mirror of
https://github.com/itzmeanjan/ml-kem.git
synced 2026-01-08 23:27:54 -05:00
Add tests for checking, bad secret-key must fail to successfully decapsulate shared secret, against ACVP KATs
Signed-off-by: Anjan Roy <hello@itzmeanjan.in>
This commit is contained in:
64
tests/test_ml_kem_1024_seckeyCheck_acvp_kat.cpp
Normal file
64
tests/test_ml_kem_1024_seckeyCheck_acvp_kat.cpp
Normal file
@@ -0,0 +1,64 @@
|
||||
#include "ml_kem/ml_kem_1024.hpp"
|
||||
#include "randomshake/randomshake.hpp"
|
||||
#include "test_helper.hpp"
|
||||
#include <array>
|
||||
#include <fstream>
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
// Test
|
||||
//
|
||||
// - Given bad ML-KEM-1024 secret key, derived shared secret should not match.
|
||||
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
|
||||
//
|
||||
// using ACVP Known Answer Tests, from
|
||||
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
|
||||
TEST(ML_KEM, ML_KEM_1024_SeckeyCheck_ACVP_KnownAnswerTests)
|
||||
{
|
||||
using namespace std::literals;
|
||||
|
||||
const std::string kat_file = "./kats/ml_kem_1024_seckeyCheck.acvp.kat";
|
||||
std::fstream file(kat_file);
|
||||
|
||||
while (true) {
|
||||
std::string pk_line;
|
||||
|
||||
if (!std::getline(file, pk_line).eof()) {
|
||||
std::string sk_line;
|
||||
std::string tp_line;
|
||||
std::string reason_line;
|
||||
|
||||
std::getline(file, sk_line);
|
||||
std::getline(file, tp_line);
|
||||
std::getline(file, reason_line);
|
||||
|
||||
const auto pk = extract_and_parse_hex_string<ml_kem_1024::PKEY_BYTE_LEN>(pk_line);
|
||||
const auto sk = extract_and_parse_hex_string<ml_kem_1024::SKEY_BYTE_LEN>(sk_line);
|
||||
|
||||
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
|
||||
|
||||
std::array<uint8_t, ml_kem_1024::SEED_M_BYTE_LEN> random_m{};
|
||||
std::array<uint8_t, ml_kem_1024::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
|
||||
std::array<uint8_t, ml_kem_1024::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
|
||||
std::array<uint8_t, ml_kem_1024::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
|
||||
|
||||
randomshake::randomshake_t<256> csprng;
|
||||
csprng.generate(random_m);
|
||||
|
||||
EXPECT_TRUE(ml_kem_1024::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
|
||||
ml_kem_1024::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
|
||||
|
||||
if (test_passed) {
|
||||
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
} else {
|
||||
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
}
|
||||
|
||||
std::string empty_line;
|
||||
std::getline(file, empty_line);
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
file.close();
|
||||
}
|
||||
64
tests/test_ml_kem_512_seckeyCheck_acvp_kat.cpp
Normal file
64
tests/test_ml_kem_512_seckeyCheck_acvp_kat.cpp
Normal file
@@ -0,0 +1,64 @@
|
||||
#include "ml_kem/ml_kem_512.hpp"
|
||||
#include "randomshake/randomshake.hpp"
|
||||
#include "test_helper.hpp"
|
||||
#include <array>
|
||||
#include <fstream>
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
// Test
|
||||
//
|
||||
// - Given bad ML-KEM-512 secret key, derived shared secret should not match.
|
||||
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
|
||||
//
|
||||
// using ACVP Known Answer Tests, from
|
||||
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
|
||||
TEST(ML_KEM, ML_KEM_512_SeckeyCheck_ACVP_KnownAnswerTests)
|
||||
{
|
||||
using namespace std::literals;
|
||||
|
||||
const std::string kat_file = "./kats/ml_kem_512_seckeyCheck.acvp.kat";
|
||||
std::fstream file(kat_file);
|
||||
|
||||
while (true) {
|
||||
std::string pk_line;
|
||||
|
||||
if (!std::getline(file, pk_line).eof()) {
|
||||
std::string sk_line;
|
||||
std::string tp_line;
|
||||
std::string reason_line;
|
||||
|
||||
std::getline(file, sk_line);
|
||||
std::getline(file, tp_line);
|
||||
std::getline(file, reason_line);
|
||||
|
||||
const auto pk = extract_and_parse_hex_string<ml_kem_512::PKEY_BYTE_LEN>(pk_line);
|
||||
const auto sk = extract_and_parse_hex_string<ml_kem_512::SKEY_BYTE_LEN>(sk_line);
|
||||
|
||||
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
|
||||
|
||||
std::array<uint8_t, ml_kem_512::SEED_M_BYTE_LEN> random_m{};
|
||||
std::array<uint8_t, ml_kem_512::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
|
||||
std::array<uint8_t, ml_kem_512::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
|
||||
std::array<uint8_t, ml_kem_512::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
|
||||
|
||||
randomshake::randomshake_t<128> csprng;
|
||||
csprng.generate(random_m);
|
||||
|
||||
EXPECT_TRUE(ml_kem_512::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
|
||||
ml_kem_512::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
|
||||
|
||||
if (test_passed) {
|
||||
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
} else {
|
||||
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
}
|
||||
|
||||
std::string empty_line;
|
||||
std::getline(file, empty_line);
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
file.close();
|
||||
}
|
||||
64
tests/test_ml_kem_768_seckeyCheck_acvp_kat.cpp
Normal file
64
tests/test_ml_kem_768_seckeyCheck_acvp_kat.cpp
Normal file
@@ -0,0 +1,64 @@
|
||||
#include "ml_kem/ml_kem_768.hpp"
|
||||
#include "randomshake/randomshake.hpp"
|
||||
#include "test_helper.hpp"
|
||||
#include <array>
|
||||
#include <fstream>
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
// Test
|
||||
//
|
||||
// - Given bad ML-KEM-768 secret key, derived shared secret should not match.
|
||||
// - Is it conformant with the specification https://doi.org/10.6028/NIST.FIPS.203 ?
|
||||
//
|
||||
// using ACVP Known Answer Tests, from
|
||||
// https://github.com/usnistgov/ACVP-Server/blob/d98cad66639bf9d0822129c4bcae7a169fcf9ca6/gen-val/json-files/ML-KEM-encapDecap-FIPS203/internalProjection.json.
|
||||
TEST(ML_KEM, ML_KEM_768_SeckeyCheck_ACVP_KnownAnswerTests)
|
||||
{
|
||||
using namespace std::literals;
|
||||
|
||||
const std::string kat_file = "./kats/ml_kem_768_seckeyCheck.acvp.kat";
|
||||
std::fstream file(kat_file);
|
||||
|
||||
while (true) {
|
||||
std::string pk_line;
|
||||
|
||||
if (!std::getline(file, pk_line).eof()) {
|
||||
std::string sk_line;
|
||||
std::string tp_line;
|
||||
std::string reason_line;
|
||||
|
||||
std::getline(file, sk_line);
|
||||
std::getline(file, tp_line);
|
||||
std::getline(file, reason_line);
|
||||
|
||||
const auto pk = extract_and_parse_hex_string<ml_kem_768::PKEY_BYTE_LEN>(pk_line);
|
||||
const auto sk = extract_and_parse_hex_string<ml_kem_768::SKEY_BYTE_LEN>(sk_line);
|
||||
|
||||
const auto test_passed = tp_line.substr(tp_line.find("="sv) + 2, tp_line.size()) == "True";
|
||||
|
||||
std::array<uint8_t, ml_kem_768::SEED_M_BYTE_LEN> random_m{};
|
||||
std::array<uint8_t, ml_kem_768::CIPHER_TEXT_BYTE_LEN> computed_ctxt{};
|
||||
std::array<uint8_t, ml_kem_768::SHARED_SECRET_BYTE_LEN> computed_shared_secret_sender{};
|
||||
std::array<uint8_t, ml_kem_768::SHARED_SECRET_BYTE_LEN> computed_shared_secret_receiver{};
|
||||
|
||||
randomshake::randomshake_t<192> csprng;
|
||||
csprng.generate(random_m);
|
||||
|
||||
EXPECT_TRUE(ml_kem_768::encapsulate(random_m, pk, computed_ctxt, computed_shared_secret_sender));
|
||||
ml_kem_768::decapsulate(sk, computed_ctxt, computed_shared_secret_receiver);
|
||||
|
||||
if (test_passed) {
|
||||
EXPECT_EQ(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
} else {
|
||||
EXPECT_NE(computed_shared_secret_sender, computed_shared_secret_receiver);
|
||||
}
|
||||
|
||||
std::string empty_line;
|
||||
std::getline(file, empty_line);
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
file.close();
|
||||
}
|
||||
Reference in New Issue
Block a user