DiceLock encryption architecture improves symmetric ciphers like block cipher as Advanced Encryption Standard (AES 128, AES 192 and AES 256) with different block cipher operation modes and stream ciphers as HC 128 and HC 256 and others.
DiceLock (both configurations) makes use of the following random number tests: Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test and Discrete Fourier Transform Test.
Additionally DiceLock Digested configuration makes use currently of following hash digest algorithms: Sha 1, Sha 224, Sha 256, Sha 384, Sha 512, Ripemd 128, Ripemd 160, Ripemd 256 and Ripemd 320.
As the new version JDiceLock 22.214.171.124 for Java (Windows 7 platform) is developed, all individual components must be tested and verified, and in this article we verify DecreaseBase0IndexModifier 126.96.36.199 class (computing DecreaseBase0IndexModifier 188.8.131.52 symmetric key modifier algorithm).
Symmetric key modification is a crucial point of DiceLock architecture, cause determines which new key will be used in next re-encryption (if current encryption does not provide randomized ciphertext) of same plaintext in order to get a verified randomized-encrypted text sequence.
At the bottom of the post you can find Java source code being used to perform this test.
Click here if you want to read more on … JDiceLock 184.108.40.206 for Java (Windows 7, 6.1 platform), DecreaseBase0IndexModifier_6_0_0_1 class (DecreaseBase0IndexModifier 220.127.116.11 key modifier) verified with Two byte key modification with propagation test set and DefaultCryptoRandomStream class (default virtual memory management)