summary refs log tree commit diff
path: root/crypto
diff options
context:
space:
mode:
authorDavid Hook <dgh@bouncycastle.org>2017-07-06 11:31:12 +1000
committerDavid Hook <dgh@bouncycastle.org>2017-07-06 11:31:12 +1000
commit683e29b0f3bd0a15eaf576e12f3e48426e1ead84 (patch)
treefed489d21ea6447e5716404a72ea5db9b2a9991d /crypto
parentadded extra vector (diff)
downloadBouncyCastle.NET-ed25519-683e29b0f3bd0a15eaf576e12f3e48426e1ead84.tar.xz
initial DSTU7624 work
Diffstat (limited to 'crypto')
-rw-r--r--crypto/src/crypto/engines/Dstu7624Engine.cs862
-rw-r--r--crypto/src/crypto/engines/Dstu7624WrapEngine.cs263
-rw-r--r--crypto/test/src/crypto/test/DSTU7624Test.cs481
3 files changed, 1606 insertions, 0 deletions
diff --git a/crypto/src/crypto/engines/Dstu7624Engine.cs b/crypto/src/crypto/engines/Dstu7624Engine.cs
new file mode 100644
index 000000000..4699ee5bd
--- /dev/null
+++ b/crypto/src/crypto/engines/Dstu7624Engine.cs
@@ -0,0 +1,862 @@
+using System;
+using System.Collections;
+
+using Org.BouncyCastle.Crypto.Parameters;
+using Org.BouncyCastle.Utilities;
+
+namespace Org.BouncyCastle.Crypto.Engines
+{
+    /**
+    * implementation of DSTU 7624 (Kalyna)
+    */
+    public class Dstu7624Engine
+         : IBlockCipher
+    {
+        private const int BITS_IN_WORD = 64;
+        private const int BITS_IN_BYTE = 8;
+
+        /* Block words size. */
+        private const int kNB_128 = 2;
+        private const int kNB_256 = 4;
+        private const int kNB_512 = 8;
+
+        /* Key words size. */
+        private const int kNK_128 = 2;
+        private const int kNK_256 = 4;
+        private const int kNK_512 = 8;
+
+        /* Block bits size. */
+        private const int kBLOCK_128 = kNB_128 * BITS_IN_WORD;
+        private const int kBLOCK_256 = kNB_256 * BITS_IN_WORD;
+        private const int kBLOCK_512 = kNB_512 * BITS_IN_WORD;
+
+        /* Block bits size. */
+        private const int kKEY_128 = kNK_128 * BITS_IN_WORD;
+        private const int kKEY_256 = kNK_256 * BITS_IN_WORD;
+        private const int kKEY_512 = kNK_512 * BITS_IN_WORD;
+
+        /* Number of enciphering rounds size depending on key length. */
+        private const int kNR_128 = 10;
+        private const int kNR_256 = 14;
+        private const int kNR_512 = 18;
+
+        private const int REDUCTION_POLYNOMIAL = 0x011d;  /* x^8 + x^4 + x^3 + x^2 + 1 */
+
+
+        private int nb;  /* Number of 64-bit words in enciphering block. */
+        private int nk;  /*< Number of 64-bit words in key. */
+        private int roundKeysAmount;  /*< Number of enciphering rounds. */
+
+        private ulong[] internalState = null;  /*< Current cipher state. */
+
+
+        private ulong[] workingKey = null;
+        private ulong[][] roundKeys = null;  /*< Round key computed from enciphering key. */
+
+
+        private int blockSizeBits;
+        private int keySizeBits;
+
+        private bool forEncryption;
+
+
+        public Dstu7624Engine(int blockSizeBits, int keySizeBits)
+        {
+            this.blockSizeBits = blockSizeBits;
+            this.keySizeBits = keySizeBits;
+
+            if (blockSizeBits == kBLOCK_128)
+            {
+                nb = kBLOCK_128 / BITS_IN_WORD;
+                if (keySizeBits == kKEY_128)
+                {
+                    nk = kKEY_128 / BITS_IN_WORD;
+                    roundKeysAmount = kNR_128;
+                }
+                else if (keySizeBits == kKEY_256)
+                {
+                    nk = kKEY_256 / BITS_IN_WORD;
+                    roundKeysAmount = kNR_256;
+                }
+                else
+                {
+                    throw new ArgumentException("Unsupported key size");
+                }
+            }
+            else if (blockSizeBits == 256)
+            {
+                nb = kBLOCK_256 / BITS_IN_WORD;
+                if (keySizeBits == kKEY_256)
+                {
+                    nk = kKEY_256 / BITS_IN_WORD;
+                    roundKeysAmount = kNR_256;
+                }
+                else if (keySizeBits == kKEY_512)
+                {
+                    nk = kKEY_512 / BITS_IN_WORD;
+                    roundKeysAmount = kNR_512;
+                }
+                else
+                {
+                    throw new ArgumentException("Unsupported key size");
+                }
+            }
+            else if (blockSizeBits == kBLOCK_512)
+            {
+                nb = kBLOCK_512 / BITS_IN_WORD;
+                if (keySizeBits == kKEY_512)
+                {
+                    nk = kKEY_512 / BITS_IN_WORD;
+                    roundKeysAmount = kNR_512;
+                }
+                else
+                {
+                    throw new ArgumentException("Unsupported key size");
+                }
+            }
+            else
+            {
+                throw new ArgumentException("Unsupported block size");
+            }
+
+            internalState = new ulong[nb];
+
+            roundKeys = new ulong[roundKeysAmount + 1][];
+
+            for (int i = 0; i < roundKeysAmount + 1; i++)
+            {
+                roundKeys[i] = new ulong[nb];
+            }
+        }
+
+
+
+        #region INITIALIZATION
+        public virtual void Init(bool forEncryption, ICipherParameters parameters)
+        {
+            if (parameters is KeyParameter)
+            {
+                workingKey = BytesToWords(((KeyParameter)parameters).GetKey());
+
+                ulong[] kt = new ulong[nb];
+
+                KeyExpandKT(workingKey, kt);
+
+                KeyExpandEven(workingKey, kt);
+
+                KeyExpandOdd();
+
+            }
+            else if (parameters != null)
+            {
+                throw new ArgumentException("invalid parameter passed to Dstu7624 init - "
+                + Platform.GetTypeName(parameters));
+            }
+
+            this.forEncryption = forEncryption;
+        }
+
+        private void KeyExpandKT(ulong[] key, ulong[] kt)
+        {
+            ulong[] k0 = new ulong[nb];
+            ulong[] k1 = new ulong[nb];
+
+            internalState = new ulong[nb];
+            internalState[0] += (ulong)(nb + nk + 1);
+
+            if (nb == nk)
+            {
+                Array.Copy(key, k0, k0.Length);
+                Array.Copy(key, k1, k1.Length);
+            }
+            else
+            {
+                Array.Copy(key, 0, k0, 0, nb);
+                Array.Copy(key, nb, k1, 0, nb);
+            }
+
+            AddRoundKeyExpand(k0);
+
+            EncryptionRound();
+
+            XorRoundKeyExpand(k1);
+
+            EncryptionRound();
+
+            AddRoundKeyExpand(k0);
+
+            EncryptionRound();
+
+            Array.Copy(internalState, kt, nb);
+        }
+        private void KeyExpandEven(ulong[] key, ulong[] kt)
+        {
+            ulong[] initial_data = new ulong[nk];
+
+            ulong[] kt_round = new ulong[nb];
+
+            ulong[] tmv = new ulong[nb];
+
+            int round = 0;
+
+            Array.Copy(key, initial_data, nk);
+
+            for (int i = 0; i < nb; i++)
+            {
+                tmv[i] = 0x0001000100010001;
+            }
+
+            while (true)
+            {
+                Array.Copy(kt, internalState, nb);
+
+                AddRoundKeyExpand(tmv);
+
+                Array.Copy(internalState, kt_round, nb);
+                Array.Copy(initial_data, internalState, nb);
+
+                AddRoundKeyExpand(kt_round);
+
+                EncryptionRound();
+
+                XorRoundKeyExpand(kt_round);
+
+                EncryptionRound();
+
+                AddRoundKeyExpand(kt_round);
+
+                Array.Copy(internalState, roundKeys[round], nb);
+
+                if (roundKeysAmount == round)
+                {
+                    break;
+                }
+                if (nk != nb)
+                {
+                    round += 2;
+
+                    ShiftLeft(tmv);
+
+                    Array.Copy(kt, internalState, nb);
+
+                    AddRoundKeyExpand(tmv);
+
+                    Array.Copy(internalState, kt_round, nb);
+                    Array.Copy(initial_data, nb, internalState, 0, nb);
+
+                    AddRoundKeyExpand(kt_round);
+
+                    EncryptionRound();
+
+                    XorRoundKeyExpand(kt_round);
+
+                    EncryptionRound();
+
+                    AddRoundKeyExpand(kt_round);
+
+                    Array.Copy(internalState, roundKeys[round], nb);
+
+                    if (roundKeysAmount == round)
+                    {
+                        break;
+                    }
+                }
+
+                round += 2;
+                ShiftLeft(tmv);
+
+                //Rotate initial data array on 1 element left
+                ulong temp = initial_data[0];
+                Array.Copy(initial_data, 1, initial_data, 0, initial_data.Length - 1);
+                initial_data[initial_data.Length - 1] = temp;
+            }
+        }
+        private void KeyExpandOdd()
+        {
+            for (int i = 1; i < roundKeysAmount; i += 2)
+            {
+                Array.Copy(roundKeys[i - 1], roundKeys[i], nb);
+                RotateLeft(roundKeys[i]);
+            }
+        }
+        #endregion
+
+
+        public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff)
+        {
+            if (workingKey == null)
+                throw new InvalidOperationException("Dstu7624 engine not initialised");
+
+            Check.DataLength(input, inOff, GetBlockSize(), "input buffer too short");
+            Check.OutputLength(output, outOff, GetBlockSize(), "output buffer too short");
+
+            if (forEncryption)
+            {
+                Encrypt(input, inOff, output, outOff);
+            }
+            else
+            {
+                Decrypt(input, inOff, output, outOff);
+            }
+
+            return GetBlockSize();
+        }
+
+        private void Encrypt(byte[] plain, int inOff, byte[] cipherText, int outOff)
+        {
+            int round = 0;
+
+            Array.Copy(plain, inOff, plain, 0, blockSizeBits / BITS_IN_BYTE);
+            Array.Resize(ref plain, blockSizeBits / BITS_IN_BYTE);
+            
+            ulong[] plain_ = BytesToWords(plain);
+
+            Array.Copy(plain_, internalState, nb);
+
+            AddRoundKey(round);
+
+            for (round = 1; round < roundKeysAmount; round++)
+            {
+                EncryptionRound();
+
+                XorRoundKey(round);
+
+            }
+            EncryptionRound();
+
+            AddRoundKey(roundKeysAmount);
+
+            ulong[] cipherText_ = new ulong[internalState.Length];
+
+            Array.Copy(internalState, cipherText_, nb);
+
+            byte[] temp = WordsToBytes(cipherText_);
+
+            Array.Copy(temp, 0, cipherText, outOff, temp.Length);
+
+        }
+        private void Decrypt(byte[] cipherText, int inOff, byte[] decryptedText, int outOff)
+        {
+            Array.Copy(cipherText, inOff, cipherText, 0, blockSizeBits / BITS_IN_BYTE);
+            Array.Resize(ref cipherText, blockSizeBits / BITS_IN_BYTE);
+
+            int round = roundKeysAmount;
+
+            ulong[] cipherText_ = BytesToWords(cipherText);
+
+            Array.Copy(cipherText_, internalState, nb);
+
+            SubRoundKey(round);
+
+            for (round = roundKeysAmount - 1; round > 0; round--)
+            {
+                DecryptionRound();
+                XorRoundKey(round);
+            }
+
+            DecryptionRound();
+            SubRoundKey(0);
+
+            ulong[] decryptedText_ = new ulong[internalState.Length];
+
+            Array.Copy(internalState, decryptedText_, nb);
+
+
+            byte[] temp = WordsToBytes(decryptedText_);
+            Array.Copy(temp, 0, decryptedText, outOff, temp.Length);
+
+            
+        }
+
+
+
+
+
+
+
+
+
+        private void AddRoundKeyExpand(ulong[] value)
+        {
+            for (int i = 0; i < nb; i++)
+            {
+                internalState[i] += value[i];
+            }
+        }
+
+        private void EncryptionRound()
+        {
+            SubBytes();
+            ShiftRows();
+            MixColumns();
+        }
+
+        private void DecryptionRound()
+        {
+            InvMixColumns();
+            InvShiftRows();
+            InvSubBytes();
+        }
+
+        private void RotateLeft(ulong[] state_value)
+        {
+            int rotateBytesLength = 2 * state_value.Length + 3;
+            int bytesLength = state_value.Length * (BITS_IN_WORD / BITS_IN_BYTE);
+
+
+            byte[] bytes = WordsToBytes(state_value);
+            byte[] buffer = new byte[rotateBytesLength];
+
+            Array.Copy(bytes, buffer, rotateBytesLength);
+
+            Buffer.BlockCopy(bytes, rotateBytesLength, bytes, 0, bytesLength - rotateBytesLength);
+
+            Array.Copy(buffer, 0, bytes, bytesLength - rotateBytesLength, rotateBytesLength);
+
+            var temp = BytesToWords(bytes);
+            Array.Copy(temp, state_value, state_value.Length);
+        }
+
+        private void ShiftLeft(ulong[] state_value)
+        {
+            for (int i = 0; i < state_value.Length; i++)
+            {
+                state_value[i] <<= 1;
+            }
+            Array.Reverse(state_value);
+        }
+
+        private void XorRoundKeyExpand(ulong[] value)
+        {
+            for (int i = 0; i < nb; i++)
+            {
+                internalState[i] ^= value[i];
+            }
+        }
+
+        private void XorRoundKey(int round)
+        {
+            for (int i = 0; i < nb; i++)
+            {
+                internalState[i] ^= roundKeys[round][i];
+            }
+        }
+
+        private void ShiftRows()
+        {
+            int row, col;
+            int shift = -1;
+
+            byte[] stateBytes = WordsToBytes(internalState);
+
+            byte[] nstate = new byte[nb * sizeof(ulong)];
+
+            for (row = 0; row < sizeof(ulong); row++)
+            {
+                if (row % (sizeof(ulong) / nb) == 0)
+                {
+                    shift += 1;
+                }
+
+                for (col = 0; col < nb; col++)
+                {
+                    nstate[row + ((col + shift) % nb) * sizeof(ulong)] = stateBytes[row + col * sizeof(ulong)];
+                }
+            }
+
+            internalState = BytesToWords(nstate);
+
+        }
+
+        private void InvShiftRows()
+        {
+            int row, col;
+            int shift = -1;
+
+            byte[] stateBytes = WordsToBytes(internalState);
+            byte[] nstate = new byte[nb * sizeof(ulong)];
+
+            for (row = 0; row < sizeof(ulong); row++)
+            {
+                if (row % (sizeof(ulong) / nb) == 0)
+                {
+                    shift += 1;
+                }
+
+                for (col = 0; col < nb; col++)
+                {
+                    nstate[row + col * sizeof(ulong)] = stateBytes[row + ((col + shift) % nb) * sizeof(ulong)];
+                }
+            }
+
+            internalState = BytesToWords(nstate);
+        }
+
+        private ulong[] BytesToWords(byte[] bytes)
+        {
+            ulong[] words = new ulong[bytes.Length / sizeof(ulong)];
+
+            for (int i = 0; i < words.Length; i++)
+            {
+                words[i] = BitConverter.ToUInt64(bytes, i * sizeof(ulong));
+
+                if (!BitConverter.IsLittleEndian)
+                {
+                    words[i] = ReverseWord(words[i]);
+                }
+            }
+
+            return words;
+        }
+
+        private byte[] WordsToBytes(ulong[] words)
+        {
+            byte[] bytes = new byte[words.Length * sizeof(ulong)];
+
+            byte[] tempBytes = new byte[sizeof(ulong)];
+
+            for (int i = 0; i < words.Length; ++i)
+            {
+                if (!BitConverter.IsLittleEndian)
+                {
+                    words[i] = ReverseWord(words[i]);
+                }
+
+                tempBytes = BitConverter.GetBytes(words[i]);
+                Array.Copy(tempBytes, 0, bytes, i * tempBytes.Length, tempBytes.Length);
+            }
+            return bytes;
+        }
+
+        private ulong ReverseWord(ulong x)
+        {
+            byte[] bytes = BitConverter.GetBytes(x);
+            Array.Reverse(bytes);
+            return BitConverter.ToUInt64(bytes, 0);
+        }
+
+        private void AddRoundKey(int round)
+        {
+            for (int i = 0; i < nb; ++i)
+            {
+                internalState[i] += roundKeys[round][i];
+            }
+        }
+
+        private void SubRoundKey(int round)
+        {
+            for (int i = 0; i < nb; ++i)
+            {
+                internalState[i] -= roundKeys[round][i];
+            }
+        }
+
+        private void MixColumns()
+        {
+            MatrixMultiply(mdsMatrix);
+        }
+
+        private void InvMixColumns()
+        {
+            MatrixMultiply(mdsInvMatrix);
+        }
+
+        private void MatrixMultiply(byte[][] matrix)
+        {
+            int col, row, b;
+            byte product;
+            ulong result;
+            byte[] stateBytes = WordsToBytes(internalState);
+
+            for (col = 0; col < nb; ++col)
+            {
+                result = 0;
+                for (row = sizeof(ulong) - 1; row >= 0; --row)
+                {
+                    product = 0;
+                    for (b = sizeof(ulong) - 1; b >= 0; --b)
+                    {
+                        product ^= MultiplyGF(stateBytes[b + col * sizeof(ulong)], matrix[row][b]);
+                    }
+                    result |= (ulong)product << (row * sizeof(ulong));
+                }
+                internalState[col] = result;
+            }
+        }
+
+        private byte MultiplyGF(byte x, byte y)
+        {
+            byte r = 0;
+            byte hbit = 0;
+
+            for (int i = 0; i < BITS_IN_BYTE; i++)
+            {
+                if ((y & 0x01) == 1)
+                {
+                    r ^= x;
+                }
+
+                hbit = (byte)(x & 0x80);
+
+                x <<= 1;
+
+                if (hbit == 0x80)
+                {
+                    x = (byte)((int)x ^ REDUCTION_POLYNOMIAL);
+                }
+                y >>= 1;
+            }
+            return r;
+        }
+
+        private void SubBytes()
+        {
+            for (int i = 0; i < nb; i++)
+            {
+                internalState[i] = sboxesForEncryption[0][internalState[i] & 0x00000000000000FF] |
+                           ((ulong)sboxesForEncryption[1][(internalState[i] & 0x000000000000FF00) >> 8] << 8) |
+                           ((ulong)sboxesForEncryption[2][(internalState[i] & 0x0000000000FF0000) >> 16] << 16) |
+                           ((ulong)sboxesForEncryption[3][(internalState[i] & 0x00000000FF000000) >> 24] << 24) |
+                           ((ulong)sboxesForEncryption[0][(internalState[i] & 0x000000FF00000000) >> 32] << 32) |
+                           ((ulong)sboxesForEncryption[1][(internalState[i] & 0x0000FF0000000000) >> 40] << 40) |
+                           ((ulong)sboxesForEncryption[2][(internalState[i] & 0x00FF000000000000) >> 48] << 48) |
+                           ((ulong)sboxesForEncryption[3][(internalState[i] & 0xFF00000000000000) >> 56] << 56);
+            }
+        }
+
+        private void InvSubBytes()
+        {
+            for (int i = 0; i < nb; i++)
+            {
+                internalState[i] = sboxesForDecryption[0][internalState[i] & 0x00000000000000FF] |
+                           ((ulong)sboxesForDecryption[1][(internalState[i] & 0x000000000000FF00) >> 8] << 8) |
+                           ((ulong)sboxesForDecryption[2][(internalState[i] & 0x0000000000FF0000) >> 16] << 16) |
+                           ((ulong)sboxesForDecryption[3][(internalState[i] & 0x00000000FF000000) >> 24] << 24) |
+                           ((ulong)sboxesForDecryption[0][(internalState[i] & 0x000000FF00000000) >> 32] << 32) |
+                           ((ulong)sboxesForDecryption[1][(internalState[i] & 0x0000FF0000000000) >> 40] << 40) |
+                           ((ulong)sboxesForDecryption[2][(internalState[i] & 0x00FF000000000000) >> 48] << 48) |
+                           ((ulong)sboxesForDecryption[3][(internalState[i] & 0xFF00000000000000) >> 56] << 56);
+            }
+        }
+
+
+        #region TABLES AND S-BOXES
+
+        private byte[][] mdsMatrix = 
+          {
+               new byte[] { 0x01, 0x01, 0x05, 0x01, 0x08, 0x06, 0x07, 0x04 },
+               new byte[] { 0x04, 0x01, 0x01, 0x05, 0x01, 0x08, 0x06, 0x07 },
+               new byte[] { 0x07, 0x04, 0x01, 0x01, 0x05, 0x01, 0x08, 0x06 },
+               new byte[] { 0x06, 0x07, 0x04, 0x01, 0x01, 0x05, 0x01, 0x08 },
+               new byte[] { 0x08, 0x06, 0x07, 0x04, 0x01, 0x01, 0x05, 0x01 },
+               new byte[] { 0x01, 0x08, 0x06, 0x07, 0x04, 0x01, 0x01, 0x05 },
+               new byte[] { 0x05, 0x01, 0x08, 0x06, 0x07, 0x04, 0x01, 0x01 },
+               new byte[] { 0x01, 0x05, 0x01, 0x08, 0x06, 0x07, 0x04, 0x01 },
+          };
+
+        private byte[][] mdsInvMatrix = 
+          {
+               new byte[] { 0xAD, 0x95, 0x76, 0xA8, 0x2F, 0x49, 0xD7, 0xCA },
+               new byte[] { 0xCA, 0xAD, 0x95, 0x76, 0xA8, 0x2F, 0x49, 0xD7 },
+               new byte[] { 0xD7, 0xCA, 0xAD, 0x95, 0x76, 0xA8, 0x2F, 0x49 },
+               new byte[] { 0x49, 0xD7, 0xCA, 0xAD, 0x95, 0x76, 0xA8, 0x2F },
+               new byte[] { 0x2F, 0x49, 0xD7, 0xCA, 0xAD, 0x95, 0x76, 0xA8 },
+               new byte[] { 0xA8, 0x2F, 0x49, 0xD7, 0xCA, 0xAD, 0x95, 0x76 },
+               new byte[] { 0x76, 0xA8, 0x2F, 0x49, 0xD7, 0xCA, 0xAD, 0x95 },
+               new byte[] { 0x95, 0x76, 0xA8, 0x2F, 0x49, 0xD7, 0xCA, 0xAD },
+          };
+
+
+        private byte[][] sboxesForEncryption = 
+          {
+               new byte[]
+               {
+                    0xa8, 0x43, 0x5f, 0x06, 0x6b, 0x75, 0x6c, 0x59, 0x71, 0xdf, 0x87, 0x95, 0x17, 0xf0, 0xd8, 0x09, 
+                    0x6d, 0xf3, 0x1d, 0xcb, 0xc9, 0x4d, 0x2c, 0xaf, 0x79, 0xe0, 0x97, 0xfd, 0x6f, 0x4b, 0x45, 0x39, 
+                    0x3e, 0xdd, 0xa3, 0x4f, 0xb4, 0xb6, 0x9a, 0x0e, 0x1f, 0xbf, 0x15, 0xe1, 0x49, 0xd2, 0x93, 0xc6, 
+                    0x92, 0x72, 0x9e, 0x61, 0xd1, 0x63, 0xfa, 0xee, 0xf4, 0x19, 0xd5, 0xad, 0x58, 0xa4, 0xbb, 0xa1, 
+                    0xdc, 0xf2, 0x83, 0x37, 0x42, 0xe4, 0x7a, 0x32, 0x9c, 0xcc, 0xab, 0x4a, 0x8f, 0x6e, 0x04, 0x27, 
+                    0x2e, 0xe7, 0xe2, 0x5a, 0x96, 0x16, 0x23, 0x2b, 0xc2, 0x65, 0x66, 0x0f, 0xbc, 0xa9, 0x47, 0x41, 
+                    0x34, 0x48, 0xfc, 0xb7, 0x6a, 0x88, 0xa5, 0x53, 0x86, 0xf9, 0x5b, 0xdb, 0x38, 0x7b, 0xc3, 0x1e, 
+                    0x22, 0x33, 0x24, 0x28, 0x36, 0xc7, 0xb2, 0x3b, 0x8e, 0x77, 0xba, 0xf5, 0x14, 0x9f, 0x08, 0x55, 
+                    0x9b, 0x4c, 0xfe, 0x60, 0x5c, 0xda, 0x18, 0x46, 0xcd, 0x7d, 0x21, 0xb0, 0x3f, 0x1b, 0x89, 0xff, 
+                    0xeb, 0x84, 0x69, 0x3a, 0x9d, 0xd7, 0xd3, 0x70, 0x67, 0x40, 0xb5, 0xde, 0x5d, 0x30, 0x91, 0xb1, 
+                    0x78, 0x11, 0x01, 0xe5, 0x00, 0x68, 0x98, 0xa0, 0xc5, 0x02, 0xa6, 0x74, 0x2d, 0x0b, 0xa2, 0x76, 
+                    0xb3, 0xbe, 0xce, 0xbd, 0xae, 0xe9, 0x8a, 0x31, 0x1c, 0xec, 0xf1, 0x99, 0x94, 0xaa, 0xf6, 0x26, 
+                    0x2f, 0xef, 0xe8, 0x8c, 0x35, 0x03, 0xd4, 0x7f, 0xfb, 0x05, 0xc1, 0x5e, 0x90, 0x20, 0x3d, 0x82, 
+                    0xf7, 0xea, 0x0a, 0x0d, 0x7e, 0xf8, 0x50, 0x1a, 0xc4, 0x07, 0x57, 0xb8, 0x3c, 0x62, 0xe3, 0xc8, 
+                    0xac, 0x52, 0x64, 0x10, 0xd0, 0xd9, 0x13, 0x0c, 0x12, 0x29, 0x51, 0xb9, 0xcf, 0xd6, 0x73, 0x8d, 
+                    0x81, 0x54, 0xc0, 0xed, 0x4e, 0x44, 0xa7, 0x2a, 0x85, 0x25, 0xe6, 0xca, 0x7c, 0x8b, 0x56, 0x80 
+               },
+
+               new byte[]
+               {
+                    0xce, 0xbb, 0xeb, 0x92, 0xea, 0xcb, 0x13, 0xc1, 0xe9, 0x3a, 0xd6, 0xb2, 0xd2, 0x90, 0x17, 0xf8, 
+                    0x42, 0x15, 0x56, 0xb4, 0x65, 0x1c, 0x88, 0x43, 0xc5, 0x5c, 0x36, 0xba, 0xf5, 0x57, 0x67, 0x8d, 
+                    0x31, 0xf6, 0x64, 0x58, 0x9e, 0xf4, 0x22, 0xaa, 0x75, 0x0f, 0x02, 0xb1, 0xdf, 0x6d, 0x73, 0x4d, 
+                    0x7c, 0x26, 0x2e, 0xf7, 0x08, 0x5d, 0x44, 0x3e, 0x9f, 0x14, 0xc8, 0xae, 0x54, 0x10, 0xd8, 0xbc, 
+                    0x1a, 0x6b, 0x69, 0xf3, 0xbd, 0x33, 0xab, 0xfa, 0xd1, 0x9b, 0x68, 0x4e, 0x16, 0x95, 0x91, 0xee, 
+                    0x4c, 0x63, 0x8e, 0x5b, 0xcc, 0x3c, 0x19, 0xa1, 0x81, 0x49, 0x7b, 0xd9, 0x6f, 0x37, 0x60, 0xca, 
+                    0xe7, 0x2b, 0x48, 0xfd, 0x96, 0x45, 0xfc, 0x41, 0x12, 0x0d, 0x79, 0xe5, 0x89, 0x8c, 0xe3, 0x20, 
+                    0x30, 0xdc, 0xb7, 0x6c, 0x4a, 0xb5, 0x3f, 0x97, 0xd4, 0x62, 0x2d, 0x06, 0xa4, 0xa5, 0x83, 0x5f, 
+                    0x2a, 0xda, 0xc9, 0x00, 0x7e, 0xa2, 0x55, 0xbf, 0x11, 0xd5, 0x9c, 0xcf, 0x0e, 0x0a, 0x3d, 0x51, 
+                    0x7d, 0x93, 0x1b, 0xfe, 0xc4, 0x47, 0x09, 0x86, 0x0b, 0x8f, 0x9d, 0x6a, 0x07, 0xb9, 0xb0, 0x98, 
+                    0x18, 0x32, 0x71, 0x4b, 0xef, 0x3b, 0x70, 0xa0, 0xe4, 0x40, 0xff, 0xc3, 0xa9, 0xe6, 0x78, 0xf9, 
+                    0x8b, 0x46, 0x80, 0x1e, 0x38, 0xe1, 0xb8, 0xa8, 0xe0, 0x0c, 0x23, 0x76, 0x1d, 0x25, 0x24, 0x05, 
+                    0xf1, 0x6e, 0x94, 0x28, 0x9a, 0x84, 0xe8, 0xa3, 0x4f, 0x77, 0xd3, 0x85, 0xe2, 0x52, 0xf2, 0x82, 
+                    0x50, 0x7a, 0x2f, 0x74, 0x53, 0xb3, 0x61, 0xaf, 0x39, 0x35, 0xde, 0xcd, 0x1f, 0x99, 0xac, 0xad, 
+                    0x72, 0x2c, 0xdd, 0xd0, 0x87, 0xbe, 0x5e, 0xa6, 0xec, 0x04, 0xc6, 0x03, 0x34, 0xfb, 0xdb, 0x59, 
+                    0xb6, 0xc2, 0x01, 0xf0, 0x5a, 0xed, 0xa7, 0x66, 0x21, 0x7f, 0x8a, 0x27, 0xc7, 0xc0, 0x29, 0xd7 
+               },
+
+               new byte[]
+               {
+                    0x93, 0xd9, 0x9a, 0xb5, 0x98, 0x22, 0x45, 0xfc, 0xba, 0x6a, 0xdf, 0x02, 0x9f, 0xdc, 0x51, 0x59, 
+                    0x4a, 0x17, 0x2b, 0xc2, 0x94, 0xf4, 0xbb, 0xa3, 0x62, 0xe4, 0x71, 0xd4, 0xcd, 0x70, 0x16, 0xe1, 
+                    0x49, 0x3c, 0xc0, 0xd8, 0x5c, 0x9b, 0xad, 0x85, 0x53, 0xa1, 0x7a, 0xc8, 0x2d, 0xe0, 0xd1, 0x72, 
+                    0xa6, 0x2c, 0xc4, 0xe3, 0x76, 0x78, 0xb7, 0xb4, 0x09, 0x3b, 0x0e, 0x41, 0x4c, 0xde, 0xb2, 0x90, 
+                    0x25, 0xa5, 0xd7, 0x03, 0x11, 0x00, 0xc3, 0x2e, 0x92, 0xef, 0x4e, 0x12, 0x9d, 0x7d, 0xcb, 0x35, 
+                    0x10, 0xd5, 0x4f, 0x9e, 0x4d, 0xa9, 0x55, 0xc6, 0xd0, 0x7b, 0x18, 0x97, 0xd3, 0x36, 0xe6, 0x48, 
+                    0x56, 0x81, 0x8f, 0x77, 0xcc, 0x9c, 0xb9, 0xe2, 0xac, 0xb8, 0x2f, 0x15, 0xa4, 0x7c, 0xda, 0x38, 
+                    0x1e, 0x0b, 0x05, 0xd6, 0x14, 0x6e, 0x6c, 0x7e, 0x66, 0xfd, 0xb1, 0xe5, 0x60, 0xaf, 0x5e, 0x33, 
+                    0x87, 0xc9, 0xf0, 0x5d, 0x6d, 0x3f, 0x88, 0x8d, 0xc7, 0xf7, 0x1d, 0xe9, 0xec, 0xed, 0x80, 0x29, 
+                    0x27, 0xcf, 0x99, 0xa8, 0x50, 0x0f, 0x37, 0x24, 0x28, 0x30, 0x95, 0xd2, 0x3e, 0x5b, 0x40, 0x83, 
+                    0xb3, 0x69, 0x57, 0x1f, 0x07, 0x1c, 0x8a, 0xbc, 0x20, 0xeb, 0xce, 0x8e, 0xab, 0xee, 0x31, 0xa2, 
+                    0x73, 0xf9, 0xca, 0x3a, 0x1a, 0xfb, 0x0d, 0xc1, 0xfe, 0xfa, 0xf2, 0x6f, 0xbd, 0x96, 0xdd, 0x43, 
+                    0x52, 0xb6, 0x08, 0xf3, 0xae, 0xbe, 0x19, 0x89, 0x32, 0x26, 0xb0, 0xea, 0x4b, 0x64, 0x84, 0x82, 
+                    0x6b, 0xf5, 0x79, 0xbf, 0x01, 0x5f, 0x75, 0x63, 0x1b, 0x23, 0x3d, 0x68, 0x2a, 0x65, 0xe8, 0x91, 
+                    0xf6, 0xff, 0x13, 0x58, 0xf1, 0x47, 0x0a, 0x7f, 0xc5, 0xa7, 0xe7, 0x61, 0x5a, 0x06, 0x46, 0x44, 
+                    0x42, 0x04, 0xa0, 0xdb, 0x39, 0x86, 0x54, 0xaa, 0x8c, 0x34, 0x21, 0x8b, 0xf8, 0x0c, 0x74, 0x67 
+               },
+
+               new byte[]
+               {
+                    0x68, 0x8d, 0xca, 0x4d, 0x73, 0x4b, 0x4e, 0x2a, 0xd4, 0x52, 0x26, 0xb3, 0x54, 0x1e, 0x19, 0x1f, 
+                    0x22, 0x03, 0x46, 0x3d, 0x2d, 0x4a, 0x53, 0x83, 0x13, 0x8a, 0xb7, 0xd5, 0x25, 0x79, 0xf5, 0xbd, 
+                    0x58, 0x2f, 0x0d, 0x02, 0xed, 0x51, 0x9e, 0x11, 0xf2, 0x3e, 0x55, 0x5e, 0xd1, 0x16, 0x3c, 0x66, 
+                    0x70, 0x5d, 0xf3, 0x45, 0x40, 0xcc, 0xe8, 0x94, 0x56, 0x08, 0xce, 0x1a, 0x3a, 0xd2, 0xe1, 0xdf, 
+                    0xb5, 0x38, 0x6e, 0x0e, 0xe5, 0xf4, 0xf9, 0x86, 0xe9, 0x4f, 0xd6, 0x85, 0x23, 0xcf, 0x32, 0x99, 
+                    0x31, 0x14, 0xae, 0xee, 0xc8, 0x48, 0xd3, 0x30, 0xa1, 0x92, 0x41, 0xb1, 0x18, 0xc4, 0x2c, 0x71, 
+                    0x72, 0x44, 0x15, 0xfd, 0x37, 0xbe, 0x5f, 0xaa, 0x9b, 0x88, 0xd8, 0xab, 0x89, 0x9c, 0xfa, 0x60, 
+                    0xea, 0xbc, 0x62, 0x0c, 0x24, 0xa6, 0xa8, 0xec, 0x67, 0x20, 0xdb, 0x7c, 0x28, 0xdd, 0xac, 0x5b, 
+                    0x34, 0x7e, 0x10, 0xf1, 0x7b, 0x8f, 0x63, 0xa0, 0x05, 0x9a, 0x43, 0x77, 0x21, 0xbf, 0x27, 0x09, 
+                    0xc3, 0x9f, 0xb6, 0xd7, 0x29, 0xc2, 0xeb, 0xc0, 0xa4, 0x8b, 0x8c, 0x1d, 0xfb, 0xff, 0xc1, 0xb2, 
+                    0x97, 0x2e, 0xf8, 0x65, 0xf6, 0x75, 0x07, 0x04, 0x49, 0x33, 0xe4, 0xd9, 0xb9, 0xd0, 0x42, 0xc7, 
+                    0x6c, 0x90, 0x00, 0x8e, 0x6f, 0x50, 0x01, 0xc5, 0xda, 0x47, 0x3f, 0xcd, 0x69, 0xa2, 0xe2, 0x7a, 
+                    0xa7, 0xc6, 0x93, 0x0f, 0x0a, 0x06, 0xe6, 0x2b, 0x96, 0xa3, 0x1c, 0xaf, 0x6a, 0x12, 0x84, 0x39, 
+                    0xe7, 0xb0, 0x82, 0xf7, 0xfe, 0x9d, 0x87, 0x5c, 0x81, 0x35, 0xde, 0xb4, 0xa5, 0xfc, 0x80, 0xef, 
+                    0xcb, 0xbb, 0x6b, 0x76, 0xba, 0x5a, 0x7d, 0x78, 0x0b, 0x95, 0xe3, 0xad, 0x74, 0x98, 0x3b, 0x36, 
+                    0x64, 0x6d, 0xdc, 0xf0, 0x59, 0xa9, 0x4c, 0x17, 0x7f, 0x91, 0xb8, 0xc9, 0x57, 0x1b, 0xe0, 0x61 
+               }
+
+          };
+
+
+        private byte[][] sboxesForDecryption = 
+          {
+               new byte[]
+               {
+	               0xa4, 0xa2, 0xa9, 0xc5, 0x4e, 0xc9, 0x03, 0xd9, 0x7e, 0x0f, 0xd2, 0xad, 0xe7, 0xd3, 0x27, 0x5b, 
+	               0xe3, 0xa1, 0xe8, 0xe6, 0x7c, 0x2a, 0x55, 0x0c, 0x86, 0x39, 0xd7, 0x8d, 0xb8, 0x12, 0x6f, 0x28, 
+	               0xcd, 0x8a, 0x70, 0x56, 0x72, 0xf9, 0xbf, 0x4f, 0x73, 0xe9, 0xf7, 0x57, 0x16, 0xac, 0x50, 0xc0, 
+	               0x9d, 0xb7, 0x47, 0x71, 0x60, 0xc4, 0x74, 0x43, 0x6c, 0x1f, 0x93, 0x77, 0xdc, 0xce, 0x20, 0x8c, 
+	               0x99, 0x5f, 0x44, 0x01, 0xf5, 0x1e, 0x87, 0x5e, 0x61, 0x2c, 0x4b, 0x1d, 0x81, 0x15, 0xf4, 0x23, 
+	               0xd6, 0xea, 0xe1, 0x67, 0xf1, 0x7f, 0xfe, 0xda, 0x3c, 0x07, 0x53, 0x6a, 0x84, 0x9c, 0xcb, 0x02, 
+	               0x83, 0x33, 0xdd, 0x35, 0xe2, 0x59, 0x5a, 0x98, 0xa5, 0x92, 0x64, 0x04, 0x06, 0x10, 0x4d, 0x1c, 
+	               0x97, 0x08, 0x31, 0xee, 0xab, 0x05, 0xaf, 0x79, 0xa0, 0x18, 0x46, 0x6d, 0xfc, 0x89, 0xd4, 0xc7, 
+	               0xff, 0xf0, 0xcf, 0x42, 0x91, 0xf8, 0x68, 0x0a, 0x65, 0x8e, 0xb6, 0xfd, 0xc3, 0xef, 0x78, 0x4c, 
+	               0xcc, 0x9e, 0x30, 0x2e, 0xbc, 0x0b, 0x54, 0x1a, 0xa6, 0xbb, 0x26, 0x80, 0x48, 0x94, 0x32, 0x7d, 
+	               0xa7, 0x3f, 0xae, 0x22, 0x3d, 0x66, 0xaa, 0xf6, 0x00, 0x5d, 0xbd, 0x4a, 0xe0, 0x3b, 0xb4, 0x17, 
+	               0x8b, 0x9f, 0x76, 0xb0, 0x24, 0x9a, 0x25, 0x63, 0xdb, 0xeb, 0x7a, 0x3e, 0x5c, 0xb3, 0xb1, 0x29, 
+	               0xf2, 0xca, 0x58, 0x6e, 0xd8, 0xa8, 0x2f, 0x75, 0xdf, 0x14, 0xfb, 0x13, 0x49, 0x88, 0xb2, 0xec, 
+	               0xe4, 0x34, 0x2d, 0x96, 0xc6, 0x3a, 0xed, 0x95, 0x0e, 0xe5, 0x85, 0x6b, 0x40, 0x21, 0x9b, 0x09, 
+	               0x19, 0x2b, 0x52, 0xde, 0x45, 0xa3, 0xfa, 0x51, 0xc2, 0xb5, 0xd1, 0x90, 0xb9, 0xf3, 0x37, 0xc1, 
+	               0x0d, 0xba, 0x41, 0x11, 0x38, 0x7b, 0xbe, 0xd0, 0xd5, 0x69, 0x36, 0xc8, 0x62, 0x1b, 0x82, 0x8f
+               },
+
+               new byte[]
+               {
+                    0x83, 0xf2, 0x2a, 0xeb, 0xe9, 0xbf, 0x7b, 0x9c, 0x34, 0x96, 0x8d, 0x98, 0xb9, 0x69, 0x8c, 0x29, 
+                    0x3d, 0x88, 0x68, 0x06, 0x39, 0x11, 0x4c, 0x0e, 0xa0, 0x56, 0x40, 0x92, 0x15, 0xbc, 0xb3, 0xdc, 
+                    0x6f, 0xf8, 0x26, 0xba, 0xbe, 0xbd, 0x31, 0xfb, 0xc3, 0xfe, 0x80, 0x61, 0xe1, 0x7a, 0x32, 0xd2, 
+                    0x70, 0x20, 0xa1, 0x45, 0xec, 0xd9, 0x1a, 0x5d, 0xb4, 0xd8, 0x09, 0xa5, 0x55, 0x8e, 0x37, 0x76, 
+                    0xa9, 0x67, 0x10, 0x17, 0x36, 0x65, 0xb1, 0x95, 0x62, 0x59, 0x74, 0xa3, 0x50, 0x2f, 0x4b, 0xc8, 
+                    0xd0, 0x8f, 0xcd, 0xd4, 0x3c, 0x86, 0x12, 0x1d, 0x23, 0xef, 0xf4, 0x53, 0x19, 0x35, 0xe6, 0x7f, 
+                    0x5e, 0xd6, 0x79, 0x51, 0x22, 0x14, 0xf7, 0x1e, 0x4a, 0x42, 0x9b, 0x41, 0x73, 0x2d, 0xc1, 0x5c, 
+                    0xa6, 0xa2, 0xe0, 0x2e, 0xd3, 0x28, 0xbb, 0xc9, 0xae, 0x6a, 0xd1, 0x5a, 0x30, 0x90, 0x84, 0xf9, 
+                    0xb2, 0x58, 0xcf, 0x7e, 0xc5, 0xcb, 0x97, 0xe4, 0x16, 0x6c, 0xfa, 0xb0, 0x6d, 0x1f, 0x52, 0x99, 
+                    0x0d, 0x4e, 0x03, 0x91, 0xc2, 0x4d, 0x64, 0x77, 0x9f, 0xdd, 0xc4, 0x49, 0x8a, 0x9a, 0x24, 0x38, 
+                    0xa7, 0x57, 0x85, 0xc7, 0x7c, 0x7d, 0xe7, 0xf6, 0xb7, 0xac, 0x27, 0x46, 0xde, 0xdf, 0x3b, 0xd7, 
+                    0x9e, 0x2b, 0x0b, 0xd5, 0x13, 0x75, 0xf0, 0x72, 0xb6, 0x9d, 0x1b, 0x01, 0x3f, 0x44, 0xe5, 0x87, 
+                    0xfd, 0x07, 0xf1, 0xab, 0x94, 0x18, 0xea, 0xfc, 0x3a, 0x82, 0x5f, 0x05, 0x54, 0xdb, 0x00, 0x8b, 
+                    0xe3, 0x48, 0x0c, 0xca, 0x78, 0x89, 0x0a, 0xff, 0x3e, 0x5b, 0x81, 0xee, 0x71, 0xe2, 0xda, 0x2c, 
+                    0xb8, 0xb5, 0xcc, 0x6e, 0xa8, 0x6b, 0xad, 0x60, 0xc6, 0x08, 0x04, 0x02, 0xe8, 0xf5, 0x4f, 0xa4, 
+                    0xf3, 0xc0, 0xce, 0x43, 0x25, 0x1c, 0x21, 0x33, 0x0f, 0xaf, 0x47, 0xed, 0x66, 0x63, 0x93, 0xaa
+               },
+
+               new byte[]
+               {
+                    0x45, 0xd4, 0x0b, 0x43, 0xf1, 0x72, 0xed, 0xa4, 0xc2, 0x38, 0xe6, 0x71, 0xfd, 0xb6, 0x3a, 0x95, 
+                    0x50, 0x44, 0x4b, 0xe2, 0x74, 0x6b, 0x1e, 0x11, 0x5a, 0xc6, 0xb4, 0xd8, 0xa5, 0x8a, 0x70, 0xa3, 
+                    0xa8, 0xfa, 0x05, 0xd9, 0x97, 0x40, 0xc9, 0x90, 0x98, 0x8f, 0xdc, 0x12, 0x31, 0x2c, 0x47, 0x6a, 
+                    0x99, 0xae, 0xc8, 0x7f, 0xf9, 0x4f, 0x5d, 0x96, 0x6f, 0xf4, 0xb3, 0x39, 0x21, 0xda, 0x9c, 0x85, 
+                    0x9e, 0x3b, 0xf0, 0xbf, 0xef, 0x06, 0xee, 0xe5, 0x5f, 0x20, 0x10, 0xcc, 0x3c, 0x54, 0x4a, 0x52, 
+                    0x94, 0x0e, 0xc0, 0x28, 0xf6, 0x56, 0x60, 0xa2, 0xe3, 0x0f, 0xec, 0x9d, 0x24, 0x83, 0x7e, 0xd5, 
+                    0x7c, 0xeb, 0x18, 0xd7, 0xcd, 0xdd, 0x78, 0xff, 0xdb, 0xa1, 0x09, 0xd0, 0x76, 0x84, 0x75, 0xbb, 
+                    0x1d, 0x1a, 0x2f, 0xb0, 0xfe, 0xd6, 0x34, 0x63, 0x35, 0xd2, 0x2a, 0x59, 0x6d, 0x4d, 0x77, 0xe7, 
+                    0x8e, 0x61, 0xcf, 0x9f, 0xce, 0x27, 0xf5, 0x80, 0x86, 0xc7, 0xa6, 0xfb, 0xf8, 0x87, 0xab, 0x62, 
+                    0x3f, 0xdf, 0x48, 0x00, 0x14, 0x9a, 0xbd, 0x5b, 0x04, 0x92, 0x02, 0x25, 0x65, 0x4c, 0x53, 0x0c, 
+                    0xf2, 0x29, 0xaf, 0x17, 0x6c, 0x41, 0x30, 0xe9, 0x93, 0x55, 0xf7, 0xac, 0x68, 0x26, 0xc4, 0x7d, 
+                    0xca, 0x7a, 0x3e, 0xa0, 0x37, 0x03, 0xc1, 0x36, 0x69, 0x66, 0x08, 0x16, 0xa7, 0xbc, 0xc5, 0xd3, 
+                    0x22, 0xb7, 0x13, 0x46, 0x32, 0xe8, 0x57, 0x88, 0x2b, 0x81, 0xb2, 0x4e, 0x64, 0x1c, 0xaa, 0x91, 
+                    0x58, 0x2e, 0x9b, 0x5c, 0x1b, 0x51, 0x73, 0x42, 0x23, 0x01, 0x6e, 0xf3, 0x0d, 0xbe, 0x3d, 0x0a, 
+                    0x2d, 0x1f, 0x67, 0x33, 0x19, 0x7b, 0x5e, 0xea, 0xde, 0x8b, 0xcb, 0xa9, 0x8c, 0x8d, 0xad, 0x49, 
+                    0x82, 0xe4, 0xba, 0xc3, 0x15, 0xd1, 0xe0, 0x89, 0xfc, 0xb1, 0xb9, 0xb5, 0x07, 0x79, 0xb8, 0xe1
+               },
+
+               new byte[]
+               {
+                    0xb2, 0xb6, 0x23, 0x11, 0xa7, 0x88, 0xc5, 0xa6, 0x39, 0x8f, 0xc4, 0xe8, 0x73, 0x22, 0x43, 0xc3, 
+                    0x82, 0x27, 0xcd, 0x18, 0x51, 0x62, 0x2d, 0xf7, 0x5c, 0x0e, 0x3b, 0xfd, 0xca, 0x9b, 0x0d, 0x0f, 
+                    0x79, 0x8c, 0x10, 0x4c, 0x74, 0x1c, 0x0a, 0x8e, 0x7c, 0x94, 0x07, 0xc7, 0x5e, 0x14, 0xa1, 0x21, 
+                    0x57, 0x50, 0x4e, 0xa9, 0x80, 0xd9, 0xef, 0x64, 0x41, 0xcf, 0x3c, 0xee, 0x2e, 0x13, 0x29, 0xba, 
+                    0x34, 0x5a, 0xae, 0x8a, 0x61, 0x33, 0x12, 0xb9, 0x55, 0xa8, 0x15, 0x05, 0xf6, 0x03, 0x06, 0x49, 
+                    0xb5, 0x25, 0x09, 0x16, 0x0c, 0x2a, 0x38, 0xfc, 0x20, 0xf4, 0xe5, 0x7f, 0xd7, 0x31, 0x2b, 0x66, 
+                    0x6f, 0xff, 0x72, 0x86, 0xf0, 0xa3, 0x2f, 0x78, 0x00, 0xbc, 0xcc, 0xe2, 0xb0, 0xf1, 0x42, 0xb4, 
+                    0x30, 0x5f, 0x60, 0x04, 0xec, 0xa5, 0xe3, 0x8b, 0xe7, 0x1d, 0xbf, 0x84, 0x7b, 0xe6, 0x81, 0xf8, 
+                    0xde, 0xd8, 0xd2, 0x17, 0xce, 0x4b, 0x47, 0xd6, 0x69, 0x6c, 0x19, 0x99, 0x9a, 0x01, 0xb3, 0x85, 
+                    0xb1, 0xf9, 0x59, 0xc2, 0x37, 0xe9, 0xc8, 0xa0, 0xed, 0x4f, 0x89, 0x68, 0x6d, 0xd5, 0x26, 0x91, 
+                    0x87, 0x58, 0xbd, 0xc9, 0x98, 0xdc, 0x75, 0xc0, 0x76, 0xf5, 0x67, 0x6b, 0x7e, 0xeb, 0x52, 0xcb, 
+                    0xd1, 0x5b, 0x9f, 0x0b, 0xdb, 0x40, 0x92, 0x1a, 0xfa, 0xac, 0xe4, 0xe1, 0x71, 0x1f, 0x65, 0x8d, 
+                    0x97, 0x9e, 0x95, 0x90, 0x5d, 0xb7, 0xc1, 0xaf, 0x54, 0xfb, 0x02, 0xe0, 0x35, 0xbb, 0x3a, 0x4d, 
+                    0xad, 0x2c, 0x3d, 0x56, 0x08, 0x1b, 0x4a, 0x93, 0x6a, 0xab, 0xb8, 0x7a, 0xf2, 0x7d, 0xda, 0x3f, 
+                    0xfe, 0x3e, 0xbe, 0xea, 0xaa, 0x44, 0xc6, 0xd0, 0x36, 0x48, 0x70, 0x96, 0x77, 0x24, 0x53, 0xdf, 
+                    0xf3, 0x83, 0x28, 0x32, 0x45, 0x1e, 0xa4, 0xd3, 0xa2, 0x46, 0x6e, 0x9c, 0xdd, 0x63, 0xd4, 0x9d
+               }
+          };
+        #endregion
+
+
+
+        public virtual string AlgorithmName
+        {
+            get { return "Dstu7624"; }
+        }
+
+        public virtual int GetBlockSize()
+        {
+            return blockSizeBits / BITS_IN_BYTE;
+        }
+
+        public virtual bool IsPartialBlockOkay
+        {
+            get { return false; }
+        }
+
+        public virtual void Reset()
+        {
+
+        }
+
+    }
+}
diff --git a/crypto/src/crypto/engines/Dstu7624WrapEngine.cs b/crypto/src/crypto/engines/Dstu7624WrapEngine.cs
new file mode 100644
index 000000000..bfe8d9c1c
--- /dev/null
+++ b/crypto/src/crypto/engines/Dstu7624WrapEngine.cs
@@ -0,0 +1,263 @@
+using System;
+
+using Org.BouncyCastle.Crypto.Parameters;
+using System.Collections.Generic;
+using Org.BouncyCastle.Utilities;
+
+namespace Org.BouncyCastle.Crypto.Engines
+{
+     public class Dstu7624WrapEngine : IWrapper 
+     {
+          private const int BYTES_IN_INTEGER = 4;
+
+          private KeyParameter param;
+          private Dstu7624Engine engine;
+          private bool forWrapping;
+          private int blockSize;
+
+          private byte[] buffer;
+          private byte[] intArray;
+
+          private readonly byte[] checkSumArray, zeroArray;
+
+
+          public Dstu7624WrapEngine(int blockSizeBits, int keySizeBits)
+          {
+               engine = new Dstu7624Engine(blockSizeBits, keySizeBits);
+               param = null;
+           
+               blockSize = blockSizeBits / 8;
+               buffer = new byte[blockSize];
+               
+               intArray = new byte[BYTES_IN_INTEGER];
+
+               checkSumArray = new byte[blockSize];
+               zeroArray = new byte[blockSize];
+          }
+          
+
+          public string AlgorithmName
+          {
+               get { return "Dstu7624WrapEngine"; }
+          }
+
+          public void Init(bool forWrapping, ICipherParameters parameters)
+          {
+               this.forWrapping = forWrapping;
+                            
+               if (parameters is KeyParameter)
+               {
+                    this.param = (KeyParameter)parameters;
+
+                    engine.Init(forWrapping, param);
+               }
+               else
+               {
+                    throw new ArgumentException("Bad parameters passed to Dstu7624WrapEngine");
+               }
+          }
+
+          public byte[] Wrap(byte[] input, int inOff, int length)
+          {
+               if (!forWrapping)
+               {
+                    throw new InvalidOperationException("Not set for wrapping");
+               }
+
+               if ((input.Length - inOff) % blockSize != 0)
+               {
+                    throw new ArgumentException("Padding not supported");
+               }
+
+               int n = 2 * (1 + input.Length / blockSize);
+               
+               int V = (n - 1) * 6;
+
+               buffer = new byte[input.Length - inOff + blockSize];
+               Array.Copy(input, inOff, buffer, 0, input.Length - inOff);
+               //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+
+               
+
+               byte[] B = new byte[blockSize / 2];
+               Array.Copy(buffer, 0, B, 0, blockSize / 2);
+               //Console.WriteLine("B0: "+ Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B));
+               
+               
+               List<byte[]> bTemp = new List<byte[]>();
+              
+               int bHalfBlocksLen = buffer.Length - blockSize  / 2;
+               int bufOff = blockSize / 2;
+               while (bHalfBlocksLen != 0)
+               {                    
+                    byte[] temp = new byte[blockSize / 2];
+                    Array.Copy(buffer, bufOff, temp, 0, blockSize / 2);
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+                    //Console.WriteLine(buffer.Length);
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(temp));
+                    
+                    bTemp.Add(temp);
+
+                    bHalfBlocksLen -= blockSize / 2;
+                    bufOff += blockSize / 2;
+               }
+
+                                       
+
+               for (int j = 0; j < V; j++)
+               {
+                    Array.Copy(B, 0, buffer, 0, blockSize / 2);
+                    Array.Copy(bTemp[0], 0, buffer, blockSize / 2, blockSize / 2);
+
+                    engine.ProcessBlock(buffer, 0, buffer, 0);
+                                        
+                    intTobytes(j + 1, intArray, 0);
+                    for (int byteNum = 0; byteNum < BYTES_IN_INTEGER; byteNum++)
+                    {
+                         buffer[byteNum + blockSize / 2] ^= intArray[byteNum];
+                    }
+
+                    Array.Copy(buffer, blockSize / 2, B, 0, blockSize / 2);
+                    
+                    for (int i = 2; i < n; i++)
+                    {                        
+                         Array.Copy(bTemp[i - 1], 0, bTemp[i - 2], 0, blockSize / 2);
+                    }
+
+                    Array.Copy(buffer, 0, bTemp[n - 2], 0, blockSize / 2);
+
+                    //Console.WriteLine("B" + j.ToString() + ": " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[0]));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[1]));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[2]));
+
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+               }
+
+
+               Array.Copy(B, 0, buffer, 0, blockSize / 2);
+               bufOff = blockSize / 2;
+
+               for (int i = 0; i < n - 1; i++)
+               {
+                    Array.Copy(bTemp[i], 0, buffer, bufOff, blockSize / 2);
+                    bufOff += blockSize / 2;
+               }
+
+               return buffer;
+          }
+
+          public byte[] Unwrap(byte[] input, int inOff, int length)
+          {
+               if (forWrapping)
+               {
+                    throw new InvalidOperationException("not set for unwrapping");
+               }
+
+               if ((input.Length - inOff) % blockSize != 0)
+               {
+                    throw new ArgumentException("Padding not supported");
+               }
+
+               int n = 2 * input.Length / blockSize;
+
+               int V = (n - 1) * 6;
+
+               buffer = new byte[input.Length - inOff];
+               Array.Copy(input, inOff, buffer, 0, input.Length - inOff);
+                              
+               byte[] B = new byte[blockSize / 2];
+               Array.Copy(buffer, 0, B, 0, blockSize / 2);
+               //Console.WriteLine("B18: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B));
+               
+               List<byte[]> bTemp = new List<byte[]>();
+
+               int bHalfBlocksLen = buffer.Length - blockSize / 2;
+               int bufOff = blockSize / 2;
+               while (bHalfBlocksLen != 0)
+               {
+                    byte[] temp = new byte[blockSize / 2];
+                    Array.Copy(buffer, bufOff, temp, 0, blockSize / 2);
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+                    //Console.WriteLine(buffer.Length);
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(temp));
+
+                    bTemp.Add(temp);
+
+                    bHalfBlocksLen -= blockSize / 2;
+                    bufOff += blockSize / 2;     
+               }
+
+
+               for (int j = 0; j < V; j++)
+               {
+                    Array.Copy(bTemp[n - 2], 0, buffer, 0, blockSize / 2);
+                    Array.Copy(B, 0, buffer, blockSize / 2, blockSize / 2);
+                    intTobytes(V - j, intArray, 0);
+                    for (int byteNum = 0; byteNum < BYTES_IN_INTEGER; byteNum++)
+                    {
+                         buffer[byteNum + blockSize / 2] ^= intArray[byteNum];
+                    }
+
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+
+                    engine.ProcessBlock(buffer, 0, buffer, 0);
+
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+                                        
+                    Array.Copy(buffer, 0, B, 0, blockSize / 2);
+
+                    for (int i = 2; i < n; i++)
+                    {
+                         Array.Copy(bTemp[n - i - 1], 0, bTemp[n - i], 0, blockSize / 2);
+                    }
+
+                    Array.Copy(buffer, blockSize / 2, bTemp[0], 0, blockSize / 2);
+
+                    //Console.WriteLine("B" + (V - j - 1).ToString() + ": " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[0]));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[1]));
+                    //Console.WriteLine("b: " + Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[2]));
+
+                    //Console.WriteLine(Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer));
+               }
+
+
+               Array.Copy(B, 0, buffer, 0, blockSize / 2);
+               bufOff = blockSize / 2;
+
+               for (int i = 0; i < n - 1; i++)
+               {
+                    Array.Copy(bTemp[i], 0, buffer, bufOff, blockSize / 2);
+                    bufOff += blockSize / 2;
+               }
+
+               
+               Array.Copy(buffer, buffer.Length - blockSize, checkSumArray, 0, blockSize);
+
+
+               if (!Arrays.AreEqual(checkSumArray, zeroArray))
+               {
+                    throw new InvalidCipherTextException("checksum failed");
+               }
+               else
+               {
+                    Array.Resize(ref buffer, buffer.Length - blockSize);
+               }
+
+               return buffer;
+          }
+
+          //int to array of bytes
+          private static void intTobytes(
+                    int num,
+                    byte[] outBytes,
+                    int outOff)
+          {
+               outBytes[outOff + 3] = (byte)(num >> 24);
+               outBytes[outOff + 2] = (byte)(num >> 16);
+               outBytes[outOff + 1] = (byte)(num >> 8);
+               outBytes[outOff] = (byte)num;
+          }
+     }
+}
diff --git a/crypto/test/src/crypto/test/DSTU7624Test.cs b/crypto/test/src/crypto/test/DSTU7624Test.cs
new file mode 100644
index 000000000..5c06fd5d1
--- /dev/null
+++ b/crypto/test/src/crypto/test/DSTU7624Test.cs
@@ -0,0 +1,481 @@
+using System;
+
+using NUnit.Framework;
+
+using Org.BouncyCastle.Crypto.Digests;
+using Org.BouncyCastle.Crypto.Engines;
+using Org.BouncyCastle.Crypto.Modes;
+using Org.BouncyCastle.Crypto.Parameters;
+using Org.BouncyCastle.Math;
+using Org.BouncyCastle.Security;
+using Org.BouncyCastle.Utilities.Encoders;
+using Org.BouncyCastle.Utilities.Test;
+using Org.BouncyCastle.Crypto.Macs;
+using Org.BouncyCastle.Utilities;
+
+namespace Org.BouncyCastle.Crypto.Tests
+{
+    [TestFixture]
+    public class Dstu7624Test : CipherTest
+    {
+        public Dstu7624Test()
+            : base(tests, new Dstu7624Engine(256, 256), new KeyParameter(new byte[32])) { }
+
+
+
+        internal static SimpleTest[] tests = new SimpleTest[]
+          {
+
+               //ECB mode
+               /*
+               new KBlockCipherVectorTest(0, new Dstu7624Engine(128, 128), new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F")), "101112131415161718191A1B1C1D1E1F", "81BF1C7D779BAC20E1C9EA39B4D2AD06"),
+               new KBlockCipherVectorTest(1, new Dstu7624Engine(128, 256), new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F", "58EC3E091000158A1148F7166F334F14"),
+               new KBlockCipherVectorTest(2, new Dstu7624Engine(256, 256), new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F", "F66E3D570EC92135AEDAE323DCBD2A8CA03963EC206A0D5A88385C24617FD92C"),
+               new KBlockCipherVectorTest(3, new Dstu7624Engine(256, 512), new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), "404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F", "606990E9E6B7B67A4BD6D893D72268B78E02C83C3CD7E102FD2E74A8FDFE5DD9"),
+               new KBlockCipherVectorTest(4, new Dstu7624Engine(512, 512), new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), "404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F", "4A26E31B811C356AA61DD6CA0596231A67BA8354AA47F3A13E1DEEC320EB56B895D0F417175BAB662FD6F134BB15C86CCB906A26856EFEB7C5BC6472940DD9D9"),
+            */
+               //CTR mode
+              // new BlockCipherVectorTest(5, new KCtrBlockCipher(new Dstu7624Engine(128, 128)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F")), Hex.Decode("101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748", "A90A6B9780ABDFDFF64D14F5439E88F266DC50EDD341528DD5E698E2F000CE21F872DAF9FE1811844A"),
+                  /*      
+               //CFB mode (THERE ARE DIFFERENCE IN LAST BLOCK PROCESSING, SO KBufferedBlockCipher WRAPPER IS USED)
+               new KBlockCipherVectorTest(6, new KCfbBlockCipher(new Dstu7624Engine(128, 128), 128), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F")), Hex.Decode("101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F", "A19E3E5E53BE8A07C9E0C01298FF83291F8EE6212110BE3FA5C72C88A082520B265570FE28680719D9B4465E169BC37A"),
+               new KBlockCipherVectorTest(7, new KCfbBlockCipher(new Dstu7624Engine(256, 256), 128), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), "404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F90", "E07821AF642F4B1DC071166F2D329763C2CF3B9E39CD0B52BDD33A0DC7B6B6BB201C4A1CD0F5DCB693ABEEA120DACA3A29C73D1D6E87FD75B7DE9E3BE4D256791C2E44583DE8E061E45834A24262BDEBBE"),
+               new KBlockCipherVectorTest(8, new KCfbBlockCipher(new Dstu7624Engine(128, 256), 64), new ParametersWithIV(new KeyParameter(Hex.Decode("1F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("2F2E2D2C2B2A29282726252423222120")), "26319A368D85DE43DD5FDB928D91A441493D8CE07B64797C8F9676C5921CD1EA743F5E2777C327AC58", "5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A494847464544434241403F3E3D3C3B3A393837"),
+               new KBlockCipherVectorTest(9, new KCfbBlockCipher(new Dstu7624Engine(256, 256), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("1F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A29282726252423222120")), "7758A939DD6BD00CAF9153E5A5D5A66129105CA1EA54A97C06FA4A40960A068F61C3E424DE950151AC46879D84A3BCC24EC8FB69008DAF016EF9832FFD3DB39D02185FDB782DC28EAC27B35179FCA40640", "9F9E9D9C9B9A999897969594939291908F8E8D8C8B8A898887868584838281807F7E7D7C7B7A797877767574737271706F6E6D6C6B6A696867666564636261605F5E5D5C5B5A595857565554535251504F"),
+               new KBlockCipherVectorTest(10, new KCfbBlockCipher(new Dstu7624Engine(256, 512), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F")), "606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8A9AAABACADAEAFB0", "0008F28A82D2D01D23BFB2F8BB4F06D8FE73BA4F48A2977585570ED3818323A6DBAD3D9DD580D9D8F787CE55FAB90735F6B2D6152D56C0C787E6F4B6A2F557DF707A671D06AED196DD7D7E2320D8E45C4C"),
+               new KBlockCipherVectorTest(11, new KCfbBlockCipher(new Dstu7624Engine(256, 512), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "98E122708FDABB1B1A5765C396DC79D7573221EC486ADDABD1770B147A6DD00BDD5E4F1496D4D573923F9809EEEEF46B063C64A5E875E77E65EC6832ECE3C24A4B8FD40B04088CBEE2CDECE4DC3CC5573A", "BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F8E8D8C8B8A898887868584838281807F7E7D7C7B7A797877767574737271706F"),
+               new KBlockCipherVectorTest(12, new KCfbBlockCipher(new Dstu7624Engine(512, 512), 512), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode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
+               new KBlockCipherVectorTest(13, new KCfbBlockCipher(new Dstu7624Engine(512, 512), 512), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("7F7E7D7C7B7A797877767574737271706F6E6D6C6B6A696867666564636261605F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "06C061A4A66DFC0910034B3CFBDC4206D8908241C56BF41C4103CFD6DF322210B87F57EAE9F9AD815E606a7D1E8E6BD7CB1EBFBDBCB085C2D06BF3CC1586CB2E88C9155E95B4872D86B49D80F5745B605EAF488AA520A717A92F4D68838E42C995", "EFEEEDECEBEAE9E8E7E6E5E4E3E2E1E0DFDEDDDCDBDAD9D8D7D6D5D4D3D2D1D0CFCECDCCCBCAC9C8C7C6C5C4C3C2C1C0BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F"),
+               */
+               //CBC mode (PADDING NOT SUPPORTED)
+               new BlockCipherVectorTest(14, new CbcBlockCipher(new Dstu7624Engine(128, 128)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F")), Hex.Decode("101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F", "A73625D7BE994E85469A9FAABCEDAAB6DBC5F65DD77BB35E06BD7D1D8EAFC8624D6CB31CE189C82B8979F2936DE9BF14"),
+               new BlockCipherVectorTest(15, new CbcBlockCipher(new Dstu7624Engine(128, 128)), new ParametersWithIV(new KeyParameter(Hex.Decode("0F0E0D0C0B0A09080706050403020100")), Hex.Decode("1F1E1D1C1B1A19181716151413121110")), "88F2F048BA696170E3818915E0DBC0AFA6F141FEBC2F817138DA4AAB2DBF9CE490A488C9C82AC83FB0A6C0EEB64CFD22", "4F4E4D4C4B4A494847464544434241403F3E3D3C3B3A393837363534333231302F2E2D2C2B2A29282726252423222120"),
+               new BlockCipherVectorTest(16, new CbcBlockCipher(new Dstu7624Engine(128, 256)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), Hex.Decode("202122232425262728292A2B2C2D2E2F")), "303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D8000", "13EA15843AD14C50BC03ECEF1F43E398E4217752D3EB046AC393DACC5CA1D6FA0EB9FCEB229362B4F1565527EE3D8433"),
+               new BlockCipherVectorTest(17, new CbcBlockCipher(new Dstu7624Engine(128, 256)), new ParametersWithIV(new KeyParameter(Hex.Decode("1F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("2F2E2D2C2B2A29282726252423222120")), "BC8F026FC603ECE05C24FDE87542730999B381870882AC0535D4368C4BABD81B884E96E853EE7E055262D9D204FBE212", "5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A494847464544434241403F3E3D3C3B3A39383736353433323130"),
+               new BlockCipherVectorTest(18, new CbcBlockCipher(new Dstu7624Engine(256, 256)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), "404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9F", "9CDFDAA75929E7C2A5CFC1BF16B42C5AE3886D0258E8C577DC01DAF62D185FB999B9867736B87110F5F1BC7481912C593F48FF79E2AFDFAB9F704A277EC3E557B1B0A9F223DAE6ED5AF591C4F2D6FB22E48334F5E9B96B1A2EA5200F30A406CE"),
+               new BlockCipherVectorTest(19, new CbcBlockCipher(new Dstu7624Engine(256, 512)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F")), "606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8A9AAABACADAEAFB0B1B2B3B4B5B6B7B8B9BABBBCBDBEBF", "B8A2474578C2FEBF3F94703587BD5FDC3F4A4D2F43575B6144A1E1031FB3D1452B7FD52F5E3411461DAC506869FF8D2FAEF4FEE60379AE00B33AA3EAF911645AF8091CD8A45D141D1FB150E5A01C1F26FF3DBD26AC4225EC7577B2CE57A5B0FF"),
+               new BlockCipherVectorTest(20, new CbcBlockCipher(new Dstu7624Engine(256, 512)), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "C69A59E10D00F087319B62288A57417C074EAD07C732A87055F0A5AD2BB288105705C45E091A9A6726E9672DC7D8C76FC45C782BCFEF7C39D94DEB84B17035BC8651255A0D34373451B6E1A2C827DB97566C9FF5506C5579F982A0EFC5BA7C28", "BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F8E8D8C8B8A898887868584838281807F7E7D7C7B7A797877767574737271706F6E6D6C6B6A69686766656463626160"),
+               new BlockCipherVectorTest(21, new CbcBlockCipher(new Dstu7624Engine(512, 512)), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode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
+               new BlockCipherVectorTest(22, new CbcBlockCipher(new Dstu7624Engine(512, 512)), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("7F7E7D7C7B7A797877767574737271706F6E6D6C6B6A696867666564636261605F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "5D5B3E3DE5BAA70E0A0684D458856CE759C6018D0B3F087FC1DAC101D380236DD934F2880B02D56A575BCA35A0CE4B0D9BA1F4A39C16CA7D80D59956630F09E54EC91E32B6830FE08323ED393F8028D150BF03CAD0629A5AFEEFF6E44257980618DB2F32B7B2B65B96E8451F1090829D2FFFC615CC1581E9221438DCEAD1FD12", "FFFEFDFCFBFAF9F8F7F6F5F4F3F2F1F0EFEEEDECEBEAE9E8E7E6E5E4E3E2E1E0DFDEDDDCDBDAD9D8D7D6D5D4D3D2D1D0CFCECDCCCBCAC9C8C7C6C5C4C3C2C1C0BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F8E8D8C8B8A89888786858483828180"),
+
+               //OFB mode
+               new BlockCipherVectorTest(23, new OfbBlockCipher(new Dstu7624Engine(128, 128), 128), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F")), Hex.Decode("101112131415161718191A1B1C1D1E1F")), "202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F", "A19E3E5E53BE8A07C9E0C01298FF832953205C661BD85A51F3A94113BC785CAB634B36E89A8FDD16A12E4467F5CC5A26"),
+               new BlockCipherVectorTest(24, new OfbBlockCipher(new Dstu7624Engine(128, 128), 128), new ParametersWithIV(new KeyParameter(Hex.Decode("0F0E0D0C0B0A09080706050403020100")), Hex.Decode("1F1E1D1C1B1A19181716151413121110")), "649A1EAAE160AF20F5B3EF2F58D66C1178B82E00D26F30689C8EC22E8E86E9CBB0BD4FFEE39EB13C2311276A906DD636", "4F4E4D4C4B4A494847464544434241403F3E3D3C3B3A393837363534333231302F2E2D2C2B2A29282726252423222120"),
+               new BlockCipherVectorTest(25, new OfbBlockCipher(new Dstu7624Engine(128, 256), 128), new ParametersWithIV(new KeyParameter(Hex.Decode("1F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("2F2E2D2C2B2A29282726252423222120")), "1A66CFBFEC00C6D52E39923E858DD64B214AB787798D3D5059A6B498AD66B34EAC48C4074BEC0D98C6", "5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A494847464544434241403F3E3D3C3B3A393837"),
+               new BlockCipherVectorTest(26, new OfbBlockCipher(new Dstu7624Engine(256, 256), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F")), Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), "404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F90", "B62F7F144A8C6772E693A96890F064C3F06831BF743F5B0DD061067F3D22877331AA6A99D939F05B7550E9402BD1615CC7B2D4A167E83EC0D8A894F92C72E176F3880B61C311D69CE1210C59184E818E19"),
+               new BlockCipherVectorTest(27, new OfbBlockCipher(new Dstu7624Engine(256, 256), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("1F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A29282726252423222120")), "7758A939DD6BD00CAF9153E5A5D5A66129105CA1EA54A97C06FA4A40960A068F55E34F9339A14436216948F92FA2FB5286D3AB1E81543FC0018A0C4E8C493475F4D35DCFB0A7A5377F6669B857CDC978E4", "9F9E9D9C9B9A999897969594939291908F8E8D8C8B8A898887868584838281807F7E7D7C7B7A797877767574737271706F6E6D6C6B6A696867666564636261605F5E5D5C5B5A595857565554535251504F"),
+               new BlockCipherVectorTest(28, new OfbBlockCipher(new Dstu7624Engine(256, 512), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F")), "606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8A9AAABACADAEAFB0", "0008F28A82D2D01D23BFB2F8BB4F06D8FE73BA4F48A2977585570ED3818323A668883C9DCFF610CC7E3EA5C025FBBC5CA6520F8F11CA35CEB9B07031E6DBFABE39001E9A3CC0A24BBC565939592B4DEDBD"),
+               new BlockCipherVectorTest(29, new OfbBlockCipher(new Dstu7624Engine(256, 512), 256), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("5F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "98E122708FDABB1B1A5765C396DC79D7573221EC486ADDABD1770B147A6DD00B5FBC4F1EC68C59775B7AAA4D43C4CCE4F396D982DF64D30B03EF6C3B997BA0ED940BBC590BD30D64B5AE207147D71086B5", "BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F8E8D8C8B8A898887868584838281807F7E7D7C7B7A797877767574737271706F"),
+               new BlockCipherVectorTest(30, new OfbBlockCipher(new Dstu7624Engine(512, 512), 512), new ParametersWithIV(new KeyParameter(Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F")), Hex.Decode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
+               new BlockCipherVectorTest(31, new OfbBlockCipher(new Dstu7624Engine(512, 512), 512), new ParametersWithIV(new KeyParameter(Hex.Decode("3F3E3D3C3B3A393837363534333231302F2E2D2C2B2A292827262524232221201F1E1D1C1B1A191817161514131211100F0E0D0C0B0A09080706050403020100")), Hex.Decode("7F7E7D7C7B7A797877767574737271706F6E6D6C6B6A696867666564636261605F5E5D5C5B5A595857565554535251504F4E4D4C4B4A49484746454443424140")), "06C061A4A66DFC0910034B3CFBDC4206D8908241C56BF41C4103CFD6DF322210B87F57EAE9F9AD815E606A7D1E8E6BD7CB1EBFBDBCB085C2D06BF3CC1586CB2EE1D81D38437F425131321647E42F5DE309D33F25B89DE37124683E4B44824FC56D", "EFEEEDECEBEAE9E8E7E6E5E4E3E2E1E0DFDEDDDCDBDAD9D8D7D6D5D4D3D2D1D0CFCECDCCCBCAC9C8C7C6C5C4C3C2C1C0BFBEBDBCBBBAB9B8B7B6B5B4B3B2B1B0AFAEADACABAAA9A8A7A6A5A4A3A2A1A09F9E9D9C9B9A999897969594939291908F"),
+               
+               
+
+               
+
+        };
+
+        public override ITestResult Perform()
+        {
+
+            ITestResult result = base.Perform();
+
+            result = MacTests(); //Mac tests
+
+            result = KeyWrapTests(); //Key wrapping tests
+
+            if (!result.IsSuccessful())
+            {
+                return result;
+            }
+            else
+            {
+                return new SimpleTestResult(true, Name + ": Okay");
+            }
+
+        }
+
+        private ITestResult MacTests()
+        {
+            /*
+            //MAC mode (PADDING NOT SUPPORTED)
+            //test 1
+            byte[] key = Hex.Decode("000102030405060708090A0B0C0D0E0F");
+
+            byte[] authtext = Hex.Decode("202122232425262728292A2B2C2D2E2F" +
+                                         "303132333435363738393A3B3C3D3E3F" +
+                                         "404142434445464748494A4B4C4D4E4F");
+
+            byte[] expectedMac = Hex.Decode("123B4EAB8E63ECF3E645A99C1115E241");
+
+            byte[] mac = new byte[128 / 8];
+
+            Dstu7624Mac dstu7624Mac = new Dstu7624Mac(128, 128, 128);
+            dstu7624Mac.Init(new KeyParameter(key));
+            dstu7624Mac.BlockUpdate(authtext, 0, authtext.Length);
+            dstu7624Mac.DoFinal(mac, 0);
+
+            if (!Arrays.AreEqual(mac, expectedMac))
+            {
+                return new SimpleTestResult(false, Name + ": Failed MAC test 1 - expected "
+                     + Hex.ToHexString(expectedMac)
+                     + " got " + Hex.ToHexString(mac));
+            }
+
+
+            //test 2
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F" +
+                             "101112131415161718191A1B1C1D1E1F" +
+                             "202122232425262728292A2B2C2D2E2F" +
+                             "303132333435363738393A3B3C3D3E3F");
+
+            authtext = Hex.Decode("404142434445464748494A4B4C4D4E4F" +
+                                  "505152535455565758595A5B5C5D5E5F" +
+                                  "606162636465666768696A6B6C6D6E6F" +
+                                  "707172737475767778797A7B7C7D7E7F" +
+                                  "808182838485868788898A8B8C8D8E8F" +
+                                  "909192939495969798999A9B9C9D9E9F" +
+                                  "A0A1A2A3A4A5A6A7A8A9AAABACADAEAF" +
+                                  "B0B1B2B3B4B5B6B7B8B9BABBBCBDBEBF");
+
+            expectedMac = Hex.Decode("7279FA6BC8EF7525B2B35260D00A1743");
+
+            dstu7624Mac = new Dstu7624Mac(512, 512, 128);
+            dstu7624Mac.Init(new KeyParameter(key));
+            dstu7624Mac.BlockUpdate(authtext, 0, authtext.Length);
+            dstu7624Mac.DoFinal(mac, 0);
+
+            if (!Arrays.AreEqual(mac, expectedMac))
+            {
+                return new SimpleTestResult(false, Name + ": Failed MAC test 2 - expected "
+                     + Hex.ToHexString(expectedMac)
+                     + " got " + Hex.ToHexString(mac));
+            }
+            */
+            return new SimpleTestResult(true, Name + ": Okay");
+        }
+        private ITestResult KeyWrapTests()
+        {
+            //KW mode (PADDING NOT SUPPORTED)
+            //test 1
+            byte[] key = Hex.Decode("000102030405060708090A0B0C0D0E0F");
+            byte[] textToWrap = Hex.Decode("101112131415161718191A1B1C1D1E1F");
+            byte[] expectedWrappedText = Hex.Decode("1DC91DC6E52575F6DBED25ADDA95A1B6AD3E15056E489738972C199FB9EE2913");
+
+            byte[] output = new byte[expectedWrappedText.Length];
+
+            Dstu7624WrapEngine wrapper = new Dstu7624WrapEngine(128, 128);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 1 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 1 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            //test 2
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F");
+            textToWrap = Hex.Decode("101112131415161718191A1B1C1D1E1F20219000000000000000800000000000");
+            expectedWrappedText = Hex.Decode("0EA983D6CE48484D51462C32CC61672210FCC44196ABE635BAF878FDB83E1A63114128585D49DB355C5819FD38039169");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 2 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 2 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            //test 3
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
+            textToWrap = Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F");
+            expectedWrappedText = Hex.Decode("2D09A7C18E6A5A0816331EC27CEA596903F77EC8D63F3BDB73299DE7FD9F4558E05992B0B24B39E02EA496368E0841CC1E3FA44556A3048C5A6E9E335717D17D");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(128, 256);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 3 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 3 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            //test 4
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
+            textToWrap = Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464E8040000000000020");
+            expectedWrappedText = Hex.Decode("37E3EECB91150C6FA04CFD19D6FC57B7168C9FA5C5ED18601C68EE4AFD7301F8C8C51D7A0A5CD34F6FAB0D8AF11845CC1E4B16E0489FDA1D76BA4EFCFD161F76");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(128, 256);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 4 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 4 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            //test 5
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
+            textToWrap = Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F");
+            expectedWrappedText = Hex.Decode("BE59D3C3C31B2685A8FA57CD000727F16AF303F0D87BC2D7ABD80DC2796BBC4CDBC4E0408943AF4DAF7DE9084DC81BFEF15FDCDD0DF399983DF69BF730D7AE2A199CA4F878E4723B7171DD4D1E8DF59C0F25FA0C20946BA64F9037D724BB1D50B6C2BD9788B2AF83EF6163087CD2D4488BC19F3A858D813E3A8947A529B6D65D");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(256, 256);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 5 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 5 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            //test 6
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
+            textToWrap = Hex.Decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F708802000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000");
+            expectedWrappedText = Hex.Decode("CC41D643B08592F509432E3C6F4B73156907A53B9FFB99B157DEC708F917AEA1E41D76475EDFB138A8B0220A152B673E9713DE7A2791E3573FE257C3FF3C0DAA9AD13477E52770F54CBF94D1603AED7CA876FB7913BC359D2B89562299FA92D32A9C17DBE4CC21CCE097089B9FBC245580D6DB59F8731D864B604E654397E5F5E7A79A6A777C75856039C8C86140D0CB359CA3923D902D08269F8D48E7F0F085");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(256, 256);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 6 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 6 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            //test 7
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F");
+            textToWrap = Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9F");
+            expectedWrappedText = Hex.Decode("599217EB2B5270ECEF0BB716D70E251234A2451CE04FCFBAEEA92022C581F19B7C9386BB7476B4AD721D40778F49062C3605F1E8FAC9F3F3AC04E46E89E1844DBF4F18FA9303B288741ABD71013CF208F31B4C76FBE342F89B1ABFD97E830457555651B74D3CCDBF94CC5E5EEC22821536A96F44C8BC4346B0271303E67FD313");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(256, 512);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 7 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 7 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            //test 8
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F");
+            textToWrap = Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F908802000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000");
+            expectedWrappedText = Hex.Decode("B92E58F53C38F7D23F1068FA98B921AC800AD0D1947BD620700D0B6088F87D03D6A516F54198154D0C71169C2BCF520F3DF3DF527FC23E800E9A65158D45BB253A3BD0493E4822DF0DB5A366BC2F47551C5D477DDDE724A0B869F562223CEDB9D4AA36C750FA864ADF938273FBC859F7D4930F6B70C6474304AB670BA32CB0C41023769338A29EA1555F526CDFEB75C72212CD2D29F4BA49C2A62ACBE4F3272B");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(256, 512);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 8 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 8 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            //test 9
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F");
+            textToWrap = Hex.Decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8A9AAABACADAEAFB0B1B2B3B4B5B6B7B8B9BABBBCBDBEBF");
+            expectedWrappedText = Hex.Decode("9618AE6065069D5054464040F17337D58BEB51AE92391D740BDF7ABB239709C46270832039FF045BCF7878E7DA9C3B4CF89326CA8B4D29DB8680EEAE1B5A18463284713A323A69AEBF33CFC4B11283C7C8041FFC97668EDF727823411C9559816C108C11EC401643765527860D8DA0ED7254792C21DB775DEB1D6971C924CC83EB626173D894694943B1828ABDE8F9495BCEBA9AC3A4A03592C085AA29CC9A0C65786E631A702D589B819C89E79EEFF29C4EC312C8860BB68F02272EA770FB8D");
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(512, 512);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 9 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 9 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+
+            //test 10
+            key = Hex.Decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F");
+            textToWrap = Hex.Decode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
+            expectedWrappedText = Hex.Decode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
+
+            output = new byte[expectedWrappedText.Length];
+
+            wrapper = new Dstu7624WrapEngine(512, 512);
+            wrapper.Init(true, new KeyParameter(key));
+            output = wrapper.Wrap(textToWrap, 0, textToWrap.Length);
+
+
+            if (!Arrays.AreEqual(output, expectedWrappedText))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (wrapping) test 10 - expected "
+                     + Hex.ToHexString(expectedWrappedText)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            wrapper.Init(false, new KeyParameter(key));
+            output = wrapper.Unwrap(expectedWrappedText, 0, expectedWrappedText.Length);
+
+            if (!Arrays.AreEqual(output, textToWrap))
+            {
+                return new SimpleTestResult(false, Name + ": Failed KW (unwrapping) test 10 - expected "
+                     + Hex.ToHexString(textToWrap)
+                     + " got " + Hex.ToHexString(output));
+            }
+
+            return new SimpleTestResult(true, Name + ": Okay");
+        }
+
+
+        [Test]
+        public void Dstu7624TestFunction()
+        {
+            string resultText = Perform().ToString();
+
+            Assert.AreEqual(Name + ": Okay", resultText);
+        }
+
+        public override string Name
+        {
+            get { return "Dstu7624"; }
+        }
+
+        public static void Main(
+           string[] args)
+        {
+            Dstu7624Test test = new Dstu7624Test();
+            ITestResult result = test.Perform();
+
+            Console.WriteLine(result.ToString());
+        }
+    }
+}