Add tests for checking, bad secret-key must fail to successfully decapsulate shared secret, against ACVP KATs

Signed-off-by: Anjan Roy <hello@itzmeanjan.in>
This commit is contained in:
Anjan Roy
2025-09-23 09:25:57 +05:30
parent 5be903e966
commit 82bc552e4e
3 changed files with 192 additions and 0 deletions

View File

@@ -0,0 +1,64 @@
#include "ml_kem/ml_kem_1024.hpp"
#include "randomshake/randomshake.hpp"
#include "test_helper.hpp"
#include <array>
#include <fstream>
#include <gtest/gtest.h>
// Test
//
// - Given bad ML-KEM-1024 secret key, derived shared secret should not match.
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
//
// using ACVP Known Answer Tests, from
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
TEST(ML_KEM, ML_KEM_1024_SeckeyCheck_ACVP_KnownAnswerTests)
{
using namespace std::literals;
const std::string kat_file = "./kats/ml_kem_1024_seckeyCheck.acvp.kat";
std::fstream file(kat_file);
while (true) {
std::string pk_line;
if (!std::getline(file, pk_line).eof()) {
std::string sk_line;
std::string tp_line;
std::string reason_line;
std::getline(file, sk_line);
std::getline(file, tp_line);
std::getline(file, reason_line);
const auto pk = extract_and_parse_hex_string<ml_kem_1024::PKEY_BYTE_LEN>(pk_line);
const auto sk = extract_and_parse_hex_string<ml_kem_1024::SKEY_BYTE_LEN>(sk_line);
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
std::array<uint8_t, ml_kem_1024::SEED_M_BYTE_LEN> random_m{};
std::array<uint8_t, ml_kem_1024::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
std::array<uint8_t, ml_kem_1024::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
std::array<uint8_t, ml_kem_1024::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
randomshake::randomshake_t<256> csprng;
csprng.generate(random_m);
EXPECT_TRUE(ml_kem_1024::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
ml_kem_1024::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
if (test_passed) {
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
} else {
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
}
std::string empty_line;
std::getline(file, empty_line);
} else {
break;
}
}
file.close();
}

View File

@@ -0,0 +1,64 @@
#include "ml_kem/ml_kem_512.hpp"
#include "randomshake/randomshake.hpp"
#include "test_helper.hpp"
#include <array>
#include <fstream>
#include <gtest/gtest.h>
// Test
//
// - Given bad ML-KEM-512 secret key, derived shared secret should not match.
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
//
// using ACVP Known Answer Tests, from
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
TEST(ML_KEM, ML_KEM_512_SeckeyCheck_ACVP_KnownAnswerTests)
{
using namespace std::literals;
const std::string kat_file = "./kats/ml_kem_512_seckeyCheck.acvp.kat";
std::fstream file(kat_file);
while (true) {
std::string pk_line;
if (!std::getline(file, pk_line).eof()) {
std::string sk_line;
std::string tp_line;
std::string reason_line;
std::getline(file, sk_line);
std::getline(file, tp_line);
std::getline(file, reason_line);
const auto pk = extract_and_parse_hex_string<ml_kem_512::PKEY_BYTE_LEN>(pk_line);
const auto sk = extract_and_parse_hex_string<ml_kem_512::SKEY_BYTE_LEN>(sk_line);
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
std::array<uint8_t, ml_kem_512::SEED_M_BYTE_LEN> random_m{};
std::array<uint8_t, ml_kem_512::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
std::array<uint8_t, ml_kem_512::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
std::array<uint8_t, ml_kem_512::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
randomshake::randomshake_t<128> csprng;
csprng.generate(random_m);
EXPECT_TRUE(ml_kem_512::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
ml_kem_512::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
if (test_passed) {
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
} else {
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
}
std::string empty_line;
std::getline(file, empty_line);
} else {
break;
}
}
file.close();
}

View File

@@ -0,0 +1,64 @@
#include "ml_kem/ml_kem_768.hpp"
#include "randomshake/randomshake.hpp"
#include "test_helper.hpp"
#include <array>
#include <fstream>
#include <gtest/gtest.h>
// Test
//
// - Given bad ML-KEM-768 secret key, derived shared secret should not match.
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
//
// using ACVP Known Answer Tests, from
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
TEST(ML_KEM, ML_KEM_768_SeckeyCheck_ACVP_KnownAnswerTests)
{
using namespace std::literals;
const std::string kat_file = "./kats/ml_kem_768_seckeyCheck.acvp.kat";
std::fstream file(kat_file);
while (true) {
std::string pk_line;
if (!std::getline(file, pk_line).eof()) {
std::string sk_line;
std::string tp_line;
std::string reason_line;
std::getline(file, sk_line);
std::getline(file, tp_line);
std::getline(file, reason_line);
const auto pk = extract_and_parse_hex_string<ml_kem_768::PKEY_BYTE_LEN>(pk_line);
const auto sk = extract_and_parse_hex_string<ml_kem_768::SKEY_BYTE_LEN>(sk_line);
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
std::array<uint8_t, ml_kem_768::SEED_M_BYTE_LEN> random_m{};
std::array<uint8_t, ml_kem_768::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
std::array<uint8_t, ml_kem_768::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
std::array<uint8_t, ml_kem_768::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
randomshake::randomshake_t<192> csprng;
csprng.generate(random_m);
EXPECT_TRUE(ml_kem_768::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
ml_kem_768::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
if (test_passed) {
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
} else {
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
}
std::string empty_line;
std::getline(file, empty_line);
} else {
break;
}
}
file.close();
}