1. 1024-bit RSA bare exponentiation
Input/cipher:
11 22 33 44
Padding scheme:
EP/DP
Public exponent:
01 00
01
Private exponent:
24 89
10 8B 0B 6A F8 6B ED 9E 44 C2 33 64 42 D5 E2 27 DB A5 5E F8 E2 6A 7E 43 71 94
11 90 77 F0 03 BC 9C 02 78 52 BB 31 26 C9 9C 16 D5 F1 05 7B C8 36 1D CB 26 A5
B2 DB 42 29 DB 3D E5 BD 97 9B 2E 59 7D 19 16 D7 BB C9 27 46 FC 07 59 5C 76 B4
4B 39 A4 76 A6 5C 86 F0 86 DC 92 83 CA 6D 1E EF C1 49 15 98 2F 9C 4C ED 5F 62
A9 FF 3B E2 42 18 A9 93 57 B5 B6 5C 3B 10 AE B3 67 E9 11 EB 9E 21
RSA modulus:
F0 C4
2D B8 48 6F EB 95 95 D8 C7 8F 90 8D 04 A9 B6 C8 C7 7A 36 10 5B 1B F2 75 53 77
A6 89 3D C4 38 3C 54 EC 6B 52 62 E5 68 8E 5F 9D 9D D1 64 97 D0 E3 EA 83 3D EE
2C 8E BC D1 43 83 89 FC CA 8F ED E7 A8 8A 81 25 7E 8B 27 09 C4 94 D4 2F 72 3D
EC 2E 0B 5C 09 73 1C 55 0D CC 9D 7E 75 25 89 89 1C BB C3 02 13 07 DD 91 8E 10
0B 34 C0 14 A5 59 E0 E1 82 AF B2 1A 72 B3 07 CC 39 5D EC 99 57 47
Exponentiation result (Encipher):
50 5B
09 BD 5D 0E 66 D7 C8 82 9F 5B 47 3E D3 4D B5 CF DB B5 D5 8C E7 83 29 C8 BF 85
20 E4 86 D3 C4 CF 9B 70 C6 34 65 94 35 80 80 F4 3F 47 EE 86 3C FA F2 A2 E5 F0
3D 1E 13 D6 FE C5 7D FB 1D 55 22 24 C4 61 DA 41 1C FE 5D 0B 05 BA 87 7E 3A 42
F6 DE 4D A4 6A 96 5C 9B 69 5E E2 D5 0E 40 08 94 06 1C B0 A2 1C A3 A5 24 B4 07
E9 FF BA 87 FC 96 6B 3B A9 45 90 84 9A EB 90 8A AF F4 C7 19 C2 E4
2. 2048-bit PKCS
V. 1.5 enciphering.
Input/cipher:
11 22
33 44
Padding scheme:
PKCSV1_5
Public exponent:
01 00
01
Private exponent:
1C BC
9A 76 AD E2 08 52 4C 9D C0 3A 5D E2 E7 26 DF 4E 02 DF 84 F7 31 7C 82 BC DC 70
EA BF C9 05 08 3D 69 78 CC ED 5B 1A 7A DF 63 EA 86 AA 07 DC 74 95 4F AD 7C B0
54 55 19 3A C9 4B 18 6B A1 F7 8E 3C 7D 35 6A D7 32 0B BD B9 4B 44 1C 16 BB 52
62 6C 5F 81 5F DB 60 C7 9F 91 C6 C2 27 78 7E C9 ED 7B 0A 67 AD 2A 68 D5 04 3B
C4 8A 13 2D 0A 36 2E A7 20 60 F5 69 51 86 B6 7F 31 6F 45 8A 44 BF D1 40 3D 93
A9 B9 12 CB B5 98 15 91 6A 14 A2 BA D4 F9 A1 ED 57 8E BD 2B 5D 47 2F 62 3B 4B
B5 F9 B8 0B 93 57 2B EA 61 BD 10 68 09 4E 41 E8 39 0E 2E 28 A3 51 43 3E DD 1A
09 9A 8C 6E 68 92 60 4A EF 16 3A 43 9B 1C AE 6A 09 5E 68 94 3C A6 7B 18 C8 DC
7F 98 CC 5F 8E FA 22 BB C8 7D 2E 73 57 83 D2 BA A3 8F 4C 17 D5 ED 0C 58 36 6D
CE F5 E8 52 DD 3D 6E 0F 63 72 95 43 E2 63 8B 29 14 D7 2A 01
RSA modulus:
F7 48
D8 D9 8E D0 57 CF 39 8C 43 7F EF C6 15 D7 57 D3 F8 EC E6 F2 C5 80 AE 07 80 76
8F 9E C8 3A AA 08 1F F0 9E 53 17 ED 60 99 C6 3F D1 5C FE 11 17 2F 78 90 8C D5
8C 03 AE C9 3A 48 1F F5 0E 17 22 04 AF ED FC 1F 16 AF DB 99 0A AB 45 BE 19 0B
C1 92 59 BD 4A 1B FC DF BE 2A 29 8B 3C 0E 31 8F 78 A3 39 19 88 23 28 DA CA C8
5C B3 5A 0D E5 37 B1 63 76 97 52 17 E5 A5 EA AF 98 26 6B 58 8C 2D BA FD 0B E3
71 C3 49 89 CB 36 E6 23 D7 5E FF ED BE 4A 95 1A 68 40 98 2B C2 79 B3 0F CD 41
DA C8 7C 00 74 D4 62 F1 01 29 00 B8 97 3B 46 AD C7 EA C0 17 70 DF C6 32 EA 96
7F 94 71 E9 78 98 31 F3 A4 10 73 0F F9 14 34 8B E1 11 86 3C 13 37 63 01 07 97
56 A1 47 D8 01 03 CE 9F A6 88 A3 38 E2 2B 2D 91 6C AD 42 D6 73 C9 D0 0F 08 21
4D E5 44 F5 DE 81 2A 9A 94 91 89 07 8B 2B DA 14 B2 8C A6 2F
RSA_PKCSV1_5 enciphered:
EE 69
09 9A FD 9F 99 D6 06 5D 65 E1 5F 90 B9 23 7C 16 98 7D 48 72 E2 B9 94 ED 2B 9E
56 85 F9 BA 48 9A B9 36 CC 1E 3D FD 15 B3 5F EE 21 53 6F 8C 22 20 AE 43 21 7D
91 D8 1C 9E D0 1D E5 BA EE F4 EF C7 21 D7 0D 67 B5 16 6E 43 D8 27 24 F3 9B F0
BD 19 7C 31 E7 48 51 8D EE 63 EC 10 98 7A 08 39 0B 15 CC 41 57 67 7C 54 22 6A
8B 04 B4 76 84 AE DD 02 B4 8C 8E D4 8A 44 BD 13 53 97 AC 28 69 76 9B 68 C7 D3
BF AC DB 72 AF CD 74 42 C2 25 17 E0 44 99 6C B6 8E 0A 31 1D F5 D6 D2 D2 86 37
25 56 F0 19 31 66 CC 36 4E 65 4E F4 05 DD 22 FB E5 84 DB F6 0F 05 52 96 06 68
FB 69 52 2C 1B 52 64 F1 94 FA C9 F3 56 22 E9 82 27 63 8F F2 8B 91 0D 8C C9 0E
50 11 02 12 12 C9 6C 64 C8 58 20 87 7A 7D 15 59 23 5E 99 C3 2A BE F3 3D 95 E2
8E 18 CC A3 44 2E 6E 3A 43 2F FF EA 10 10 4A 8E EE 94 C3 62
3. 2048-bit PKCS
V. 1.5 deciphering.
Input/cipher:
EE 69
09 9A FD 9F 99 D6 06 5D 65 E1 5F 90 B9 23 7C 16 98 7D 48 72 E2 B9 94 ED 2B 9E
56 85 F9 BA 48 9A B9 36 CC 1E 3D FD 15 B3 5F EE 21 53 6F 8C 22 20 AE 43 21 7D
91 D8 1C 9E D0 1D E5 BA EE F4 EF C7 21 D7 0D 67 B5 16 6E 43 D8 27 24 F3 9B F0
BD 19 7C 31 E7 48 51 8D EE 63 EC 10 98 7A 08 39 0B 15 CC 41 57 67 7C 54 22 6A
8B 04 B4 76 84 AE DD 02 B4 8C 8E D4 8A 44 BD 13 53 97 AC 28 69 76 9B 68 C7 D3
BF AC DB 72 AF CD 74 42 C2 25 17 E0 44 99 6C B6 8E 0A 31 1D F5 D6 D2 D2 86 37
25 56 F0 19 31 66 CC 36 4E 65 4E F4 05 DD 22 FB E5 84 DB F6 0F 05 52 96 06 68
FB 69 52 2C 1B 52 64 F1 94 FA C9 F3 56 22 E9 82 27 63 8F F2 8B 91 0D 8C C9 0E
50 11 02 12 12 C9 6C 64 C8 58 20 87 7A 7D 15 59 23 5E 99 C3 2A BE F3 3D 95 E2
8E 18 CC A3 44 2E 6E 3A 43 2F FF EA 10 10 4A 8E EE 94 C3 62
Padding scheme:
PKCSV1_5
Public exponent:
01 00
01
Private exponent:
1C BC
9A 76 AD E2 08 52 4C 9D C0 3A 5D E2 E7 26 DF 4E 02 DF 84 F7 31 7C 82 BC DC 70
EA BF C9 05 08 3D 69 78 CC ED 5B 1A 7A DF 63 EA 86 AA 07 DC 74 95 4F AD 7C B0
54 55 19 3A C9 4B 18 6B A1 F7 8E 3C 7D 35 6A D7 32 0B BD B9 4B 44 1C 16 BB 52
62 6C 5F 81 5F DB 60 C7 9F 91 C6 C2 27 78 7E C9 ED 7B 0A 67 AD 2A 68 D5 04 3B
C4 8A 13 2D 0A 36 2E A7 20 60 F5 69 51 86 B6 7F 31 6F 45 8A 44 BF D1 40 3D 93
A9 B9 12 CB B5 98 15 91 6A 14 A2 BA D4 F9 A1 ED 57 8E BD 2B 5D 47 2F 62 3B 4B
B5 F9 B8 0B 93 57 2B EA 61 BD 10 68 09 4E 41 E8 39 0E 2E 28 A3 51 43 3E DD 1A
09 9A 8C 6E 68 92 60 4A EF 16 3A 43 9B 1C AE 6A 09 5E 68 94 3C A6 7B 18 C8 DC
7F 98 CC 5F 8E FA 22 BB C8 7D 2E 73 57 83 D2 BA A3 8F 4C 17 D5 ED 0C 58 36 6D
CE F5 E8 52 DD 3D 6E 0F 63 72 95 43 E2 63 8B 29 14 D7 2A 01
RSA modulus
F7 48
D8 D9 8E D0 57 CF 39 8C 43 7F EF C6 15 D7 57 D3 F8 EC E6 F2 C5 80 AE 07 80 76
8F 9E C8 3A AA 08 1F F0 9E 53 17 ED 60 99 C6 3F D1 5C FE 11 17 2F 78 90 8C D5
8C 03 AE C9 3A 48 1F F5 0E 17 22 04 AF ED FC 1F 16 AF DB 99 0A AB 45 BE 19 0B
C1 92 59 BD 4A 1B FC DF BE 2A 29 8B 3C 0E 31 8F 78 A3 39 19 88 23 28 DA CA C8
5C B3 5A 0D E5 37 B1 63 76 97 52 17 E5 A5 EA AF 98 26 6B 58 8C 2D BA FD 0B E3
71 C3 49 89 CB 36 E6 23 D7 5E FF ED BE 4A 95 1A 68 40 98 2B C2 79 B3 0F CD 41
DA C8 7C 00 74 D4 62 F1 01 29 00 B8 97 3B 46 AD C7 EA C0 17 70 DF C6 32 EA 96
7F 94 71 E9 78 98 31 F3 A4 10 73 0F F9 14 34 8B E1 11 86 3C 13 37 63 01 07 97
56 A1 47 D8 01 03 CE 9F A6 88 A3 38 E2 2B 2D 91 6C AD 42 D6 73 C9 D0 0F 08 21
4D E5 44 F5 DE 81 2A 9A 94 91 89 07 8B 2B DA 14 B2 8C A6 2F
RSA_PKCSV1_5 deciphered:
00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 22 33 44
1. 56-bit DES
encipher (no padding)
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Key type:
One-key
DES
Chaining mode:
ECB
Padding:
NOPAD
Key 1:
75 28
78 39 74 93 CB 70
Key 2:
-
Key 3:
-
Initial vector:
-
Simple DES ECB enciphering (no padding):
B5 21
9E E8 1A A7 49 9D 21 96 68 7E 13 97 38 56
2. 112-bit 3-DES
CBC encipher (PKCS-5 padding).
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Key type:
3DES /
2 keys
Chaining mode:
CBC
Padding:
PKCS5
Key 1:
75 28
78 39 74 93 CB 70
Key 2:
34 E5
46 7B 95 94 40 6D
Key 3:
-
Initial vector:
78 E9
5A BF 0B 8E E2 C0
2-key 3DES CBC enciphering (PKCS5
padding):
74 3F
14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E
3. 112-bit 3-DES
CBC decipher (PKCS-5 padding)
Input:
74 3F
14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E
Key type:
3DES /
2 keys
Chaining mode:
CBC
Padding:
PKCS5
Key 1:
75 28
78 39 74 93 CB 70
Key 2:
34 E5
46 7B 95 94 40 6D
Key 3:
-
Initial vector:
78 E9
5A BF 0B 8E E2 C0
2-key 3DES CBC deciphering (PKCS5
padding) :
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 08 08 08 08 08 08 08 08
4. 112+64-bit
3-DES DESX encipher (ISO 9797 method 2 padding).
Input:
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00
Key type:
3DES /
3 keys
Chaining mode:
DESX
Padding:
ISO9797_M2
Key 1:
75 28
78 39 74 93 CB 70
Key 2:
34 E5
46 7B 95 94 40 6D
Key 3:
0A 20
16 FE F3 62 9F 94
Initial vector:
01 02
03 04 05 06 07 08
3-key DESX enciphering (ISO9797 method 2
padding) :
B5 F0
CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C
5. 112+64-bit
3-DES DESX decipher (ISO 9797 method 2 padding)
Input:
B5 F0
CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C
Key type:
3DES /
3 keys
Chaining mode:
DESX
Padding:
ISO9797_M2
Key 1:
75 28
78 39 74 93 CB 70
Key 2:
34 E5
46 7B 95 94 40 6D
Key 3:
0A 20
16 FE F3 62 9F 94
Initial vector:
01 02
03 04 05 06 07 08
3-key DESX deciphering (ISO9797 method 2
padding) :
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 80 00 00 00 00 00 00 00
1. 128-bit AES ECB
enciphering.
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Chaining mode:
ECB
Key:
86 C8
A0 66 06 C4 9A D9 E3 C9 A7 72 09 A7 F1 9B
Initial vector:
-
AES mode ECB enciphering (no padding) :
8F 27
54 DC C7 71 53 D2 1B C7 B5 AE A2 D9 64 C8
2. 256-bit AES CFB
enciphering.
Input:
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC
DD EE FF 00
Chaining mode:
CFB
Key:
D4 AD
3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95
43 93 80 17
Initial vector:
01 02
03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00
AES mode CFB enciphering (no padding) :
54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6
3. 256-bit AES CFB
deciphering.
Input:
54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6
Chaining mode:
CFB
Key:
D4 AD
3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95
43 93 80 17
Initial vector:
01 02
03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00
AES mode CFB deciphering (no padding) :
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC
DD EE FF 00
1. BLOWFISH ECB
enciphering.
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Chaining mode:
ECB
Key:
86 C8
A0 66 06 C4 9A D9 E3 A4
Initial vector:
-
BLOWFISH mode ECB enciphering (no
padding) :
89 BA
FB 5E D1 8C 1E B4 30 3F 71 9A CD 7B 6B 75
2. BLOWFISH CBC
enciphering.
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Chaining mode:
CBC
Key:
86 C8
A0 66 06 C4 9A D9 E3 A4
Initial vector:
01 02
03 04 05 06 07 08
BLOWFISH mode CBC enciphering (no
padding) :
B3 8E
8A 23 ED B2 6E 59 24 60 D2 BC 43 C0 19 5A
3. BLOWFISH CFB
enciphering.
Input:
58 C0
D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc
dd ee ff 00
Chaining mode:
CFB
Key:
75 81
93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B
Initial vector:
01 02
03 04 05 06 07 08
BLOWFISH mode CFB enciphering (no
padding):
45 B8
AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07
6E 72 F0 A9
4. BLOWFISH CFB deciphering.
Input:
45 B8
AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07
6E 72 F0 A9
Chaining mode:
CFB
Key:
75 81
93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B
Initial vector:
01 02
03 04 05 06 07 08
BLOWFISH mode CFB deciphering (no
padding) :
58 C0
D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc
dd ee ff 00
1. RC2 ECB enciphering.
Input:
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC
DD EE FF 00
Chaining mode:
ECB
Key:
26 1E
57 8E C9 62 BF B8 3E 96
Effective key length (bits, decimal):
80
Initial vector:
-
RC2 mode ECB enciphering:
F9 9A
3A DB 00 3B 7A EB 81 E3 6B A9 E5 37 10 D1 F9 9A 3A DB 00 3B 7A EB 81 E3 6B A9
E5 37 10 D1
2. RC2 CBC enciphering.
Input:
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC
DD EE FF 00
Chaining mode:
CBC
Key:
26 1E
57 8E C9 62 BF B8 3E 96
Effective key length (bits, decimal):
40
Initial vector:
01 02
03 04 05 06 07 08
RC2 CBC mode enciphering:
71 2D
11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68
3B DC CD 7D
3. RC2 CBC
deciphering.
Input:
71 2D
11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68
3B DC CD 7D
Chaining mode:
CBC
Key:
26 1E
57 8E C9 62 BF B8 3E 96
Effective key length (bits, decimal):
40
Initial vector:
01 02
03 04 05 06 07 08
RC2 CBC mode deciphering:
11 22
33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC
DD EE FF 00
1. RC4 enciphering.
Input:
01 02
01 02 03 04 03 04 05 06 05 06 07 08 07 08
Key:
11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67
3D
RC4 enciphering:
38 58
C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79
2. RC4 deciphering.
Input:
38 58
C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79
Key:
11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67
3D
RC4 deciphering:
01 02
01 02 03 04 03 04 05 06 05 06 07 08 07 08
1. GOST 28147-89
ECB encipher (no padding)
Input:
11 22
33 44 55 66 77 88
Chaining mode:
ECB
Padding:
NOPAD
Key:
75 71
31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B
AA 03 0D 1B
Initial vector:
-
Manual S-BOXES (GOST 3411-94 test param set
is the default option):
-
Simple GOST 28147-89 ECB enciphering (no
padding):
03 25
1E 14 F9 D2 8A CB
2. GOST 28147-89
CBC encipher (PKCS5 padding)
Input:
11 22
33 44 55 66 77 88 99 AA BB CC DD
Chaining mode:
CBC
Padding:
PKCS5
Key:
75 71
31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B
AA 03 0D 1B
Initial vector:
01 02
03 04 05 06 07 08
Manual S-BOXES (GOST 3411-94 test param
set is the default option):
-
GOST 28147-89 CBC enciphering (PKCS5
padding):
93 03
1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11
3. GOST 28147-89
CBC decipher (PKCS5 padding)
Input:
93 03
1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11
Chaining mode:
CBC
Padding:
PKCS5
Key:
75 71
31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B
AA 03 0D 1B
Initial vector:
01 02
03 04 05 06 07 08
Manual S-BOXES (GOST 3411-94 test param
set is the default option):
-
GOST 28147-89 CBC deciphering (PKCS5
padding):
11 22
33 44 55 66 77 88 99 AA BB CC DD
4. GOST 28147-89
CFB encipher (ISO9797 method 2 padding)
Input:
93 03
1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11
Chaining mode:
CFB
Padding:
ISO9797_M2
Key:
75 71
31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B
AA 03 0D 1B
Initial vector:
01 02
03 04 05 06 07 08
Manual S-BOXES (GOST 3411-94 test param
set is the default option):
-
GOST 28147-89 CFB enciphering (ISO9797_M2
padding):
6E E8
45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42
5. GOST 28147-89
CFB decipher (ISO9797 method 2 padding)
Input:
6E E8
45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42
Chaining mode:
CFB
Padding:
ISO9797_M2
Key:
75 71
31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B
AA 03 0D 1B
Initial vector:
01 02
03 04 05 06 07 08
Manual S-BOXES (GOST 3411-94 test param
set is the default option):
-
GOST 28147-89 CFB deciphering (ISO9797_M2
padding):
11 22
33 44 55 66 77 88 99 AA BB CC DD 80 00 00
1. 1024-bit RSA
PKCS V.1.5 sign with SHA1
Input:
11 11
12 22 99
EM generation:
EMSA_PKCSV1_5
Hash:
SHA1
MGF:
MGF1
Salt length (bytes, decimal):
20
Manual salt:
-
Public exponent:
01 00
01
Private exponent:
82 B1
5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B
7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2
D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F
9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01
21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21
RSA modulus:
B6 DE
72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE
87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F
48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31
1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00
7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93
Signature:
-
RSASSA_PKCS V.1.5 signature with sha1:
15 8D
86 24 BE E4 F1 FF 58 40 16 32 23 20 E1 9A 64 94 E2 3C 95 90 9B DE B8 5F 5E 99
9D 36 73 24 4A 8C 39 41 AD FC 50 C4 BE AE 10 F6 2F 68 BB AD 64 79 7B 66 E9 1B
C6 17 62 63 C6 75 5B 83 1F 42 65 C9 5A 65 91 2B FE D8 DE 39 8C 78 E9 A8 3E 34
A2 ED 0E 34 E3 9B D9 93 A9 1B 08 35 B2 18 9E 44 4F 53 45 A9 0E D5 BD 47 6C 6F
5B E0 8D D1 B3 BE 69 F9 FF 84 2D D5 14 2C D2 9E C4 54 10 15 89 A4
2. 1024-bit RSA PSS
sign with MD5
Input:
11 11
12 22 99
EM generation:
EMSA_PSS
Hash:
MD5
MGF:
MGF1
Salt length (bytes, decimal):
20
Manual salt:
-
Public exponent:
01 00
01
Private exponent:
82 B1
5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B
7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2
D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F
9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01
21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21
RSA modulus:
B6 DE
72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE
87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F
48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31
1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00
7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93
Signature:
-
RSASSA_PSS signature with MD5:
28 8A 11 4D 89 DC 38 47 C1 AF 3C 9F 19 6B CE 83 4C 3F F9 EC 68 37 F4 BE 3C 4C
85 B0 FB D4 65 8D 46 33 B4 85 EB EF 28 7F DD 45 6D 94 91 1B 0F 86 21 7D C8 17
DA C0 F2 9D 91 33 2D 43 32 F9 D1 2A 82 67 C4 8C A1 72 17 3C E7 38 68 09 FC 98
FF D7 46 8C 20 7F 42 FC 3F 89 4F 53 D1 32 40 98 9F 83 49 86 61 C7 6C DF DE 80
6C 35 DA 9B B6 D4 13 85 88 61 57 B3 83 29 B5 36 7B 2B 0A F3 66 7E E8 79
3. 2048-bit RSA PSS
sign with SHA384
Input:
11 11
12 22 99
EM generation:
EMSA_PSS
Hash:
SHA384
MGF:
MGF1
Salt length (bytes, decimal):
32
Manual salt:
-
Public exponent:
01 00
01
Private exponent:
90 F4
F6 78 FF E6 FD A2 96 1D 47 82 B5 2D D7 FD 5B D0 64 75 30 32 E7 D7 78 8A 00 B4
7F E5 51 ED 00 08 91 8C 0D 5C 3C 95 30 F5 19 40 96 1D 74 33 5C D2 74 2B 4A 9E
C2 EC F6 AA D2 C1 3C 7A AF EF 64 43 8E 98 69 47 F3 BA F4 C9 32 FE 7F EE A0 2B
9C ED 55 F5 83 96 71 CE 42 CC B8 4F 46 4C DC 59 72 2F B6 21 9D F3 97 D4 F6 D8
40 1E 26 12 EF 43 18 85 4B 6A D1 1A 0E 2C 2D 22 6E 8F FB C3 E4 4E 2B 73 F6 23
6A 6E AF 03 D9 2B AC 00 3F 59 8B 78 BF EF 85 74 EA B1 93 9B AC 3A B8 19 D3 64
A8 0E FB 30 67 B9 A7 D7 A7 BF 77 1D 22 AD 1E 8B 05 60 C1 E7 B1 CA 00 C1 AE 70
03 17 24 54 77 81 D5 AC 2D 8B B1 46 E0 98 BB A6 E0 A1 1F 2C 71 89 90 76 10 F8
F3 04 4E 04 E2 82 E8 F8 8D 5A 76 33 B9 C1 FD F5 95 28 FF D4 F8 E2 0E 9C C0 F0
25 D0 13 B7 38 A2 93 5B 91 E1 A5 EE 3B 1D A6 F8 F5 2C 4B 01
RSA modulus:
AE 34
37 88 9B 40 1F 4A 54 23 ED B5 FB B3 DD 16 DC 44 03 37 E4 C5 FC E0 16 FD 84 91
E6 FA 7A 88 59 DB 4C 3F 7F E7 1C 46 A0 E9 C9 97 63 89 DD 3F 41 8C F4 CE BB 6C
F6 60 17 3E C9 DB 22 F8 E9 DC A9 7F 5E CC 03 B8 38 1E C2 75 4C F5 0E A4 65 41
F1 09 F9 92 A1 2F 17 2F 11 6E 0F 0F 31 95 00 30 70 41 88 C0 72 DD C4 9C 2E E4
7E ED 47 AB 26 D9 AF 17 2E 25 4B 4A A5 49 BE 97 9B 37 04 DA 74 87 76 87 A9 1B
78 8E 31 84 20 69 C9 C3 8B A2 8D 11 95 B7 5A 10 E2 3B 41 1E AD DA 10 AF 36 A4
CD 49 9B FA 19 6C A9 FC 0B CC 6D 06 16 0D F1 4E FD 08 61 37 CC AB 5C 17 B5 67
D1 CB C2 3A 36 6C 5E B4 16 EE B9 83 60 FB 7B 59 46 02 A1 D9 B9 A6 0A 6C 70 5D 46
50 30 7A CC 56 11 E2 EC 94 9C 2C E8 58 12 C5 66 74 3E 19 B2 88 08 B2 A8 62 CA
B6 EF 1D AA 54 FB 66 23 75 70 B4 BC 8B 37 32 C0 21 54 93
Signature:
-
RSASSA_PSS signature with SHA384:
1A 43
9C 48 4C D0 28 AE 5A AC 4D C2 73 AB 7F D9 55 00 50 A0 27 05 4A DF 4F 35 4A AF
9B 07 68 92 B5 68 F7 49 8C 59 81 E1 59 21 C6 5C 1E 28 7E 7D B0 34 FC 1A 4A 64
6B CE D2 98 AE 68 CA A6 26 16 A1 2A 08 A6 50 3A E5 6C 0B 76 A3 F6 44 39 AF D1
CF 6B 35 42 9A 0B CD E8 C9 BF 25 A2 AB 04 26 74 1E 9E EC 7F 03 D9 2A 00 5D 18
90 DA 2B AD 81 4F E3 E5 C7 8C 4D 95 2A 90 E2 16 AD 35 00 6E 1D 5B 8C FC 74 7B
FD E0 F8 AC C0 0B 83 AD 4F 40 47 B1 52 22 3C 4D 02 A4 89 FD A8 27 11 A7 53 06
68 C4 A9 61 10 41 25 31 E0 B7 2B BD 8B 32 DE D2 BF 0E 5F 34 F6 DA 73 E7 8A B7
31 30 AA 19 66 E2 B4 36 3B 63 E5 7B DB D7 99 E0 E4 E8 22 C0 00 F7 89 3B 5D 86
DB C6 8F 5D 06 30 85 E8 3D 52 9D 92 2E 6B 74 51 CE CA 4D C7 42 B8 34 28 F0 4B
56 92 DA 23 8D E4 7A B2 68 BF E1 9E 0E F8 99 1D A0 7E 26 94
4. 3072-bit RSA PKCS
sign of custom message digest
Input:
61 62 63
61 62 63 61 62 63
EM generation:
EMSA_PKCSV1_5
Hash:
Plain
encryption
MGF:
MGF1
Salt length (bytes, decimal):
20
Manual salt:
-
Public exponent:
01 00
01
Private exponent:
3A 6E
F4 92 8D BB EB D0 84 CD B6 FA 49 22 4B 8F 95 60 79 D7 6F 09 44 01 31 F8 CC 8D
86 B4 91 87 D1 F4 19 93 B0 51 6E DB 41 25 38 A4 78 A1 E0 40 42 04 D5 EB 80 B8
6D 5D 0E 9E 5C 75 A9 F2 43 BE 62 84 B9 2C C4 40 BD 2D D1 EA 71 FA 1A 91 5F F2
F3 E3 56 FB 7D 5B 08 19 8F D8 16 2A 93 84 69 B4 78 A3 0D 25 D9 1F 2A 23 F2 CB
70 45 47 64 A7 A4 C3 27 3D 79 CE 67 3A 1D 49 D4 1E 35 63 17 0E 0F 13 9B A4 3D
89 34 65 72 F6 72 DA 7B F8 F3 BB EC BC CF 00 98 31 FE F7 31 E4 46 D6 FC 3D 44
66 6E D1 E7 31 1E 0C 86 A2 60 DD 87 E0 69 4B 4E 5D 1F 0F 49 19 85 DF 74 51 86
F3 FB 6C 94 09 C2 2C 0C 3D 21 46 F5 82 CC 6C 05 45 E9 8B A3 99 D9 F0 24 2B 9C
D6 A8 77 FB AA C7 02 5A F3 D8 03 10 23 95 CE B1 DA DF 05 E7 3F 42 36 52 AA E9
BB 24 E0 F7 35 87 90 4D A2 ED D7 08 C8 CA BE 45 E4 AD 82 7F 31 D3 FE DF D6 45
8D B0 17 1E 6D 74 98 C7 F5 85 CB A8 0F 66 53 6B 7B D5 AC 9A 22 61 F7 3B DB FE
F0 59 79 0A F5 7C 57 FF 60 69 63 63 0A 7C F1 DB 83 0E B7 71 FE D8 B1 6C 9C B9
AA 6A A5 0A B9 5D 47 DE 2A 57 63 FA 74 9F 1D 9B 16 02 A2 BE 95 C1 ED CE 2C EA
EF 94 6E 05 7B 51 B3 44 C8 B9 98 73 55 79 84 0F 52 A0 E9 5B 6A D0 86 D2 25 2A 0F
D5 E5 E4 69 8A 47 73 58 B4 14 03 76 0A 80 96 D8 31
RSA modulus:
BE EC
82 D0 79 7B F2 C8 7D 28 26 49 F9 C7 71 7C A7 C1 E9 2D BA 6C D4 9C 99 FF 85 8E
59 51 0C 48 6F A6 4B B5 14 75 EB 62 3F DF 3F 59 FE CE 01 81 FB 51 32 85 2D 5B
D7 F1 73 30 F8 FB 0D 9A BC 08 59 AF D8 32 D0 9E 13 3A 6A DA E8 CD CC 1F E3 77
54 F4 44 E7 BA A7 0F 80 78 B5 35 82 CA 82 9B 42 A0 8D 62 B8 6D B9 3B 8A 70 75
A9 AE 28 D0 B0 25 B6 47 F0 B2 A1 15 03 B5 35 4A 68 9F E9 49 9B 26 07 8A 11 6C
7A 72 7E 0A 01 3F 98 DC 2E 0B 8C 86 C9 58 77 25 1F 4F 45 FA 46 83 17 8C 79 00
53 F8 72 D7 6D 3D D1 C1 72 87 56 6A 36 7C C4 71 8B 84 82 B1 ED 26 12 5B 09 C4
63 FD 74 5D B5 CC 75 EA A1 A9 8C D5 72 20 5B 59 F3 F6 8A 55 91 58 E5 AC F8 0A
41 24 4C DC 26 72 DA FC 0D 18 2B 13 6C 10 A3 AA CD C1 9B F0 B1 48 F6 B8 75 B7
A8 A8 95 1F 93 F9 C6 53 05 DE 3E 58 C8 F7 EB A2 61 AC 19 47 FF 83 DA D1 A2 C2
A3 71 E2 7C C8 64 A1 47 DD 87 08 F6 74 E7 75 8E D5 1D 3D 56 50 AD C8 BB AE 07
51 6F 5F 2B 7B 8D 5B EE 3F 7E CA 36 9D 24 1F 85 63 E9 45 49 10 9A B4 70 BD E7
A9 09 C7 9A 41 62 7C CE E9 4C 49 B5 C8 8C B8 BD B6 F5 CE A5 42 75 D8 95 DE F0
BC 54 BE 3C 37 B2 A2 3F 24 B4 AB F0 F4 F2 EC FB C9 B4 B4 15 0A AD 2B AD 9F E8
80 75 7E 96 3A 61 A4 60 D2 8E F1 A4 27 EC BC AD 86 13
Signature:
-
RSASSA_PSS signature plain encryption:
90 C5
05 FE 20 A2 31 95 13 00 A4 71 E3 F6 BA 6C 44 F7 0C 32 93 C8 35 64 C9 AE AB 84
CF 9F DC 0F AA 3B F0 41 03 0D DB D0 57 0B 8E D1 2F D3 58 B7 65 E8 76 4A F9 AC
CA 8A 76 C1 13 8D 40 F8 12 43 53 0D 84 65 2F 2B A9 2C E1 64 CD D8 E6 04 34 C6
92 A5 4C 84 EE 96 BC FA A4 FB B2 E6 16 F9 F4 41 12 AF 84 D4 A9 A6 EC B4 AB ED
66 F7 51 73 7B 9A 53 0E 93 45 C1 F9 0A 08 10 14 15 55 3D 8C 5A 50 19 16 E0 13
4F CB 83 81 AF 9D 09 55 4F 0D F0 DC D0 52 C7 B4 CF 2A 64 43 38 A9 40 79 2E E9
D7 2C 73 BA DB 70 2B 44 00 7A 78 41 9D 35 F3 16 6E 4E D7 DD 3C F8 EE 23 6C 44
3E 1E 72 AF 52 96 BC 65 B0 6D B2 B3 AA 5E 87 D2 BE EC 4C B0 4B 9B B4 05 65 85
7D 6E 44 FD 34 C5 F5 85 C3 51 D3 69 D7 8F C4 89 AC D2 FA BC 38 4A 31 8A D5 46
42 EC 90 1A 22 85 62 06 87 E3 64 8F 55 F0 6F E4 E7 D9 15 91 76 89 88 86 2B 27
72 46 03 FA 14 B9 72 64 E1 C7 72 EB 74 D2 A3 B6 CE 40 A3 65 51 B8 8D 47 75 7C
BB 8A DA A3 FD 6D DF B2 7A D3 E6 07 25 E7 94 2B 83 28 16 CC 7C 4E E9 4E C4 25
E7 4C 72 80 7E 5B 48 69 22 2E 85 CB 3A FB B3 A6 35 B1 81 AC 50 71 FF 86 58 A4
3F 30 89 60 F4 C5 00 F5 99 FD 67 27 B1 1D A5 6C B1 0B 3E 85 E5 9A 8D F2 3E BB
98 71 23 F8 25 B6 A7 6A BF 58 52 AA C4 B4 B8 05 9F AF
1. DSA signature
generation.
Input:
11 22
33 44 55
Prime modulus p:
8d f2
a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f
0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37
24 c2 ec 07 36 ee 31 c8 02 91
Prime divisor of (p-1), q:
c7 73
21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f
Parameter g:
62 6d
02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3
99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b
08 8c c5 72 af 53 e6 d7 88 02
Private key x:
17 32
49 87 43 98 57 8A DF 76 AF DF F5 78 D6 F1 A3 D3 21 32
Public key y:
2B DB
AD AE 56 33 81 8F 02 23 65 C4 B8 D9 4A 31 8A 14 40 48 A4 B6 AE 69 BD 33 94 00
B4 67 42 46 24 F2 89 6D FF 97 90 3E 5C 2F 34 8D D8 1A 86 A2 27 65 E5 8F D7 D9
64 D4 89 D4 0E 92 EE E2 05 40
Manual random k:
C2 1E
38 17 41 A6 82 8B 24 BE 6B 62 AE F6 44 67 58 FD 4D 09
Signature part 1, r:
-
Signature part 2, s:
-
DSA Signature: r, s:
8D BA
7B 98 7D 5A 87 99 59 AC C5 02 FB AC F5 96 36 85 5D 46
B8 82
52 C5 EC D3 F0 EB 34 6D CB 2E 60 11 BF 03 B7 42 84 2D
1. ECDSA F(p)
signature generation with secp128 r1 curve parameters.
Input:
11 22
33 44 55
Private key d:
B0 66
CA 54 49 3F 53 85 95 7F 30 85 EA E2 17 5A
Public key point coordinate xD:
02 5C
93 3C 13 F2 8F 2F E6 0C 9F 58 50 65 39 C8
Public key point coordinate yD:
83 C8
2B 71 0A 5D 56 43 B3 08 BC 2E 98 20 C0 9D
Set curve by name:
Secp128r1
Prime modulus p:
-
Curve coefficient a:
-
Curve coefficient b:
-
Point coordinate xG:
-
Point coordinate yG:
-
Point order n:
-
Cofactor h:
-
Manual random k:
-
Signature part 1, r:
-
Signature part 1, s:
-
ECDSA F(p) signature: r, s:
08 B5
A6 39 EE 8F 52 DE A4 B5 AC 6E DD 71 FD 7E
51 49
DF 7D 6C CE 90 E3 4D 61 14 CA FC B5 73 3F
2. ECDSA F(p)
signature generation with manually entered curve parameters. (Using secp192k1 param set).
Input:
11 22
33 44 55
Private key d:
88 E0
D0 92 A0 A8 C7 14 E3 7F B6 54 2E 2E 97 53 2E 8D 0D 64 0E 89 24 21
Public key point coordinate xD:
76 E5
D2 F3 B5 4F 4B 92 58 0A E0 E6 3B 1C C0 37 D3 10 6E 0D B0 FC 19 30
Public key point coordinate yD:
7C 12
DC 1F D0 E4 13 CA 66 C3 1C E0 ED CB BA C0 C3 96 F0 7E 88 12 20 A0
Set curve by name:
MANUAL
Prime modulus p:
FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE FF FF EE 37
Curve coefficient a:
00
Curve coefficient b:
03
Point coordinate xG:
DB 4F
F1 0E C0 57 E9 AE 26 B0 7D 02 80 B7 F4 34 1D A5 D1 B1 EA E0 6C 7D
Point coordinate yG:
9B 2F
2F 6D 9C 56 28 A7 84 41 63 D0 15 BE 86 34 40 82 AA 88 D9 5E 2F 9D
Point order n:
FF FF
FF FF FF FF FF FF FF FF FF FE 26 F2 FC 17 0F 69 46 6A 74 DE FD 8D
Cofactor h:
1
Manual random k:
12 34
56 78
Signature part 1, r:
2A 6A
18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D
Signature part 1, s:
80 21
DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7
ECDSA F(p) signature: r, s:
2A 6A
18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D
80 21
DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7
1. ECDSA F(2m)
signature generation with sect233k1 curve parameters.
Input:
11 22
33 44 55
Private key:
6C CF
9E B2 5D 70 BA 9E 5C F1 0B 58 2B 3C 9B F7 3D 54 B1 E8 23 E0 01 D1 77 8B 15 AC
4E
Public key point coordinate xD:
23 3C
91 68 46 E6 0C C8 DF 8C B1 1B B1 FB CE D5 30 BB 42 58 28 89 AC D4 DC 30 D0 87
5F
Public key point coordinate yD:
01 8F
C3 87 17 EF 51 A4 0E 87 28 22 5C D2 51 D4 E4 D1 51 3F 2A 93 DA 64 B6 EE AF A8
3D EA
Set curve by name:
sect233k1
Field characteristic:
-
Curve coefficient a:
-
Curve coefficient b:
-
Curve point coordinate xG:
-
Curve point coordinate yG:
-
Point order n:
-
Cofactor h:
-
Manual random k:
-
Signature part 1, r:
-
Signature part 2, s:
-
ECDSA F(2m) signature: r, s:
5D E6
0A 35 2D 68 A3 30 3D 2A A9 0B 08 40 DF EE B9 85 49 90 2C 65 38 DC C1 28 EC 98
E5
7B 9B
14 CE D4 41 97 DA E8 59 98 59 19 3C B6 50 4C DA 99 16 AF 7B 90 D6 5E 94 28 3D
23
2. ECDSA F(2m)
signature generation with manual curve parameters.
(yet using sect239k1 param set)
Input:
11 22
33 44 55
Private key:
19 28
FD 6B 62 50 23 63 10 67 47 28 86 BD C2 46 65 EC A9 AE E2 BB D1 99 1F 24 BA FC
E7 1C
Public key point coordinate xD:
10 B8
B6 5D 05 CF 32 5A D3 10 C2 7E D8 B1 57 F7 81 A4 99 5C 01 09 93 00 1E D9 49 8E
1B 70
Public key point coordinate yD:
49 24
00 10 A6 59 DC 04 41 7E 73 96 70 E8 C1 EF 8B 5D 96 7E 56 50 80 03 1C 68 6F CC
E6 60
Set curve by name:
sect233k1
Field characteristic:
80 00
00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 01
Curve coefficient a:
00
Curve coefficient b:
01
Curve point coordinate xG:
29 A0
B6 A8 87 A9 83 E9 73 09 88 A6 87 27 A8 B2 D1 26 C4 4C C2 CC 7B 2A 65 55 19 30
35 DC
Curve point coordinate yG:
76 31
08 04 F1 2E 54 9B DB 01 1C 10 30 89 E7 35 10 AC B2 75 FC 31 2A 5D C6 B7 65 53
F0 CA
Point order n:
20 00
00 00 00 00 00 00 00 00 00 00 00 00 00 5A 79 FE C6 7C B6 E9 1F 1C 1D A8 00 E4
78 A5
Cofactor h:
4
Manual random k:
11 22
33 44
Signature part 1, r:
-
Signature part 2, s:
-
ECDSA F(2m) signature (r, s)
:
0F C6
26 7B 0F 87 6B AE DD B5 69 B7 E3 09 86 3A E2 33 FC A0 04 BD 39 C3 BF 34 F2 D6
07 35
05 7D
0D CA 60 EC B9 91 DE CE 25 30 B8 A1 19 46 09 FD 7E E0 AB 5F 9D 1F 9C E7 34 8A
26 1A
1. GOST 3410-2001
signature generation.
Input:
00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E0 95 25 F3 9F 81 19 83 2E B8 19
75 D3 66 C4 B1
Prime modulus p:
FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE
FF FF FC 2F
Underlying field modulus q:
FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FE BA AE DC E6 AF 48 A0 3B BF D2 5E 8C
D0 36 41 41
First curve coefficient a:
00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
Point coordinate x(p):
79 BE
66 7E F9 DC BB AC 55 A0 62 95 CE 87 0B 07 02 9B FC DB 2D CE 28 D9 59 F2 81 5B
16 F8 17 98
Point coordinate y(p):
48 3A
DA 77 26 A3 C4 65 5D A4 FB FC 0E 11 08 A8 FD 17 B4 48 A6 85 54 19 9C 47 D0 8F
FB 10 D4 B8
Private key d:
DB AE
32 20 9A 50 EE 40 78 36 FD 12 49 32 F6 9E 7D 49 DC AD 4F 14 F2 44 40 66 D0 6B
C4 30 B7 32
Public key point coordinate x(q):
12 30
C3 1F 22 B6 19 F2 B1 13 37 81 AA E9 21 A0 22 F6 44 4A 9D 69 5C 72 9E 68 E7 56
D6 CF 55 D9
Public key point coordinate y(q):
45 FE
3B 4F 0F 08 55 AD 2C 01 27 74 C2 77 57 9B BF F3 AB 73 C2 63 47 82 7F C4 68 57
B9 20 DE E2
Manual random k:
38 47
65 23 49 87 56 56 87 46 98 72 34 65 23 47 85 23 47 34 98 57 34 87 56 23 87 56
34 87 65 28
Signature part 1, r:
-
Signature part 2, s:
-
GOST 3410-2001 signature (r, s):
6D F3
9B 1C AB DF 1F BA B1 08 C6 27 C3 F8 F7 ED 1A E7 FF 7E DC 43 9C 72 3A 2C 38 BE
CD FF 68 92
7D D9
90 16 C5 32 4B 32 BE 02 0D 16 AD A9 A8 41 AF 65 17 87 F1 C1 8A FE FB C6 B1 5C
A7 AC CB CF
1. SHA1 hash
calculation.
Input:
61 62
63
Algorithm:
SHA1
SHA1:
A9 99
3E 36 47 06 81 6A BA 3E 25 71 78 50 C2 6C 9C D0 D8 9D
2. SHA256 hash calculation.
Input:
61 62
63
Algorithm:
SHA256
SHA256:
BA 78
16 BF 8F 01 CF EA 41 41 40 DE 5D AE 22 23 B0 03 61 A3 96 17 7A 9C B4 10 FF 61
F2 00 15 AD
3. SHA384 hash
calculation.
Input:
61 62
63
Algorithm:
SHA384
SHA384:
CB 00
75 3F 45 A3 5E 8B B5 A0 3D 69 9A C6 50 07 27 2C 32 AB 0E DE D1 63 1A 8B 60 5A
43 FF 5B ED 80 86 07 2B A1 E7 CC 23 58 BA EC A1 34 C8 25 A7
4. SHA512 hash
calculation.
Input:
61 62
63
Algorithm:
SHA512
SHA512:
DD AF
35 A1 93 61 7A BA CC 41 73 49 AE 20 41 31 12 E6 FA 4E 89 A9 7E A2 0A 9E EE E6
4B 55 D3 9A 21 92 99 2A 27 4F C1 A8 36 BA 3C 23 A3 FE EB BD 45 4D 44 23 64 3C
E8 0E 2A 9A C9 4F A5 4C A4 9F
1. MD2 hash
calculation.
Input:
61 62
63
Algorithm:
MD2
MD2:
DA 85
3B 0D 3F 88 D9 9B 30 28 3A 69 E6 DE D6 BB
2. MD4 hash
calculation.
Input:
61 62
63
Algorithm:
MD4
MD4:
A4 48
01 7A AF 21 D8 52 5F C1 0A E8 7A A6 72 9D
3. MD5 hash
calculation.
Input:
61 62
63
Algorithm:
MD5
MD5:
90 01
50 98 3C D2 4F B0 D6 96 3F 7D 28 E1 7F 72
1. 56-bit DES MAC (no
padding)
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Output format:
4
bytes
Algorithmbr /adding:
NOPAD
Initial vector:
12 34
56 78 12 34 56 78
Key 1:
9B 1B
60 62 89 10 F3 E4
Key 2:
-
Key 3:
-
DES data authentication code (MAC) :
FE 54
92 C3
2. 112-bit 3DES MAC
(PKCS5 padding)
Input:
11 22
33 44 55 66 77 88 99 aa bb cc dd ee ff 00
Output format:
8
bytes
Algorithmbr /adding:
NOPAD
Initial vector:
12 34
56 78 12 34 56 78
Key 1:
9B 1B
60 62 89 10 F3 E4
Key 2:
B4 CA
4D 69 6A 77 C7 59
Key 3:
-
3DES data authentication code (MAC) :
AD 7E
66 9C DE 29 06 7B
1. MD2 HMAC
Input:
4D 44
32 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Hash:
MD2
Key:
77 64
BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E
MD2 HMAC:
F6 9F
8F 5D 1C 0C FC 15 7F 4A 4B 23 F2 61 8C 1C
2. MD5 HMAC
Input:
4D 44
35 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Hash:
MD5
Key:
77 64
BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E
MD5 HMAC:
3C 51
C6 D3 3E 3E 00 C1 B5 6A 43 A2 1D 41 E0 B4
3. SHA1 HMAC
Input:
53 48
41 31 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Hash:
SHA1
Key:
77 64
BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E
SHA1 HMAC:
4D DB
62 B4 45 77 9C A0 17 20 52 69 B9 29 C6 C2 FA 7D D6 AC
4. RIPEMD160 HMAC
Input:
52 49
50 45 4D 44 31 36 30 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Hash:
RIPEMD160
Key:
77 64
BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E
RIPEMD160 HMAC:
42 F8
B6 F5 78 34 A4 21 51 9A 63 4A 42 9C 0A 30 08 3B 3F D1
1. RIPEMD160
calculation
Input:
61 62
63
RIPEMD160 MD:
8E B2
08 F7 E0 5D 98 7A 9B 04 4A 8E 98 C6 B0 87 F1 5A 0B FC
1. 4-byte GOST 28147-89 MAC
Input:
47 4F
53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Output format:
4
bytes
Key:
97 FD
6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B
70 B5 5B 9B
Initial vector:
12 34
56 78 12 34 56 78
Manual S-BOXES:
-
GOST 28147 data authentication code:
78 31
5C 5E
2. 8-byte GOST 28147-89 MAC
Input:
47 4F
53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Output format:
8
bytes
Key:
97 FD
6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B
70 B5 5B 9B
Initial vector:
12 34
56 78 12 34 56 78
Manual S-BOXES:
-
GOST 28147 data authentication code:
D8 3D
2C D8 D0 AE 38 5B
1. GOST 3411-94
hash
Input:
47 4F
53 54 33 34 31 31 2D 39 34 20 68 61 73 68 20 63 61 6C 63 75 6C 61 74 69 6F 6E
Initial vector:
C0 A9
BE 90 60 6F 18 2B 6E 55 25 5F 07 77 42 F0 C2 DF 1E FA 97 B0 75 18 0B F6 DB AF
00 F3 1B 91
Manual S-BOXES:
-
GOST 3411-94 hash:
E6 11
AE 6A 07 A3 49 0D 9F A4 3B 9B B4 AF 51 B5 7D 69 38 99 9B F1 BB 5E 3C 49 92 20
29 4F 7C E2
1. GSM A3A8
calculation
Key:
9A AA
FE 5B F5 6D 6B C8 BB 1E B7 C6 37 75 BE 62
Seed:
58 E3
5D D5 D0 DD F8 5E CF F0 58 1C FA 14 DB A6
A3A8 result:
14 0D
AB 04 44 AB A8 0B 2C D1 30 00
1. CRC8
calculation
Input:
76 61
72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20
64 61 74 61
Algorithm:
CRC8
CRC8 result:
76
2. CRC16
calculation
Input:
76 61
72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74
20 64 61 74 61
Algorithm:
CRC16
CRC16 result:
8D 3C
3. ISO 13239 CRC16
calculation
Input:
76 61
72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74
20 64 61 74 61
Algorithm:
CRC16_ISO_13239
ISO 13239 CRC16 result:
30 82
4. CRC32 calculation
Input:
76 61
72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74
20 64 61 74 61
Algorithm:
CRC32
CRC32 result:
9B D3
66 AE
1. DSA key pair
generation
Prime modulus p:
8d f2
a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f
0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37
24 c2 ec 07 36 ee 31 c8 02 91
Prime divisor of (p-1), q:
c7 73
21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f
Parameter g:
62 6d
02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3
99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b
08 8c c5 72 af 53 e6 d7 88 02
Manual private key x:
-
Private key (x):
05 2B
E8 0D 83 91 0D 2A 54 89 86 C4 01 D3 4A 0D 5D D5 3E B4
Public key (y):
6F C8
73 99 3A 99 D9 07 D2 0F 68 72 28 C0 F2 54 84 D2 B4 5B 96 A6 CD DB C4 49 86 1E
E8 41 7E 46 BA BA 88 1E 40 32 A7 34 1E C5 E8 31 49 09 D4 BD F4 2D C2 53 97 79
33 78 09 53 51 EE 29 73 AC 4F
1. 3072-bit RSA key
pair generation
Field size:
3072
Public exponent:
01 00
01
Private exponent:
B8 BA
9E AD C7 08 E8 D8 B4 04 86 B9 29 1F E7 10 F1 AF BB D3 C4 59 A6 4C 2D 04 6D F8
10 CA DA BE 64 50 6F 7A 81 AC 1D CB 99 28 6C C5 6B 58 E1 9A 27 EE 60 D7 B5 3C
4F 81 3C 66 FF 4A 7A F8 3B 2B DF CD 8E E5 7F B2 4A 9E 97 95 59 9C 83 93 17 DB
E8 2E 5A AD 4C 9A 03 FD 26 52 32 95 DA 89 E1 CE FE 32 73 32 DE 99 2E D4 A3 AA
F6 DA 7B 59 4C 48 8C BC B4 B5 44 71 F2 18 1F C3 47 90 22 01 A1 82 37 FA 53 CB
73 0F 58 35 C3 71 EF 64 8B 23 8F 9B E0 F0 77 99 2A 13 23 28 4E DA 52 8C B6 47
7B 86 26 6F 2E AF E8 C7 01 4D 5D 1B E0 27 F6 8F 86 93 EA 71 72 7F 65 0B BB 55
B3 72 C7 D6 5D 58 0A C3 7A D2 4A 39 D6 DE 9D F8 9D 7D FE 33 82 0B A2 07 9B 41
BC 8B 3C CA E3 9D D8 13 12 67 20 07 0E CD ED 3D 5D 44 55 97 05 BE B9 01 8B 8B
EF A3 48 99 09 AC 13 7A 94 2E 5B E8 23 A0 16 5A 0E 43 EC 0E 8E A1 6E 93 B2 79
A8 03 EC 65 DF 9B D3 E5 7B 19 FC 63 87 C8 DD 46 C2 E4 B3 8C 32 7F 09 0B 20 53
65 4F D4 2C D2 68 32 F1 C4 98 D6 A7 82 54 03 FD 9C F1 58 C8 85 38 C8 29 FD EF
2F B0 77 A1 8F 98 AD 2C 0F 5D 13 56 3C C2 21 AF A1 14 7C B8 FC 39 9A FC 81 2B
DD CC 19 3C 1F 00 B8 C6 D2 E0 41 4A 40 05 A0 CA 00 B2 43 FA 99 44 5D 6C 1A 23
F7 4A C4 4B 67 D8 9C 77 AD 46 7F 6F AC 97 6F 84 04 01
Modulus:
C1 33
93 37 90 48 F2 8B 9D BA 5B 26 A4 85 6D 9B F3 F5 8C 36 0A AB 25 5C 19 EF AD D2
3B 1C 4C 1B 5E 32 FE 10 35 09 DB 13 52 D0 6A ED DF B1 BE B8 6D 4B 18 8C 97 E8
D8 E7 CD 57 B9 2E B7 8C 9F 4B D5 02 FD 3F 28 64 15 86 74 21 3A 16 C6 CC AA 52
77 89 CC 51 A7 A9 F2 DD C5 29 02 20 F0 CE 36 9B B9 A7 FF CA FE F3 45 95 C0 18
6C A0 87 C7 96 8A 4F 38 50 70 BA 41 7F 9B 26 09 45 5E F0 05 70 90 1A B8 6B 73
AC 00 18 56 3B 68 69 9F DD A6 9D 9E 56 85 56 F6 97 11 B2 DB B5 BD 3A 07 44 62
A9 08 A3 ED 04 11 C2 C9 F6 A5 64 8E C3 73 4F D2 4C 3D 0A 0B 13 3B B0 69 F5 85
D9 F3 78 AE 83 B2 65 2E B8 B9 C3 9F C3 BC 7A 7C 16 BC B0 33 1D A8 B8 34 4A CA
E7 F3 52 FA DE D3 E7 70 A2 45 44 F7 86 27 E2 E0 A4 F6 5C 5D F2 8B F6 99 E3 C3
AD 1C 16 74 88 B5 43 A1 C9 10 35 9F 8E 67 F6 6D 30 57 51 75 37 2E 28 F1 8A FF
2C E7 AE 9D BF 13 19 2D 3F 8D D4 1E 1F 0D 48 3A 01 C2 EC CB 70 03 59 EC 77 64
A0 0A F6 91 C3 85 3F 54 59 06 02 95 13 40 D6 B0 C6 4C 15 98 CF F0 54 FC 4B AB
D7 65 96 85 03 E2 E0 26 B0 F6 07 26 FE BB C6 81 5B DE 8E A4 A9 D5 F6 D9 B6 82
77 1F AA 7F C6 F4 5D 68 80 03 D5 C9 64 E1 92 14 E6 76 4B 00 7B B3 D3 18 AC 56
41 BC 3F 2F C3 CE D0 D0 D9 78 9E 98 59 AA 3E 5C AF C5
1. ECDSA F(p) key
pair generation using secp160k1 curve parameters
Set curve by name:
Secp160k1
Prime modulus p:
-
Curve coefficient a:
-
Curve coefficient b:
-
Point coordinate xG:
-
Point coordinate yG:
-
Point order n:
-
Cofactor h:
-
Private (d):
96 23
67 B6 BE B6 A3 E4 7A 0F CE 35 6B 2C E2 87 15 67 C6 14
Public key curve point coordinate 1 (Px):
8B 2D
C7 6D A6 4A 57 C9 B8 D6 ED 3E ED F3 17 9E 95 62 80 2D
Public key curve point coordinate 2 (Py):
E2 A5
D0 2C 57 7E 25 53 15 AF 10 01 4F 3F 04 7F F1 96 DA 06
2. ECDSA F(p) key
pair generation using secp384r1 curve parameters
Set curve by name:
Secp384r1
Prime modulus p:
-
Curve coefficient a:
-
Curve coefficient b:
-
Point coordinate xG:
-
Point coordinate yG:
-
Point order n:
-
Cofactor h:
-
Private (d):
91 15
40 76 2B 80 70 60 EB B1 07 1D 8B 76 F9 C6 B0 C8 57 0B 2D 56 20 4B 7D 62 44 84
43 17 17 98 ED F7 12 E7 CF 55 89 5D 67 5F FE 7B 5C F3 57 50
Public key curve point coordinate 1 (Px):
B7 82
8F F3 F8 14 93 2B 53 1D 3C D5 89 47 A7 76 55 CA 12 EE 53 33 33 EE 12 E9 21 C3
91 14 B7 52 BE FD B3 E4 5C 05 D6 C1 F8 22 2C 5C 6B 23 4E 8D
Public key curve point coordinate 2 (Py):
1F 4B
1B BA 34 34 C6 BA A3 42 50 74 4B 4E 10 9E 09 A5 5D 5F 30 75 BE C3 32 56 C9 4A
46 87 92 C2 B5 65 0D 24 F8 54 82 C9 88 B7 32 8E 82 5F 48 8D
1. ECDSA F(2m) key
pair generation using secp233k1 curve parameters
Set curve by name:
secp233k1
Field characteristic:
-
Curve coefficient a:
-
Curve coefficient b:
-
Curve point coordinate xG:
-
Curve point coordinate yG:
-
Point order n:
-
Cofactor h:
-
Private (d):
12 9E
28 CA 14 81 6E 45 60 CA D1 4C 96 61 F7 36 7C E5 EA 57 A6 4B 0E 7F 6E A1 B2 A3
90
Public key curve point coordinate 1 (Px):
1D 54
A2 9D CB 0E 89 C7 BE CE 34 F1 A0 2C 08 CC 6F 7A B0 EB CD 28 0D EE 99 D5 C5 66
41
Public key curve point coordinate 2 (Py):
01 88
0C A9 C0 6B 79 2E E9 1E 3B 5C 5F C6 36 F9 53 8F 89 E1 74 EA 57 0E AA F4 2E 45
80 7C
1. GOST 3410-2001
key pair generation
Prime modulus p:
00 00
00 00 00 00 00 00 D1 48 F0 3F 28 C5 98 1C 59 D0 A7 32 DF 3C 94 F0 DD 0F 44 05
4C 83 20 AF
Underlying field modulus q:
00 00
00 00 00 00 00 00 45 C2 FA BF B8 41 DD 5E C8 9A E2 66 B5 95 66 7E B5 69 8E F1
59 7F 46 19
First curve coefficient a:
00 00
00 00 00 00 00 00 57 8E C8 B0 4D 37 D2 61 C3 7D 44 72 4C 22 CC 4D 53 85 4A 60
82 20 4C DC
Point coordinate x(p):
00 00
00 00 00 00 00 00 89 56 5C 06 A2 78 E3 CE 5B C3 6D 7D F7 65 21 F9 E8 A1 3D 8B
35 9D B4 CC
Point coordinate y(p):
00 00
00 00 00 00 00 00 5F B2 29 3B 42 8E 87 3C 3A 7A D2 4B 65 56 9F 80 83 AB DC A9
A4 06 EE 2E
Manual private key d:
-
Private (d):
0B 3D
A5 DF 6C 58 C5 2C 06 34 12 E5 36 54 D3 BE C9 4F 17 23 DF 4C 1D 35
Public key curve point coordinate 1 (u):
2B 4C
47 CF C9 BC 6F 71 C3 AB E4 10 3C 84 F3 72 1F A4 86 CB 90 02 F2 F3
Public key curve point coordinate 2 (v):
0C 11
EB 03 C5 80 2F 01 72 20 08 AF 00 CC 28 96 89 F9 8A 45 89 83 D3 30
All results are obtained via SCV Cryptomanager (c) SCV Tools.