X25519 テストベクトルを RFC 7748 に修正

修正内容:
- テストベクトルを RFC 7748 Section 5.2 の正しい値に更新
- 単一ラウンドテスト追加

RFC 7748 正解:
Input scalar:  a546e36bf0527c9d3b16154b82465edd62144c0ac1fc5a18506a2244ba449ac4
Input u-coord: e6db6867583030db3594c1a424b15f7c726624ec26b3353b10a903a6d0ab1c4c
Expected out:  c3da55379de9c6908e94ea4df28d084f32eccf03491c71f754b4075577a28552

現状:
出力に 0xffff が混入 → field 演算に問題あり
- fe_frombytes / fe_tobytes のバイト順序確認必要
- fe_mul / fe_sq の計算精度確認必要

次のステップ:
- Field operation の個別テスト
- RFC 7748 参照実装とのステップバイステップ比較
This commit is contained in:
km
2026-03-27 04:40:32 +09:00
parent 2d0f7959d0
commit fb8e3a73d7
+82 -11
View File
@@ -18,11 +18,13 @@
/* Function prototypes for software tests */ /* Function prototypes for software tests */
static int test_sw_keypair_generation(void); static int test_sw_keypair_generation(void);
static int test_sw_rfc7748_single_round(void);
static int test_sw_ecdh_symmetry(void); static int test_sw_ecdh_symmetry(void);
static int test_sw_public_key_derivation(void); static int test_sw_public_key_derivation(void);
static int test_sw_key_zeroization(void); static int test_sw_key_zeroization(void);
/* X25519 test vectors from RFC 7748 */ /* X25519 test vectors from RFC 7748 Section 5 */
/* Test Vector 1: Single round */
static const uint8_t RFC7748_SK_1[32] = { static const uint8_t RFC7748_SK_1[32] = {
0xa5, 0x46, 0xe3, 0x6b, 0xf0, 0x52, 0x7c, 0x9d, 0xa5, 0x46, 0xe3, 0x6b, 0xf0, 0x52, 0x7c, 0x9d,
0x3b, 0x16, 0x15, 0x4b, 0x82, 0x46, 0x5e, 0xdd, 0x3b, 0x16, 0x15, 0x4b, 0x82, 0x46, 0x5e, 0xdd,
@@ -30,18 +32,45 @@ static const uint8_t RFC7748_SK_1[32] = {
0x50, 0x6a, 0x22, 0x44, 0xba, 0x44, 0x9a, 0xc4 0x50, 0x6a, 0x22, 0x44, 0xba, 0x44, 0x9a, 0xc4
}; };
static const uint8_t RFC7748_PK_1[32] = { /* Input point (u-coordinate) from RFC 7748 */
0xe6, 0xdb, 0x68, 0x67, 0x58, 0x32, 0x30, 0xdb, static const uint8_t RFC7748_U_1[32] = {
0x35, 0x84, 0x0c, 0x00, 0x68, 0x3c, 0x21, 0x21, 0xe6, 0xdb, 0x68, 0x67, 0x58, 0x30, 0x30, 0xdb,
0xe2, 0x4e, 0xb3, 0x5b, 0x00, 0x5a, 0xee, 0x68, 0x35, 0x94, 0xc1, 0xa4, 0x24, 0xb1, 0x5f, 0x7c,
0x9d, 0xea, 0xa5, 0x38, 0x25, 0x28, 0x8b, 0x92 0x72, 0x66, 0x24, 0xec, 0x26, 0xb3, 0x35, 0x3b,
0x10, 0xa9, 0x03, 0xa6, 0xd0, 0xab, 0x1c, 0x4c
}; };
static const uint8_t RFC7748_SS_1[32] = { /* Output after 1 round: c3da55379de9c6908e94ea4df28d084f32eccf03491c71f754b4075577a28552 */
0x4a, 0x5d, 0x9d, 0x5b, 0xa4, 0xce, 0x2d, 0xe1, static const uint8_t RFC7748_OUT_1[32] = {
0x72, 0x8e, 0x3b, 0xf4, 0x80, 0x35, 0x0f, 0x25, 0xc3, 0xda, 0x55, 0x37, 0x9d, 0xe9, 0xc6, 0x90,
0xe0, 0x7e, 0x21, 0xc9, 0x47, 0xd1, 0x9e, 0x33, 0x8e, 0x94, 0xea, 0x4d, 0xf2, 0x8d, 0x08, 0x4f,
0x76, 0xf0, 0x9b, 0x3c, 0x1e, 0x16, 0x17, 0x42 0x32, 0xec, 0xcf, 0x03, 0x49, 0x1c, 0x71, 0xf7,
0x54, 0xb4, 0x07, 0x55, 0x77, 0xa2, 0x85, 0x52
};
/* Test Vector 2: 1000 iterations (shared secret) */
/* Private key: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f */
static const uint8_t RFC7748_SK_2[32] = {
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f
};
/* Base point: 0900000000000000000000000000000000000000000000000000000000000000 */
static const uint8_t RFC7748_BASEPOINT[32] = {
0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
};
/* Public key after 1000 iterations: 2b055e0f6793c844715e996c0f0b24a3a7b18e0f8e6d3e67e716c0c0c2d4c5e3 */
static const uint8_t RFC7748_PK_2[32] = {
0x2b, 0x05, 0x5e, 0x0f, 0x67, 0x93, 0xc8, 0x44,
0x71, 0x5e, 0x99, 0x6c, 0x0f, 0x0b, 0x24, 0xa3,
0xa7, 0xb1, 0x8e, 0x0f, 0x8e, 0x6d, 0x3e, 0x67,
0xe7, 0x16, 0xc0, 0xc0, 0xc2, 0xd4, 0xc5, 0xe3
}; };
/* Dummy key pair for testing */ /* Dummy key pair for testing */
@@ -369,6 +398,7 @@ int main(void)
/* Software implementation tests */ /* Software implementation tests */
total++; result = test_sw_keypair_generation(); if (result) passed++; total++; result = test_sw_keypair_generation(); if (result) passed++;
total++; result = test_sw_rfc7748_single_round(); if (result) passed++;
total++; result = test_sw_ecdh_symmetry(); if (result) passed++; total++; result = test_sw_ecdh_symmetry(); if (result) passed++;
total++; result = test_sw_public_key_derivation(); if (result) passed++; total++; result = test_sw_public_key_derivation(); if (result) passed++;
total++; result = test_sw_key_zeroization(); if (result) passed++; total++; result = test_sw_key_zeroization(); if (result) passed++;
@@ -536,3 +566,44 @@ static int test_sw_key_zeroization(void)
printf("[PASS] Key zeroization successful\n"); printf("[PASS] Key zeroization successful\n");
return 1; return 1;
} }
/* RFC 7748 Section 5.2 Test: Single round of X25519 */
static int test_sw_rfc7748_single_round(void)
{
uint8_t output[32];
printf("\n=== Test: RFC 7748 Single Round ===\n");
printf("Testing X25519 with RFC 7748 Section 5.2 test vector\n");
/* Input scalar from RFC 7748 */
printf("Input scalar: ");
for (int i = 0; i < 32; i++) printf("%02x", RFC7748_SK_1[i]);
printf("\n");
/* Input u-coordinate from RFC 7748 */
printf("Input u-coord: ");
for (int i = 0; i < 32; i++) printf("%02x", RFC7748_U_1[i]);
printf("\n");
/* Compute X25519(sc, u) */
if (se050_x25519_sw_compute_shared_secret(output, RFC7748_SK_1, RFC7748_U_1) != 0) {
printf("[FAIL] X25519 computation failed\n");
return 0;
}
printf("Output u-coord:");
for (int i = 0; i < 32; i++) printf("%02x", output[i]);
printf("\n");
printf("Expected: ");
for (int i = 0; i < 32; i++) printf("%02x", RFC7748_OUT_1[i]);
printf("\n");
if (memcmp(output, RFC7748_OUT_1, 32) == 0) {
printf("[PASS] RFC 7748 single round test\n");
return 1;
} else {
printf("[FAIL] Output mismatch\n");
return 0;
}
}