forked from MidLevel/MLAPI.Cryptography
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathProgram.cs
More file actions
124 lines (98 loc) · 4.28 KB
/
Program.cs
File metadata and controls
124 lines (98 loc) · 4.28 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
using System;
using System.Diagnostics;
using System.Security.Cryptography;
using MLAPI.Cryptography.KeyExchanges;
namespace MLAPI.Cryptography.Examples
{
class Program
{
public static void Main(string[] args)
{
RunECDHERSA(100);
RunECDHE(100);
}
public static void RunECDHERSA(int iterations)
{
Console.WriteLine("Running " + iterations + " diffie hellman + rsa key exchanges");
Stopwatch watch = new Stopwatch();
RSAParameters privateKey;
RSAParameters publicKey;
using (RSACryptoServiceProvider rsaGen = new RSACryptoServiceProvider(2048))
{
privateKey = rsaGen.ExportParameters(true);
publicKey = rsaGen.ExportParameters(false);
}
for (int i = 0; i < iterations; i++)
{
watch.Start();
using (RSACryptoServiceProvider serverRSA = new RSACryptoServiceProvider())
using (RSACryptoServiceProvider clientRSA = new RSACryptoServiceProvider())
{
serverRSA.ImportParameters(privateKey);
clientRSA.ImportParameters(publicKey);
// Both create their instances
ECDiffieHellmanRSA serverDiffie = new ECDiffieHellmanRSA(serverRSA);
ECDiffieHellmanRSA clientDiffie = new ECDiffieHellmanRSA(clientRSA);
// Exchange publics
/* START TRANSMISSION */
byte[] serverPublic = serverDiffie.GetSecurePublicPart();
byte[] clientPublic = clientDiffie.GetSecurePublicPart();
/* END TRANSMISSION */
// Calculate shared
byte[] key1 = serverDiffie.GetVerifiedSharedPart(clientPublic);
byte[] key2 = clientDiffie.GetVerifiedSharedPart(serverPublic);
watch.Stop();
if (key1.Length != key2.Length)
{
Console.WriteLine("CRITICAL: LENGTH MISSMATCH");
continue;
}
for (int x = 0; x < key1.Length; x++)
{
if (key1[x] != key2[x])
{
Console.WriteLine("CRITICAL: MISSMATCH");
break;
}
}
}
}
Console.WriteLine("Completed in " + watch.ElapsedMilliseconds + " ms, " + (watch.ElapsedMilliseconds / iterations) + " ms per exchange");
}
public static void RunECDHE(int iterations)
{
Console.WriteLine("Running " + iterations + " diffie hellman key exchanges");
Stopwatch watch = new Stopwatch();
for (int i = 0; i < iterations; i++)
{
watch.Start();
// Both create their instances
ECDiffieHellman serverDiffie = new ECDiffieHellman();
ECDiffieHellman clientDiffie = new ECDiffieHellman();
// Exchange publics
/* START TRANSMISSION */
byte[] serverPublic = serverDiffie.GetPublicKey();
byte[] clientPublic = clientDiffie.GetPublicKey();
/* END TRANSMISSION */
// Calculate shared
byte[] key1 = serverDiffie.GetSharedSecretRaw(clientPublic);
byte[] key2 = clientDiffie.GetSharedSecretRaw(serverPublic);
watch.Stop();
if (key1.Length != key2.Length)
{
Console.WriteLine("CRITICAL: LENGTH MISSMATCH");
continue;
}
for (int x = 0; x < key1.Length; x++)
{
if (key1[x] != key2[x])
{
Console.WriteLine("CRITICAL: MISSMATCH");
break;
}
}
}
Console.WriteLine("Completed in " + watch.ElapsedMilliseconds + " ms, " + (watch.ElapsedMilliseconds / iterations) + " ms per exchange");
}
}
}