barrier/tools/cryptopp561/TestVectors/rsa_pkcs1_1_5.txt

90 lines
4.4 KiB
Plaintext

AlgorithmType: Signature
Name: RSA/PKCS1-1.5(MD2)
KeyFormat: DER
Source: http://www.rsasecurity.com/rsalabs/pkcs/index.html, \
Some Examples of the PKCS Standards
PrivateKey: \
30 82 01 50\
02 01 00 #version = 0\
30 0d #privateKeyAlgorithmIdentifier\
06 09 #algorithm = rsaEncryption\
2a 86 48 86 f7 0d 01 01 01\
05 00 #parameters = NULL\
04 82 01 3a #privateKey = RSAPrivateKey encoding\
30 82 01 36\
02 01 00 #version = 0\
02 40 #modulus = n\
0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\
c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\
d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\
01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\
02 03 01 00 01 #publicExponent = e\
02 40 #privateExponent = d\
01 23 c5 b6 1b a3 6e db 1d 36 79 90 41 99 a8 9e\
a8 0c 09 b9 12 2e 14 00 c0 9a dc f7 78 46 76 d0\
1d 23 35 6a 7d 44 d6 bd 8b d5 0e 94 bf c7 23 fa\
87 d8 86 2b 75 17 76 91 c1 1d 75 76 92 df 88 81\
02 20 #prime1 = p\
33 d4 84 45 c8 59 e5 23 40 de 70 4b cd da 06 5f\
bb 40 58 d7 40 bd 1d 67 d2 9e 9c 14 6c 11 cf 61\
02 20 #prime2 = q\
33 5e 84 08 86 6b 0f d3 8d c7 00 2d 3f 97 2c 67\
38 9a 65 d5 d8 30 65 66 d5 c4 f2 a5 aa 52 62 8b\
02 20 #exponent1 = d mod p-1\
04 5e c9 00 71 52 53 25 d3 d4 6d b7 96 95 e9 af\
ac c4 52 39 64 36 0e 02 b1 19 ba a3 66 31 62 41\
02 20 #exponent2 = d mod q-1\
15 eb 32 73 60 c7 b6 0d 12 e5 e2 d1 6b dc d9 79\
81 d1 7f ba 6b 70 db 13 b2 0b 43 6e 24 ea da 59\
02 20 #coefficient = q-1 mod p\
2c a6 36 6d 72 78 1d fa 24 d3 4a 9a 24 cb c2 ae\
92 7a 99 58 af 42 65 63 ff 63 fb 11 65 8a 46 1d
PublicKey: \
30 5b #subjectPublicKeyInfo\
30 0d #algorithm\
06 09 #algorithm = rsaEncryption\
2a 86 48 86 f7 0d 01 01 01\
05 00 #parameters = NULL\
03 4a #subjectPublicKey = RSAPublicKey encoding\
00\
30 47\
02 40 #modulus = n\
0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\
c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\
d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\
01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\
02 03 01 00 01 #publicExponent = e
Test: KeyPairValidAndConsistent
Message: # "Everyone gets Friday off."\
45 76 65 72 79 6f 6e 65 20 67 65 74 73 20 46 72 69 64 61 79 20 6f 66 66 2e
Signature: \
05fa6a812fc7df8bf4f2542509e03e84\
6e11b9c620be2009efb440efbcc66921\
6994ac04f341b57d05202d428fb2a27b\
5c77dfd9b15bfc3d559353503410c1e1
Test: Verify
Name: RSA/PKCS1-1.5(SHA-1)
Source: generated by Wei Dai using Crypto++ 5.0
Signature: 0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81
Test: Verify
Message: 00
Test: NotVerify
AlgorithmType: Signature
Name: RSA/PKCS1-1.5(SHA-1)
Source: http://islab.oregonstate.edu/emails/pkcs-tng-02/0152
KeyFormat: Component
Modulus: A885B6F851A8079AB8A281DB0297148511EE0D8C07C0D4AE6D6FED461488E0D41E3FF8F281B06A3240B5007A5C2AB4FB6BE8AF88F119DB998368DDDC9710ABED
PublicExponent: 010001
PrivateExponent: 2B259D2CA3DF851EE891F6F4678BDDFD9A131C95D3305C63D2723B4A5B9C960F5EC8BB7DCDDBEBD8B6A38767D64AD451E9383E0891E4EE7506100481F2B49323
Prime1: D7103CD676E39824E2BE50B8E6533FE7CB7484348E283802AD2B8D00C80D19DF
Prime2: C89996DC169CEB3F227958275968804D4BE9FC4012C3219662F1A438C9950BB3
ModPrime1PrivateExponent: 5D8EA4C8AF83A70634D5920C3DB66D908AC3AF57A597FD75BC9BBB856181C185
ModPrime2PrivateExponent: C598E54DAEC8ABC1E907769A6C2BD01653ED0C9960E1EDB7E186FDA922883A99
MultiplicativeInverseOfPrime2ModPrime1: 7C6F27B5B51B78AD80FB36E700990CF307866F2943124CBD93D97C137794C104
Test: KeyPairValidAndConsistent
Source: generated by Wei Dai using Crypto++ 5.0
Message: 74657374 # "test"
Signature: A7E00CE4391F914D82158D9B732759808E25A1C6383FE87A5199157650D4296CF612E9FF809E686A0AF328238306E79965F6D0138138829D9A1A22764306F6CE
Test: Verify