A collection of known test vectors for various cryptographic algorithms Ciphers RSA 1. 1024-bit RSA bare exponentiation Input/cipher: 11 22 33 44 Padding scheme: EP/DP Public exponent: 01 00 01 Private exponent: 24 89 10 8B 0B 6A F8 6B ED 9E 44 C2 33 64 42 D5 E2 27 DB A5 5E F8 E2 6A 7E 43 71 94 11 90 77 F0 03 BC 9C 02 78 52 BB 31 26 C9 9C 16 D5 F1 05 7B C8 36 1D CB 26 A5 B2 DB 42 29 DB 3D E5 BD 97 9B 2E 59 7D 19 16 D7 BB C9 27 46 FC 07 59 5C 76 B4 4B 39 A4 76 A6 5C 86 F0 86 DC 92 83 CA 6D 1E EF C1 49 15 98 2F 9C 4C ED 5F 62 A9 FF 3B E2 42 18 A9 93 57 B5 B6 5C 3B 10 AE B3 67 E9 11 EB 9E 21 RSA modulus: F0 C4 2D B8 48 6F EB 95 95 D8 C7 8F 90 8D 04 A9 B6 C8 C7 7A 36 10 5B 1B F2 75 53 77 A6 89 3D C4 38 3C 54 EC 6B 52 62 E5 68 8E 5F 9D 9D D1 64 97 D0 E3 EA 83 3D EE 2C 8E BC D1 43 83 89 FC CA 8F ED E7 A8 8A 81 25 7E 8B 27 09 C4 94 D4 2F 72 3D EC 2E 0B 5C 09 73 1C 55 0D CC 9D 7E 75 25 89 89 1C BB C3 02 13 07 DD 91 8E 10 0B 34 C0 14 A5 59 E0 E1 82 AF B2 1A 72 B3 07 CC 39 5D EC 99 57 47 Exponentiation result (Encipher): 50 5B 09 BD 5D 0E 66 D7 C8 82 9F 5B 47 3E D3 4D B5 CF DB B5 D5 8C E7 83 29 C8 BF 85 20 E4 86 D3 C4 CF 9B 70 C6 34 65 94 35 80 80 F4 3F 47 EE 86 3C FA F2 A2 E5 F0 3D 1E 13 D6 FE C5 7D FB 1D 55 22 24 C4 61 DA 41 1C FE 5D 0B 05 BA 87 7E 3A 42 F6 DE 4D A4 6A 96 5C 9B 69 5E E2 D5 0E 40 08 94 06 1C B0 A2 1C A3 A5 24 B4 07 E9 FF BA 87 FC 96 6B 3B A9 45 90 84 9A EB 90 8A AF F4 C7 19 C2 E4 2. 2048-bit PKCS V. 1.5 enciphering. Input/cipher: 11 22 33 44 Padding scheme: PKCSV1_5 Public exponent: 01 00 01 Private exponent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modulus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enciphered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bit PKCS V. 1.5 deciphering. Input/cipher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adding scheme: PKCSV1_5 Public exponent: 01 00 01 Private exponent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modulus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deciphered: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 22 33 44 DES 1. 56-bit DES encipher (no padding) Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Key type: One-key DES Chaining mode: ECB Padding: NOPAD Key 1: 75 28 78 39 74 93 CB 70 Key 2: - Key 3: - Initial vector: - Simple DES ECB enciphering (no padding): B5 21 9E E8 1A A7 49 9D 21 96 68 7E 13 97 38 56 2. 112-bit 3-DES CBC encipher (PKCS-5 padding). Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Key type: 3DES / 2 keys Chaining mode: CBC Padding: PKCS5 Key 1: 75 28 78 39 74 93 CB 70 Key 2: 34 E5 46 7B 95 94 40 6D Key 3: - Initial vector: 78 E9 5A BF 0B 8E E2 C0 2-key 3DES CBC enciphering (PKCS5 padding): 74 3F 14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E 3. 112-bit 3-DES CBC decipher (PKCS-5 padding) Input: 74 3F 14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E Key type: 3DES / 2 keys Chaining mode: CBC Padding: PKCS5 Key 1: 75 28 78 39 74 93 CB 70 Key 2: 34 E5 46 7B 95 94 40 6D Key 3: - Initial vector: 78 E9 5A BF 0B 8E E2 C0 2-key 3DES CBC deciphering (PKCS5 padding) : 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 08 08 08 08 08 08 08 08 4. 112+64-bit 3-DES DESX encipher (ISO 9797 method 2 padding). Input: 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 Key type: 3DES / 3 keys Chaining mode: DESX Padding: ISO9797_M2 Key 1: 75 28 78 39 74 93 CB 70 Key 2: 34 E5 46 7B 95 94 40 6D Key 3: 0A 20 16 FE F3 62 9F 94 Initial vector: 01 02 03 04 05 06 07 08 3-key DESX enciphering (ISO9797 method 2 padding) : B5 F0 CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C 5. 112+64-bit 3-DES DESX decipher (ISO 9797 method 2 padding) Input: B5 F0 CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C Key type: 3DES / 3 keys Chaining mode: DESX Padding: ISO9797_M2 Key 1: 75 28 78 39 74 93 CB 70 Key 2: 34 E5 46 7B 95 94 40 6D Key 3: 0A 20 16 FE F3 62 9F 94 Initial vector: 01 02 03 04 05 06 07 08 3-key DESX deciphering (ISO9797 method 2 padding) : 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 80 00 00 00 00 00 00 00 AES 1. 128-bit AES ECB enciphering. Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Chaining mode: ECB Key: 86 C8 A0 66 06 C4 9A D9 E3 C9 A7 72 09 A7 F1 9B Initial vector: - AES mode ECB enciphering (no padding) : 8F 27 54 DC C7 71 53 D2 1B C7 B5 AE A2 D9 64 C8 2. 256-bit AES CFB enciphering. Input: 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 Chaining mode: CFB Key: D4 AD 3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95 43 93 80 17 Initial vector: 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00 AES mode CFB enciphering (no padding) : 54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6 3. 256-bit AES CFB deciphering. Input: 54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6 Chaining mode: CFB Key: D4 AD 3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95 43 93 80 17 Initial vector: 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00 AES mode CFB deciphering (no padding) : 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 BLOWFISH 1. BLOWFISH ECB enciphering. Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Chaining mode: ECB Key: 86 C8 A0 66 06 C4 9A D9 E3 A4 Initial vector: - BLOWFISH mode ECB enciphering (no padding) : 89 BA FB 5E D1 8C 1E B4 30 3F 71 9A CD 7B 6B 75 2. BLOWFISH CBC enciphering. Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Chaining mode: CBC Key: 86 C8 A0 66 06 C4 9A D9 E3 A4 Initial vector: 01 02 03 04 05 06 07 08 BLOWFISH mode CBC enciphering (no padding) : B3 8E 8A 23 ED B2 6E 59 24 60 D2 BC 43 C0 19 5A 3. BLOWFISH CFB enciphering. Input: 58 C0 D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Chaining mode: CFB Key: 75 81 93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B Initial vector: 01 02 03 04 05 06 07 08 BLOWFISH mode CFB enciphering (no padding): 45 B8 AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07 6E 72 F0 A9 4. BLOWFISH CFB deciphering. Input: 45 B8 AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07 6E 72 F0 A9 Chaining mode: CFB Key: 75 81 93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B Initial vector: 01 02 03 04 05 06 07 08 BLOWFISH mode CFB deciphering (no padding) : 58 C0 D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 RC2 1. RC2 ECB enciphering. Input: 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 Chaining mode: ECB Key: 26 1E 57 8E C9 62 BF B8 3E 96 Effective key length (bits, decimal): 80 Initial vector: - RC2 mode ECB enciphering: F9 9A 3A DB 00 3B 7A EB 81 E3 6B A9 E5 37 10 D1 F9 9A 3A DB 00 3B 7A EB 81 E3 6B A9 E5 37 10 D1 2. RC2 CBC enciphering. Input: 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 Chaining mode: CBC Key: 26 1E 57 8E C9 62 BF B8 3E 96 Effective key length (bits, decimal): 40 Initial vector: 01 02 03 04 05 06 07 08 RC2 CBC mode enciphering: 71 2D 11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68 3B DC CD 7D 3. RC2 CBC deciphering. Input: 71 2D 11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68 3B DC CD 7D Chaining mode: CBC Key: 26 1E 57 8E C9 62 BF B8 3E 96 Effective key length (bits, decimal): 40 Initial vector: 01 02 03 04 05 06 07 08 RC2 CBC mode deciphering: 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 RC4 1. RC4 enciphering. Input: 01 02 01 02 03 04 03 04 05 06 05 06 07 08 07 08 Key: 11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67 3D RC4 enciphering: 38 58 C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79 2. RC4 deciphering. Input: 38 58 C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79 Key: 11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67 3D RC4 deciphering: 01 02 01 02 03 04 03 04 05 06 05 06 07 08 07 08 GOST 28147-89 1. GOST 28147-89 ECB encipher (no padding) Input: 11 22 33 44 55 66 77 88 Chaining mode: ECB Padding: NOPAD Key: 75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B Initial vector: - Manual S-BOXES (GOST 3411-94 test param set is the default option): - Simple GOST 28147-89 ECB enciphering (no padding): 03 25 1E 14 F9 D2 8A CB 2. GOST 28147-89 CBC encipher (PKCS5 padding) Input: 11 22 33 44 55 66 77 88 99 AA BB CC DD Chaining mode: CBC Padding: PKCS5 Key: 75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B Initial vector: 01 02 03 04 05 06 07 08 Manual S-BOXES (GOST 3411-94 test param set is the default option): - GOST 28147-89 CBC enciphering (PKCS5 padding): 93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11 3. GOST 28147-89 CBC decipher (PKCS5 padding) Input: 93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11 Chaining mode: CBC Padding: PKCS5 Key: 75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B Initial vector: 01 02 03 04 05 06 07 08 Manual S-BOXES (GOST 3411-94 test param set is the default option): - GOST 28147-89 CBC deciphering (PKCS5 padding): 11 22 33 44 55 66 77 88 99 AA BB CC DD 4. GOST 28147-89 CFB encipher (ISO9797 method 2 padding) Input: 93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11 Chaining mode: CFB Padding: ISO9797_M2 Key: 75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B Initial vector: 01 02 03 04 05 06 07 08 Manual S-BOXES (GOST 3411-94 test param set is the default option): - GOST 28147-89 CFB enciphering (ISO9797_M2 padding): 6E E8 45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42 5. GOST 28147-89 CFB decipher (ISO9797 method 2 padding) Input: 6E E8 45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42 Chaining mode: CFB Padding: ISO9797_M2 Key: 75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B Initial vector: 01 02 03 04 05 06 07 08 Manual S-BOXES (GOST 3411-94 test param set is the default option): - GOST 28147-89 CFB deciphering (ISO9797_M2 padding): 11 22 33 44 55 66 77 88 99 AA BB CC DD 80 00 00 Signatures RSASSA 1. 1024-bit RSA PKCS V.1.5 sign with SHA1 Input: 11 11 12 22 99 EM generation: EMSA_PKCSV1_5 Hash: SHA1 MGF: MGF1 Salt length (bytes, decimal): 20 Manual salt: - Public exponent: 01 00 01 Private exponent: 82 B1 5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B 7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2 D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F 9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01 21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21 RSA modulus: B6 DE 72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE 87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F 48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31 1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00 7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93 Signature: - RSASSA_PKCS V.1.5 signature with sha1: 15 8D 86 24 BE E4 F1 FF 58 40 16 32 23 20 E1 9A 64 94 E2 3C 95 90 9B DE B8 5F 5E 99 9D 36 73 24 4A 8C 39 41 AD FC 50 C4 BE AE 10 F6 2F 68 BB AD 64 79 7B 66 E9 1B C6 17 62 63 C6 75 5B 83 1F 42 65 C9 5A 65 91 2B FE D8 DE 39 8C 78 E9 A8 3E 34 A2 ED 0E 34 E3 9B D9 93 A9 1B 08 35 B2 18 9E 44 4F 53 45 A9 0E D5 BD 47 6C 6F 5B E0 8D D1 B3 BE 69 F9 FF 84 2D D5 14 2C D2 9E C4 54 10 15 89 A4 2. 1024-bit RSA PSS sign with MD5 Input: 11 11 12 22 99 EM generation: EMSA_PSS Hash: MD5 MGF: MGF1 Salt length (bytes, decimal): 20 Manual salt: - Public exponent: 01 00 01 Private exponent: 82 B1 5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B 7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2 D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F 9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01 21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21 RSA modulus: B6 DE 72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE 87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F 48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31 1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00 7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93 Signature: - RSASSA_PSS signature with MD5: 28 8A 11 4D 89 DC 38 47 C1 AF 3C 9F 19 6B CE 83 4C 3F F9 EC 68 37 F4 BE 3C 4C 85 B0 FB D4 65 8D 46 33 B4 85 EB EF 28 7F DD 45 6D 94 91 1B 0F 86 21 7D C8 17 DA C0 F2 9D 91 33 2D 43 32 F9 D1 2A 82 67 C4 8C A1 72 17 3C E7 38 68 09 FC 98 FF D7 46 8C 20 7F 42 FC 3F 89 4F 53 D1 32 40 98 9F 83 49 86 61 C7 6C DF DE 80 6C 35 DA 9B B6 D4 13 85 88 61 57 B3 83 29 B5 36 7B 2B 0A F3 66 7E E8 79 3. 2048-bit RSA PSS sign with SHA384 Input: 11 11 12 22 99 EM generation: EMSA_PSS Hash: SHA384 MGF: MGF1 Salt length (bytes, decimal): 32 Manual salt: - Public exponent: 01 00 01 Private exponent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modulus: AE 34 37 88 9B 40 1F 4A 54 23 ED B5 FB B3 DD 16 DC 44 03 37 E4 C5 FC E0 16 FD 84 91 E6 FA 7A 88 59 DB 4C 3F 7F E7 1C 46 A0 E9 C9 97 63 89 DD 3F 41 8C F4 CE BB 6C F6 60 17 3E C9 DB 22 F8 E9 DC A9 7F 5E CC 03 B8 38 1E C2 75 4C F5 0E A4 65 41 F1 09 F9 92 A1 2F 17 2F 11 6E 0F 0F 31 95 00 30 70 41 88 C0 72 DD C4 9C 2E E4 7E ED 47 AB 26 D9 AF 17 2E 25 4B 4A A5 49 BE 97 9B 37 04 DA 74 87 76 87 A9 1B 78 8E 31 84 20 69 C9 C3 8B A2 8D 11 95 B7 5A 10 E2 3B 41 1E AD DA 10 AF 36 A4 CD 49 9B FA 19 6C A9 FC 0B CC 6D 06 16 0D F1 4E FD 08 61 37 CC AB 5C 17 B5 67 D1 CB C2 3A 36 6C 5E B4 16 EE B9 83 60 FB 7B 59 46 02 A1 D9 B9 A6 0A 6C 70 5D 46 50 30 7A CC 56 11 E2 EC 94 9C 2C E8 58 12 C5 66 74 3E 19 B2 88 08 B2 A8 62 CA B6 EF 1D AA 54 FB 66 23 75 70 B4 BC 8B 37 32 C0 21 54 93 Signature: - RSASSA_PSS signature with SHA384: 1A 43 9C 48 4C D0 28 AE 5A AC 4D C2 73 AB 7F D9 55 00 50 A0 27 05 4A DF 4F 35 4A AF 9B 07 68 92 B5 68 F7 49 8C 59 81 E1 59 21 C6 5C 1E 28 7E 7D B0 34 FC 1A 4A 64 6B CE D2 98 AE 68 CA A6 26 16 A1 2A 08 A6 50 3A E5 6C 0B 76 A3 F6 44 39 AF D1 CF 6B 35 42 9A 0B CD E8 C9 BF 25 A2 AB 04 26 74 1E 9E EC 7F 03 D9 2A 00 5D 18 90 DA 2B AD 81 4F E3 E5 C7 8C 4D 95 2A 90 E2 16 AD 35 00 6E 1D 5B 8C FC 74 7B FD E0 F8 AC C0 0B 83 AD 4F 40 47 B1 52 22 3C 4D 02 A4 89 FD A8 27 11 A7 53 06 68 C4 A9 61 10 41 25 31 E0 B7 2B BD 8B 32 DE D2 BF 0E 5F 34 F6 DA 73 E7 8A B7 31 30 AA 19 66 E2 B4 36 3B 63 E5 7B DB D7 99 E0 E4 E8 22 C0 00 F7 89 3B 5D 86 DB C6 8F 5D 06 30 85 E8 3D 52 9D 92 2E 6B 74 51 CE CA 4D C7 42 B8 34 28 F0 4B 56 92 DA 23 8D E4 7A B2 68 BF E1 9E 0E F8 99 1D A0 7E 26 94 4. 3072-bit RSA PKCS sign of custom message digest Input: 61 62 63 61 62 63 61 62 63 EM generation: EMSA_PKCSV1_5 Hash: Plain encryption MGF: MGF1 Salt length (bytes, decimal): 20 Manual salt: - Public exponent: 01 00 01 Private exponent: 3A 6E F4 92 8D BB EB D0 84 CD B6 FA 49 22 4B 8F 95 60 79 D7 6F 09 44 01 31 F8 CC 8D 86 B4 91 87 D1 F4 19 93 B0 51 6E DB 41 25 38 A4 78 A1 E0 40 42 04 D5 EB 80 B8 6D 5D 0E 9E 5C 75 A9 F2 43 BE 62 84 B9 2C C4 40 BD 2D D1 EA 71 FA 1A 91 5F F2 F3 E3 56 FB 7D 5B 08 19 8F D8 16 2A 93 84 69 B4 78 A3 0D 25 D9 1F 2A 23 F2 CB 70 45 47 64 A7 A4 C3 27 3D 79 CE 67 3A 1D 49 D4 1E 35 63 17 0E 0F 13 9B A4 3D 89 34 65 72 F6 72 DA 7B F8 F3 BB EC BC CF 00 98 31 FE F7 31 E4 46 D6 FC 3D 44 66 6E D1 E7 31 1E 0C 86 A2 60 DD 87 E0 69 4B 4E 5D 1F 0F 49 19 85 DF 74 51 86 F3 FB 6C 94 09 C2 2C 0C 3D 21 46 F5 82 CC 6C 05 45 E9 8B A3 99 D9 F0 24 2B 9C D6 A8 77 FB AA C7 02 5A F3 D8 03 10 23 95 CE B1 DA DF 05 E7 3F 42 36 52 AA E9 BB 24 E0 F7 35 87 90 4D A2 ED D7 08 C8 CA BE 45 E4 AD 82 7F 31 D3 FE DF D6 45 8D B0 17 1E 6D 74 98 C7 F5 85 CB A8 0F 66 53 6B 7B D5 AC 9A 22 61 F7 3B DB FE F0 59 79 0A F5 7C 57 FF 60 69 63 63 0A 7C F1 DB 83 0E B7 71 FE D8 B1 6C 9C B9 AA 6A A5 0A B9 5D 47 DE 2A 57 63 FA 74 9F 1D 9B 16 02 A2 BE 95 C1 ED CE 2C EA EF 94 6E 05 7B 51 B3 44 C8 B9 98 73 55 79 84 0F 52 A0 E9 5B 6A D0 86 D2 25 2A 0F D5 E5 E4 69 8A 47 73 58 B4 14 03 76 0A 80 96 D8 31 RSA modulus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ignature: - RSASSA_PSS signature plain encryption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signature generation. Input: 11 22 33 44 55 Prime modulus p: 8d f2 a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f 0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37 24 c2 ec 07 36 ee 31 c8 02 91 Prime divisor of (p-1), q: c7 73 21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f Parameter g: 62 6d 02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3 99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b 08 8c c5 72 af 53 e6 d7 88 02 Private key x: 17 32 49 87 43 98 57 8A DF 76 AF DF F5 78 D6 F1 A3 D3 21 32 Public key y: 2B DB AD AE 56 33 81 8F 02 23 65 C4 B8 D9 4A 31 8A 14 40 48 A4 B6 AE 69 BD 33 94 00 B4 67 42 46 24 F2 89 6D FF 97 90 3E 5C 2F 34 8D D8 1A 86 A2 27 65 E5 8F D7 D9 64 D4 89 D4 0E 92 EE E2 05 40 Manual random k: C2 1E 38 17 41 A6 82 8B 24 BE 6B 62 AE F6 44 67 58 FD 4D 09 Signature part 1, r: - Signature part 2, s: - DSA Signature: r, s: 8D BA 7B 98 7D 5A 87 99 59 AC C5 02 FB AC F5 96 36 85 5D 46 B8 82 52 C5 EC D3 F0 EB 34 6D CB 2E 60 11 BF 03 B7 42 84 2D ECDSA F(p) 1. ECDSA F(p) signature generation with secp128 r1 curve parameters. Input: 11 22 33 44 55 Private key d: B0 66 CA 54 49 3F 53 85 95 7F 30 85 EA E2 17 5A Public key point coordinate xD: 02 5C 93 3C 13 F2 8F 2F E6 0C 9F 58 50 65 39 C8 Public key point coordinate yD: 83 C8 2B 71 0A 5D 56 43 B3 08 BC 2E 98 20 C0 9D Set curve by name: Secp128r1 Prime modulus p: - Curve coefficient a: - Curve coefficient b: - Point coordinate xG: - Point coordinate yG: - Point order n: - Cofactor h: - Manual random k: - Signature part 1, r: - Signature part 1, s: - ECDSA F(p) signature: r, s: 08 B5 A6 39 EE 8F 52 DE A4 B5 AC 6E DD 71 FD 7E 51 49 DF 7D 6C CE 90 E3 4D 61 14 CA FC B5 73 3F 2. ECDSA F(p) signature generation with manually entered curve parameters. (Using secp192k1 param set). Input: 11 22 33 44 55 Private key d: 88 E0 D0 92 A0 A8 C7 14 E3 7F B6 54 2E 2E 97 53 2E 8D 0D 64 0E 89 24 21 Public key point coordinate xD: 76 E5 D2 F3 B5 4F 4B 92 58 0A E0 E6 3B 1C C0 37 D3 10 6E 0D B0 FC 19 30 Public key point coordinate yD: 7C 12 DC 1F D0 E4 13 CA 66 C3 1C E0 ED CB BA C0 C3 96 F0 7E 88 12 20 A0 Set curve by name: MANUAL Prime modulus p: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE FF FF EE 37 Curve coefficient a: 00 Curve coefficient b: 03 Point coordinate xG: DB 4F F1 0E C0 57 E9 AE 26 B0 7D 02 80 B7 F4 34 1D A5 D1 B1 EA E0 6C 7D Point coordinate yG: 9B 2F 2F 6D 9C 56 28 A7 84 41 63 D0 15 BE 86 34 40 82 AA 88 D9 5E 2F 9D Point order n: FF FF FF FF FF FF FF FF FF FF FF FE 26 F2 FC 17 0F 69 46 6A 74 DE FD 8D Cofactor h: 1 Manual random k: 12 34 56 78 Signature part 1, r: 2A 6A 18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D Signature part 1, s: 80 21 DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7 ECDSA F(p) signature: r, s: 2A 6A 18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D 80 21 DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7 ECDSA F(2m) 1. ECDSA F(2m) signature generation with sect233k1 curve parameters. Input: 11 22 33 44 55 Private key: 6C CF 9E B2 5D 70 BA 9E 5C F1 0B 58 2B 3C 9B F7 3D 54 B1 E8 23 E0 01 D1 77 8B 15 AC 4E Public key point coordinate xD: 23 3C 91 68 46 E6 0C C8 DF 8C B1 1B B1 FB CE D5 30 BB 42 58 28 89 AC D4 DC 30 D0 87 5F Public key point coordinate yD: 01 8F C3 87 17 EF 51 A4 0E 87 28 22 5C D2 51 D4 E4 D1 51 3F 2A 93 DA 64 B6 EE AF A8 3D EA Set curve by name: sect233k1 Field characteristic: - Curve coefficient a: - Curve coefficient b: - Curve point coordinate xG: - Curve point coordinate yG: - Point order n: - Cofactor h: - Manual random k: - Signature part 1, r: - Signature part 2, s: - ECDSA F(2m) signature: r, s: 5D E6 0A 35 2D 68 A3 30 3D 2A A9 0B 08 40 DF EE B9 85 49 90 2C 65 38 DC C1 28 EC 98 E5 7B 9B 14 CE D4 41 97 DA E8 59 98 59 19 3C B6 50 4C DA 99 16 AF 7B 90 D6 5E 94 28 3D 23 2. ECDSA F(2m) signature generation with manual curve parameters. (yet using sect239k1 param set) Input: 11 22 33 44 55 Private key: 19 28 FD 6B 62 50 23 63 10 67 47 28 86 BD C2 46 65 EC A9 AE E2 BB D1 99 1F 24 BA FC E7 1C Public key point coordinate xD: 10 B8 B6 5D 05 CF 32 5A D3 10 C2 7E D8 B1 57 F7 81 A4 99 5C 01 09 93 00 1E D9 49 8E 1B 70 Public key point coordinate yD: 49 24 00 10 A6 59 DC 04 41 7E 73 96 70 E8 C1 EF 8B 5D 96 7E 56 50 80 03 1C 68 6F CC E6 60 Set curve by name: sect233k1 Field characteristic: 80 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 Curve coefficient a: 00 Curve coefficient b: 01 Curve point coordinate xG: 29 A0 B6 A8 87 A9 83 E9 73 09 88 A6 87 27 A8 B2 D1 26 C4 4C C2 CC 7B 2A 65 55 19 30 35 DC Curve point coordinate yG: 76 31 08 04 F1 2E 54 9B DB 01 1C 10 30 89 E7 35 10 AC B2 75 FC 31 2A 5D C6 B7 65 53 F0 CA Point order n: 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5A 79 FE C6 7C B6 E9 1F 1C 1D A8 00 E4 78 A5 Cofactor h: 4 Manual random k: 11 22 33 44 Signature part 1, r: - Signature part 2, s: - ECDSA F(2m) signature (r, s) : 0F C6 26 7B 0F 87 6B AE DD B5 69 B7 E3 09 86 3A E2 33 FC A0 04 BD 39 C3 BF 34 F2 D6 07 35 05 7D 0D CA 60 EC B9 91 DE CE 25 30 B8 A1 19 46 09 FD 7E E0 AB 5F 9D 1F 9C E7 34 8A 26 1A GOST 3410-2001 1. GOST 3410-2001 signature generation. Input: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E0 95 25 F3 9F 81 19 83 2E B8 19 75 D3 66 C4 B1 Prime modulus p: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE FF FF FC 2F Underlying field modulus q: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE BA AE DC E6 AF 48 A0 3B BF D2 5E 8C D0 36 41 41 First curve coefficient a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Point coordinate x(p): 79 BE 66 7E F9 DC BB AC 55 A0 62 95 CE 87 0B 07 02 9B FC DB 2D CE 28 D9 59 F2 81 5B 16 F8 17 98 Point coordinate y(p): 48 3A DA 77 26 A3 C4 65 5D A4 FB FC 0E 11 08 A8 FD 17 B4 48 A6 85 54 19 9C 47 D0 8F FB 10 D4 B8 Private key d: DB AE 32 20 9A 50 EE 40 78 36 FD 12 49 32 F6 9E 7D 49 DC AD 4F 14 F2 44 40 66 D0 6B C4 30 B7 32 Public key point coordinate x(q): 12 30 C3 1F 22 B6 19 F2 B1 13 37 81 AA E9 21 A0 22 F6 44 4A 9D 69 5C 72 9E 68 E7 56 D6 CF 55 D9 Public key point coordinate y(q): 45 FE 3B 4F 0F 08 55 AD 2C 01 27 74 C2 77 57 9B BF F3 AB 73 C2 63 47 82 7F C4 68 57 B9 20 DE E2 Manual random k: 38 47 65 23 49 87 56 56 87 46 98 72 34 65 23 47 85 23 47 34 98 57 34 87 56 23 87 56 34 87 65 28 Signature part 1, r: - Signature part 2, s: - GOST 3410-2001 signature (r, s): 6D F3 9B 1C AB DF 1F BA B1 08 C6 27 C3 F8 F7 ED 1A E7 FF 7E DC 43 9C 72 3A 2C 38 BE CD FF 68 92 7D D9 90 16 C5 32 4B 32 BE 02 0D 16 AD A9 A8 41 AF 65 17 87 F1 C1 8A FE FB C6 B1 5C A7 AC CB CF Hashes, authentication codes SHA 1. SHA1 hash calculation. Input: 61 62 63 Algorithm: SHA1 SHA1: A9 99 3E 36 47 06 81 6A BA 3E 25 71 78 50 C2 6C 9C D0 D8 9D 2. SHA256 hash calculation. Input: 61 62 63 Algorithm: SHA256 SHA256: BA 78 16 BF 8F 01 CF EA 41 41 40 DE 5D AE 22 23 B0 03 61 A3 96 17 7A 9C B4 10 FF 61 F2 00 15 AD 3. SHA384 hash calculation. Input: 61 62 63 Algorithm: SHA384 SHA384: CB 00 75 3F 45 A3 5E 8B B5 A0 3D 69 9A C6 50 07 27 2C 32 AB 0E DE D1 63 1A 8B 60 5A 43 FF 5B ED 80 86 07 2B A1 E7 CC 23 58 BA EC A1 34 C8 25 A7 4. SHA512 hash calculation. Input: 61 62 63 Algorithm: SHA512 SHA512: DD AF 35 A1 93 61 7A BA CC 41 73 49 AE 20 41 31 12 E6 FA 4E 89 A9 7E A2 0A 9E EE E6 4B 55 D3 9A 21 92 99 2A 27 4F C1 A8 36 BA 3C 23 A3 FE EB BD 45 4D 44 23 64 3C E8 0E 2A 9A C9 4F A5 4C A4 9F MD2, MD4, MD5 1. MD2 hash calculation. Input: 61 62 63 Algorithm: MD2 MD2: DA 85 3B 0D 3F 88 D9 9B 30 28 3A 69 E6 DE D6 BB 2. MD4 hash calculation. Input: 61 62 63 Algorithm: MD4 MD4: A4 48 01 7A AF 21 D8 52 5F C1 0A E8 7A A6 72 9D 3. MD5 hash calculation. Input: 61 62 63 Algorithm: MD5 MD5: 90 01 50 98 3C D2 4F B0 D6 96 3F 7D 28 E1 7F 72 DES MAC 1. 56-bit DES MAC (no padding) Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Output format: 4 bytes Algorithmbr /adding: NOPAD Initial vector: 12 34 56 78 12 34 56 78 Key 1: 9B 1B 60 62 89 10 F3 E4 Key 2: - Key 3: - DES data authentication code (MAC) : FE 54 92 C3 2. 112-bit 3DES MAC (PKCS5 padding) Input: 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00 Output format: 8 bytes Algorithmbr /adding: NOPAD Initial vector: 12 34 56 78 12 34 56 78 Key 1: 9B 1B 60 62 89 10 F3 E4 Key 2: B4 CA 4D 69 6A 77 C7 59 Key 3: - 3DES data authentication code (MAC) : AD 7E 66 9C DE 29 06 7B HMAC 1. MD2 HMAC Input: 4D 44 32 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E Hash: MD2 Key: 77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E MD2 HMAC: F6 9F 8F 5D 1C 0C FC 15 7F 4A 4B 23 F2 61 8C 1C 2. MD5 HMAC Input: 4D 44 35 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E Hash: MD5 Key: 77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E MD5 HMAC: 3C 51 C6 D3 3E 3E 00 C1 B5 6A 43 A2 1D 41 E0 B4 3. SHA1 HMAC Input: 53 48 41 31 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E Hash: SHA1 Key: 77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E SHA1 HMAC: 4D DB 62 B4 45 77 9C A0 17 20 52 69 B9 29 C6 C2 FA 7D D6 AC 4. RIPEMD160 HMAC Input: 52 49 50 45 4D 44 31 36 30 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E Hash: RIPEMD160 Key: 77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E RIPEMD160 HMAC: 42 F8 B6 F5 78 34 A4 21 51 9A 63 4A 42 9C 0A 30 08 3B 3F D1 RIPEMD160 1. RIPEMD160 calculation Input: 61 62 63 RIPEMD160 MD: 8E B2 08 F7 E0 5D 98 7A 9B 04 4A 8E 98 C6 B0 87 F1 5A 0B FC GOST 28147-89 MAC 1. 4-byte GOST 28147-89 MAC Input: 47 4F 53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E Output format: 4 bytes Key: 97 FD 6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B 70 B5 5B 9B Initial vector: 12 34 56 78 12 34 56 78 Manual S-BOXES: - GOST 28147 data authentication code: 78 31 5C 5E 2. 8-byte GOST 28147-89 MAC Input: 47 4F 53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E Output format: 8 bytes Key: 97 FD 6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B 70 B5 5B 9B Initial vector: 12 34 56 78 12 34 56 78 Manual S-BOXES: - GOST 28147 data authentication code: D8 3D 2C D8 D0 AE 38 5B GOST 3411-94 hash 1. GOST 3411-94 hash Input: 47 4F 53 54 33 34 31 31 2D 39 34 20 68 61 73 68 20 63 61 6C 63 75 6C 61 74 69 6F 6E Initial vector: C0 A9 BE 90 60 6F 18 2B 6E 55 25 5F 07 77 42 F0 C2 DF 1E FA 97 B0 75 18 0B F6 DB AF 00 F3 1B 91 Manual S-BOXES: - GOST 3411-94 hash: E6 11 AE 6A 07 A3 49 0D 9F A4 3B 9B B4 AF 51 B5 7D 69 38 99 9B F1 BB 5E 3C 49 92 20 29 4F 7C E2 GSM A3A8 1. GSM A3A8 calculation Key: 9A AA FE 5B F5 6D 6B C8 BB 1E B7 C6 37 75 BE 62 Seed: 58 E3 5D D5 D0 DD F8 5E CF F0 58 1C FA 14 DB A6 A3A8 result: 14 0D AB 04 44 AB A8 0B 2C D1 30 00 CRC 1. CRC8 calculation Input: 76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61 Algorithm: CRC8 CRC8 result: 76 2. CRC16 calculation Input: 76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61 Algorithm: CRC16 CRC16 result: 8D 3C 3. ISO 13239 CRC16 calculation Input: 76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61 Algorithm: CRC16_ISO_13239 ISO 13239 CRC16 result: 30 82 4. CRC32 calculation Input: 76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61 Algorithm: CRC32 CRC32 result: 9B D3 66 AE Key generation functions DSA key pair generation 1. DSA key pair generation Prime modulus p: 8d f2 a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f 0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37 24 c2 ec 07 36 ee 31 c8 02 91 Prime divisor of (p-1), q: c7 73 21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f Parameter g: 62 6d 02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3 99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b 08 8c c5 72 af 53 e6 d7 88 02 Manual private key x: - Private key (x): 05 2B E8 0D 83 91 0D 2A 54 89 86 C4 01 D3 4A 0D 5D D5 3E B4 Public key (y): 6F C8 73 99 3A 99 D9 07 D2 0F 68 72 28 C0 F2 54 84 D2 B4 5B 96 A6 CD DB C4 49 86 1E E8 41 7E 46 BA BA 88 1E 40 32 A7 34 1E C5 E8 31 49 09 D4 BD F4 2D C2 53 97 79 33 78 09 53 51 EE 29 73 AC 4F RSA key pair generation 1. 3072-bit RSA key pair generation Field size: 3072 Public exponent: 01 00 01 Private exponent: B8 BA 9E AD C7 08 E8 D8 B4 04 86 B9 29 1F E7 10 F1 AF BB D3 C4 59 A6 4C 2D 04 6D F8 10 CA DA BE 64 50 6F 7A 81 AC 1D CB 99 28 6C C5 6B 58 E1 9A 27 EE 60 D7 B5 3C 4F 81 3C 66 FF 4A 7A F8 3B 2B DF CD 8E E5 7F B2 4A 9E 97 95 59 9C 83 93 17 DB E8 2E 5A AD 4C 9A 03 FD 26 52 32 95 DA 89 E1 CE FE 32 73 32 DE 99 2E D4 A3 AA F6 DA 7B 59 4C 48 8C BC B4 B5 44 71 F2 18 1F C3 47 90 22 01 A1 82 37 FA 53 CB 73 0F 58 35 C3 71 EF 64 8B 23 8F 9B E0 F0 77 99 2A 13 23 28 4E DA 52 8C B6 47 7B 86 26 6F 2E AF E8 C7 01 4D 5D 1B E0 27 F6 8F 86 93 EA 71 72 7F 65 0B BB 55 B3 72 C7 D6 5D 58 0A C3 7A D2 4A 39 D6 DE 9D F8 9D 7D FE 33 82 0B A2 07 9B 41 BC 8B 3C CA E3 9D D8 13 12 67 20 07 0E CD ED 3D 5D 44 55 97 05 BE B9 01 8B 8B EF A3 48 99 09 AC 13 7A 94 2E 5B E8 23 A0 16 5A 0E 43 EC 0E 8E A1 6E 93 B2 79 A8 03 EC 65 DF 9B D3 E5 7B 19 FC 63 87 C8 DD 46 C2 E4 B3 8C 32 7F 09 0B 20 53 65 4F D4 2C D2 68 32 F1 C4 98 D6 A7 82 54 03 FD 9C F1 58 C8 85 38 C8 29 FD EF 2F B0 77 A1 8F 98 AD 2C 0F 5D 13 56 3C C2 21 AF A1 14 7C B8 FC 39 9A FC 81 2B DD CC 19 3C 1F 00 B8 C6 D2 E0 41 4A 40 05 A0 CA 00 B2 43 FA 99 44 5D 6C 1A 23 F7 4A C4 4B 67 D8 9C 77 AD 46 7F 6F AC 97 6F 84 04 01 Modulus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p) key pair generation 1. ECDSA F(p) key pair generation using secp160k1 curve parameters Set curve by name: Secp160k1 Prime modulus p: - Curve coefficient a: - Curve coefficient b: - Point coordinate xG: - Point coordinate yG: - Point order n: - Cofactor h: - Private (d): 96 23 67 B6 BE B6 A3 E4 7A 0F CE 35 6B 2C E2 87 15 67 C6 14 Public key curve point coordinate 1 (Px): 8B 2D C7 6D A6 4A 57 C9 B8 D6 ED 3E ED F3 17 9E 95 62 80 2D Public key curve point coordinate 2 (Py): E2 A5 D0 2C 57 7E 25 53 15 AF 10 01 4F 3F 04 7F F1 96 DA 06 2. ECDSA F(p) key pair generation using secp384r1 curve parameters Set curve by name: Secp384r1 Prime modulus p: - Curve coefficient a: - Curve coefficient b: - Point coordinate xG: - Point coordinate yG: - Point order n: - Cofactor h: - Private (d): 91 15 40 76 2B 80 70 60 EB B1 07 1D 8B 76 F9 C6 B0 C8 57 0B 2D 56 20 4B 7D 62 44 84 43 17 17 98 ED F7 12 E7 CF 55 89 5D 67 5F FE 7B 5C F3 57 50 Public key curve point coordinate 1 (Px): B7 82 8F F3 F8 14 93 2B 53 1D 3C D5 89 47 A7 76 55 CA 12 EE 53 33 33 EE 12 E9 21 C3 91 14 B7 52 BE FD B3 E4 5C 05 D6 C1 F8 22 2C 5C 6B 23 4E 8D Public key curve point coordinate 2 (Py): 1F 4B 1B BA 34 34 C6 BA A3 42 50 74 4B 4E 10 9E 09 A5 5D 5F 30 75 BE C3 32 56 C9 4A 46 87 92 C2 B5 65 0D 24 F8 54 82 C9 88 B7 32 8E 82 5F 48 8D ECDSA F(2m) key pair generation 1. ECDSA F(2m) key pair generation using secp233k1 curve parameters Set curve by name: secp233k1 Field characteristic: - Curve coefficient a: - Curve coefficient b: - Curve point coordinate xG: - Curve point coordinate yG: - Point order n: - Cofactor h: - Private (d): 12 9E 28 CA 14 81 6E 45 60 CA D1 4C 96 61 F7 36 7C E5 EA 57 A6 4B 0E 7F 6E A1 B2 A3 90 Public key curve point coordinate 1 (Px): 1D 54 A2 9D CB 0E 89 C7 BE CE 34 F1 A0 2C 08 CC 6F 7A B0 EB CD 28 0D EE 99 D5 C5 66 41 Public key curve point coordinate 2 (Py): 01 88 0C A9 C0 6B 79 2E E9 1E 3B 5C 5F C6 36 F9 53 8F 89 E1 74 EA 57 0E AA F4 2E 45 80 7C GOST 3410-2001 key pair generation 1. GOST 3410-2001 key pair generation Prime modulus p: 00 00 00 00 00 00 00 00 D1 48 F0 3F 28 C5 98 1C 59 D0 A7 32 DF 3C 94 F0 DD 0F 44 05 4C 83 20 AF Underlying field modulus q: 00 00 00 00 00 00 00 00 45 C2 FA BF B8 41 DD 5E C8 9A E2 66 B5 95 66 7E B5 69 8E F1 59 7F 46 19 First curve coefficient a: 00 00 00 00 00 00 00 00 57 8E C8 B0 4D 37 D2 61 C3 7D 44 72 4C 22 CC 4D 53 85 4A 60 82 20 4C DC Point coordinate x(p): 00 00 00 00 00 00 00 00 89 56 5C 06 A2 78 E3 CE 5B C3 6D 7D F7 65 21 F9 E8 A1 3D 8B 35 9D B4 CC Point coordinate y(p): 00 00 00 00 00 00 00 00 5F B2 29 3B 42 8E 87 3C 3A 7A D2 4B 65 56 9F 80 83 AB DC A9 A4 06 EE 2E Manual private key d: - Private (d): 0B 3D A5 DF 6C 58 C5 2C 06 34 12 E5 36 54 D3 BE C9 4F 17 23 DF 4C 1D 35 Public key curve point coordinate 1 (u): 2B 4C 47 CF C9 BC 6F 71 C3 AB E4 10 3C 84 F3 72 1F A4 86 CB 90 02 F2 F3 Public key curve point coordinate 2 (v): 0C 11 EB 03 C5 80 2F 01 72 20 08 AF 00 CC 28 96 89 F9 8A 45 89 83 D3 30