org.bouncycastle.crypto.test.HashCommitmentTest Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-ext-jdk15on Show documentation
Show all versions of bcprov-ext-jdk15on Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8. Note: this package includes the NTRU encryption algorithms.
The newest version!
package org.bouncycastle.crypto.test;
import java.security.SecureRandom;
import org.bouncycastle.crypto.Commitment;
import org.bouncycastle.crypto.Committer;
import org.bouncycastle.crypto.DataLengthException;
import org.bouncycastle.crypto.commitments.GeneralHashCommitter;
import org.bouncycastle.crypto.commitments.HashCommitter;
import org.bouncycastle.crypto.digests.SHA1Digest;
import org.bouncycastle.crypto.digests.SHA256Digest;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.encoders.Hex;
import org.bouncycastle.util.test.SimpleTest;
public class HashCommitmentTest
extends SimpleTest
{
public String getName()
{
return "HashCommitmentTest";
}
public void performBasicTest()
throws Exception
{
byte[] data = Hex.decode("4e6f77206973207468652074696d6520666f7220616c6c20");
Committer committer = new HashCommitter(new SHA256Digest(), new SecureRandom());
Commitment c = committer.commit(data);
committer = new HashCommitter(new SHA256Digest(), new SecureRandom());
if (!committer.isRevealed(c, data))
{
fail("commitment failed to validate");
}
committer = new HashCommitter(new SHA1Digest(), new SecureRandom());
if (committer.isRevealed(c, data))
{
fail("commitment validated!!");
}
try
{
committer.isRevealed(c, new byte[data.length + 1]);
}
catch (Exception e)
{
if (!e.getMessage().equals("Message and witness secret lengths do not match."))
{
fail("exception thrown but wrong message");
}
}
// SHA1 has a block size of 512 bits, try a message that's too big
try
{
c = committer.commit(new byte[33]);
}
catch (DataLengthException e)
{
if (!e.getMessage().equals("Message to be committed to too large for digest."))
{
fail("exception thrown but wrong message");
}
}
}
public void performGeneralTest()
throws Exception
{
byte[] data = Hex.decode("4e6f77206973207468652074696d6520666f7220616c6c20");
Committer committer = new GeneralHashCommitter(new SHA256Digest(), new SecureRandom());
Commitment c = committer.commit(data);
committer = new GeneralHashCommitter(new SHA256Digest(), new SecureRandom());
if (!committer.isRevealed(c, data))
{
fail("general commitment failed to validate");
}
committer = new GeneralHashCommitter(new SHA1Digest(), new SecureRandom());
if (committer.isRevealed(c, data))
{
fail("general commitment validated!!");
}
c = committer.commit(data);
// try and fool it.
byte[] s = c.getSecret();
byte[] newS = Arrays.copyOfRange(s, 0, s.length - 1);
byte[] newData = new byte[data.length + 1];
newData[0] = s[s.length - 1];
System.arraycopy(data, 0, newData, 1, data.length);
c = new Commitment(newS, c.getCommitment());
if (committer.isRevealed(c, newData))
{
fail("general commitment validated!!");
}
try
{
committer.isRevealed(c, new byte[data.length + 1]);
}
catch (Exception e)
{
if (!e.getMessage().equals("Message and witness secret lengths do not match."))
{
fail("exception thrown but wrong message");
}
}
// SHA1 has a block size of 512 bits, try a message that's too big
try
{
c = committer.commit(new byte[33]);
}
catch (DataLengthException e)
{
if (!e.getMessage().equals("Message to be committed to too large for digest."))
{
fail("exception thrown but wrong message");
}
}
}
public void performTest()
throws Exception
{
performBasicTest();
performGeneralTest();
}
public static void main(String[] args)
{
runTest(new HashCommitmentTest());
}
}