Nothing
## tests for AES, taken from the examples in the manual page
suppressMessages(library(digest))
# FIPS-197 examples
hextextToRaw <- function(text) {
vals <- matrix(as.integer(as.hexmode(strsplit(text, "")[[1]])), ncol=2, byrow=TRUE)
vals <- vals %*% c(16, 1)
as.raw(vals)
}
plaintext <- hextextToRaw("00112233445566778899aabbccddeeff")
aes128key <- hextextToRaw("000102030405060708090a0b0c0d0e0f")
aes128output <- hextextToRaw("69c4e0d86a7b0430d8cdb78070b4c55a")
aes <- AES(aes128key)
#aes
aes128 <- aes$encrypt(plaintext)
#aes128
expect_true(identical(aes128, aes128output))
expect_true(identical(plaintext, aes$decrypt(aes128, raw=TRUE)))
aes192key <- hextextToRaw("000102030405060708090a0b0c0d0e0f1011121314151617")
aes192output <- hextextToRaw("dda97ca4864cdfe06eaf70a0ec0d7191")
aes <- AES(aes192key)
#aes
aes192 <- aes$encrypt(plaintext)
#aes192
expect_true(identical(aes192, aes192output))
expect_true(identical(plaintext, aes$decrypt(aes192, raw=TRUE)))
aes256key <- hextextToRaw("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f")
aes256output <- hextextToRaw("8ea2b7ca516745bfeafc49904b496089")
aes <- AES(aes256key)
aes256 <- aes$encrypt(plaintext)
#aes256
expect_true(identical(aes256, aes256output))
expect_true(identical(plaintext, aes$decrypt(aes256, raw=TRUE)))
# SP800-38a examples
plaintext <- hextextToRaw(paste("6bc1bee22e409f96e93d7e117393172a",
"ae2d8a571e03ac9c9eb76fac45af8e51",
"30c81c46a35ce411e5fbc1191a0a52ef",
"f69f2445df4f9b17ad2b417be66c3710",sep=""))
key <- hextextToRaw("2b7e151628aed2a6abf7158809cf4f3c")
ecb128output <- hextextToRaw(paste("3ad77bb40d7a3660a89ecaf32466ef97",
"f5d3d58503b9699de785895a96fdbaaf",
"43b1cd7f598ece23881b00e3ed030688",
"7b0c785e27e8ad3f8223207104725dd4",sep=""))
aes <- AES(key)
ecb128 <- aes$encrypt(plaintext)
#ecb128
expect_true(identical(ecb128, ecb128output))
expect_true(identical(plaintext, aes$decrypt(ecb128, raw=TRUE)))
cbc128output <- hextextToRaw(paste("7649abac8119b246cee98e9b12e9197d",
"5086cb9b507219ee95db113a917678b2",
"73bed6b8e3c1743b7116e69e22229516",
"3ff1caa1681fac09120eca307586e1a7",sep=""))
iv <- hextextToRaw("000102030405060708090a0b0c0d0e0f")
aes <- AES(key, mode="CBC", IV=iv)
cbc128 <- aes$encrypt(plaintext)
#cbc128
expect_true(identical(cbc128, cbc128output))
aes <- AES(key, mode="CBC", IV=iv)
expect_true(identical(plaintext, aes$decrypt(cbc128, raw=TRUE)))
ctr128output <- hextextToRaw(paste("874d6191b620e3261bef6864990db6ce",
"9806f66b7970fdff8617187bb9fffdff",
"5ae4df3edbd5d35e5b4f09020db03eab",
"1e031dda2fbe03d1792170a0f3009cee",sep=""))
iv <- hextextToRaw("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff")
aes <- AES(key, mode="CTR", IV=iv)
ctr128 <- aes$encrypt(plaintext)
#ctr128
expect_true(identical(ctr128, ctr128output))
aes <- AES(key, mode="CTR", IV=iv)
expect_true(identical(plaintext, aes$decrypt(ctr128, raw=TRUE)))
#cfb
key <- hextextToRaw("2b7e151628aed2a6abf7158809cf4f3c")
iv <- hextextToRaw("000102030405060708090a0b0c0d0e0f")
#cfb not a multiplier of 16
text <- "This is very secret string"
key <- hextextToRaw("2b7e151628aed2a6abf7158809cf4f3c")
iv <- hextextToRaw("000102030405060708090a0b0c0d0e0f")
cfb128output <- hextextToRaw(paste("04960ebfb9044196ac6c4590bbdc8903",
"e1259a479e199af94518",sep=""))
aes <- AES(key, mode="CFB", IV=iv)
cfb128 <- aes$encrypt(text)
expect_true(identical(cfb128, cfb128output))
aes <- AES(key, mode="CFB", IV=iv)
expect_true(identical(text, aes$decrypt(cfb128, raw=FALSE)))
#cfb128
cfb128output <- hextextToRaw(paste("3b3fd92eb72dad20333449f8e83cfb4a",
"c8a64537a0b3a93fcde3cdad9f1ce58b",
"26751f67a3cbb140b1808cf187a4f4df",
"c04b05357c5d1c0eeac4c66f9ff7f2e6",sep=""))
aes <- AES(key, mode="CFB", IV=iv)
cfb128 <- aes$encrypt(plaintext)
expect_true(identical(cfb128, cfb128output))
aes <- AES(key, mode="CFB", IV=iv)
expect_true(identical(plaintext, aes$decrypt(cfb128, raw=TRUE)))
# test throws exception on IV null or not a multiplier of 16 bytes
aes <- AES(key, mode="CFB", IV=NULL)
expect_error(aes$encrypt(plaintext))
expect_error(aes$decrypt(plaintext))
aes <- AES(key, mode="CFB", IV=raw(15))
expect_error(aes$encrypt(plaintext))
expect_error(aes$decrypt(plaintext))
# test that providing raw vs character inputs results in the same output
text <- "0123456789ABCDEF"
raw_text <- charToRaw(text)
expect_identical(
AES(key, mode="ECB")$encrypt(text),
AES(key, mode="ECB")$encrypt(raw_text)
)
# test padding for CBC
expect_length(AES(raw_text, "CBC", raw_text)$encrypt(text), 16)
expect_length(AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt(text), 32)
expect_identical(
AES(raw_text, "CBC", raw_text)$encrypt(text),
head(AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt(text), 16)
)
expect_identical(
paste(AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt(text), collapse = ""),
"9d2cda901b682d3359709a5ab24196242125333bdf540132179ac0de79e1837a"
)
cipher <- AES(raw_text, "CBC", raw_text)$encrypt(text)
expect_identical(AES(raw_text, "CBC", raw_text)$decrypt(cipher), text)
cipher_padded <- AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt(text)
expect_identical(AES(raw_text, "CBC", raw_text, padding = TRUE)$decrypt(cipher_padded), text)
expect_error(AES(raw_text, "CBC", raw_text)$encrypt("testing"))
expect_identical(
paste(AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt("testing"), collapse = ""),
"4017d340b6eafbb66c3dfceb10808cff"
)
expect_identical(
AES(raw_text, "CBC", raw_text, padding = TRUE)$decrypt(
AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt("testing")
),
"testing"
)
expect_error(AES(raw_text, "CBC", raw_text)$encrypt("testingalongerstring"))
expect_identical(
paste(AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt("testingalongerstring"), collapse = ""),
"2d870ada654f4bdff182497a88e08013a232bfb5701c12a4d3b29f4f66e74ecd"
)
expect_identical(
AES(raw_text, "CBC", raw_text, padding = TRUE)$decrypt(
AES(raw_text, "CBC", raw_text, padding = TRUE)$encrypt("testingalongerstring")
),
"testingalongerstring"
)
Any scripts or data that you put into this service are public.
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.