Here are test vectors for the various cryptographic functions obtained via SCV Cryptomanager, a cryptocalculator tool.
Four sections are listed below:
- Ciphers
- Signature systems
- Hashes, authentication codes
- Key generation functions


Ciphers

RSA

1. 1024-bit RSA bare exponentiation

Input/cipher:
11 22 33 44

Padding scheme:
EP/DP

Public exponent:
01 00 01

Private exponent:
24 89 10 8B 0B 6A F8 6B ED 9E 44 C2 33 64 42 D5 E2 27 DB A5 5E F8 E2 6A 7E 43 71 94 11 90 77 F0 03 BC 9C 02 78 52 BB 31 26 C9 9C 16 D5 F1 05 7B C8 36 1D CB 26 A5 B2 DB 42 29 DB 3D E5 BD 97 9B 2E 59 7D 19 16 D7 BB C9 27 46 FC 07 59 5C 76 B4 4B 39 A4 76 A6 5C 86 F0 86 DC 92 83 CA 6D 1E EF C1 49 15 98 2F 9C 4C ED 5F 62 A9 FF 3B E2 42 18 A9 93 57 B5 B6 5C 3B 10 AE B3 67 E9 11 EB 9E 21

RSA modulus:
F0 C4 2D B8 48 6F EB 95 95 D8 C7 8F 90 8D 04 A9 B6 C8 C7 7A 36 10 5B 1B F2 75 53 77 A6 89 3D C4 38 3C 54 EC 6B 52 62 E5 68 8E 5F 9D 9D D1 64 97 D0 E3 EA 83 3D EE 2C 8E BC D1 43 83 89 FC CA 8F ED E7 A8 8A 81 25 7E 8B 27 09 C4 94 D4 2F 72 3D EC 2E 0B 5C 09 73 1C 55 0D CC 9D 7E 75 25 89 89 1C BB C3 02 13 07 DD 91 8E 10 0B 34 C0 14 A5 59 E0 E1 82 AF B2 1A 72 B3 07 CC 39 5D EC 99 57 47

Exponentiation result (Encipher):
50 5B 09 BD 5D 0E 66 D7 C8 82 9F 5B 47 3E D3 4D B5 CF DB B5 D5 8C E7 83 29 C8 BF 85 20 E4 86 D3 C4 CF 9B 70 C6 34 65 94 35 80 80 F4 3F 47 EE 86 3C FA F2 A2 E5 F0 3D 1E 13 D6 FE C5 7D FB 1D 55 22 24 C4 61 DA 41 1C FE 5D 0B 05 BA 87 7E 3A 42 F6 DE 4D A4 6A 96 5C 9B 69 5E E2 D5 0E 40 08 94 06 1C B0 A2 1C A3 A5 24 B4 07 E9 FF BA 87 FC 96 6B 3B A9 45 90 84 9A EB 90 8A AF F4 C7 19 C2 E4


2. 2048-bit PKCS V. 1.5 enciphering.

Input/cipher:
11 22 33 44

Padding scheme:
PKCSV1_5

Public exponent:
01 00 01

Private exponent:
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

RSA modulus:
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

RSA_PKCSV1_5 enciphered:
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


3. 2048-bit PKCS V. 1.5 deciphering.

Input/cipher:
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

Padding scheme:
PKCSV1_5

Public exponent:
01 00 01

Private exponent:
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

RSA modulus
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

RSA_PKCSV1_5 deciphered:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 22 33 44


DES

1. 56-bit DES encipher (no padding)

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Key type:
One-key DES

Chaining mode:
ECB

Padding:
NOPAD

Key 1:
75 28 78 39 74 93 CB 70

Key 2:
-

Key 3:
-

Initial vector:
-

Simple DES ECB enciphering (no padding):
B5 21 9E E8 1A A7 49 9D 21 96 68 7E 13 97 38 56


2. 112-bit 3-DES CBC encipher (PKCS-5 padding).

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Key type:
3DES / 2 keys

Chaining mode:
CBC

Padding:
PKCS5

Key 1:
75 28 78 39 74 93 CB 70

Key 2:
34 E5 46 7B 95 94 40 6D

Key 3:
-

Initial vector:
78 E9 5A BF 0B 8E E2 C0

2-key 3DES CBC enciphering (PKCS5 padding):
74 3F 14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E


3. 112-bit 3-DES CBC decipher (PKCS-5 padding)

Input:
74 3F 14 0C F3 72 B3 3C 71 B8 AA 2A F2 D4 97 6B 34 A2 68 F2 9B 18 F3 6E

Key type:
3DES / 2 keys

Chaining mode:
CBC

Padding:
PKCS5

Key 1:
75 28 78 39 74 93 CB 70

Key 2:
34 E5 46 7B 95 94 40 6D

 Key 3:
-

Initial vector:
78 E9 5A BF 0B 8E E2 C0

2-key 3DES CBC deciphering (PKCS5 padding) :
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 08 08 08 08 08 08 08 08                  


4. 112+64-bit 3-DES DESX encipher (ISO 9797 method 2 padding).

Input:
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00

Key type:
3DES / 3 keys

Chaining mode:
DESX

Padding:
ISO9797_M2

Key 1:
75 28 78 39 74 93 CB 70

Key 2:
34 E5 46 7B 95 94 40 6D

Key 3:
0A 20 16 FE F3 62 9F 94

Initial vector:
01 02 03 04 05 06 07 08

3-key DESX enciphering (ISO9797 method 2 padding) :
B5 F0 CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C


5. 112+64-bit 3-DES DESX decipher (ISO 9797 method 2 padding)

Input:
B5 F0 CB 09 7F 8B FD 65 B8 62 70 75 22 10 81 92 AF 65 1A 5E B0 7A 9B 9C

Key type:
3DES / 3 keys

Chaining mode:
DESX

Padding:
ISO9797_M2

Key 1:
75 28 78 39 74 93 CB 70

Key 2:
34 E5 46 7B 95 94 40 6D

Key 3:
0A 20 16 FE F3 62 9F 94

Initial vector:
01 02 03 04 05 06 07 08

3-key DESX deciphering (ISO9797 method 2 padding) :
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 80 00 00 00 00 00 00 00


AES

1. 128-bit AES ECB enciphering.

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Chaining mode:
ECB

Key:
86 C8 A0 66 06 C4 9A D9 E3 C9 A7 72 09 A7 F1 9B

Initial vector:
-

AES mode ECB enciphering (no padding) :
8F 27 54 DC C7 71 53 D2 1B C7 B5 AE A2 D9 64 C8


2. 256-bit AES CFB enciphering.

Input:
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00

Chaining mode:
CFB

Key:
D4 AD 3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95 43 93 80 17

Initial vector:
01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00


AES mode CFB enciphering (no padding) :
54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6


3. 256-bit AES CFB deciphering.

Input:
54 D3 6F EC 6F F5 2C 63 98 40 5C 23 97 F6 51 68 E1 6B F3 88 9B 8C DB 9E 90 DD E7 A6 90 9D C4 C6

Chaining mode:
CFB

Key:
D4 AD 3F 4A D4 04 68 3E 1F D2 A8 4E 71 77 ED 27 7A 61 6D 97 5A 93 1D 0B 48 FB 7C 95 43 93 80 17

Initial vector:
01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 00

AES mode CFB deciphering (no padding) :
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00


BLOWFISH

1. BLOWFISH ECB enciphering.

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Chaining mode:
ECB

Key:
86 C8 A0 66 06 C4 9A D9 E3 A4

Initial vector:
-

BLOWFISH mode ECB enciphering (no padding) :
89 BA FB 5E D1 8C 1E B4 30 3F 71 9A CD 7B 6B 75


2. BLOWFISH CBC enciphering.

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Chaining mode:
CBC

Key:
86 C8 A0 66 06 C4 9A D9 E3 A4

Initial vector:
01 02 03 04 05 06 07 08


BLOWFISH mode CBC enciphering (no padding) :
B3 8E 8A 23 ED B2 6E 59 24 60 D2 BC 43 C0 19 5A


3. BLOWFISH CFB enciphering.

Input:
58 C0 D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Chaining mode:
CFB

Key:
75 81 93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B

Initial vector:
01 02 03 04 05 06 07 08

BLOWFISH mode CFB enciphering (no padding):
45 B8 AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07 6E 72 F0 A9


4. BLOWFISH CFB deciphering.

Input:
45 B8 AB 91 34 30 06 9A 2D 95 3A 83 94 1E 3D 8E B8 F5 B8 69 C3 59 BC 92 7A C9 50 07 6E 72 F0 A9

Chaining mode:
CFB

Key:
75 81 93 85 32 D4 F8 F8 85 6F 6F 42 BB DF 3C C2 B9 AC 75 1B

Initial vector:
01 02 03 04 05 06 07 08

BLOWFISH mode CFB deciphering (no padding) :
58 C0 D1 E7 F6 20 5F EB 35 64 D4 E0 22 12 02 FD 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00


RC2

1. RC2 ECB enciphering.

 Input:
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00

Chaining mode:
ECB

Key:
26 1E 57 8E C9 62 BF B8 3E 96

Effective key length (bits, decimal):
80

Initial vector:
-

RC2 mode ECB enciphering:
F9 9A 3A DB 00 3B 7A EB 81 E3 6B A9 E5 37 10 D1 F9 9A 3A DB 00 3B 7A EB 81 E3 6B A9 E5 37 10 D1


2. RC2 CBC enciphering.

 Input:
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00


Chaining mode:
CBC

Key:
26 1E 57 8E C9 62 BF B8 3E 96

Effective key length (bits, decimal):
40

Initial vector:
01 02 03 04 05 06 07 08

RC2 CBC mode enciphering:
71 2D 11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68 3B DC CD 7D


3. RC2 CBC deciphering.

 Input:
71 2D 11 99 C9 A0 78 4F CD F1 1E 3D FD 21 7E DB B2 6E 0D A4 72 BC 31 51 48 EF 4E 68 3B DC CD 7D

Chaining mode:
CBC

Key:
26 1E 57 8E C9 62 BF B8 3E 96

Effective key length (bits, decimal):
40

Initial vector:
01 02 03 04 05 06 07 08

RC2 CBC mode deciphering:
11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF 00


RC4

1. RC4 enciphering.

 Input:
01 02 01 02 03 04 03 04 05 06 05 06 07 08 07 08

Key:
11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67 3D

RC4 enciphering:
38 58 C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79


2. RC4 deciphering.

 Input:
38 58 C9 0B 43 2F A9 45 A2 B6 8D 22 90 BE B5 79

Key:
11 62 46 DA 31 83 00 65 8F 54 48 16 CD 67 3D

RC4 deciphering:
01 02 01 02 03 04 03 04 05 06 05 06 07 08 07 08


GOST 28147-89

1. GOST 28147-89 ECB encipher (no padding)

Input:
11 22 33 44 55 66 77 88

Chaining mode:
ECB

Padding:
NOPAD

Key:
75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B

Initial vector:
-

Manual S-BOXES (GOST 3411-94 test param set is the default option):
-

Simple GOST 28147-89 ECB enciphering (no padding):
03 25 1E 14 F9 D2 8A CB


2. GOST 28147-89 CBC encipher (PKCS5 padding)

Input:
11 22 33 44 55 66 77 88 99 AA BB CC DD

Chaining mode:
CBC

Padding:
PKCS5

Key:
75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B

Initial vector:
01 02 03 04 05 06 07 08

Manual S-BOXES (GOST 3411-94 test param set is the default option):
-

GOST 28147-89 CBC enciphering (PKCS5 padding):
93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11


3. GOST 28147-89 CBC decipher (PKCS5 padding)

Input:
93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11

Chaining mode:
CBC

Padding:
PKCS5

Key:
75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B

Initial vector:
01 02 03 04 05 06 07 08

Manual S-BOXES (GOST 3411-94 test param set is the default option):
-

GOST 28147-89 CBC deciphering (PKCS5 padding):
11 22 33 44 55 66 77 88 99 AA BB CC DD


4. GOST 28147-89 CFB encipher (ISO9797 method 2 padding)

Input:
93 03 1C 78 32 D5 E1 AB 46 A7 1E E5 71 61 4F 11

Chaining mode:
CFB

Padding:
ISO9797_M2

Key:
75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B

Initial vector:
01 02 03 04 05 06 07 08

Manual S-BOXES (GOST 3411-94 test param set is the default option):
-

GOST 28147-89 CFB enciphering (ISO9797_M2 padding):
6E E8 45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42


5. GOST 28147-89 CFB decipher (ISO9797 method 2 padding)

Input:
6E E8 45 86 DD 2B CA 0C AD 36 16 94 0E 16 42 42

Chaining mode:
CFB

Padding:
ISO9797_M2

Key:
75 71 31 34 B6 0F EC 45 A6 07 BB 83 AA 37 46 AF 4F F9 9D A6 D1 B5 3B 5B 1B 40 2A 1B AA 03 0D 1B

Initial vector:
01 02 03 04 05 06 07 08

Manual S-BOXES (GOST 3411-94 test param set is the default option):
-

GOST 28147-89 CFB deciphering (ISO9797_M2 padding):
11 22 33 44 55 66 77 88 99 AA BB CC DD 80 00 00


Signatures

RSASSA

1. 1024-bit RSA PKCS V.1.5 sign with SHA1

 Input:
11 11 12 22 99

EM generation:
EMSA_PKCSV1_5

Hash:
SHA1

MGF:
MGF1

Salt length (bytes, decimal):
20

Manual salt:
-

Public exponent:
01 00 01

Private exponent:
82 B1 5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B 7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2 D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F 9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01 21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21

RSA modulus:
B6 DE 72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE 87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F 48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31 1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00 7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93

Signature:
-

RSASSA_PKCS V.1.5 signature with sha1:
15 8D 86 24 BE E4 F1 FF 58 40 16 32 23 20 E1 9A 64 94 E2 3C 95 90 9B DE B8 5F 5E 99 9D 36 73 24 4A 8C 39 41 AD FC 50 C4 BE AE 10 F6 2F 68 BB AD 64 79 7B 66 E9 1B C6 17 62 63 C6 75 5B 83 1F 42 65 C9 5A 65 91 2B FE D8 DE 39 8C 78 E9 A8 3E 34 A2 ED 0E 34 E3 9B D9 93 A9 1B 08 35 B2 18 9E 44 4F 53 45 A9 0E D5 BD 47 6C 6F 5B E0 8D D1 B3 BE 69 F9 FF 84 2D D5 14 2C D2 9E C4 54 10 15 89 A4


2. 1024-bit RSA PSS sign with MD5

 Input:
11 11 12 22 99

EM generation:
EMSA_PSS

Hash:
MD5

MGF:
MGF1

Salt length (bytes, decimal):
20

Manual salt:
-

Public exponent:
01 00 01

Private exponent:
82 B1 5C 93 F2 E2 5B D7 5E 08 61 CC 1A B1 0D 66 D2 89 AB 84 38 9B E9 60 B7 EA C1 8B 7B 06 B6 D2 B1 25 C2 2D AA 59 DB CB 32 22 92 74 93 72 68 9A 04 70 21 BB CD A2 D4 D1 D2 8B E2 97 9C 0A 40 76 21 33 43 7F 72 95 A8 17 3D 1B 62 E1 BE CA 8C 5F 9B 3F 34 15 4D 42 B7 DD D6 81 2B 4A EE 2A F3 DC 80 B7 31 80 D3 22 6E 19 C9 01 21 74 21 75 DE F6 C1 E8 0C 0A C7 6B 15 49 9B 49 C0 26 61 46 D6 21

RSA modulus:
B6 DE 72 A7 92 E5 7C 11 96 77 C8 C1 82 2A 4D FB B1 57 51 C9 90 16 0C 60 AE F6 A3 CE 87 30 3A 61 7C 31 62 47 B6 52 0A 47 FB 70 BC D8 2A 73 9C 11 84 82 8D AB 52 9F 48 4A CF 71 0B F7 8D B6 69 CD 40 49 FB 62 E0 FF 17 25 05 1E E5 66 3D 9D F8 31 1F EE 3A CA 26 7A 16 B7 D0 AD B3 21 9E 25 8A 36 9E 06 D8 1D 67 FE D9 E2 00 00 7A EC 04 27 C1 0A A5 13 D5 92 90 16 6C 22 52 9A CE FC 17 BB 6B 93

Signature:
-

RSASSA_PSS signature with MD5:
28 8A 11 4D 89 DC 38 47 C1 AF 3C 9F 19 6B CE 83 4C 3F F9 EC 68 37 F4 BE 3C 4C 85 B0 FB D4 65 8D 46 33 B4 85 EB EF 28 7F DD 45 6D 94 91 1B 0F 86 21 7D C8 17 DA C0 F2 9D 91 33 2D 43 32 F9 D1 2A 82 67 C4 8C A1 72 17 3C E7 38 68 09 FC 98 FF D7 46 8C 20 7F 42 FC 3F 89 4F 53 D1 32 40 98 9F 83 49 86 61 C7 6C DF DE 80 6C 35 DA 9B B6 D4 13 85 88 61 57 B3 83 29 B5 36 7B 2B 0A F3 66 7E E8 79


3. 2048-bit RSA PSS sign with SHA384

 Input:
11 11 12 22 99

EM generation:
EMSA_PSS

Hash:
SHA384

MGF:
MGF1

Salt length (bytes, decimal):
32

Manual salt:
-

Public exponent:
01 00 01

Private exponent:
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

RSA modulus:
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

Signature:
-

RSASSA_PSS signature with SHA384:
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


4. 3072-bit RSA PKCS sign of custom message digest

 Input:
61 62 63 61 62 63 61 62 63

EM generation:
EMSA_PKCSV1_5

Hash:
Plain encryption

MGF:
MGF1

Salt length (bytes, decimal):
20

Manual salt:
-

Public exponent:
01 00 01

Private exponent:
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

RSA modulus:
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

Signature:
-

RSASSA_PSS signature plain encryption:
90 C5 05 FE 20 A2 31 95 13 00 A4 71 E3 F6 BA 6C 44 F7 0C 32 93 C8 35 64 C9 AE AB 84 CF 9F DC 0F AA 3B F0 41 03 0D DB D0 57 0B 8E D1 2F D3 58 B7 65 E8 76 4A F9 AC CA 8A 76 C1 13 8D 40 F8 12 43 53 0D 84 65 2F 2B A9 2C E1 64 CD D8 E6 04 34 C6 92 A5 4C 84 EE 96 BC FA A4 FB B2 E6 16 F9 F4 41 12 AF 84 D4 A9 A6 EC B4 AB ED 66 F7 51 73 7B 9A 53 0E 93 45 C1 F9 0A 08 10 14 15 55 3D 8C 5A 50 19 16 E0 13 4F CB 83 81 AF 9D 09 55 4F 0D F0 DC D0 52 C7 B4 CF 2A 64 43 38 A9 40 79 2E E9 D7 2C 73 BA DB 70 2B 44 00 7A 78 41 9D 35 F3 16 6E 4E D7 DD 3C F8 EE 23 6C 44 3E 1E 72 AF 52 96 BC 65 B0 6D B2 B3 AA 5E 87 D2 BE EC 4C B0 4B 9B B4 05 65 85 7D 6E 44 FD 34 C5 F5 85 C3 51 D3 69 D7 8F C4 89 AC D2 FA BC 38 4A 31 8A D5 46 42 EC 90 1A 22 85 62 06 87 E3 64 8F 55 F0 6F E4 E7 D9 15 91 76 89 88 86 2B 27 72 46 03 FA 14 B9 72 64 E1 C7 72 EB 74 D2 A3 B6 CE 40 A3 65 51 B8 8D 47 75 7C BB 8A DA A3 FD 6D DF B2 7A D3 E6 07 25 E7 94 2B 83 28 16 CC 7C 4E E9 4E C4 25 E7 4C 72 80 7E 5B 48 69 22 2E 85 CB 3A FB B3 A6 35 B1 81 AC 50 71 FF 86 58 A4 3F 30 89 60 F4 C5 00 F5 99 FD 67 27 B1 1D A5 6C B1 0B 3E 85 E5 9A 8D F2 3E BB 98 71 23 F8 25 B6 A7 6A BF 58 52 AA C4 B4 B8 05 9F AF


DSA

1. DSA signature generation.

Input:
11 22 33 44 55

Prime modulus p:
8d f2 a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f 0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37 24 c2 ec 07 36 ee 31 c8 02 91

Prime divisor of (p-1), q:
c7 73 21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f

Parameter g:
62 6d 02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3 99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b 08 8c c5 72 af 53 e6 d7 88 02

Private key x:
17 32 49 87 43 98 57 8A DF 76 AF DF F5 78 D6 F1 A3 D3 21 32

Public key y:
2B DB AD AE 56 33 81 8F 02 23 65 C4 B8 D9 4A 31 8A 14 40 48 A4 B6 AE 69 BD 33 94 00 B4 67 42 46 24 F2 89 6D FF 97 90 3E 5C 2F 34 8D D8 1A 86 A2 27 65 E5 8F D7 D9 64 D4 89 D4 0E 92 EE E2 05 40

Manual random k:
C2 1E 38 17 41 A6 82 8B 24 BE 6B 62 AE F6 44 67 58 FD 4D 09

Signature part 1, r:
-

Signature part 2, s:
-

DSA Signature: r, s:
8D BA 7B 98 7D 5A 87 99 59 AC C5 02 FB AC F5 96 36 85 5D 46
B8 82 52 C5 EC D3 F0 EB 34 6D CB 2E 60 11 BF 03 B7 42 84 2D


ECDSA F(p)

1. ECDSA F(p) signature generation with secp128 r1 curve parameters.

Input:
11 22 33 44 55

Private key d:
B0 66 CA 54 49 3F 53 85 95 7F 30 85 EA E2 17 5A

Public key point coordinate xD:
02 5C 93 3C 13 F2 8F 2F E6 0C 9F 58 50 65 39 C8

Public key point coordinate yD:
83 C8 2B 71 0A 5D 56 43 B3 08 BC 2E 98 20 C0 9D

Set curve by name:
Secp128r1

Prime modulus p:
-

Curve coefficient a:
-

Curve coefficient b:
-

Point coordinate xG:
-

Point coordinate yG:
-

Point order n:
-

Cofactor h:
-

Manual random k:
-

Signature part 1, r:
-

Signature part 1, s:
-

ECDSA F(p) signature: r, s:
08 B5 A6 39 EE 8F 52 DE A4 B5 AC 6E DD 71 FD 7E
51 49 DF 7D 6C CE 90 E3 4D 61 14 CA FC B5 73 3F


2. ECDSA F(p) signature generation with manually entered curve parameters. (Using secp192k1 param set).

Input:
11 22 33 44 55

Private key d:
88 E0 D0 92 A0 A8 C7 14 E3 7F B6 54 2E 2E 97 53 2E 8D 0D 64 0E 89 24 21

Public key point coordinate xD:
76 E5 D2 F3 B5 4F 4B 92 58 0A E0 E6 3B 1C C0 37 D3 10 6E 0D B0 FC 19 30

Public key point coordinate yD:
7C 12 DC 1F D0 E4 13 CA 66 C3 1C E0 ED CB BA C0 C3 96 F0 7E 88 12 20 A0

Set curve by name:
MANUAL

Prime modulus p:
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE FF FF EE 37

Curve coefficient a:
00

Curve coefficient b:
03

Point coordinate xG:
DB 4F F1 0E C0 57 E9 AE 26 B0 7D 02 80 B7 F4 34 1D A5 D1 B1 EA E0 6C 7D

Point coordinate yG:
9B 2F 2F 6D 9C 56 28 A7 84 41 63 D0 15 BE 86 34 40 82 AA 88 D9 5E 2F 9D

Point order n:
FF FF FF FF FF FF FF FF FF FF FF FE 26 F2 FC 17 0F 69 46 6A 74 DE FD 8D

Cofactor h:
1

Manual random k:
12 34 56 78

Signature part 1, r:
2A 6A 18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D

Signature part 1, s:
80 21 DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7

ECDSA F(p) signature: r, s:
2A 6A 18 38 88 C8 C0 05 91 B2 3A 1A 4D 15 8C 18 6D 78 77 A4 EE C0 94 2D
80 21 DC 06 F3 9A C6 F0 06 4D 5D 10 9B 7A 39 4D AD 9E 57 BE 7E 00 B5 B7


ECDSA F(2m)

1. ECDSA F(2m) signature generation with sect233k1 curve parameters.

Input:
11 22 33 44 55

Private key:
6C CF 9E B2 5D 70 BA 9E 5C F1 0B 58 2B 3C 9B F7 3D 54 B1 E8 23 E0 01 D1 77 8B 15 AC 4E

Public key point coordinate xD:
23 3C 91 68 46 E6 0C C8 DF 8C B1 1B B1 FB CE D5 30 BB 42 58 28 89 AC D4 DC 30 D0 87 5F

Public key point coordinate yD:
01 8F C3 87 17 EF 51 A4 0E 87 28 22 5C D2 51 D4 E4 D1 51 3F 2A 93 DA 64 B6 EE AF A8 3D EA

Set curve by name:
sect233k1

Field characteristic:
-

Curve coefficient a:
-

Curve coefficient b:
-

Curve point coordinate xG:
-

Curve point coordinate yG:
-

Point order n:
-

Cofactor h:
-

Manual random k:
-

Signature part 1, r:
-

Signature part 2, s:
-

ECDSA F(2m) signature: r, s:
5D E6 0A 35 2D 68 A3 30 3D 2A A9 0B 08 40 DF EE B9 85 49 90 2C 65 38 DC C1 28 EC 98 E5
7B 9B 14 CE D4 41 97 DA E8 59 98 59 19 3C B6 50 4C DA 99 16 AF 7B 90 D6 5E 94 28 3D 23


2. ECDSA F(2m) signature generation with manual curve parameters.
(yet using sect239k1 param set)

Input:
11 22 33 44 55

Private key:
19 28 FD 6B 62 50 23 63 10 67 47 28 86 BD C2 46 65 EC A9 AE E2 BB D1 99 1F 24 BA FC E7 1C

Public key point coordinate xD:
10 B8 B6 5D 05 CF 32 5A D3 10 C2 7E D8 B1 57 F7 81 A4 99 5C 01 09 93 00 1E D9 49 8E 1B 70

Public key point coordinate yD:
49 24 00 10 A6 59 DC 04 41 7E 73 96 70 E8 C1 EF 8B 5D 96 7E 56 50 80 03 1C 68 6F CC E6 60

Set curve by name:
sect233k1

Field characteristic:
80 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01

Curve coefficient a:
00

Curve coefficient b:
01

Curve point coordinate xG:
29 A0 B6 A8 87 A9 83 E9 73 09 88 A6 87 27 A8 B2 D1 26 C4 4C C2 CC 7B 2A 65 55 19 30 35 DC

Curve point coordinate yG:
76 31 08 04 F1 2E 54 9B DB 01 1C 10 30 89 E7 35 10 AC B2 75 FC 31 2A 5D C6 B7 65 53 F0 CA

Point order n:
20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5A 79 FE C6 7C B6 E9 1F 1C 1D A8 00 E4 78 A5

Cofactor h:
4

Manual random k:
11 22 33 44

Signature part 1, r:
-

Signature part 2, s:
-

ECDSA F(2m) signature (r, s) :
0F C6 26 7B 0F 87 6B AE DD B5 69 B7 E3 09 86 3A E2 33 FC A0 04 BD 39 C3 BF 34 F2 D6 07 35
05 7D 0D CA 60 EC B9 91 DE CE 25 30 B8 A1 19 46 09 FD 7E E0 AB 5F 9D 1F 9C E7 34 8A 26 1A


GOST 3410-2001

1. GOST 3410-2001 signature generation.

Input:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E0 95 25 F3 9F 81 19 83 2E B8 19 75 D3 66 C4 B1

Prime modulus p:
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE FF FF FC 2F

Underlying field modulus q:
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FE BA AE DC E6 AF 48 A0 3B BF D2 5E 8C D0 36 41 41

First curve coefficient a:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

Point coordinate x(p):
79 BE 66 7E F9 DC BB AC 55 A0 62 95 CE 87 0B 07 02 9B FC DB 2D CE 28 D9 59 F2 81 5B 16 F8 17 98

Point coordinate y(p):
48 3A DA 77 26 A3 C4 65 5D A4 FB FC 0E 11 08 A8 FD 17 B4 48 A6 85 54 19 9C 47 D0 8F FB 10 D4 B8

Private key d:
DB AE 32 20 9A 50 EE 40 78 36 FD 12 49 32 F6 9E 7D 49 DC AD 4F 14 F2 44 40 66 D0 6B C4 30 B7 32

Public key point coordinate x(q):
12 30 C3 1F 22 B6 19 F2 B1 13 37 81 AA E9 21 A0 22 F6 44 4A 9D 69 5C 72 9E 68 E7 56 D6 CF 55 D9

Public key point coordinate y(q):
45 FE 3B 4F 0F 08 55 AD 2C 01 27 74 C2 77 57 9B BF F3 AB 73 C2 63 47 82 7F C4 68 57 B9 20 DE E2

Manual random k:
38 47 65 23 49 87 56 56 87 46 98 72 34 65 23 47 85 23 47 34 98 57 34 87 56 23 87 56 34 87 65 28

Signature part 1, r:
-

Signature part 2, s:
-

GOST 3410-2001  signature (r, s):
6D F3 9B 1C AB DF 1F BA B1 08 C6 27 C3 F8 F7 ED 1A E7 FF 7E DC 43 9C 72 3A 2C 38 BE CD FF 68 92
7D D9 90 16 C5 32 4B 32 BE 02 0D 16 AD A9 A8 41 AF 65 17 87 F1 C1 8A FE FB C6 B1 5C A7 AC CB CF


Hashes, authentication codes

SHA

1. SHA1 hash calculation.

Input:
61 62 63

Algorithm:
SHA1

SHA1:
A9 99 3E 36 47 06 81 6A BA 3E 25 71 78 50 C2 6C 9C D0 D8 9D


2. SHA256 hash calculation.

Input:
61 62 63

Algorithm:
SHA256

SHA256:
BA 78 16 BF 8F 01 CF EA 41 41 40 DE 5D AE 22 23 B0 03 61 A3 96 17 7A 9C B4 10 FF 61 F2 00 15 AD


3. SHA384 hash calculation.

Input:
61 62 63

Algorithm:
SHA384

SHA384:
CB 00 75 3F 45 A3 5E 8B B5 A0 3D 69 9A C6 50 07 27 2C 32 AB 0E DE D1 63 1A 8B 60 5A 43 FF 5B ED 80 86 07 2B A1 E7 CC 23 58 BA EC A1 34 C8 25 A7


4. SHA512 hash calculation.

Input:
61 62 63

Algorithm:
SHA512

SHA512:
DD AF 35 A1 93 61 7A BA CC 41 73 49 AE 20 41 31 12 E6 FA 4E 89 A9 7E A2 0A 9E EE E6 4B 55 D3 9A 21 92 99 2A 27 4F C1 A8 36 BA 3C 23 A3 FE EB BD 45 4D 44 23 64 3C E8 0E 2A 9A C9 4F A5 4C A4 9F


MD2, MD4, MD5

1. MD2 hash calculation.

Input:
61 62 63

Algorithm:
MD2

MD2:
DA 85 3B 0D 3F 88 D9 9B 30 28 3A 69 E6 DE D6 BB


2. MD4 hash calculation.

Input:
61 62 63

Algorithm:
MD4

MD4:
A4 48 01 7A AF 21 D8 52 5F C1 0A E8 7A A6 72 9D


3. MD5 hash calculation.

Input:
61 62 63

Algorithm:
MD5

MD5:
90 01 50 98 3C D2 4F B0 D6 96 3F 7D 28 E1 7F 72


DES MAC

1. 56-bit DES MAC (no padding)

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Output format:
4 bytes

Algorithmbr /adding:
NOPAD

Initial vector:
12 34 56 78 12 34 56 78

Key 1:
9B 1B 60 62 89 10 F3 E4

Key 2:
-

Key 3:
-

DES data authentication code (MAC) :
FE 54 92 C3


2. 112-bit 3DES MAC (PKCS5 padding)

Input:
11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff 00

Output format:
8 bytes

Algorithmbr /adding:
NOPAD

Initial vector:
12 34 56 78 12 34 56 78

Key 1:
9B 1B 60 62 89 10 F3 E4

Key 2:
B4 CA 4D 69 6A 77 C7 59

Key 3:
-

3DES data authentication code (MAC) :
AD 7E 66 9C DE 29 06 7B


HMAC

1. MD2 HMAC

Input:
4D 44 32 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Hash:
MD2

Key:
77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E

MD2 HMAC:
F6 9F 8F 5D 1C 0C FC 15 7F 4A 4B 23 F2 61 8C 1C


2. MD5 HMAC

Input:
4D 44 35 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Hash:
MD5

Key:
77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E

MD5 HMAC:
3C 51 C6 D3 3E 3E 00 C1 B5 6A 43 A2 1D 41 E0 B4


3. SHA1 HMAC

Input:
53 48 41 31 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Hash:
SHA1

Key:
77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E

SHA1 HMAC:
4D DB 62 B4 45 77 9C A0 17 20 52 69 B9 29 C6 C2 FA 7D D6 AC


4. RIPEMD160 HMAC

Input:
52 49 50 45 4D 44 31 36 30 20 48 4D 41 43 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Hash:
RIPEMD160

Key:
77 64 BE 6A 6F E9 CB 2B 73 67 40 B5 E2 84 D7 9E

RIPEMD160 HMAC:
42 F8 B6 F5 78 34 A4 21 51 9A 63 4A 42 9C 0A 30 08 3B 3F D1


RIPEMD160

1. RIPEMD160 calculation

Input:
61 62 63

RIPEMD160 MD:
8E B2 08 F7 E0 5D 98 7A 9B 04 4A 8E 98 C6 B0 87 F1 5A 0B FC


GOST 28147-89 MAC

1.  4-byte GOST 28147-89 MAC

Input:
47 4F 53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Output format:
4 bytes

Key:
97 FD 6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B 70 B5 5B 9B

Initial vector:
12 34 56 78 12 34 56 78

Manual S-BOXES:
-

GOST 28147 data authentication code:
78 31 5C 5E


2.  8-byte GOST 28147-89 MAC

Input:
47 4F 53 54 20 32 38 31 34 37 20 4D 44 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Output format:
8 bytes

Key:
97 FD 6E A2 AE A3 69 FD FE 88 CD 48 F3 AD E4 E4 33 39 A5 55 76 46 B8 9E 49 E8 E8 4B 70 B5 5B 9B

Initial vector:
12 34 56 78 12 34 56 78

Manual S-BOXES:
-

GOST 28147 data authentication code:
D8 3D 2C D8 D0 AE 38 5B


GOST 3411-94 hash

1. GOST 3411-94 hash

Input:
47 4F 53 54 33 34 31 31 2D 39 34 20 68 61 73 68 20 63 61 6C 63 75 6C 61 74 69 6F 6E

Initial vector:
C0 A9 BE 90 60 6F 18 2B 6E 55 25 5F 07 77 42 F0 C2 DF 1E FA 97 B0 75 18 0B F6 DB AF 00 F3 1B 91

Manual S-BOXES:
-

GOST 3411-94 hash:
E6 11 AE 6A 07 A3 49 0D 9F A4 3B 9B B4 AF 51 B5 7D 69 38 99 9B F1 BB 5E 3C 49 92 20 29 4F 7C E2


GSM A3A8

1. GSM A3A8 calculation

Key:
9A AA FE 5B F5 6D 6B C8 BB 1E B7 C6 37 75 BE 62

Seed:
58 E3 5D D5 D0 DD F8 5E CF F0 58 1C FA 14 DB A6

A3A8 result:
14 0D AB 04 44 AB A8 0B 2C D1 30 00


CRC

1. CRC8 calculation

Input:
76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61

Algorithm:
CRC8

CRC8 result:
76


2. CRC16 calculation

Input:
76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61

Algorithm:
CRC16

CRC16 result:
8D 3C


3. ISO 13239 CRC16 calculation

Input:
76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61

Algorithm:
CRC16_ISO_13239

ISO 13239 CRC16 result:
30 82


4. CRC32 calculation

Input:
76 61 72 69 6F 75 73 20 43 52 43 20 61 6C 67 6F 72 69 74 68 6D 73 20 69 6E 70 75 74 20 64 61 74 61

Algorithm:
CRC32

CRC32 result:
9B D3 66 AE


Key generation functions

DSA key pair generation

1. DSA key pair generation

Prime modulus p:
8d f2 a4 94 49 22 76 aa 3d 25 75 9b b0 68 69 cb ea c0 d8 3a fb 8d 0c f7 cb b8 32 4f 0d 78 82 e5 d0 76 2f c5 b7 21 0e af c2 e9 ad ac 32 ab 7a ac 49 69 3d fb f8 37 24 c2 ec 07 36 ee 31 c8 02 91

Prime divisor of (p-1), q:
c7 73 21 8c 73 7e c8 ee 99 3b 4f 2d ed 30 f4 8e da ce 91 5f

Parameter g:

62 6d 02 78 39 ea 0a 13 41 31 63 a5 5b 4c b5 00 29 9d 55 22 95 6c ef cb 3b ff 10 f3 99 ce 2c 2e 71 cb 9d e5 fa 24 ba bf 58 e5 b7 95 21 92 5c 9c c4 2e 9f 6f 46 4b 08 8c c5 72 af 53 e6 d7 88 02

Manual private key x:
-

Private key (x):

05 2B E8 0D 83 91 0D 2A 54 89 86 C4 01 D3 4A 0D 5D D5 3E B4

Public key (y):
6F C8 73 99 3A 99 D9 07 D2 0F 68 72 28 C0 F2 54 84 D2 B4 5B 96 A6 CD DB C4 49 86 1E E8 41 7E 46 BA BA 88 1E 40 32 A7 34 1E C5 E8 31 49 09 D4 BD F4 2D C2 53 97 79 33 78 09 53 51 EE 29 73 AC 4F


RSA key pair generation

1. 3072-bit RSA key pair generation

Field size:
3072

Public exponent:
01 00 01

Private exponent:
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

Modulus:
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


ECDSA F(p) key pair generation

1. ECDSA F(p) key pair generation using secp160k1 curve parameters

Set curve by name:
Secp160k1

Prime modulus p:
-

Curve coefficient a:
-

Curve coefficient b:
-

Point coordinate xG:
-

Point coordinate yG:
-

Point order n:
-

Cofactor h:
-

Private (d):
96 23 67 B6 BE B6 A3 E4 7A 0F CE 35 6B 2C E2 87 15 67 C6 14

Public key curve point coordinate 1 (Px):
8B 2D C7 6D A6 4A 57 C9 B8 D6 ED 3E ED F3 17 9E 95 62 80 2D

Public key curve point coordinate 2 (Py):
E2 A5 D0 2C 57 7E 25 53 15 AF 10 01 4F 3F 04 7F F1 96 DA 06


2. ECDSA F(p) key pair generation using secp384r1 curve parameters

Set curve by name:
Secp384r1

Prime modulus p:
-

Curve coefficient a:
-

Curve coefficient b:
-

Point coordinate xG:
-

Point coordinate yG:
-

Point order n:
-

Cofactor h:
-

Private (d):
91 15 40 76 2B 80 70 60 EB B1 07 1D 8B 76 F9 C6 B0 C8 57 0B 2D 56 20 4B 7D 62 44 84 43 17 17 98 ED F7 12 E7 CF 55 89 5D 67 5F FE 7B 5C F3 57 50

Public key curve point coordinate 1 (Px):
B7 82 8F F3 F8 14 93 2B 53 1D 3C D5 89 47 A7 76 55 CA 12 EE 53 33 33 EE 12 E9 21 C3 91 14 B7 52 BE FD B3 E4 5C 05 D6 C1 F8 22 2C 5C 6B 23 4E 8D

Public key curve point coordinate 2 (Py):
1F 4B 1B BA 34 34 C6 BA A3 42 50 74 4B 4E 10 9E 09 A5 5D 5F 30 75 BE C3 32 56 C9 4A 46 87 92 C2 B5 65 0D 24 F8 54 82 C9 88 B7 32 8E 82 5F 48 8D


ECDSA F(2m) key pair generation

1. ECDSA F(2m) key pair generation using secp233k1 curve parameters

Set curve by name:
secp233k1

Field characteristic:
-

Curve coefficient a:
-

Curve coefficient b:
-

Curve point coordinate xG:
-

Curve point coordinate yG:
-

Point order n:
-

Cofactor h:
-

Private (d):
12 9E 28 CA 14 81 6E 45 60 CA D1 4C 96 61 F7 36 7C E5 EA 57 A6 4B 0E 7F 6E A1 B2 A3 90

Public key curve point coordinate 1 (Px):
1D 54 A2 9D CB 0E 89 C7 BE CE 34 F1 A0 2C 08 CC 6F 7A B0 EB CD 28 0D EE 99 D5 C5 66 41

Public key curve point coordinate 2 (Py):

01 88 0C A9 C0 6B 79 2E E9 1E 3B 5C 5F C6 36 F9 53 8F 89 E1 74 EA 57 0E AA F4 2E 45 80 7C


GOST 3410-2001 key pair generation

1. GOST 3410-2001 key pair generation

Prime modulus p:
00 00 00 00 00 00 00 00 D1 48 F0 3F 28 C5 98 1C 59 D0 A7 32 DF 3C 94 F0 DD 0F 44 05 4C 83 20 AF

Underlying field modulus q:
00 00 00 00 00 00 00 00 45 C2 FA BF B8 41 DD 5E C8 9A E2 66 B5 95 66 7E B5 69 8E F1 59 7F 46 19

First curve coefficient a:
00 00 00 00 00 00 00 00 57 8E C8 B0 4D 37 D2 61 C3 7D 44 72 4C 22 CC 4D 53 85 4A 60 82 20 4C DC

Point coordinate x(p):
00 00 00 00 00 00 00 00 89 56 5C 06 A2 78 E3 CE 5B C3 6D 7D F7 65 21 F9 E8 A1 3D 8B 35 9D B4 CC

Point coordinate y(p):
00 00 00 00 00 00 00 00 5F B2 29 3B 42 8E 87 3C 3A 7A D2 4B 65 56 9F 80 83 AB DC A9 A4 06 EE 2E

Manual private key d:
-

Private (d):
0B 3D A5 DF 6C 58 C5 2C 06 34 12 E5 36 54 D3 BE C9 4F 17 23 DF 4C 1D 35

Public key curve point coordinate 1 (u):
2B 4C 47 CF C9 BC 6F 71 C3 AB E4 10 3C 84 F3 72 1F A4 86 CB 90 02 F2 F3

Public key curve point coordinate 2 (v):
0C 11 EB 03 C5 80 2F 01 72 20 08 AF 00 CC 28 96 89 F9 8A 45 89 83 D3 30

 



All results are obtained via SCV Cryptomanager (c) SCV Tools.