📄 mct.java
字号:
// $Id: MCT.java,v 1.1.1.1 2002/08/27 12:32:15 grosbois Exp $//// $Log: MCT.java,v $// Revision 1.1.1.1 2002/08/27 12:32:15 grosbois// Add cryptix 3.2//// Revision 1.5 2000/08/17 11:41:04 edwin// java.* -> xjava.*//// Revision 1.4 1998/03/13 11:01:25 raif// *** empty log message ***//// Revision 1.3.1 1998/03/13 raif// + added support for _Algorithm implementations with variable block size.//// Revision 1.3 1998/02/28 07:11:23 raif// *** empty log message ***//// Revision 1.2.1 1998/02/28 raif// + fixed a bug that appeared when IJCE API was used.// + added support for a user-defined Provider and key lengths.//// Revision 1.2 1998/02/08 21:04:46 raif// *** empty log message ***//// Revision 1.1.1 1998/02/09 raif// + fixed the VERSION string.//// Revision 1.1 1998/01/15 20:30:46 raif// *** empty log message ***//// Revision 0.1 1998/01/10 raif// + original version.//// $Endlog$/* * Copyright (c) 1998 Systemics Ltd on behalf of * the Cryptix Development Team. All rights reserved. */package cryptix.tools;import cryptix.util.core.ArrayUtil;import cryptix.util.core.Hex;import java.io.File;import java.io.FileWriter;import java.io.IOException;import java.io.PrintWriter;import java.lang.reflect.InvocationTargetException;import java.lang.reflect.Method;import xjava.security.Cipher;import java.security.KeyException;import java.security.NoSuchAlgorithmException;import java.security.NoSuchProviderException;import xjava.security.SecretKey;import java.util.StringTokenizer;/** * For a designated symmetric block cipher algorithm, this command generates * and exercises Monte Carlo Tests data for both Encryption and Decryption in * Electronic Codebook (ECB) and Cipher Block Chaining (CBC) modes.<p> * * MCT's output file format is in conformance with the layout described in * Section 4 of NIST's document "Description of Known Answer Tests and Monte * Carlo Tests for Advanced Encryption Standard (AES) Candidate Algorithm * Submissions" dated January 7, 1998.<p> * * If the -p argument is not specified, this command assumes that the name * of the designated cipher algorithm is also that of its Security Provider. * It always tries processing the user's request using Java Reflection API * methods on an XXX_Algorithm class, if such a class exists --XXX being the * name of the AES candidate algorithm. When such a class exists, it is * assumed to include the following static methods:<ul> * <li>public static int blockSize();<br> * Return the length in bytes of the cipher's input block. * <li>public static synchronized Object makeKey (byte[]);<br> * Expand a user-supplied key material into a cipher's session key. * <li>public static byte[] blockEncrypt (byte[], int, Object);<br> * Encrypt exactly one block of plaintext. * <li>public static byte[] blockDecrypt (byte[], int, Object);<br> * Decrypt exactly one block of plaintext.</ul><p> * * If an *_Algorithm class was not found, or if found but an exception was * thrown during the invocation and/or execution of one of its methods, this * command then reverts to using the IJCE API methods for carrying on the * user's request.<p> * * This duality of functionalities is here for performance reasons since * speed is faster with the Reflection API than with the IJCE one --on a * Pentium 133MHz, without JIT, using JDK-1.1.5 Reflection API brings more * than 10% speed improvement.<p> * * <b>Copyright</b> © 1998 * <a href="http://www.systemics.com/">Systemics Ltd</a> on behalf of the * <a href="http://www.systemics.com/docs/cryptix/">Cryptix Development Team</a>. * <br>All rights reserved.<p> * * <b>$Revision: 1.1.1.1 $</b> * @author Raif S. Naffah */public final class MCT{// main method//........................................................................... public static void main (String[] args) { System.out.println( "NIST Monte-Carlo Tests data generator/exerciser\n\n" + VERSION + "\n" + "Copyright (c) 1998 Systemics Ltd. on behalf of\n" + "the Cryptix Development Team. All rights reserved.\n\n"); MCT cmd = new MCT(); cmd.processOptions(args); cmd.run(); }// Fields & constants//........................................................................... static final String VERSION = "$Revision: 1.1.1.1 $"; static final String SUBMITTER = "<as stated on the submission cover sheet>"; /** Current values of switches as set from the command line arguments. */ boolean ecb = false ; // -e generate ECB Encrypt/Decrypt only boolean cbc = false ; // -c generate CBC Encrypt/Decrypt only String dirName = null; // -d output directory if != user.dir String keylengths = null; // -l comma-separated key lengths String provider = null; // provider name if cipherName != provider name String cipherName = null; // cipher algorithm name == provider File destination = null; // destination directory File object int[] keys = new int[] {128, 192, 256}; // key-length values to test with final String eeFileName = "ecb_e_m.txt"; // ECB/Encrypt output filename final String edFileName = "ecb_d_m.txt"; // ECB/Decrypt output filename final String ceFileName = "cbc_e_m.txt"; // CBC/Encrypt output filename final String cdFileName = "cbc_d_m.txt"; // CBC/Decrypt output filename // will use zeroes for fields that require initial values. // could be replaced by random.nextBytes() using //// static final java.util.Random rand = new java.util.Random(); // // or for cryptographically strong randoms use the following //// static final java.security.SecureRandom rand = new java.security.SecureRandom(); // // bear in mind that initialising the latter PRNG is a lengthy process // statistics fields long encBlocks; // total count of encrypted blocks long decBlocks; // total count of decrypted blocks long keyCount; // total count of key creation requests Class algorithm = null; // fields for using Reflection API methods Method blockSize = null; Method makeKey = null; Method encrypt = null; Method decrypt = null; Cipher cipher = null; // field for using IJCE API methods boolean useReflection = true; // by default we'll use the Reflection API// Own methods//........................................................................... /** Process command line arguments. */ void processOptions (String[] args) { int argc = args.length; if (argc == 0) printUsage(); System.out.println( "(type \"java cryptix.tools.MCT\" with no arguments for help)\n\n"); int i = -1; String cmd = ""; boolean next = true; while (true) { if (next) { i++; if (i >= argc) break; else cmd = args[i]; } else cmd = "-" + cmd.substring(2); if (cmd.startsWith("-e")) { ecb = true; next = (cmd.length() == 2); } else if (cmd.startsWith("-c")) { cbc = true; next = (cmd.length() == 2); } else if (cmd.startsWith("-l")) { // key lengths keylengths = args[i + 1]; i++; next = true; } else if (cmd.startsWith("-d")) { // destination directory dirName = args[i + 1]; i++; next = true; } else if (cmd.startsWith("-p")) { // provider name provider = args[i + 1]; i++; next = true; } else // it's the cipher cipherName = cmd; } // sanity checks if (cipherName == null) halt("Missing cipher algorithm name"); if (cipherName.length() > 1 && (cipherName.startsWith("\"") || cipherName.startsWith("'"))) cipherName = cipherName.substring(2, cipherName.length() - 2); if (provider == null) provider = cipherName; if (keylengths != null) { int count = 0; int k; int[] keystemp = new int[3]; // maximum allowed StringTokenizer st = new StringTokenizer(keylengths, ", \t\""); while (st.hasMoreTokens()) { k = Integer.parseInt(st.nextToken()); if (k <= 0) halt("Negative key length not allowed: "+k); if (count == 3) halt("Only three key-length values are allowed."); keystemp[count++] = k; } if (count != 0) { keys = new int[count]; System.arraycopy(keystemp, 0, keys, 0, count); } } if (!ecb && !cbc) ecb = cbc = true; if (dirName == null) dirName = System.getProperty("user.dir"); destination = new File(dirName); if (! destination.isDirectory()) halt("Destination <" + destination.getName() + "> is not a directory"); // now instantiate both Reflection and IJCE fields // start with Reflection // to use reflection API we load the *_Algorithm class if one exists // look for class fully named XXX.XXX_Algorithm try { algorithm = Class.forName(// cipherName + "." + cipherName + "_Algorithm"); provider + "." + cipherName + "_Algorithm"); // inspect the _Algorithm class Method[] methods = algorithm.getDeclaredMethods(); for (i = 0; i < methods.length; i++) { String name = methods[i].getName(); int params = methods[i].getParameterTypes().length; if (name.equals("blockSize")) blockSize = methods[i]; else if (name.equals("makeKey") && (params == 1)) makeKey = methods[i]; else if (name.equals("blockEncrypt") && (params == 3)) encrypt = methods[i]; else if (name.equals("blockDecrypt") && (params == 3)) decrypt = methods[i]; } if (blockSize == null) throw new NoSuchMethodException("blockSize()"); if (makeKey == null) throw new NoSuchMethodException("makeKey()"); if (encrypt == null) throw new NoSuchMethodException("blockEncrypt()"); if (decrypt == null) throw new NoSuchMethodException("blockDecrypt()"); } catch (ClassNotFoundException ex1) { notify("Unable to find a " + cipherName + "_Algorithm class"); algorithm = null; } catch (NoSuchMethodException ex2) { notify("Unable to find method " + ex2.getMessage() + " in " + cipherName + "_Algorithm class"); algorithm = null; } // // then IJCE. note that IJCE is mandatory. // try {// cipher = Cipher.getInstance(cipherName + "/ECB", cipherName); cipher = Cipher.getInstance(cipherName + "/ECB", provider); } catch (NoSuchProviderException ex3) {// halt("Unable to locate Security Provider: " + cipherName); halt("Unable to locate Security Provider: " + provider); } catch (NoSuchAlgorithmException ex4) { halt("Unable to locate an implementation for Cipher: " + cipherName + "/ECB"); } useReflection = algorithm != null; } /** * Print an error message to System.err and halts execution returning * -1 to the JVM. * * @param s a message to output on System.err */ static void halt (String s) { System.err.println("\n*** " + s + "..."); System.exit(-1); } /** * Write a notification message to System.out. * * @param s string to output to System.out. */ static void notify (String s) { System.out.println("MCT: " + s + "..."); } /** write help text and quit. */ void printUsage() { System.out.println( "NAME\n" + " MCT: A Monte Carlo Tests data generator/exerciser for any block\n" + " cipher algorithm.\n\n" + "SYNTAX\n" + " java cryptix.tools.MCT\n" + " [ -e | -c ]\n" + " [ -l <comma-separated-key-lengths>]\n" + " [ -d <output-directory>]\n" + " [ -p <provider>]\n" + " <cipher>\n\n" + "DESCRIPTION\n" + " For a designated symmetric block cipher algorithm, this command\n" + " generates and exercises Monte Carlo Tests data for both Encryption\n" + " and Decryption in Electronic Codebook (ECB) and Cipher Block Chaining\n" + " (CBC) modes.\n" + " MCT's output file format is in conformance with the layout described\n" + " in Section 4 of NIST's document \"Description of Known Answer Tests\n" + " and Monte Carlo Tests for Advanced Encryption Standard (AES) Candidate\n" + " Algorithm Submissions\" dated January 7, 1998.\n\n" + "OPTIONS\n" + " -e Generate both Encryption and Decryption data for the cipher in\n" + " ECB mode only. By default MCT generates both ECB and CBC test\n" + " suites.\n\n" + " -c Generate both Encryption and Decryption data for the cipher in\n" + " CBC mode only. By default MCT generates both ECB and CBC test\n" + " suites.\n\n" + " -l <comma-separated-key-lengths>\n" + " Comma separated list (maximum of three) of key lengths to use\n" + " for the tests. If omitted, the following three values are\n" + " assumed: 128, 192 and 256.\n\n" + " -d <output-directory>\n" + " Pathname of the directory where the output files: \"ecb_e_m.txt\",\n" +
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -