+++ /dev/null
-# Test vectors for Montgomery reduction
-#
-# $Id: mpmont,v 1.1 1999/11/17 18:02:17 mdw Exp $
-
-create {
- 340809809850981098423498794792349 # m
- 266454859 # -m^{-1} mod b
- 130655606683780235388773757767708 # R mod m
- 237786678640282040194246459306177; # R^2 mod m
-}
-
-mul {
- 43289823545
- 234324324
- 6456542564
- 10807149256;
-}
-
-exp {
- 4325987397987458979875737589783
- 435365332435654643667
- 8745435676786567758678547
- 2439674515119108242643169132064;
-
- # --- Quick RSA test ---
-
- 905609324890967090294090970600361 # This is p
- 3
- 905609324890967090294090970600360 # This is (p - 1)
- 1; # Fermat test: p is prime
-
- 734589569806680985408670989082927 # This is q
- 5
- 734589569806680985408670989082926 # And this is (q - 1)
- 1; # Fermat again: q is prime
-
- # --- Encrypt a message ---
- #
- # The public and private exponents are from the GCD test. The message
- # is just obvious. The modulus is the product of the two primes above.
-
- 665251164384574309450646977867045404520085938543622535546005136647
- 123456789012345678901234567890123456789012345678901234567890
- 5945908509680983480596809586040589085680968709809890671
- 25906467774034212974484417859588980567136610347807401817990462701;
-
- # --- And decrypt it again ---
-
- 665251164384574309450646977867045404520085938543622535546005136647
- 25906467774034212974484417859588980567136610347807401817990462701
- 514778499400157641662814932021958856708417966520837469125919104431
- 123456789012345678901234567890123456789012345678901234567890;
-}