/* ==================================================================== * Copyright (c) 2015 - 2016 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== */ #include "zuc_standard.h" #include "openssl/zuc.h" /************************************************************ Function: add_mod Description: calculate a+b mod 2^31-1 Calls: Called By: lfsr_with_init_mode Input: a,b: uint32_t(32bit) Output: Return: c, c=a+b mod 2^31-1 Others: ************************************************************/ uint32_t add_mod(uint32_t a, uint32_t b) { uint32_t c = a + b; if (c >> 31) { c = (c & 0x7fffffff) + 1; } return c; } /************************************************************ Function: pow_mod Description: calculate x*2^k mod 2^31-1 Calls: Called By: lfsr_with_init_mode Input: x: input k: exponential Output: Return: x*2^k mod 2^31-1 Others: ************************************************************/ uint32_t pow_mod(uint32_t x, uint32_t k) { return (((x << k) | (x >> (31 - k))) & 0x7fffffff); } /************************************************************ Function: l1 Description: linear transformation l1 Calls: Called By: f Input: X: input Output: Return: X^(X<<< 2)^(X<<<10)^(X<<<18)^(X<<<24) Others: ************************************************************/ uint32_t l1(uint32_t X) { return X ^ ZUC_ROTL32(X, 2) ^ ZUC_ROTL32(X, 10) ^ ZUC_ROTL32(X, 18) ^ ZUC_ROTL32(X, 24); } /************************************************************ Function: l2 Description: linear transformation l2 Calls: Called By: f Input: X: input Output: Return: X^(X<<< 8)^(X<<<14)^(X<<<22)^(X<<<30) Others: ************************************************************/ uint32_t l2(uint32_t X) { return X ^ ZUC_ROTL32(X, 8) ^ ZUC_ROTL32(X, 14) ^ ZUC_ROTL32(X, 22) ^ ZUC_ROTL32(X, 30); } /************************************************************ Function: bit_value Description: test if the value of M at the position i equals 0 Calls: Called By: zuc_integrity Input: M: message i: the position i Output: Return: 0:the value of M at the position i equals 0 1:the value of M at the position i equals 1 Others: ************************************************************/ unsigned char bit_value(uint32_t M[], uint32_t i) { int j, k; j = i >> 5; k = i & 0x1f; if (M[j] & (0x1 << (31 - k))) return 1; else return 0; } /************************************************************ Function: get_word Description: get a 32bit word ki from bit strings k[i],k[i+1]...,namely ki=k[i]||k[i+1]||…||k[i+31] Calls: Called By: zuc_integrity Input: k[]: i: the position i Output: Return: ki=k[i]||k[i+1]||…||k[i+31] Others: ************************************************************/ uint32_t get_word(uint32_t k[], uint32_t i) { int j, m; uint32_t word; j = i >> 5; m = i & 0x1f; if (m == 0) word = k[j]; else word = (k[j] << m) | (k[j + 1] >> (32 - m)); return word; } /************************************************************ Function: lfsr_with_init_mode Description: Initialisation mode,refresh the current state of LFSR Calls: add_mod,pow_mod Called By: zuc_standard_init Input: LFSR_S:current state of LFSR u:u=W>>1 Output: Null Return: Null Others: ************************************************************/ void lfsr_with_init_mode(uint32_t LFSR_S[], uint32_t u) { uint32_t v = LFSR_S[0], i; v = add_mod(v, pow_mod(LFSR_S[15], 15)); v = add_mod(v, pow_mod(LFSR_S[13], 17)); v = add_mod(v, pow_mod(LFSR_S[10], 21)); v = add_mod(v, pow_mod(LFSR_S[4] , 20)); v = add_mod(v, pow_mod(LFSR_S[0] , 8)); for (i = 0; i < 15; i++) { LFSR_S[i] = LFSR_S[i + 1]; } LFSR_S[15] = add_mod(v, u); if (!LFSR_S[15]) { LFSR_S[15] = 0x7fffffff; } }; /************************************************************ Function: lfsr_with_work_mode Description: working mode,refresh the current state of LFSR Calls: add_mod,pow_mod Called By: zuc_standard_work Input: LFSR_S:current state of LFSR Output: Null Return: Null Others: ************************************************************/ void lfsr_with_work_mode(uint32_t LFSR_S[]) { uint32_t v = LFSR_S[0], i; v = add_mod(v, pow_mod(LFSR_S[15], 15)); v = add_mod(v, pow_mod(LFSR_S[13], 17)); v = add_mod(v, pow_mod(LFSR_S[10], 21)); v = add_mod(v, pow_mod(LFSR_S[4] , 20)); v = add_mod(v, pow_mod(LFSR_S[0] , 8)); for (i = 0; i < 15; i++) { LFSR_S[i] = LFSR_S[i + 1]; } LFSR_S[15] = v; if (!LFSR_S[15]) { LFSR_S[15] = 0x7fffffff; } }; /************************************************************ Function: br Description: Bit Reconstruction Calls: Called By: zuc_standard_init,zuc_standard_work Input: LFSR_S:current state of LFSR Output: BR_X[]:achieve X0,X1,X2,X3 Return: Null Others: ************************************************************/ void br(uint32_t LFSR_S[], uint32_t BR_X[]) { BR_X[0] = ((LFSR_S[15] & 0x7fff8000) << 1) | (LFSR_S[14] & 0x0000ffff); BR_X[1] = ((LFSR_S[11] & 0x0000ffff) << 16) | ((LFSR_S[9] & 0x7fff8000) >> 15); BR_X[2] = ((LFSR_S[7] & 0x0000ffff) << 16) | ((LFSR_S[5] & 0x7fff8000) >> 15); BR_X[3] = ((LFSR_S[2] & 0x0000ffff) << 16) | ((LFSR_S[0] & 0x7fff8000) >> 15); } /************************************************************ Function: f Description: nonlinear function Calls: Called By: zuc_standard_init,zuc_standard_work Input: BR_X[]:words X0,X1,X2,X3 from br F_R[]:F_R[0]=R1,F_R[1]=R2 Output: Return: W Others: ************************************************************/ uint32_t f(uint32_t BR_X[], uint32_t F_R[]) { uint32_t W, W1, W2; W = (BR_X[0] ^ F_R[0]) + F_R[1]; W1 = F_R[0] + BR_X[1]; W2 = F_R[1] ^ BR_X[2]; F_R[0] = l1((W1 << 16) | (W2 >> 16)); F_R[0] = (ZUC_S0[(F_R[0] >> 24) & 0xFF]) << 24 | (ZUC_S1[(F_R[0] >> 16) & 0xFF]) << 16 | (ZUC_S0[(F_R[0] >> 8) & 0xFF]) << 8 | (ZUC_S1[F_R[0] & 0xFF]); F_R[1] = l2((W2 << 16) | (W1 >> 16)); F_R[1] = (ZUC_S0[(F_R[1] >> 24) & 0xFF]) << 24 | (ZUC_S1[(F_R[1] >> 16) & 0xFF]) << 16 | (ZUC_S0[(F_R[1] >> 8) & 0xFF]) << 8 | (ZUC_S1[F_R[1] & 0xFF]); return W; }; /************************************************************ Function: zuc_standard_init Description: Initialisation process of ZUC Calls: ZUC_LINK_TO_S,br,f,lfsr_with_init_mode Called By: zuc_genkeystream Input: k:initial key iv:initial vector Output: LFSR_S[]:the state of LFSR after initialisation:s0,s1,s2,..s15 BR_X[] : the current value:X0,X1,X2,X3 F_R[]:the current value:R1,R2,F_R[0]=R1,F_R[1]=R2 Return: Null Others: ************************************************************/ void zuc_standard_init(unsigned char k[], unsigned char iv[], uint32_t LFSR_S[], uint32_t BR_X[], uint32_t F_R[]) { unsigned char count = 32; int i; //loading key to the LFSR s0,s1,s2....s15 printf("\ninitial state of LFSR: S[0]-S[15]\n"); for (i = 0; i < 16; i++) { LFSR_S[i] = ZUC_LINK_TO_S(k[i], ZUC_D[i], iv[i]); printf("%08x ", LFSR_S[i]); } F_R[0] = 0x00; //R1 F_R[1] = 0x00; //R2 while (count) //32 times { uint32_t W; br( LFSR_S, BR_X); //BitReconstruction W = f(BR_X, F_R); //nonlinear function lfsr_with_init_mode(LFSR_S, W >> 1); count--; } } /************************************************************ Function: zuc_standard_work Description: working stage of ZUC Calls: br,f,lfsr_with_work_mode Called By: zuc_genkeystream Input: LFSR_S[]:the state of LFSR after initialisation:s0,s1,s2,..s15 BR_X[] : X0,X1,X2,X3 F_R[]:R1,R2 Output: pKeyStream[]:key stream KeyStreamLen:the length of KeyStream,exporting 32bit for a beat Return: Null Others: ************************************************************/ void zuc_standard_work(uint32_t LFSR_S[], uint32_t BR_X[], uint32_t F_R[], uint32_t pKeyStream[], int KeyStreamLen) { int i = 0; br(LFSR_S, BR_X); f(BR_X, F_R); lfsr_with_work_mode(LFSR_S); while (i < KeyStreamLen) { br( LFSR_S, BR_X); pKeyStream[i] = f(BR_X, F_R) ^ BR_X[3]; lfsr_with_work_mode(LFSR_S); i++; } } /**************************************************************** Function: zuc_genkeystream Description: generate key stream Calls: zuc_standard_init,zuc_standard_work Called By: ZUC_SelfCheck Input: k[] //initial key,128bit iv[] //initial iv,128bit KeyStreamLen //the byte length of KeyStream,exporting 32bit for a beat Output: KeyStream[] // key strem to be outputed Return: null Others: ****************************************************************/ void zuc_genkeystream(unsigned char k[], unsigned char iv[], uint32_t KeyStream[], int KeyStreamLen) { uint32_t LFSR_S[16]; //LFSR state s0,s1,s2,...s15 uint32_t BR_X[4]; //Bit Reconstruction X0,X1,X2,X3 uint32_t F_R[2]; //R1,R2,variables of nonlinear function f int i; //Initialisation zuc_standard_init(k, iv, LFSR_S, BR_X, F_R); printf("\nstate of LFSR after executing initialization: S[0]-S[15]\n"); for (i = 0; i < 16; i++) { printf("%08x ", LFSR_S[i]); } printf("\ninternal state of Finite State Machine:\n"); printf("R1=%08x\n", F_R[0]); printf("R2=%08x\n", F_R[1]); //Working zuc_standard_work(LFSR_S, BR_X, F_R, KeyStream, KeyStreamLen); } /**************************************************************** Function: zuc_confidentiality Description: the ZUC-based condifentiality algorithm Calls: zuc_genkeystream Called By: ZUC_SelfCheck Input: CK[] //initial key,128bit,uesed to gain the key of ZUC KeyStream generation algorithm COUNT //128bit BEARER //5bit,bearing layer identification, DIRECTION //1bit IBS[] //input bit stream, LENGTH //the bit length of IBS Output: OBS[] //output bit stream, Return: null Others: ****************************************************************/ void zuc_confidentiality(unsigned char CK[], uint32_t COUNT, unsigned char BEARER, unsigned char DIRECTION, uint32_t IBS[], int LENGTH, uint32_t OBS[]) { uint32_t *k; int L, i, t; unsigned char iv[16]; //generate vector iv1,iv2,...iv15 iv[0] = (unsigned char)(COUNT >> 24); iv[1] = (unsigned char)((COUNT >> 16) & 0xff); iv[2] = (unsigned char)((COUNT >> 8) & 0xff); iv[3] = (unsigned char)(COUNT & 0xff); iv[4] = (((BEARER << 3) | (DIRECTION << 2)) & 0xfc); iv[5] = 0x00; iv[6] = 0x00; iv[7] = 0x00; iv[8] = iv[0]; iv[9] = iv[1]; iv[10] = iv[2]; iv[11] = iv[3]; iv[12] = iv[4]; iv[13] = iv[5]; iv[14] = iv[6]; iv[15] = iv[7]; //L,the length of key stream,taking 32bit as a unit L = (LENGTH + 31) / 32; k = malloc(sizeof(uint32_t) * L); //generate key stream k zuc_genkeystream(CK, iv, k, L); //generate key stream //OBS=IBS^k for (i = 0; i < L; i++) { OBS[i] = IBS[i] ^ k[i]; } t = LENGTH % 32; if (t) { OBS[L - 1] = ((OBS[L - 1] >> (32 - t)) << (32 - t)); } free(k); } /**************************************************************** Function: zuc_integrity Description: the ZUC-based integrity algorithm Calls: zuc_genkeystream,bit_value,get_word Called By: ZUC_SelfCheck Input: IK[] //integrity key,128bit,uesed to gain the key of ZUC KeyStream generation algorithm COUNT //128bit BEARER //5bit,bearing layer identification, DIRECTION //1bit M[] //message LENGTH //the bit length of M Output: Return: MAC //message authentication code Others: ****************************************************************/ uint32_t zuc_integrity(unsigned char IK[], uint32_t COUNT, unsigned char BEARER, unsigned char DIRECTION, uint32_t M[], int LENGTH) { uint32_t *k, ki, MAC; int L, i; unsigned char iv[16]; uint32_t T = 0; //generate vector iv1,iv2,...iv15 iv[0] = (unsigned char)(COUNT >> 24); iv[1] = (unsigned char)((COUNT >> 16) & 0xff); iv[2] = (unsigned char)((COUNT >> 8) & 0xff); iv[3] = (unsigned char)(COUNT & 0xff); iv[4] = BEARER << 3; iv[5] = 0x00; iv[6] = 0x00; iv[7] = 0x00; iv[8] = iv[0] ^ (DIRECTION << 7); iv[9] = iv[1]; iv[10] = iv[2]; iv[11] = iv[3]; iv[12] = iv[4]; iv[13] = iv[5]; iv[14] = iv[6] ^ (DIRECTION << 7); iv[15] = iv[7]; //L,the length of key stream,taking 32bit as a unit L = (LENGTH + 31) / 32 + 2; k = malloc(sizeof(uint32_t) * L); //generate key stream k zuc_genkeystream(IK, iv, k, L); //T=T^ki for (i = 0; i < LENGTH; i++) { if (bit_value(M, i)) { ki = get_word(k, i); T = T ^ ki; } } //T=T^kLENGTH ki = get_word(k, LENGTH); T = T ^ ki; //MAC=T^k(32*(L-1)) ki = get_word(k, 32 * (L - 1)); MAC = T ^ ki; free(k); return MAC; } /**************************************************************** Function: ZUC_SelfCheck Description: Self-check with standard data Calls: zuc_genkeystream,zuc_confidentiality,zuc_integrity Called By: Input: Output: Return: 0:success 1:error Others: ****************************************************************/ int ZUC_SelfCheck() { int i; /**************** KeyStream generation validation data ***************************/ // (all 0) /* unsigned char k[16]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}; unsigned char iv[16]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}; uint32_t Std_Keystream[2]={0x27bede74,0x018082da};*/ //(all 1) /*unsigned char k[16]={0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}; unsigned char iv[16]={0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}; uint32_t Std_Keystream[2]={0x0657cfa0,0x7096398b};*/ //(random) unsigned char k[16] = {0x3d, 0x4c, 0x4b, 0xe9, 0x6a, 0x82, 0xfd, 0xae, 0xb5, 0x8f, 0x64, 0x1d, 0xb1, 0x7b, 0x45, 0x5b}; unsigned char iv[16] = {0x84, 0x31, 0x9a, 0xa8, 0xde, 0x69, 0x15, 0xca, 0x1f, 0x6b, 0xda, 0x6b, 0xfb, 0xd8, 0xc7, 0x66}; uint32_t Std_Keystream[2] = {0x14f1c272, 0x3279c419}; int KeystreamLen = 2; //the length of key stream uint32_t Keystream[2]; /******************* Confidentiality validation data ***************************/ unsigned char key[16] = {0x17, 0x3d, 0x14, 0xba, 0x50, 0x03, 0x73, 0x1d, 0x7a, 0x60, 0x04, 0x94, 0x70, 0xf0, 0x0a, 0x29}; uint32_t COUNT = 0x66035492; unsigned char BEARER = 0x0f; unsigned char DIRECTION = 0x00; uint32_t plain[7] = {0x6cf65340, 0x735552ab, 0x0c9752fa, 0x6f9025fe, 0x0bd675d9, 0x005875b2, 0x00000000}; uint32_t Std_cipher[7] = {0xa6c85fc6, 0x6afb8533, 0xaafc2518, 0xdfe78494, 0x0ee1e4b0, 0x30238cc8, 0x00000000}; int plainlen = 0xc1; uint32_t cipher[7]; //2 //unsigned char key[16] = {0xe5, 0xbd, 0x3e, 0xa0, 0xeb, 0x55, 0xad, 0xe8, 0x66, 0xc6, 0xac, 0x58, 0xbd, 0x54, 0x30, 0x2a}; //uint32_t COUNT=0x00056823; //unsigned char BEARER=0x18; //unsigned char DIRECTION=0x01; //uint32_t plain[25] = { 0x14a8ef69, 0x3d678507, 0xbbe7270a, 0x7f67ff50, 0x06c3525b, 0x9807e467, 0xc4e56000, // 0xba338f5d, 0x42955903, 0x67518222, 0x46c80d3b, 0x38f07f4b, 0xe2d8ff58, 0x05f51322, 0x29bde93b, 0xbb dcaf38, // 0x2bf1ee97, 0x2fbf9977, 0xbada8945, 0x847a2a6c, 0x9ad34a66, 0x7554e04d, 0x1f7fa2c3, 0x3241bd8f, 0x01 ba220d }; //uint32_t Std_cipher[25] = { 0x131d43e0, 0xdea1be5c, 0x5a1bfd97, 0x1d852cbf, 0x712d7b4f, 0x57961fea, 0x3208afa8, // 0xbca433f4, 0x56ad09c7, 0x417e58bc, 0x69cf8866, 0xd1353f74, 0x865e8078, 0x1d202dfb, 0x3ecff7fc, 0xbc 3b190f, // 0xe82a204e, 0xd0e350fc, 0x0f6f2613, 0xb2f2bca6, 0xdf5a473a, 0x57a4a00d, 0x985ebad8, 0x80d6f238, 0x64 a07b01 }; //int plainlen = 0x0320; //uint32_t cipher[25]; //3 //unsigned char key[16] = {0xe1, 0x3f, 0xed, 0x21, 0xb4, 0x6e, 0x4e, 0x7e, 0xc3, 0x12, 0x53, 0xb2, 0xbb, 0x17, 0xb3, 0xe0}; //uint32_t COUNT=0x2738cdaa; //unsigned char BEARER=0x1a; //unsigned char DIRECTION=0x00; //uint32_t plain[126] = { 0x8d74e20d, 0x54894e06, 0xd3cb13cb, 0x3933065e, 0x8674be62, 0xadb1c72b, 0x3a646965, // 0xab63cb7b, 0x7854dfdc, 0x27e84929, 0xf49c64b8, 0x72a490b1, 0x3f957b64, 0x827e71f4, 0x1fbd4269, 0xa4 2c97f8, // 0x24537027, 0xf86e9f4a, 0xd82d1df4, 0x51690fdd, 0x98b6d03f, 0x3a0ebe3a, 0x312d6b84, 0x0ba5a182, 0x0b 2a2c97, // 0x09c090d2, 0x45ed267c, 0xf845ae41, 0xfa975d33, 0x33ac3009, 0xfd40eba9, 0xeb5b8857, 0x14b768b6, 0x97 138baf, // 0x21380eca, 0x49f644d4, 0x8689e421, 0x5760b906, 0x739f0d2b, 0x3f091133, 0xca15d981, 0xcbe401ba, 0xf7 2d05ac, // 0xe05cccb2, 0xd297f4ef, 0x6a5f58d9, 0x1246cfa7, 0x7215b892, 0xab441d52, 0x78452795, 0xccb7f5d7, 0x90 57a1c4, // 0xf77f80d4, 0x6db2033c, 0xb79bedf8, 0xe60551ce, 0x10c667f6, 0x2a97abaf, 0xabbcd677, 0x2018df96, 0xa2 82ea73, // 0x7ce2cb33, 0x1211f60d, 0x5354ce78, 0xf9918d9c, 0x206ca042, 0xc9b62387, 0xdd709604, 0xa50af16d, 0x8d 35a890, // 0x6be484cf, 0x2e74a928, 0x99403643, 0x53249b27, 0xb4c9ae29, 0xeddfc7da, 0x6418791a, 0x4e7baa06, 0x60 fa6451, // 0x1f2d685c, 0xc3a5ff70, 0xe0d2b742, 0x92e3b8a0, 0xcd6b04b1, 0xc790b8ea, 0xd2703708, 0x540dea2f, 0xc0 9c3da7, // 0x70f65449, 0xe84d817a, 0x4f551055, 0xe19ab850, 0x18a0028b, 0x71a144d9, 0x6791e9a3, 0x57793350, 0x4e ee0060, // 0x340c69d2, 0x74e1bf9d, 0x805dcbcc, 0x1a6faa97, 0x6800b6ff, 0x2b671dc4, 0x63652fa8, 0xa33ee509, 0x74 c1c21b, // 0xe01eabb2, 0x16743026, 0x9d72ee51, 0x1c9dde30, 0x797c9a25, 0xd86ce74f, 0x5b961be5, 0xfdfb6807, 0x81 4039e7, // 0x137636bd, 0x1d7fa9e0, 0x9efd2007, 0x505906a5, 0xac45dfde, 0xed7757bb, 0xee745749, 0xc2963335, 0x0b ee0ea6, // 0xf409df45,0x80160000}; //uint32_t Std_cipher[126] = { 0x94eaa4aa, 0x30a57137, 0xddf09b97, 0xb25618a2, 0x0a13e2f1, 0x0fa5bf81, 0x61a879cc, // 0x2ae797a6, 0xb4cf2d9d, 0xf31debb9, 0x905ccfec, 0x97de605d, 0x21c61ab8, 0x531b7f3c, 0x9da5f039, 0x31 f8a064, // 0x2de48211, 0xf5f52ffe, 0xa10f392a, 0x04766998, 0x5da454a2, 0x8f080961, 0xa6c2b62d, 0xaa17f33c, 0xd6 0a4971, // 0xf48d2d90, 0x9394a55f, 0x48117ace, 0x43d708e6, 0xb77d3dc4, 0x6d8bc017, 0xd4d1abb7, 0x7b7428c0, 0x42 b06f2f, // 0x99d8d07c, 0x9879d996, 0x00127a31, 0x985f1099, 0xbbd7d6c1, 0x519ede8f, 0x5eeb4a61, 0x0b349ac0, 0x1e a23506, // 0x91756bd1, 0x05c974a5, 0x3eddb35d, 0x1d4100b0, 0x12e522ab, 0x41f4c5f2, 0xfde76b59, 0xcb8b96d8, 0x85 cfe408, // 0x0d1328a0, 0xd636cc0e, 0xdc05800b, 0x76acca8f, 0xef672084, 0xd1f52a8b, 0xbd8e0993, 0x320992c7, 0xff bae17c, // 0x408441e0, 0xee883fc8, 0xa8b05e22, 0xf5ff7f8d, 0x1b48c74c, 0x468c467a, 0x028f09fd, 0x7ce91109, 0xa5 70a2d5, // 0xc4d5f4fa, 0x18c5dd3e, 0x4562afe2, 0x4ef77190, 0x1f59af64, 0x5898acef, 0x088abae0, 0x7e92d52e, 0xb2 de5504, // 0x5bb1b7c4, 0x164ef2d7, 0xa6cac15e, 0xeb926d7e, 0xa2f08b66, 0xe1f759f3, 0xaee44614, 0x725aa3c7, 0x48 2b3084, // 0x4c143ff8, 0x5b53f1e5, 0x83c50125, 0x7dddd096, 0xb81268da, 0xa303f172, 0x34c23335, 0x41f0bb8e, 0x19 0648c5, // 0x807c866d, 0x71932286, 0x09adb948, 0x686f7de2, 0x94a802cc, 0x38f7fe52, 0x08f5ea31, 0x96d0167b, 0x9b dd02f0, // 0xd2a5221c, 0xa508f893, 0xaf5c4b4b, 0xb9f4f520, 0xfd84289b, 0x3dbe7e61, 0x497a7e2a, 0x584037ea, 0x63 7b6981, // 0x127174af, 0x57b471df, 0x4b2768fd, 0x79c1540f, 0xb3edf2ea, 0x22cb69be, 0xc0cf8d93, 0x3d9c6fdd, 0x64 5e8505, // 0x91cca3d6,0x2c0cc000}; //int plainlen = 0x0fb3; //uint32_t cipher[126]; /******************* Integrity validation data ***************************/ //1 unsigned char IK[16] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; uint32_t counter = 0x00000000; unsigned char bear = 0x00; unsigned char direc = 0x00; uint32_t message[1] = {0x00000000}; int length = 1; uint32_t Std_MAC = 0xc8a9595e; //2 //unsigned char IK[16] = {0xc9, 0xe6, 0xce, 0xc4, 0x60, 0x7c, 0x72, 0xdb, 0x00, 0x0a, 0xef, 0xa8, 0x83, 0x85, 0xab, 0x0a}; //uint32_t counter=0xa94059da; //unsigned char bear=0x0a; //unsigned char direc=0x01; //uint32_t message[19] = { 0x983b41d4, 0x7d780c9e, 0x1ad11d7e, 0xb70391b1, 0xde0b35da, 0x2dc62f83, 0xe7b78d63, // 0x06ca0ea0, 0x7e941b7b, 0xe91348f9, 0xfcb170e2, 0x217fecd9, 0x7f9f68ad, 0xb16e5d7d, 0x21e569d2, 0x80 ed775c, // 0xebde3f40,0x93c53881,0x00000000}; //int length = 0x0241; //uint32_t Std_MAC=0xfae8ff0b; //3 /* unsigned char IK[16] = {0x6b,0x8b,0x08,0xee,0x79,0xe0,0xb5,0x98,0x2d,0x6d,0x12,0x8e,0xa9,0xf2,0x20,0xcb}; uint32_t counter=0x561eb2dd; unsigned char bear=0x1c; unsigned char direc=0x00; uint32_t message[178] = {0x5bad7247,0x10ba1c56,0xd5a315f8,0xd40f6e09,0x3780be8e,0x8de07b69,0x92432018, 0xe08ed96a,0x5734af8b,0xad8a575d,0x3a1f162f,0x85045cc7,0x70925571,0xd9f5b94e,0x454a77c1,0x6e 72936b, 0xf016ae15,0x7499f054,0x3b5d52ca,0xa6dbeab6,0x97d2bb73,0xe41b8075,0xdce79b4b,0x86044f66,0x1d 4485a5, 0x43dd7860,0x6e0419e8,0x059859d3,0xcb2b67ce,0x0977603f,0x81ff839e,0x33185954,0x4cfbc8d0,0x0f ef1a4c, 0x8510fb54,0x7d6b06c6,0x11ef44f1,0xbce107cf,0xa45a06aa,0xb360152b,0x28dc1ebe,0x6f7fe09b,0x05 16f9a5, 0xb02a1bd8,0x4bb0181e,0x2e89e19b,0xd8125930,0xd178682f,0x3862dc51,0xb636f04e,0x720c47c3,0xce 51ad70, 0xd94b9b22,0x55fbae90,0x6549f499,0xf8c6d399,0x47ed5e5d,0xf8e2def1,0x13253e7b,0x08d0a76b,0x6b fc68c8, 0x12f375c7,0x9b8fe5fd,0x85976aa6,0xd46b4a23,0x39d8ae51,0x47f680fb,0xe70f978b,0x38effd7b,0x2f 7866a2, 0x2554e193,0xa94e98a6,0x8b74bd25,0xbb2b3f5f,0xb0a5fd59,0x887f9ab6,0x8159b717,0x8d5b7b67,0x7c b546bf, 0x41eadca2,0x16fc1085,0x0128f8bd,0xef5c8d89,0xf96afa4f,0xa8b54885,0x565ed838,0xa950fee5,0xf1 c3b0a4, 0xf6fb71e5,0x4dfd169e,0x82cecc72,0x66c850e6,0x7c5ef0ba,0x960f5214,0x060e71eb,0x172a75fc,0x14 86835c, 0xbea65344,0x65b055c9,0x6a72e410,0x52241823,0x25d83041,0x4b40214d,0xaa8091d2,0xe0fb010a,0xe1 5c6de9, 0x0850973b,0xdf1e423b,0xe148a237,0xb87a0c9f,0x34d4b476,0x05b803d7,0x43a86a90,0x399a4af3,0x96 d3a120, 0x0a62f3d9,0x507962e8,0xe5bee6d3,0xda2bb3f7,0x237664ac,0x7a292823,0x900bc635,0x03b29e80,0xd6 3f6067, 0xbf8e1716,0xac25beba,0x350deb62,0xa99fe031,0x85eb4f69,0x937ecd38,0x7941fda5,0x44ba67db,0x09 117749, 0x38b01827,0xbcc69c92,0xb3f772a9,0xd2859ef0,0x03398b1f,0x6bbad7b5,0x74f7989a,0x1d10b2df,0x79 8e0dbf, 0x30d65874,0x64d24878,0xcd00c0ea,0xee8a1a0c,0xc753a279,0x79e11b41,0xdb1de3d5,0x038afaf4,0x9f 5c682c, 0x3748d8a3,0xa9ec54e6,0xa371275f,0x1683510f,0x8e4f9093,0x8f9ab6e1,0x34c2cfdf,0x4841cba8,0x8e 0cff2b, 0x0bcc8e6a,0xdcb71109,0xb5198fec,0xf1bb7e5c,0x531aca50,0xa56a8a3b,0x6de59862,0xd41fa113,0xd9 cd9578, 0x08f08571,0xd9a4bb79,0x2af271f6,0xcc6dbb8d,0xc7ec36e3,0x6be1ed30,0x8164c31c,0x7c0afc54,0x1c 000000}; int length = 0x1626; uint32_t Std_MAC=0x0ca12792;*/ uint32_t MAC; /**************** KeyStream generation testing ***************************/ zuc_genkeystream(k, iv, Keystream, KeystreamLen); for (i = 0; i < KeystreamLen; i++) { printf("%s", "z = "); printf("%08x\n", Keystream[i]); } if (memcmp(Keystream, Std_Keystream, KeystreamLen * 8)) return 1; /**************** Confidentialitym testing ***************************/ printf("\n****************confidentiality validation******************"); zuc_confidentiality(key, COUNT, BEARER, DIRECTION, plain, plainlen, cipher); printf("\nIBS:\n"); for (i = 0; i < (plainlen + 31) / 32; i++) { printf("%08x ", plain[i]); } printf("\nOBS:\n"); for (i = 0; i < (plainlen + 31) / 32; i++) { printf("%08x ", cipher[i]); } if (memcmp(cipher, Std_cipher, (plainlen + 31) / 32)) return 1; /**************** Integrity testing ***************************/ printf("\n\n****************Integrity validation****************"); MAC = zuc_integrity(IK, counter, bear, direc, message, length); printf("\nMAC = %08x ", MAC); if (MAC != Std_MAC) return 1; return 0; }