November 2014
S M T W T F S
« Oct    
 1
2345678
9101112131415
16171819202122
23242526272829
30  

Recent Posts

DiceLock 8.0.0.1 for Windows – Comparing output DiceLockXTSDigested storage sector base cipher architecture selecting AES 128 block cipher, Sha 224 hash digest algorithm and Random Test Suite with Frequency, Block Frequency, Cumulative Sum Forward, Longest Run Of Ones and Runs random number tests, using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream (18 of 18)

Last DiceLockXTSDigestedSectorBasedCheck (C++ program) recipher output verification.
This is the last post where we verify DiceLockXTSDigested class configuration shown in this serie first post regardless of using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

Post where you can find DiceLockXTSDigestedSectorBasedCheck C++ Source Code program, program that has been executed where you can see how DiceLockXTSDigested class can work with all different options.


List of C++ source code file links upon which DiceLockXTSDigested class with these selections relies on:

DiceLock 8.0.0.1 for Windows

DiceLockCipher.h
cryptoRandomStreams.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
physicalCryptoRandomStream.h
physicalCryptoRandomStream.cpp
diceLockXTSs.h
DiceLockXTS.h
DiceLockXTS.cpp
DiceLockXTSDigested.h
DiceLockXTSDigested.cpp
symmetricCiphers.h
baseSymmetricCipher.h
baseSymmetricCipher.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
baseAES.h
baseAES.cpp
AES128.h
AES128.cpp
hashes.h
baseHash.h
baseHash.cpp
baseSha32.h
baseSha32.cpp
sha256.h
sha256.cpp
sha224.h
sha224.cpp
baseKeyModifier.h
baseKeyModifier.cpp
increaseKeyModifier_6_0_0_1.h
increaseKeyModifier_6_0_0_1.cpp
decreaseKeyModifier_6_0_0_1.h
decreaseKeyModifier_6_0_0_1.cpp
randomTests.h
randomTestErrors.h
baseRandomTest.h
baseRandomTest.cpp
mathematicalErrors.h
mathematicalFunctions.h
mathematicalFunctions.cpp
frequencyTest.h
frequencyTest.cpp
blockFrequencyTest.h
blockFrequencyTest.cpp
cumulativeSumForwardTest.h
cumulativeSumForwardTest.cpp
longestRunOfOnesTest.h
longestRunOfOnesTest.cpp
runsTest.h
runsTest.cpp
randomTestSuite.h
randomTestSuite.cpp

LOG DETAILS

Detailled output of DiceLockXTSDigested (on storage sector length basis) making use of IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

In this post we show reciphers from 4251 to 4275 of 4275 total reciphers.

IncreaseKeyModifier_6_0_0_1 key modifier
DecreaseKeyModifier_6_0_0_1 key modifier
DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE Compare Inputs
0×13 – 0×28 – 498288 – 2560 – 15287 – 220 – 1 0×13 – 0×28 – 498288 – 2560 – 15287 – 220 – 1 -OK- 0×13 – 0×28 – 498288 – 2560 – 15287 – 220 – 1 0×13 – 0×28 – 498288 – 2560 – 15287 – 220 – 1 -OK- -OK-
0×93 – 0xf3 – 498384 – 3072 – 5557 – 191 – 1 0×93 – 0xf3 – 498384 – 3072 – 5557 – 191 – 1 -OK- 0×93 – 0xf3 – 498384 – 3072 – 5557 – 191 – 1 0×93 – 0xf3 – 498384 – 3072 – 5557 – 191 – 1 -OK- -OK-
0×87 – 0×11 – 498432 – 32768 – 11466 – 135 – 1 0×87 – 0×11 – 498432 – 32768 – 11466 – 135 – 1 -OK- 0×87 – 0×11 – 498432 – 32768 – 11466 – 135 – 1 0×87 – 0×11 – 498432 – 32768 – 11466 – 135 – 1 -OK- -OK-
0xf6 – 0x1c – 498488 – 2048 – 8392 – 5 – 1 0xf6 – 0x1c – 498488 – 2048 – 8392 – 5 – 1 -OK- 0xf6 – 0x1c – 498488 – 2048 – 8392 – 5 – 1 0xf6 – 0x1c – 498488 – 2048 – 8392 – 5 – 1 -OK- -OK-
0x0b – 0×61 – 498536 – 512 – 24379 – 79 – 1 0x0b – 0×61 – 498536 – 512 – 24379 – 79 – 1 -OK- 0x0b – 0×61 – 498536 – 512 – 24379 – 79 – 1 0x0b – 0×61 – 498536 – 512 – 24379 – 79 – 1 -OK- -OK-
0x8b – 0xb0 – 498688 – 1536 – 82 – 228 – 1 0x8b – 0xb0 – 498688 – 1536 – 82 – 228 – 1 -OK- 0x8b – 0xb0 – 498688 – 1536 – 82 – 228 – 1 0x8b – 0xb0 – 498688 – 1536 – 82 – 228 – 1 -OK- -OK-
0x9c – 0×49 – 498696 – 3584 – 28808 – 78 – 1 0x9c – 0×49 – 498696 – 3584 – 28808 – 78 – 1 -OK- 0x9c – 0×49 – 498696 – 3584 – 28808 – 78 – 1 0x9c – 0×49 – 498696 – 3584 – 28808 – 78 – 1 -OK- -OK-
0x7a – 0x0f – 498728 – 1024 – 25628 – 170 – 1 0x7a – 0x0f – 498728 – 1024 – 25628 – 170 – 1 -OK- 0x7a – 0x0f – 498728 – 1024 – 25628 – 170 – 1 0x7a – 0x0f – 498728 – 1024 – 25628 – 170 – 1 -OK- -OK-
0x5e – 0xd3 – 498752 – 512 – 17378 – 212 – 1 0x5e – 0xd3 – 498752 – 512 – 17378 – 212 – 1 -OK- 0x5e – 0xd3 – 498752 – 512 – 17378 – 212 – 1 0x5e – 0xd3 – 498752 – 512 – 17378 – 212 – 1 -OK- -OK-
0x4d – 0×98 – 498768 – 2560 – 5821 – 190 – 1 0x4d – 0×98 – 498768 – 2560 – 5821 – 190 – 1 -OK- 0x4d – 0×98 – 498768 – 2560 – 5821 – 190 – 1 0x4d – 0×98 – 498768 – 2560 – 5821 – 190 – 1 -OK- -OK-
0×39 – 0×01 – 498784 – 1024 – 27090 – 39 – 1 0×39 – 0×01 – 498784 – 1024 – 27090 – 39 – 1 -OK- 0×39 – 0×01 – 498784 – 1024 – 27090 – 39 – 1 0×39 – 0×01 – 498784 – 1024 – 27090 – 39 – 1 -OK- -OK-
0x5d – 0×43 – 498832 – 512 – 25470 – 175 – 2 0x5d – 0×43 – 498832 – 512 – 25470 – 175 – 2 -OK- 0x5d – 0×43 – 498832 – 512 – 25470 – 175 – 2 0x5d – 0×43 – 498832 – 512 – 25470 – 175 – 2 -OK- -OK-
0x7d – 0xc4 – 498872 – 3584 – 25270 – 180 – 1 0x7d – 0xc4 – 498872 – 3584 – 25270 – 180 – 1 -OK- 0x7d – 0xc4 – 498872 – 3584 – 25270 – 180 – 1 0x7d – 0xc4 – 498872 – 3584 – 25270 – 180 – 1 -OK- -OK-
0×49 – 0×42 – 499024 – 1024 – 21060 – 117 – 1 0×49 – 0×42 – 499024 – 1024 – 21060 – 117 – 1 -OK- 0×49 – 0×42 – 499024 – 1024 – 21060 – 117 – 1 0×49 – 0×42 – 499024 – 1024 – 21060 – 117 – 1 -OK- -OK-
0x9e – 0×74 – 499040 – 512 – 31996 – 215 – 3 0x9e – 0×74 – 499040 – 512 – 31996 – 215 – 3 -OK- 0x9e – 0×74 – 499040 – 512 – 31996 – 215 – 3 0x9e – 0×74 – 499040 – 512 – 31996 – 215 – 3 -OK- -OK-
0x3f – 0×05 – 499048 – 1536 – 3189 – 26 – 1 0x3f – 0×05 – 499048 – 1536 – 3189 – 26 – 1 -OK- 0x3f – 0×05 – 499048 – 1536 – 3189 – 26 – 1 0x3f – 0×05 – 499048 – 1536 – 3189 – 26 – 1 -OK- -OK-
0×26 – 0xcc – 499136 – 1024 – 7773 – 165 – 1 0×26 – 0xcc – 499136 – 1024 – 7773 – 165 – 1 -OK- 0×26 – 0xcc – 499136 – 1024 – 7773 – 165 – 1 0×26 – 0xcc – 499136 – 1024 – 7773 – 165 – 1 -OK- -OK-
0x2c – 0×69 – 499160 – 4096 – 2227 – 166 – 1 0x2c – 0×69 – 499160 – 4096 – 2227 – 166 – 1 -OK- 0x2c – 0×69 – 499160 – 4096 – 2227 – 166 – 1 0x2c – 0×69 – 499160 – 4096 – 2227 – 166 – 1 -OK- -OK-
0xa8 – 0x3f – 499216 – 2560 – 23096 – 97 – 2 0xa8 – 0x3f – 499216 – 2560 – 23096 – 97 – 2 -OK- 0xa8 – 0x3f – 499216 – 2560 – 23096 – 97 – 2 0xa8 – 0x3f – 499216 – 2560 – 23096 – 97 – 2 -OK- -OK-
0×26 – 0×89 – 499312 – 512 – 1969 – 54 – 1 0×26 – 0×89 – 499312 – 512 – 1969 – 54 – 1 -OK- 0×26 – 0×89 – 499312 – 512 – 1969 – 54 – 1 0×26 – 0×89 – 499312 – 512 – 1969 – 54 – 1 -OK- -OK-
0xd3 – 0xfe – 499448 – 512 – 14309 – 74 – 1 0xd3 – 0xfe – 499448 – 512 – 14309 – 74 – 1 -OK- 0xd3 – 0xfe – 499448 – 512 – 14309 – 74 – 1 0xd3 – 0xfe – 499448 – 512 – 14309 – 74 – 1 -OK- -OK-
0xdb – 0xf6 – 499472 – 1024 – 26341 – 213 – 1 0xdb – 0xf6 – 499472 – 1024 – 26341 – 213 – 1 -OK- 0xdb – 0xf6 – 499472 – 1024 – 26341 – 213 – 1 0xdb – 0xf6 – 499472 – 1024 – 26341 – 213 – 1 -OK- -OK-
0×42 – 0×77 – 499688 – 2048 – 32601 – 239 – 1 0×42 – 0×77 – 499688 – 2048 – 32601 – 239 – 1 -OK- 0×42 – 0×77 – 499688 – 2048 – 32601 – 239 – 1 0×42 – 0×77 – 499688 – 2048 – 32601 – 239 – 1 -OK- -OK-
0×32 – 0xc0 – 499776 – 2560 – 31641 – 72 – 1 0×32 – 0xc0 – 499776 – 2560 – 31641 – 72 – 1 -OK- 0×32 – 0xc0 – 499776 – 2560 – 31641 – 72 – 1 0×32 – 0xc0 – 499776 – 2560 – 31641 – 72 – 1 -OK- -OK-
0xff – 0xaa – 499976 – 4096 – 27426 – 86 – 1 0xff – 0xaa – 499976 – 4096 – 27426 – 86 – 1 -OK- 0xff – 0xaa – 499976 – 4096 – 27426 – 86 – 1 0xff – 0xaa – 499976 – 4096 – 27426 – 86 – 1 -OK- -OK-

Execution test list of posts:
[1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18]

EXECUTION SUMMARY LOG FILES

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-8-0-0-1-DiceLockXTSDigested-Sector-AES-128-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Default-memory.log

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-8-0-0-1-DiceLockXTSDigested-Sector-AES-128-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Physical-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-8-0-0-1-DiceLockXTSDigested-Sector-AES-128-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Default-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-8-0-0-1-DiceLockXTSDigested-Sector-AES-128-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Physical-memory.log

From logs file we can see that all randomized-encrypted text sequences have been correctly deciphered.

Leave a Reply