|
from sympy.core import symbols |
|
from sympy.crypto.crypto import (cycle_list, |
|
encipher_shift, encipher_affine, encipher_substitution, |
|
check_and_join, encipher_vigenere, decipher_vigenere, |
|
encipher_hill, decipher_hill, encipher_bifid5, encipher_bifid6, |
|
bifid5_square, bifid6_square, bifid5, bifid6, |
|
decipher_bifid5, decipher_bifid6, encipher_kid_rsa, |
|
decipher_kid_rsa, kid_rsa_private_key, kid_rsa_public_key, |
|
decipher_rsa, rsa_private_key, rsa_public_key, encipher_rsa, |
|
lfsr_connection_polynomial, lfsr_autocorrelation, lfsr_sequence, |
|
encode_morse, decode_morse, elgamal_private_key, elgamal_public_key, |
|
encipher_elgamal, decipher_elgamal, dh_private_key, dh_public_key, |
|
dh_shared_key, decipher_shift, decipher_affine, encipher_bifid, |
|
decipher_bifid, bifid_square, padded_key, uniq, decipher_gm, |
|
encipher_gm, gm_public_key, gm_private_key, encipher_bg, decipher_bg, |
|
bg_private_key, bg_public_key, encipher_rot13, decipher_rot13, |
|
encipher_atbash, decipher_atbash, NonInvertibleCipherWarning, |
|
encipher_railfence, decipher_railfence) |
|
from sympy.external.gmpy import gcd |
|
from sympy.matrices import Matrix |
|
from sympy.ntheory import isprime, is_primitive_root |
|
from sympy.polys.domains import FF |
|
|
|
from sympy.testing.pytest import raises, warns |
|
|
|
from sympy.core.random import randrange |
|
|
|
def test_encipher_railfence(): |
|
assert encipher_railfence("hello world",2) == "hlowrdel ol" |
|
assert encipher_railfence("hello world",3) == "horel ollwd" |
|
assert encipher_railfence("hello world",4) == "hwe olordll" |
|
|
|
def test_decipher_railfence(): |
|
assert decipher_railfence("hlowrdel ol",2) == "hello world" |
|
assert decipher_railfence("horel ollwd",3) == "hello world" |
|
assert decipher_railfence("hwe olordll",4) == "hello world" |
|
|
|
|
|
def test_cycle_list(): |
|
assert cycle_list(3, 4) == [3, 0, 1, 2] |
|
assert cycle_list(-1, 4) == [3, 0, 1, 2] |
|
assert cycle_list(1, 4) == [1, 2, 3, 0] |
|
|
|
|
|
def test_encipher_shift(): |
|
assert encipher_shift("ABC", 0) == "ABC" |
|
assert encipher_shift("ABC", 1) == "BCD" |
|
assert encipher_shift("ABC", -1) == "ZAB" |
|
assert decipher_shift("ZAB", -1) == "ABC" |
|
|
|
def test_encipher_rot13(): |
|
assert encipher_rot13("ABC") == "NOP" |
|
assert encipher_rot13("NOP") == "ABC" |
|
assert decipher_rot13("ABC") == "NOP" |
|
assert decipher_rot13("NOP") == "ABC" |
|
|
|
|
|
def test_encipher_affine(): |
|
assert encipher_affine("ABC", (1, 0)) == "ABC" |
|
assert encipher_affine("ABC", (1, 1)) == "BCD" |
|
assert encipher_affine("ABC", (-1, 0)) == "AZY" |
|
assert encipher_affine("ABC", (-1, 1), symbols="ABCD") == "BAD" |
|
assert encipher_affine("123", (-1, 1), symbols="1234") == "214" |
|
assert encipher_affine("ABC", (3, 16)) == "QTW" |
|
assert decipher_affine("QTW", (3, 16)) == "ABC" |
|
|
|
def test_encipher_atbash(): |
|
assert encipher_atbash("ABC") == "ZYX" |
|
assert encipher_atbash("ZYX") == "ABC" |
|
assert decipher_atbash("ABC") == "ZYX" |
|
assert decipher_atbash("ZYX") == "ABC" |
|
|
|
def test_encipher_substitution(): |
|
assert encipher_substitution("ABC", "BAC", "ABC") == "BAC" |
|
assert encipher_substitution("123", "1243", "1234") == "124" |
|
|
|
|
|
def test_check_and_join(): |
|
assert check_and_join("abc") == "abc" |
|
assert check_and_join(uniq("aaabc")) == "abc" |
|
assert check_and_join("ab c".split()) == "abc" |
|
assert check_and_join("abc", "a", filter=True) == "a" |
|
raises(ValueError, lambda: check_and_join('ab', 'a')) |
|
|
|
|
|
def test_encipher_vigenere(): |
|
assert encipher_vigenere("ABC", "ABC") == "ACE" |
|
assert encipher_vigenere("ABC", "ABC", symbols="ABCD") == "ACA" |
|
assert encipher_vigenere("ABC", "AB", symbols="ABCD") == "ACC" |
|
assert encipher_vigenere("AB", "ABC", symbols="ABCD") == "AC" |
|
assert encipher_vigenere("A", "ABC", symbols="ABCD") == "A" |
|
|
|
|
|
def test_decipher_vigenere(): |
|
assert decipher_vigenere("ABC", "ABC") == "AAA" |
|
assert decipher_vigenere("ABC", "ABC", symbols="ABCD") == "AAA" |
|
assert decipher_vigenere("ABC", "AB", symbols="ABCD") == "AAC" |
|
assert decipher_vigenere("AB", "ABC", symbols="ABCD") == "AA" |
|
assert decipher_vigenere("A", "ABC", symbols="ABCD") == "A" |
|
|
|
|
|
def test_encipher_hill(): |
|
A = Matrix(2, 2, [1, 2, 3, 5]) |
|
assert encipher_hill("ABCD", A) == "CFIV" |
|
A = Matrix(2, 2, [1, 0, 0, 1]) |
|
assert encipher_hill("ABCD", A) == "ABCD" |
|
assert encipher_hill("ABCD", A, symbols="ABCD") == "ABCD" |
|
A = Matrix(2, 2, [1, 2, 3, 5]) |
|
assert encipher_hill("ABCD", A, symbols="ABCD") == "CBAB" |
|
assert encipher_hill("AB", A, symbols="ABCD") == "CB" |
|
|
|
|
|
assert encipher_hill("ABA", A) == "CFGC" |
|
assert encipher_hill("ABA", A, pad="Z") == "CFYV" |
|
|
|
|
|
def test_decipher_hill(): |
|
A = Matrix(2, 2, [1, 2, 3, 5]) |
|
assert decipher_hill("CFIV", A) == "ABCD" |
|
A = Matrix(2, 2, [1, 0, 0, 1]) |
|
assert decipher_hill("ABCD", A) == "ABCD" |
|
assert decipher_hill("ABCD", A, symbols="ABCD") == "ABCD" |
|
A = Matrix(2, 2, [1, 2, 3, 5]) |
|
assert decipher_hill("CBAB", A, symbols="ABCD") == "ABCD" |
|
assert decipher_hill("CB", A, symbols="ABCD") == "AB" |
|
|
|
assert decipher_hill("CFA", A) == "ABAA" |
|
|
|
|
|
def test_encipher_bifid5(): |
|
assert encipher_bifid5("AB", "AB") == "AB" |
|
assert encipher_bifid5("AB", "CD") == "CO" |
|
assert encipher_bifid5("ab", "c") == "CH" |
|
assert encipher_bifid5("a bc", "b") == "BAC" |
|
|
|
|
|
def test_bifid5_square(): |
|
A = bifid5 |
|
f = lambda i, j: symbols(A[5*i + j]) |
|
M = Matrix(5, 5, f) |
|
assert bifid5_square("") == M |
|
|
|
|
|
def test_decipher_bifid5(): |
|
assert decipher_bifid5("AB", "AB") == "AB" |
|
assert decipher_bifid5("CO", "CD") == "AB" |
|
assert decipher_bifid5("ch", "c") == "AB" |
|
assert decipher_bifid5("b ac", "b") == "ABC" |
|
|
|
|
|
def test_encipher_bifid6(): |
|
assert encipher_bifid6("AB", "AB") == "AB" |
|
assert encipher_bifid6("AB", "CD") == "CP" |
|
assert encipher_bifid6("ab", "c") == "CI" |
|
assert encipher_bifid6("a bc", "b") == "BAC" |
|
|
|
|
|
def test_decipher_bifid6(): |
|
assert decipher_bifid6("AB", "AB") == "AB" |
|
assert decipher_bifid6("CP", "CD") == "AB" |
|
assert decipher_bifid6("ci", "c") == "AB" |
|
assert decipher_bifid6("b ac", "b") == "ABC" |
|
|
|
|
|
def test_bifid6_square(): |
|
A = bifid6 |
|
f = lambda i, j: symbols(A[6*i + j]) |
|
M = Matrix(6, 6, f) |
|
assert bifid6_square("") == M |
|
|
|
|
|
def test_rsa_public_key(): |
|
assert rsa_public_key(2, 3, 1) == (6, 1) |
|
assert rsa_public_key(5, 3, 3) == (15, 3) |
|
|
|
with warns(NonInvertibleCipherWarning): |
|
assert rsa_public_key(2, 2, 1) == (4, 1) |
|
assert rsa_public_key(8, 8, 8) is False |
|
|
|
|
|
def test_rsa_private_key(): |
|
assert rsa_private_key(2, 3, 1) == (6, 1) |
|
assert rsa_private_key(5, 3, 3) == (15, 3) |
|
assert rsa_private_key(23,29,5) == (667,493) |
|
|
|
with warns(NonInvertibleCipherWarning): |
|
assert rsa_private_key(2, 2, 1) == (4, 1) |
|
assert rsa_private_key(8, 8, 8) is False |
|
|
|
|
|
def test_rsa_large_key(): |
|
|
|
|
|
p = int('101565610013301240713207239558950144682174355406589305284428666'\ |
|
'903702505233009') |
|
q = int('894687191887545488935455605955948413812376003053143521429242133'\ |
|
'12069293984003') |
|
e = int('65537') |
|
d = int('893650581832704239530398858744759129594796235440844479456143566'\ |
|
'6999402846577625762582824202269399672579058991442587406384754958587'\ |
|
'400493169361356902030209') |
|
assert rsa_public_key(p, q, e) == (p*q, e) |
|
assert rsa_private_key(p, q, e) == (p*q, d) |
|
|
|
|
|
def test_encipher_rsa(): |
|
puk = rsa_public_key(2, 3, 1) |
|
assert encipher_rsa(2, puk) == 2 |
|
puk = rsa_public_key(5, 3, 3) |
|
assert encipher_rsa(2, puk) == 8 |
|
|
|
with warns(NonInvertibleCipherWarning): |
|
puk = rsa_public_key(2, 2, 1) |
|
assert encipher_rsa(2, puk) == 2 |
|
|
|
|
|
def test_decipher_rsa(): |
|
prk = rsa_private_key(2, 3, 1) |
|
assert decipher_rsa(2, prk) == 2 |
|
prk = rsa_private_key(5, 3, 3) |
|
assert decipher_rsa(8, prk) == 2 |
|
|
|
with warns(NonInvertibleCipherWarning): |
|
prk = rsa_private_key(2, 2, 1) |
|
assert decipher_rsa(2, prk) == 2 |
|
|
|
|
|
def test_mutltiprime_rsa_full_example(): |
|
|
|
|
|
puk = rsa_public_key(2, 3, 5, 7, 11, 13, 7) |
|
prk = rsa_private_key(2, 3, 5, 7, 11, 13, 7) |
|
assert puk == (30030, 7) |
|
assert prk == (30030, 823) |
|
|
|
msg = 10 |
|
encrypted = encipher_rsa(2 * msg - 15, puk) |
|
assert encrypted == 18065 |
|
decrypted = (decipher_rsa(encrypted, prk) + 15) / 2 |
|
assert decrypted == msg |
|
|
|
|
|
|
|
puk1 = rsa_public_key(53, 41, 43, 47, 41) |
|
prk1 = rsa_private_key(53, 41, 43, 47, 41) |
|
puk2 = rsa_public_key(53, 41, 43, 47, 97) |
|
prk2 = rsa_private_key(53, 41, 43, 47, 97) |
|
|
|
assert puk1 == (4391633, 41) |
|
assert prk1 == (4391633, 294041) |
|
assert puk2 == (4391633, 97) |
|
assert prk2 == (4391633, 455713) |
|
|
|
msg = 12321 |
|
encrypted = encipher_rsa(encipher_rsa(msg, puk1), puk2) |
|
assert encrypted == 1081588 |
|
decrypted = decipher_rsa(decipher_rsa(encrypted, prk2), prk1) |
|
assert decrypted == msg |
|
|
|
|
|
def test_rsa_crt_extreme(): |
|
p = int( |
|
'10177157607154245068023861503693082120906487143725062283406501' \ |
|
'54082258226204046999838297167140821364638180697194879500245557' \ |
|
'65445186962893346463841419427008800341257468600224049986260471' \ |
|
'92257248163014468841725476918639415726709736077813632961290911' \ |
|
'0256421232977833028677441206049309220354796014376698325101693') |
|
|
|
q = int( |
|
'28752342353095132872290181526607275886182793241660805077850801' \ |
|
'75689512797754286972952273553128181861830576836289738668745250' \ |
|
'34028199691128870676414118458442900035778874482624765513861643' \ |
|
'27966696316822188398336199002306588703902894100476186823849595' \ |
|
'103239410527279605442148285816149368667083114802852804976893') |
|
|
|
r = int( |
|
'17698229259868825776879500736350186838850961935956310134378261' \ |
|
'89771862186717463067541369694816245225291921138038800171125596' \ |
|
'07315449521981157084370187887650624061033066022458512942411841' \ |
|
'18747893789972315277160085086164119879536041875335384844820566' \ |
|
'0287479617671726408053319619892052000850883994343378882717849') |
|
|
|
s = int( |
|
'68925428438585431029269182233502611027091755064643742383515623' \ |
|
'64321310582896893395529367074942808353187138794422745718419645' \ |
|
'28291231865157212604266903677599180789896916456120289112752835' \ |
|
'98502265889669730331688206825220074713977607415178738015831030' \ |
|
'364290585369150502819743827343552098197095520550865360159439' |
|
) |
|
|
|
t = int( |
|
'69035483433453632820551311892368908779778144568711455301541094' \ |
|
'31487047642322695357696860925747923189635033183069823820910521' \ |
|
'71172909106797748883261493224162414050106920442445896819806600' \ |
|
'15448444826108008217972129130625571421904893252804729877353352' \ |
|
'739420480574842850202181462656251626522910618936534699566291' |
|
) |
|
|
|
e = 65537 |
|
puk = rsa_public_key(p, q, r, s, t, e) |
|
prk = rsa_private_key(p, q, r, s, t, e) |
|
|
|
plaintext = 1000 |
|
ciphertext_1 = encipher_rsa(plaintext, puk) |
|
ciphertext_2 = encipher_rsa(plaintext, puk, [p, q, r, s, t]) |
|
assert ciphertext_1 == ciphertext_2 |
|
assert decipher_rsa(ciphertext_1, prk) == \ |
|
decipher_rsa(ciphertext_1, prk, [p, q, r, s, t]) |
|
|
|
|
|
def test_rsa_exhaustive(): |
|
p, q = 61, 53 |
|
e = 17 |
|
puk = rsa_public_key(p, q, e, totient='Carmichael') |
|
prk = rsa_private_key(p, q, e, totient='Carmichael') |
|
|
|
for msg in range(puk[0]): |
|
encrypted = encipher_rsa(msg, puk) |
|
decrypted = decipher_rsa(encrypted, prk) |
|
try: |
|
assert decrypted == msg |
|
except AssertionError: |
|
raise AssertionError( |
|
"The RSA is not correctly decrypted " \ |
|
"(Original : {}, Encrypted : {}, Decrypted : {})" \ |
|
.format(msg, encrypted, decrypted) |
|
) |
|
|
|
|
|
def test_rsa_multiprime_exhanstive(): |
|
primes = [3, 5, 7, 11] |
|
e = 7 |
|
args = primes + [e] |
|
puk = rsa_public_key(*args, totient='Carmichael') |
|
prk = rsa_private_key(*args, totient='Carmichael') |
|
n = puk[0] |
|
|
|
for msg in range(n): |
|
encrypted = encipher_rsa(msg, puk) |
|
decrypted = decipher_rsa(encrypted, prk) |
|
try: |
|
assert decrypted == msg |
|
except AssertionError: |
|
raise AssertionError( |
|
"The RSA is not correctly decrypted " \ |
|
"(Original : {}, Encrypted : {}, Decrypted : {})" \ |
|
.format(msg, encrypted, decrypted) |
|
) |
|
|
|
|
|
def test_rsa_multipower_exhanstive(): |
|
primes = [5, 5, 7] |
|
e = 7 |
|
args = primes + [e] |
|
puk = rsa_public_key(*args, multipower=True) |
|
prk = rsa_private_key(*args, multipower=True) |
|
n = puk[0] |
|
|
|
for msg in range(n): |
|
if gcd(msg, n) != 1: |
|
continue |
|
|
|
encrypted = encipher_rsa(msg, puk) |
|
decrypted = decipher_rsa(encrypted, prk) |
|
try: |
|
assert decrypted == msg |
|
except AssertionError: |
|
raise AssertionError( |
|
"The RSA is not correctly decrypted " \ |
|
"(Original : {}, Encrypted : {}, Decrypted : {})" \ |
|
.format(msg, encrypted, decrypted) |
|
) |
|
|
|
|
|
def test_kid_rsa_public_key(): |
|
assert kid_rsa_public_key(1, 2, 1, 1) == (5, 2) |
|
assert kid_rsa_public_key(1, 2, 2, 1) == (8, 3) |
|
assert kid_rsa_public_key(1, 2, 1, 2) == (7, 2) |
|
|
|
|
|
def test_kid_rsa_private_key(): |
|
assert kid_rsa_private_key(1, 2, 1, 1) == (5, 3) |
|
assert kid_rsa_private_key(1, 2, 2, 1) == (8, 3) |
|
assert kid_rsa_private_key(1, 2, 1, 2) == (7, 4) |
|
|
|
|
|
def test_encipher_kid_rsa(): |
|
assert encipher_kid_rsa(1, (5, 2)) == 2 |
|
assert encipher_kid_rsa(1, (8, 3)) == 3 |
|
assert encipher_kid_rsa(1, (7, 2)) == 2 |
|
|
|
|
|
def test_decipher_kid_rsa(): |
|
assert decipher_kid_rsa(2, (5, 3)) == 1 |
|
assert decipher_kid_rsa(3, (8, 3)) == 1 |
|
assert decipher_kid_rsa(2, (7, 4)) == 1 |
|
|
|
|
|
def test_encode_morse(): |
|
assert encode_morse('ABC') == '.-|-...|-.-.' |
|
assert encode_morse('SMS ') == '...|--|...||' |
|
assert encode_morse('SMS\n') == '...|--|...||' |
|
assert encode_morse('') == '' |
|
assert encode_morse(' ') == '||' |
|
assert encode_morse(' ', sep='`') == '``' |
|
assert encode_morse(' ', sep='``') == '````' |
|
assert encode_morse('!@#$%^&*()_+') == '-.-.--|.--.-.|...-..-|-.--.|-.--.-|..--.-|.-.-.' |
|
assert encode_morse('12345') == '.----|..---|...--|....-|.....' |
|
assert encode_morse('67890') == '-....|--...|---..|----.|-----' |
|
|
|
|
|
def test_decode_morse(): |
|
assert decode_morse('-.-|.|-.--') == 'KEY' |
|
assert decode_morse('.-.|..-|-.||') == 'RUN' |
|
raises(KeyError, lambda: decode_morse('.....----')) |
|
|
|
|
|
def test_lfsr_sequence(): |
|
raises(TypeError, lambda: lfsr_sequence(1, [1], 1)) |
|
raises(TypeError, lambda: lfsr_sequence([1], 1, 1)) |
|
F = FF(2) |
|
assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)] |
|
assert lfsr_sequence([F(0)], [F(1)], 2) == [F(1), F(0)] |
|
F = FF(3) |
|
assert lfsr_sequence([F(1)], [F(1)], 2) == [F(1), F(1)] |
|
assert lfsr_sequence([F(0)], [F(2)], 2) == [F(2), F(0)] |
|
assert lfsr_sequence([F(1)], [F(2)], 2) == [F(2), F(2)] |
|
|
|
|
|
def test_lfsr_autocorrelation(): |
|
raises(TypeError, lambda: lfsr_autocorrelation(1, 2, 3)) |
|
F = FF(2) |
|
s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5) |
|
assert lfsr_autocorrelation(s, 2, 0) == 1 |
|
assert lfsr_autocorrelation(s, 2, 1) == -1 |
|
|
|
|
|
def test_lfsr_connection_polynomial(): |
|
F = FF(2) |
|
x = symbols("x") |
|
s = lfsr_sequence([F(1), F(0)], [F(0), F(1)], 5) |
|
assert lfsr_connection_polynomial(s) == x**2 + 1 |
|
s = lfsr_sequence([F(1), F(1)], [F(0), F(1)], 5) |
|
assert lfsr_connection_polynomial(s) == x**2 + x + 1 |
|
|
|
|
|
def test_elgamal_private_key(): |
|
a, b, _ = elgamal_private_key(digit=100) |
|
assert isprime(a) |
|
assert is_primitive_root(b, a) |
|
assert len(bin(a)) >= 102 |
|
|
|
|
|
def test_elgamal(): |
|
dk = elgamal_private_key(5) |
|
ek = elgamal_public_key(dk) |
|
P = ek[0] |
|
assert P - 1 == decipher_elgamal(encipher_elgamal(P - 1, ek), dk) |
|
raises(ValueError, lambda: encipher_elgamal(P, dk)) |
|
raises(ValueError, lambda: encipher_elgamal(-1, dk)) |
|
|
|
|
|
def test_dh_private_key(): |
|
p, g, _ = dh_private_key(digit = 100) |
|
assert isprime(p) |
|
assert is_primitive_root(g, p) |
|
assert len(bin(p)) >= 102 |
|
|
|
|
|
def test_dh_public_key(): |
|
p1, g1, a = dh_private_key(digit = 100) |
|
p2, g2, ga = dh_public_key((p1, g1, a)) |
|
assert p1 == p2 |
|
assert g1 == g2 |
|
assert ga == pow(g1, a, p1) |
|
|
|
|
|
def test_dh_shared_key(): |
|
prk = dh_private_key(digit = 100) |
|
p, _, ga = dh_public_key(prk) |
|
b = randrange(2, p) |
|
sk = dh_shared_key((p, _, ga), b) |
|
assert sk == pow(ga, b, p) |
|
raises(ValueError, lambda: dh_shared_key((1031, 14, 565), 2000)) |
|
|
|
|
|
def test_padded_key(): |
|
assert padded_key('b', 'ab') == 'ba' |
|
raises(ValueError, lambda: padded_key('ab', 'ace')) |
|
raises(ValueError, lambda: padded_key('ab', 'abba')) |
|
|
|
|
|
def test_bifid(): |
|
raises(ValueError, lambda: encipher_bifid('abc', 'b', 'abcde')) |
|
assert encipher_bifid('abc', 'b', 'abcd') == 'bdb' |
|
raises(ValueError, lambda: decipher_bifid('bdb', 'b', 'abcde')) |
|
assert encipher_bifid('bdb', 'b', 'abcd') == 'abc' |
|
raises(ValueError, lambda: bifid_square('abcde')) |
|
assert bifid5_square("B") == \ |
|
bifid5_square('BACDEFGHIKLMNOPQRSTUVWXYZ') |
|
assert bifid6_square('B0') == \ |
|
bifid6_square('B0ACDEFGHIJKLMNOPQRSTUVWXYZ123456789') |
|
|
|
|
|
def test_encipher_decipher_gm(): |
|
ps = [131, 137, 139, 149, 151, 157, 163, 167, |
|
173, 179, 181, 191, 193, 197, 199] |
|
qs = [89, 97, 101, 103, 107, 109, 113, 127, |
|
131, 137, 139, 149, 151, 157, 47] |
|
messages = [ |
|
0, 32855, 34303, 14805, 1280, 75859, 38368, |
|
724, 60356, 51675, 76697, 61854, 18661, |
|
] |
|
for p, q in zip(ps, qs): |
|
pri = gm_private_key(p, q) |
|
for msg in messages: |
|
pub = gm_public_key(p, q) |
|
enc = encipher_gm(msg, pub) |
|
dec = decipher_gm(enc, pri) |
|
assert dec == msg |
|
|
|
|
|
def test_gm_private_key(): |
|
raises(ValueError, lambda: gm_public_key(13, 15)) |
|
raises(ValueError, lambda: gm_public_key(0, 0)) |
|
raises(ValueError, lambda: gm_public_key(0, 5)) |
|
assert 17, 19 == gm_public_key(17, 19) |
|
|
|
|
|
def test_gm_public_key(): |
|
assert 323 == gm_public_key(17, 19)[1] |
|
assert 15 == gm_public_key(3, 5)[1] |
|
raises(ValueError, lambda: gm_public_key(15, 19)) |
|
|
|
def test_encipher_decipher_bg(): |
|
ps = [67, 7, 71, 103, 11, 43, 107, 47, |
|
79, 19, 83, 23, 59, 127, 31] |
|
qs = qs = [7, 71, 103, 11, 43, 107, 47, |
|
79, 19, 83, 23, 59, 127, 31, 67] |
|
messages = [ |
|
0, 328, 343, 148, 1280, 758, 383, |
|
724, 603, 516, 766, 618, 186, |
|
] |
|
|
|
for p, q in zip(ps, qs): |
|
pri = bg_private_key(p, q) |
|
for msg in messages: |
|
pub = bg_public_key(p, q) |
|
enc = encipher_bg(msg, pub) |
|
dec = decipher_bg(enc, pri) |
|
assert dec == msg |
|
|
|
def test_bg_private_key(): |
|
raises(ValueError, lambda: bg_private_key(8, 16)) |
|
raises(ValueError, lambda: bg_private_key(8, 8)) |
|
raises(ValueError, lambda: bg_private_key(13, 17)) |
|
assert 23, 31 == bg_private_key(23, 31) |
|
|
|
def test_bg_public_key(): |
|
assert 5293 == bg_public_key(67, 79) |
|
assert 713 == bg_public_key(23, 31) |
|
raises(ValueError, lambda: bg_private_key(13, 17)) |
|
|