예제 #1
0
        public void testVectorV3()
        {
            byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                           0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                           0x0b, 0x0b };

            byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,
                            0x0a, 0x0b, 0x0c };

            byte[] info = { (byte)0xf0, (byte)0xf1, (byte)0xf2, (byte)0xf3, (byte)0xf4,
                            (byte)0xf5, (byte)0xf6, (byte)0xf7, (byte)0xf8, (byte)0xf9 };

            byte[] okm = { (byte)0x3c, (byte)0xb2, (byte)0x5f, (byte)0x25, (byte)0xfa,
                           (byte)0xac, (byte)0xd5, (byte)0x7a, (byte)0x90, (byte)0x43,
                           (byte)0x4f, (byte)0x64, (byte)0xd0, (byte)0x36, (byte)0x2f,
                           (byte)0x2a, (byte)0x2d, (byte)0x2d, (byte)0x0a, (byte)0x90,
                           (byte)0xcf, (byte)0x1a, (byte)0x5a, (byte)0x4c, (byte)0x5d,
                           (byte)0xb0, (byte)0x2d, (byte)0x56, (byte)0xec, (byte)0xc4,
                           (byte)0xc5, (byte)0xbf, (byte)0x34, (byte)0x00, (byte)0x72,
                           (byte)0x08, (byte)0xd5, (byte)0xb8, (byte)0x87, (byte)0x18,
                           (byte)0x58, (byte)0x65 };

            byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 42);

            Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(okm, actualOutput));
        }
        public void testChainKeyDerivationV3()
        {
            byte[] seed =
            {
                0x8a, 0xb7, 0x2d, 0x6f, 0x4c,
                0xc5, 0xac, 0x0d, 0x38, 0x7e,
                0xaf, 0x46, 0x33, 0x78, 0xdd,
                0xb2, 0x8e, 0xdd, 0x07, 0x38,
                0x5b, 0x1c, 0xb0, 0x12, 0x50,
                0xc7, 0x15, 0x98, 0x2e, 0x7a,
                0xd4, 0x8f
            };

            byte[] messageKey =
            {
                /* 0x02*/
                0xbf, 0x51, 0xe9, 0xd7,
                0x5e, 0x0e, 0x31, 0x03, 0x10,
                0x51, 0xf8, 0x2a, 0x24, 0x91,
                0xff, 0xc0, 0x84, 0xfa, 0x29,
                0x8b, 0x77, 0x93, 0xbd, 0x9d,
                0xb6, 0x20, 0x05, 0x6f, 0xeb,
                0xf4, 0x52, 0x17
            };

            byte[] macKey =
            {
                0xc6, 0xc7, 0x7d, 0x6a, 0x73,
                0xa3, 0x54, 0x33, 0x7a, 0x56,
                0x43, 0x5e, 0x34, 0x60, 0x7d,
                0xfe, 0x48, 0xe3, 0xac, 0xe1,
                0x4e, 0x77, 0x31, 0x4d, 0xc6,
                0xab, 0xc1, 0x72, 0xe7, 0xa7,
                0x03, 0x0b
            };

            byte[] nextChainKey =
            {
                0x28, 0xe8, 0xf8, 0xfe, 0xe5,
                0x4b, 0x80, 0x1e, 0xef, 0x7c,
                0x5c, 0xfb, 0x2f, 0x17, 0xf3,
                0x2c, 0x7b, 0x33, 0x44, 0x85,
                0xbb, 0xb7, 0x0f, 0xac, 0x6e,
                0xc1, 0x03, 0x42, 0xa2, 0x46,
                0xd1, 0x5d
            };

            ChainKey chainKey = new ChainKey(HKDF.createFor(3), seed, 0);

            CollectionAssert.AreEqual(seed, chainKey.getKey());
            CollectionAssert.AreEqual(messageKey, chainKey.getMessageKeys().getCipherKey());
            CollectionAssert.AreEqual(macKey, chainKey.getMessageKeys().getMacKey());
            CollectionAssert.AreEqual(nextChainKey, chainKey.getNextChainKey().getKey());
            Assert.AreEqual <uint>(0, chainKey.getIndex());
            Assert.AreEqual <uint>(0, chainKey.getMessageKeys().getCounter());
            Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getIndex());
            Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getMessageKeys().getCounter());
        }
예제 #3
0
        public void testChainKeyDerivationV3()
        {
            byte[] seed =
            {
                (byte)0x8a, (byte)0xb7, (byte)0x2d, (byte)0x6f, (byte)0x4c,
                (byte)0xc5, (byte)0xac, (byte)0x0d, (byte)0x38, (byte)0x7e,
                (byte)0xaf, (byte)0x46, (byte)0x33, (byte)0x78, (byte)0xdd,
                (byte)0xb2, (byte)0x8e, (byte)0xdd, (byte)0x07, (byte)0x38,
                (byte)0x5b, (byte)0x1c, (byte)0xb0, (byte)0x12, (byte)0x50,
                (byte)0xc7, (byte)0x15, (byte)0x98, (byte)0x2e, (byte)0x7a,
                (byte)0xd4, (byte)0x8f
            };

            byte[] messageKey =
            {
                /* (byte) 0x02*/
                (byte)0xbf, (byte)0x51, (byte)0xe9, (byte)0xd7,
                (byte)0x5e, (byte)0x0e, (byte)0x31, (byte)0x03,(byte)0x10,
                (byte)0x51, (byte)0xf8, (byte)0x2a, (byte)0x24,(byte)0x91,
                (byte)0xff, (byte)0xc0, (byte)0x84, (byte)0xfa,(byte)0x29,
                (byte)0x8b, (byte)0x77, (byte)0x93, (byte)0xbd,(byte)0x9d,
                (byte)0xb6, (byte)0x20, (byte)0x05, (byte)0x6f,(byte)0xeb,
                (byte)0xf4, (byte)0x52, (byte)0x17
            };

            byte[] macKey =
            {
                (byte)0xc6, (byte)0xc7, (byte)0x7d, (byte)0x6a, (byte)0x73,
                (byte)0xa3, (byte)0x54, (byte)0x33, (byte)0x7a, (byte)0x56,
                (byte)0x43, (byte)0x5e, (byte)0x34, (byte)0x60, (byte)0x7d,
                (byte)0xfe, (byte)0x48, (byte)0xe3, (byte)0xac, (byte)0xe1,
                (byte)0x4e, (byte)0x77, (byte)0x31, (byte)0x4d, (byte)0xc6,
                (byte)0xab, (byte)0xc1, (byte)0x72, (byte)0xe7, (byte)0xa7,
                (byte)0x03, (byte)0x0b
            };

            byte[] nextChainKey =
            {
                (byte)0x28, (byte)0xe8, (byte)0xf8, (byte)0xfe, (byte)0xe5,
                (byte)0x4b, (byte)0x80, (byte)0x1e, (byte)0xef, (byte)0x7c,
                (byte)0x5c, (byte)0xfb, (byte)0x2f, (byte)0x17, (byte)0xf3,
                (byte)0x2c, (byte)0x7b, (byte)0x33, (byte)0x44, (byte)0x85,
                (byte)0xbb, (byte)0xb7, (byte)0x0f, (byte)0xac, (byte)0x6e,
                (byte)0xc1, (byte)0x03, (byte)0x42, (byte)0xa2, (byte)0x46,
                (byte)0xd1, (byte)0x5d
            };

            ChainKey chainKey = new ChainKey(HKDF.createFor(3), seed, 0);

            Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getKey(), seed));
            Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getMessageKeys().getCipherKey(), messageKey));
            Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getMessageKeys().getMacKey(), macKey));
            Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getNextChainKey().getKey(), nextChainKey));
            Assert.IsTrue(chainKey.getIndex() == 0);
            Assert.IsTrue(chainKey.getMessageKeys().getCounter() == 0);
            Assert.IsTrue(chainKey.getNextChainKey().getIndex() == 1);
            Assert.IsTrue(chainKey.getNextChainKey().getMessageKeys().getCounter() == 1);
        }
        public void testChainKeyDerivationV2()
        {
            byte[] seed =
            {
                0x8a, 0xb7, 0x2d, 0x6f, 0x4c,
                0xc5, 0xac, 0x0d, 0x38, 0x7e,
                0xaf, 0x46, 0x33, 0x78, 0xdd,
                0xb2, 0x8e, 0xdd, 0x07, 0x38,
                0x5b, 0x1c, 0xb0, 0x12, 0x50,
                0xc7, 0x15, 0x98, 0x2e, 0x7a,
                0xd4, 0x8f
            };

            byte[] messageKey =
            {
                0x02, 0xa9, 0xaa, 0x6c, 0x7d,
                0xbd, 0x64, 0xf9, 0xd3, 0xaa,
                0x92, 0xf9, 0x2a, 0x27, 0x7b,
                0xf5, 0x46, 0x09, 0xda, 0xdf,
                0x0b, 0x00, 0x82, 0x8a, 0xcf,
                0xc6, 0x1e, 0x3c, 0x72, 0x4b,
                0x84, 0xa7
            };

            byte[] macKey =
            {
                0xbf, 0xbe, 0x5e, 0xfb, 0x60,
                0x30, 0x30, 0x52, 0x67, 0x42,
                0xe3, 0xee, 0x89, 0xc7, 0x02,
                0x4e, 0x88, 0x4e, 0x44, 0x0f,
                0x1f, 0xf3, 0x76, 0xbb, 0x23,
                0x17, 0xb2, 0xd6, 0x4d, 0xeb,
                0x7c, 0x83
            };

            byte[] nextChainKey =
            {
                0x28, 0xe8, 0xf8, 0xfe, 0xe5,
                0x4b, 0x80, 0x1e, 0xef, 0x7c,
                0x5c, 0xfb, 0x2f, 0x17, 0xf3,
                0x2c, 0x7b, 0x33, 0x44, 0x85,
                0xbb, 0xb7, 0x0f, 0xac, 0x6e,
                0xc1, 0x03, 0x42, 0xa2, 0x46,
                0xd1, 0x5d
            };

            ChainKey chainKey = new ChainKey(HKDF.createFor(2), seed, 0);

            Assert.AreEqual(seed, chainKey.getKey());
            CollectionAssert.AreEqual(messageKey, chainKey.getMessageKeys().getCipherKey());
            CollectionAssert.AreEqual(macKey, chainKey.getMessageKeys().getMacKey());
            CollectionAssert.AreEqual(nextChainKey, chainKey.getNextChainKey().getKey());
            Assert.AreEqual <uint>(0, chainKey.getIndex());
            Assert.AreEqual <uint>(0, chainKey.getMessageKeys().getCounter());
            Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getIndex());
            Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getMessageKeys().getCounter());
        }
예제 #5
0
        private static DerivedKeys calculateDerivedKeys(uint sessionVersion, byte[] masterSecret)
        {
            HKDF kdf = HKDF.createFor(sessionVersion);

            byte[]   derivedSecretBytes = kdf.deriveSecrets(masterSecret, Encoding.UTF8.GetBytes("WhisperText"), 64);
            byte[][] derivedSecrets     = ByteUtil.split(derivedSecretBytes, 32, 32);

            return(new DerivedKeys(new RootKey(kdf, derivedSecrets[0]),
                                   new ChainKey(kdf, derivedSecrets[1], 0)));
        }
예제 #6
0
        public ChainKey getReceiverChainKey(ECPublicKey senderEphemeral)
        {
            Pair <Chain, uint> receiverChainAndIndex = getReceiverChain(senderEphemeral);
            Chain receiverChain = receiverChainAndIndex.first();

            if (receiverChain == null)
            {
                return(null);
            }
            else
            {
                return(new ChainKey(HKDF.createFor(getSessionVersion()),
                                    receiverChain.ChainKey.Key.ToByteArray(),
                                    receiverChain.ChainKey.Index));
            }
        }
예제 #7
0
        public void testVectorV2()
        {
            byte[] ikm =
            {
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b
            };

            byte[] salt =
            {
                0x00, 0x01, 0x02, 0x03, 0x04,
                0x05, 0x06, 0x07, 0x08, 0x09,
                0x0a, 0x0b, 0x0c
            };

            byte[] info =
            {
                0xf0, 0xf1, 0xf2, 0xf3, 0xf4,
                0xf5, 0xf6, 0xf7, 0xf8, 0xf9
            };

            byte[] okm =
            {
                0x6e, 0xc2, 0x55, 0x6d, 0x5d,
                0x7b, 0x1d, 0x81, 0xde, 0xe4,
                0x22, 0x2a, 0xd7, 0x48, 0x36,
                0x95, 0xdd, 0xc9, 0x8f, 0x4f,
                0x5f, 0xab, 0xc0, 0xe0, 0x20,
                0x5d, 0xc2, 0xef, 0x87, 0x52,
                0xd4, 0x1e, 0x04, 0xe2, 0xe2,
                0x11, 0x01, 0xc6, 0x8f, 0xf0,
                0x93, 0x94, 0xb8, 0xad, 0x0b,
                0xdc, 0xb9, 0x60, 0x9c, 0xd4,
                0xee, 0x82, 0xac, 0x13, 0x19,
                0x9b, 0x4a, 0xa9, 0xfd, 0xa8,
                0x99, 0xda, 0xeb, 0xec
            };

            byte[] actualOutput = HKDF.createFor(2).deriveSecrets(ikm, salt, info, 64);
            CollectionAssert.AreEqual(okm, actualOutput);
        }
예제 #8
0
        public void testVectorV3()
        {
            byte[] ikm =
            {
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                0x0b, 0x0b
            };

            byte[] salt =
            {
                0x00, 0x01, 0x02, 0x03, 0x04,
                0x05, 0x06, 0x07, 0x08, 0x09,
                0x0a, 0x0b, 0x0c
            };

            byte[] info =
            {
                0xf0, 0xf1, 0xf2, 0xf3, 0xf4,
                0xf5, 0xf6, 0xf7, 0xf8, 0xf9
            };

            byte[] okm =
            {
                0x3c, 0xb2, 0x5f, 0x25, 0xfa,
                0xac, 0xd5, 0x7a, 0x90, 0x43,
                0x4f, 0x64, 0xd0, 0x36, 0x2f,
                0x2a, 0x2d, 0x2d, 0x0a, 0x90,
                0xcf, 0x1a, 0x5a, 0x4c, 0x5d,
                0xb0, 0x2d, 0x56, 0xec, 0xc4,
                0xc5, 0xbf, 0x34, 0x00, 0x72,
                0x08, 0xd5, 0xb8, 0x87, 0x18,
                0x58, 0x65
            };

            byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 42);
            CollectionAssert.AreEqual(okm, actualOutput);
        }
예제 #9
0
        public void testVectorV2()
        {
            byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                           0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
                           0x0b, 0x0b };

            byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,
                            0x0a, 0x0b, 0x0c };

            byte[] info = { (byte)0xf0, (byte)0xf1, (byte)0xf2, (byte)0xf3, (byte)0xf4,
                            (byte)0xf5, (byte)0xf6, (byte)0xf7, (byte)0xf8, (byte)0xf9 };

            byte[] okm = { (byte)0x6e, (byte)0xc2, (byte)0x55, (byte)0x6d, (byte)0x5d,
                           (byte)0x7b, (byte)0x1d, (byte)0x81, (byte)0xde, (byte)0xe4,
                           (byte)0x22, (byte)0x2a, (byte)0xd7, (byte)0x48, (byte)0x36,
                           (byte)0x95, (byte)0xdd, (byte)0xc9, (byte)0x8f, (byte)0x4f,
                           (byte)0x5f, (byte)0xab, (byte)0xc0, (byte)0xe0, (byte)0x20,
                           (byte)0x5d, (byte)0xc2, (byte)0xef, (byte)0x87, (byte)0x52,
                           (byte)0xd4, (byte)0x1e, (byte)0x04, (byte)0xe2, (byte)0xe2,
                           (byte)0x11, (byte)0x01, (byte)0xc6, (byte)0x8f, (byte)0xf0,
                           (byte)0x93, (byte)0x94, (byte)0xb8, (byte)0xad, (byte)0x0b,
                           (byte)0xdc, (byte)0xb9, (byte)0x60, (byte)0x9c, (byte)0xd4,
                           (byte)0xee, (byte)0x82, (byte)0xac, (byte)0x13, (byte)0x19,
                           (byte)0x9b, (byte)0x4a, (byte)0xa9, (byte)0xfd, (byte)0xa8,
                           (byte)0x99, (byte)0xda, (byte)0xeb, (byte)0xec };


            try {
                byte[] actualOutput = HKDF.createFor(2).deriveSecrets(ikm, salt, info, 64);
            }
            catch (System.NotSupportedException)
            {
            }
            catch (System.Exception e)
            {
                Assert.Fail("Unexpected Exception received: {0}", e);
            }
        }
예제 #10
0
 public ChainKey getSenderChainKey()
 {
     Chain.Types.ChainKey chainKeyStructure = sessionStructure.SenderChain.ChainKey;
     return(new ChainKey(HKDF.createFor(getSessionVersion()),
                         chainKeyStructure.Key.ToByteArray(), chainKeyStructure.Index));
 }
예제 #11
0
 public RootKey getRootKey()
 {
     return(new RootKey(HKDF.createFor(getSessionVersion()),
                        this.sessionStructure.RootKey.ToByteArray()));
 }
예제 #12
0
        public void testVectorLongV3()
        {
            byte[] ikm =
            {
                0x00, 0x01, 0x02, 0x03, 0x04,
                0x05, 0x06, 0x07, 0x08, 0x09,
                0x0a, 0x0b, 0x0c, 0x0d, 0x0e,
                0x0f, 0x10, 0x11, 0x12, 0x13,
                0x14, 0x15, 0x16, 0x17, 0x18,
                0x19, 0x1a, 0x1b, 0x1c, 0x1d,
                0x1e, 0x1f, 0x20, 0x21, 0x22,
                0x23, 0x24, 0x25, 0x26, 0x27,
                0x28, 0x29, 0x2a, 0x2b, 0x2c,
                0x2d, 0x2e, 0x2f, 0x30, 0x31,
                0x32, 0x33, 0x34, 0x35, 0x36,
                0x37, 0x38, 0x39, 0x3a, 0x3b,
                0x3c, 0x3d, 0x3e, 0x3f, 0x40,
                0x41, 0x42, 0x43, 0x44, 0x45,
                0x46, 0x47, 0x48, 0x49, 0x4a,
                0x4b, 0x4c, 0x4d, 0x4e, 0x4f
            };

            byte[] salt =
            {
                0x60, 0x61, 0x62, 0x63, 0x64,
                0x65, 0x66, 0x67, 0x68, 0x69,
                0x6a, 0x6b, 0x6c, 0x6d, 0x6e,
                0x6f, 0x70, 0x71, 0x72, 0x73,
                0x74, 0x75, 0x76, 0x77, 0x78,
                0x79, 0x7a, 0x7b, 0x7c, 0x7d,
                0x7e, 0x7f, 0x80, 0x81, 0x82,
                0x83, 0x84, 0x85, 0x86, 0x87,
                0x88, 0x89, 0x8a, 0x8b, 0x8c,
                0x8d, 0x8e, 0x8f, 0x90, 0x91,
                0x92, 0x93, 0x94, 0x95, 0x96,
                0x97, 0x98, 0x99, 0x9a, 0x9b,
                0x9c, 0x9d, 0x9e, 0x9f, 0xa0,
                0xa1, 0xa2, 0xa3, 0xa4, 0xa5,
                0xa6, 0xa7, 0xa8, 0xa9, 0xaa,
                0xab, 0xac, 0xad, 0xae, 0xaf
            };

            byte[] info =
            {
                0xb0, 0xb1, 0xb2, 0xb3, 0xb4,
                0xb5, 0xb6, 0xb7, 0xb8, 0xb9,
                0xba, 0xbb, 0xbc, 0xbd, 0xbe,
                0xbf, 0xc0, 0xc1, 0xc2, 0xc3,
                0xc4, 0xc5, 0xc6, 0xc7, 0xc8,
                0xc9, 0xca, 0xcb, 0xcc, 0xcd,
                0xce, 0xcf, 0xd0, 0xd1, 0xd2,
                0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
                0xd8, 0xd9, 0xda, 0xdb, 0xdc,
                0xdd, 0xde, 0xdf, 0xe0, 0xe1,
                0xe2, 0xe3, 0xe4, 0xe5, 0xe6,
                0xe7, 0xe8, 0xe9, 0xea, 0xeb,
                0xec, 0xed, 0xee, 0xef, 0xf0,
                0xf1, 0xf2, 0xf3, 0xf4, 0xf5,
                0xf6, 0xf7, 0xf8, 0xf9, 0xfa,
                0xfb, 0xfc, 0xfd, 0xfe, 0xff
            };

            byte[] okm =
            {
                0xb1, 0x1e, 0x39, 0x8d, 0xc8,
                0x03, 0x27, 0xa1, 0xc8, 0xe7,
                0xf7, 0x8c, 0x59, 0x6a, 0x49,
                0x34, 0x4f, 0x01, 0x2e, 0xda,
                0x2d, 0x4e, 0xfa, 0xd8, 0xa0,
                0x50, 0xcc, 0x4c, 0x19, 0xaf,
                0xa9, 0x7c, 0x59, 0x04, 0x5a,
                0x99, 0xca, 0xc7, 0x82, 0x72,
                0x71, 0xcb, 0x41, 0xc6, 0x5e,
                0x59, 0x0e, 0x09, 0xda, 0x32,
                0x75, 0x60, 0x0c, 0x2f, 0x09,
                0xb8, 0x36, 0x77, 0x93, 0xa9,
                0xac, 0xa3, 0xdb, 0x71, 0xcc,
                0x30, 0xc5, 0x81, 0x79, 0xec,
                0x3e, 0x87, 0xc1, 0x4c, 0x01,
                0xd5, 0xc1, 0xf3, 0x43, 0x4f,
                0x1d, 0x87
            };

            byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 82);
            CollectionAssert.AreEqual(okm, actualOutput);
        }
예제 #13
0
        public void testRootKeyDerivationV2()
        {
            byte[] rootKeySeed =
            {
                0x7b, 0xa6, 0xde, 0xbc, 0x2b,
                0xc1, 0xbb, 0xf9, 0x1a, 0xbb,
                0xc1, 0x36, 0x74, 0x04, 0x17,
                0x6c, 0xa6, 0x23, 0x09, 0x5b,
                0x7e, 0xc6, 0x6b, 0x45, 0xf6,
                0x02, 0xd9, 0x35, 0x38, 0x94,
                0x2d, 0xcc
            };

            byte[] alicePublic =
            {
                0x05, 0xee, 0x4f, 0xa6, 0xcd,
                0xc0, 0x30, 0xdf, 0x49, 0xec,
                0xd0, 0xba, 0x6c, 0xfc, 0xff,
                0xb2, 0x33, 0xd3, 0x65, 0xa2,
                0x7f, 0xad, 0xbe, 0xff, 0x77,
                0xe9, 0x63, 0xfc, 0xb1, 0x62,
                0x22, 0xe1, 0x3a
            };

            byte[] alicePrivate =
            {
                0x21, 0x68, 0x22, 0xec, 0x67,
                0xeb, 0x38, 0x04, 0x9e, 0xba,
                0xe7, 0xb9, 0x39, 0xba, 0xea,
                0xeb, 0xb1, 0x51, 0xbb, 0xb3,
                0x2d, 0xb8, 0x0f, 0xd3, 0x89,
                0x24, 0x5a, 0xc3, 0x7a, 0x94,
                0x8e, 0x50
            };

            byte[] bobPublic =
            {
                0x05, 0xab, 0xb8, 0xeb, 0x29,
                0xcc, 0x80, 0xb4, 0x71, 0x09,
                0xa2, 0x26, 0x5a, 0xbe, 0x97,
                0x98, 0x48, 0x54, 0x06, 0xe3,
                0x2d, 0xa2, 0x68, 0x93, 0x4a,
                0x95, 0x55, 0xe8, 0x47, 0x57,
                0x70, 0x8a, 0x30
            };

            byte[] nextRoot =
            {
                0xb1, 0x14, 0xf5, 0xde, 0x28,
                0x01, 0x19, 0x85, 0xe6, 0xeb,
                0xa2, 0x5d, 0x50, 0xe7, 0xec,
                0x41, 0xa9, 0xb0, 0x2f, 0x56,
                0x93, 0xc5, 0xc7, 0x88, 0xa6,
                0x3a, 0x06, 0xd2, 0x12, 0xa2,
                0xf7, 0x31
            };

            byte[] nextChain =
            {
                0x9d, 0x7d, 0x24, 0x69, 0xbc,
                0x9a, 0xe5, 0x3e, 0xe9, 0x80,
                0x5a, 0xa3, 0x26, 0x4d, 0x24,
                0x99, 0xa3, 0xac, 0xe8, 0x0f,
                0x4c, 0xca, 0xe2, 0xda, 0x13,
                0x43, 0x0c, 0x5c, 0x55, 0xb5,
                0xca, 0x5f
            };

            ECPublicKey  alicePublicKey  = Curve.decodePoint(alicePublic, 0);
            ECPrivateKey alicePrivateKey = Curve.decodePrivatePoint(alicePrivate);
            ECKeyPair    aliceKeyPair    = new ECKeyPair(alicePublicKey, alicePrivateKey);

            ECPublicKey bobPublicKey = Curve.decodePoint(bobPublic, 0);
            RootKey     rootKey      = new RootKey(HKDF.createFor(2), rootKeySeed);

            Pair <RootKey, ChainKey> rootKeyChainKeyPair = rootKey.createChain(bobPublicKey, aliceKeyPair);
            RootKey  nextRootKey  = rootKeyChainKeyPair.first();
            ChainKey nextChainKey = rootKeyChainKeyPair.second();

            CollectionAssert.AreEqual(rootKey.getKeyBytes(), rootKeySeed);
            CollectionAssert.AreEqual(nextRootKey.getKeyBytes(), nextRoot);
            CollectionAssert.AreEqual(nextChainKey.getKey(), nextChain);
        }