summaryrefslogtreecommitdiff
path: root/TestVectors
Commit message (Collapse)AuthorAgeFilesLines
* Add HC-256 stream cipher (GH #680)Jeffrey Walton2018-07-052-0/+2331
|
* Add additional HC-128 test vectors (GH #679)Jeffrey Walton2018-07-051-0/+16
|
* Add HC-128 stream cipher (GH #679)Jeffrey Walton2018-07-052-2/+635
|
* Update commentsJeffrey Walton2018-07-041-0/+6
|
* Add additional Rabbit test vectors (GH #678)Jeffrey Walton2018-07-041-0/+1905
|
* Add Rabbit stream cipher (GH #678)Jeffrey Walton2018-07-042-0/+70
|
* Add additional SIMECK tests (GH #675)Jeffrey Walton2018-06-301-0/+85
|
* Add additional SIMECK tests (GH #675)Jeffrey Walton2018-06-301-0/+85
|
* Add Simeck lightweight block cipher (GH #675)Jeffrey Walton2018-06-302-0/+148
| | | Add Simeck lightweight block cipher (GH #675)
* Fix copy/paste errorJeffrey Walton2018-06-251-14/+14
|
* Add HIGHT lightweight block cipher (GH #672)Jeffrey Walton2018-06-242-1/+109
|
* Add additional LEA test vectors (GH #669)Jeffrey Walton2018-06-231-0/+249
|
* Add additional LEA test vectors (GH #669)Jeffrey Walton2018-06-231-3/+251
|
* Add additional CHAM test vectors (PR #670)Jeffrey Walton2018-06-191-0/+256
| | | | This is in preparation for SSE and large block processing. CTR mode is used because AdvancedProcessBlocks128_4x1_SSE
* Add CHAM lightweight block cipher (PR #670)Jeffrey Walton2018-06-172-0/+216
| | | Add CHAM lightweight block cipher
* Add LEA lightweight block cipher (GH #669)Jeffrey Walton2018-06-172-0/+217
|
* Add KeyDerivationFunction interface (GH #610, PR #611)Jeffrey Walton2018-03-292-25/+24
|
* Updated source commentJeffrey Walton2018-02-202-10/+10
|
* Add Simon and Speck test vectors to All group (GH #585)Jeffrey Walton2018-02-191-0/+2
|
* Use random IV's for Simon and Speck test vectorsJeffrey Walton2018-02-182-780/+780
|
* Re-add Simon and Speck test vectors (GH #585)Jeffrey Walton2018-02-182-0/+1770
| | | | Of the 200+ test vectors only 10 are semi-authentic. The ten are from the Simon and Speck paper but they had permutations applied to them so they worked with the algorithms described in the paper. The remaining 200 or so were generated with Crypto++ using straight C++ code. The library generated the test vectors because we don't have a reference implementation
* Finish removing Simon and Speck (GH #585)Jeffrey Walton2018-02-151-2/+0
|
* Remove Simon and Speck ciphers (GH #585)Jeffrey Walton2018-02-142-2175/+0
| | | | | | We recently learned our Simon and Speck implementation was wrong. The removal will stop harm until we can loop back and fix the issue. The issue is, the paper, the test vectors and the ref-impl do not align. Each produces slightly different result. We followed the test vectors but they turned out to be wrong for the ciphers. We have one kernel test vector but we don't have a working implementation to observe it to fix our implementation. Ugh...
* Add Speck-128/CTR test vectorsJeffrey Walton2018-02-121-0/+249
|
* Add Simon-128/CTR test vectorsJeffrey Walton2018-02-121-0/+249
|
* Convert Kalyna from variable block size (GH #535)Jeffrey Walton2018-01-181-20/+10
|
* Fix Simon-64 and Speck-64 CTR modeJeffrey Walton2017-12-072-24/+510
| | | | | This fixes CTR mode for IA-32. We were only incrementing half the counters. Added additional test vectors
* Add additional Simon test vectorsJeffrey Walton2017-12-021-0/+188
|
* Add additional Speck test vectorsJeffrey Walton2017-12-021-0/+204
|
* Add SPECK-64 and SPECK-128 large block testsJeffrey Walton2017-12-011-0/+102
| | | | The tests were generated using Crypto++ and the straight C++ implementation. It should allow us to test the SSE and NEON impelmentations and multiple blocks
* Add SIMON-64 and SIMON-128 large block testsJeffrey Walton2017-12-012-1/+101
| | | | The tests were generated using Crypto++ and the straight C++ implementation. It should allow us to test the SSE and NEON impelmentations and multiple blocks
* List Key after Comments in Simon test vectorsJeffrey Walton2017-11-281-54/+54
|
* Add additional Simon-64 test vectorsJeffrey Walton2017-11-281-1/+126
|
* Add additional Simon-128 test vectorsJeffrey Walton2017-11-281-0/+189
|
* Add additional SM3 test vectors (GH #541)Jeffrey Walton2017-11-241-0/+165
|
* Add additional SM3 test vectors (GH #541)Jeffrey Walton2017-11-241-21/+61
|
* Add additional SM3 test vectors (GH #541)Jeffrey Walton2017-11-241-0/+134
|
* Add additional SM3 test vectorsJeffrey Walton2017-11-241-10/+170
| | | | Cleanup SM3 whitespace
* Update documentationJeffrey Walton2017-11-241-2/+2
|
* Add SM3 hash function (GH #541)Jeffrey Walton2017-11-232-0/+20
|
* Add additional SM4 test vectors (GH #540)Jeffrey Walton2017-11-231-0/+70
| | | | The additional ECB mode vectors were generated with Botan. We still need some vectors for SM4/CBC
* Add SM4 block ciphers (GH #540)Jeffrey Walton2017-11-232-0/+164
|
* Add additional test vectors (GH #538, #539)Jeffrey Walton2017-11-221-25/+87
| | | | These were generated by Crypto++ using the C/C++ implementation, which operates on 1 block at a time. They are consumed by the SSSE3 implementation, which operates on 4 blocks at a time. Its not ideal, but it will have to do.
* Add SIMON-64 and SIMON-128 lightweight block ciphers (GH #539)Jeffrey Walton2017-11-211-0/+41
|
* Remove unneeded includeJeffrey Walton2017-11-211-2/+5
|
* Add additional SPECK test vectors (GH #538)Jeffrey Walton2017-11-201-0/+140
| | | | These were generated by modifying the reference implementation
* Add SPECK-64 and SPECK-128 lightweight block ciphers (GH #538)Jeffrey Walton2017-11-203-1/+216
|
* Remove variable block size for Threefish (GH #535)Jeffrey Walton2017-11-171-25/+24
|
* Add additional Threefish test vectorsJeffrey Walton2017-05-151-0/+77
| | | | The test vectors came from NIST submission archive (NIST_CD_102610), skein_golden_kat_short_internals.txt
* Add Threefish block cipher (Issue 422)Jeffrey Walton2017-05-142-0/+42
|