[Cryptech-Commits] [core/math/modexpng] 03/92: Instructions on how to use the vector generation scripts.
git at cryptech.is
git at cryptech.is
Sat Mar 14 18:18:42 UTC 2020
This is an automated email from the git hooks/post-receive script.
paul at psgd.org pushed a commit to branch master
in repository core/math/modexpng.
commit c01d11dbd8578b98b825b6d3075b21d04a3080db
Author: Pavel V. Shatov (Meister) <meisterpaul1 at yandex.ru>
AuthorDate: Sat Mar 23 10:35:13 2019 +0300
Instructions on how to use the vector generation scripts.
---
vector/README.md | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/vector/README.md b/vector/README.md
new file mode 100644
index 0000000..1d3602b
--- /dev/null
+++ b/vector/README.md
@@ -0,0 +1,10 @@
+ModExpNG
+========
+
+Ranzomized test vector generation scripts for ModExpNG core model.
+
+ * `vector_regenerate.py` generates a new random RSA keypair using OpenSSL. Each invocation overwrites the keypair, the old one is not retained. **Never use the generated keypair for anything outside of this model!**
+ * `vector_format.py` processes the previously generated keypair. It first generates a "random" demo message to be signed, signs the message and checks the signature using Python's built-in math. If everything goes well, it writes the formatted test vector to a file.
+ * `vector_util.py` is a helper module.
+
+To obtain a test vector, optionally edit _KEY_LENGTH_ in `vector_regenerate.py` to set desired key length, then run the script to generate randomized key file. Then optionally edit _KEY_LENGTH_ in `vector_format.py` to match key length and change _RND_SEED_ to get a different demo message and run the script to obtain randomized test vector module.
More information about the Commits
mailing list