017569056646655505781757157107570501575775705779575555657156756655"));        SecureRandom    k = new FixedSecureRandom(kData);        ECCurve curve = new ECCurve.Fp(                new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), // q                new BigInteger("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc", 16), // a                new BigInteger("6b016c3bdcf18941d0d654921475ca71a9db2fb27d1d37796185c2942c0a", 16)); // b                ECParameterSpec spec = new ECParameterSpec(                curve,                curve.decodePoint(Hex.decode("020ffa963cdca8816ccc33b8642bedf905c3d358573d3f27fbbd3b3cb9aaaf")), // G                new BigInteger("883423532389192164791648750360308884807550341691627752275345424702807307")); // n                        ECPrivateKeySpec priKey = new ECPrivateKeySpec(                new BigInteger("876300101507107567501066130761671078357010671067781776716671676178726717"), // d                spec);                ECPublicKeySpec pubKey = new ECPublicKeySpec(                curve.decodePoint(Hex.decode("025b6dc53bc61a2548ffb0f671472de6c9521a9d2d2534e65abfcbd5fe0c70")), // Q                spec);                Signature           sgr = Signature.getInstance("ECDSA", "BC");        KeyFactory          f = KeyFactory.getInstance("ECDSA", "BC");        PrivateKey          sKey = f.generatePrivate(priKey);        PublicKey           vKey = f.generatePublic(pubKey);                sgr.initSign(sKey, k);                byte[] message = new byte[] { (byte)'a', (byte)'b', (byte)'c' };                sgr.update(message);                byte[]  sigBytes = sgr.sign();                sgr.initVerify(vKey);                sgr.update(message);                if (!sgr.verify(sigBytes))        {            fail("239 Bit EC verification failed");        }                BigInteger[]  sig = derDecode(sigBytes);                if (!r.equals(sig[0]))        {            fail("r component wrong." + System.getProperty("line.separator")                    + " expecting: " + r + System.getProperty("line.separator")                    + " got      : " + sig[0]);        }                if (!s.equals(sig[1]))        {            fail("s component wrong." + System.getProperty("line.separator")                    + " expecting: " + s + System.getProperty("line.separator")                    + " got      : " + sig[1]);        }    }    /**     * X9.62 - 1998,<br>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?