April 2014
S M T W T F S
« Oct    
 12345
6789101112
13141516171819
20212223242526
27282930  

Recent Posts

DiceLock-x 8.0.0.1 for Linux – Comparing output DiceLockIVDigested cipher architecture selecting OFB Output Feedback operation mode with TDEA block cipher, Sha 512 hash digest algorithm and Random Test Suite with Frequency, Block Frequency, Cumulative Sum Forward, Longest Run Of Ones and Runs random number tests, using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream (5 of 5)

Last DiceLockIVDigestedOMCheck (Linux C++ program) recipher output verification.
This is the last post where we verify DiceLockIVDigested class configuration shown in this serie first post regardless of using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

Post where you can find DiceLockIVDigestedOMCheck C++ Source Code program, program that has been executed where you can see how DiceLockIVDigested class can work with all different options.


List of Linux C++ source code file links upon which DiceLockIVDigested class with these selections relies on:

DiceLock-x 8.0.0.1 for Linux

DiceLockCipher.h
cryptoRandomStreams.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
physicalCryptoRandomStream.h
physicalCryptoRandomStream.cpp
diceLocks.h
DiceLock.h
DiceLock.cpp
DiceLockIV.h
DiceLockIV.cpp
DiceLockIVDigested.h
DiceLockIVDigested.cpp
symmetricCiphers.h
baseSymmetricCipher.h
baseSymmetricCipher.cpp
symmetricStreamers.h
symmetricStreamerSpecialTypes.h
baseSymmetricStreamer.h
baseSymmetricStreamer.cpp
blockCipherOperationModes.h
baseBlockCipherOperationMode_with_IV.h
baseBlockCipherOperationMode_with_IV.cpp
OFB_Mode.h
OFB_Mode.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
DEA.h
DEA.cpp
TDEA.h
TDEA.cpp
hashes.h
baseHash.h
baseHash.cpp
sha512.h
sha512.cpp
baseKeyModifier.h
baseKeyModifier.cpp
increaseKeyModifier_6_0_0_1.h
increaseKeyModifier_6_0_0_1.cpp
decreaseKeyModifier_6_0_0_1.h
decreaseKeyModifier_6_0_0_1.cpp
randomTests.h
randomTestErrors.h
baseRandomTest.h
baseRandomTest.cpp
mathematicalErrors.h
mathematicalFunctions.h
mathematicalFunctions.cpp
frequencyTest.h
frequencyTest.cpp
blockFrequencyTest.h
blockFrequencyTest.cpp
cumulativeSumForwardTest.h
cumulativeSumForwardTest.cpp
longestRunOfOnesTest.h
longestRunOfOnesTest.cpp
runsTest.h
runsTest.cpp
randomTestSuite.h
randomTestSuite.cpp

LOG DETAILS

Detailled output of DiceLockIVDigested making use of IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

In this post we show reciphers from 1201 to 1213 of 1213 total reciphers.

IncreaseKeyModifier_6_0_0_1 key modifier
DecreaseKeyModifier_6_0_0_1 key modifier
DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE Compare Inputs
0xfe – 0×95 – 0×00 – 496104 – 2 0xfe – 0×95 – 0×00 – 496104 – 2 -OK- 0xfe – 0×95 – 0×00 – 496104 – 1 0xfe – 0×95 – 0×00 – 496104 – 1 -OK- -OK-
0xdb – 0×92 – 0×09 – 497120 – 1 0xdb – 0×92 – 0×09 – 497120 – 1 -OK- 0xdb – 0×92 – 0×09 – 497120 – 2 0xdb – 0×92 – 0×09 – 497120 – 2 -OK- -OK-
0xfe – 0xb8 – 0xdb – 497136 – 2 0xfe – 0xb8 – 0xdb – 497136 – 2 -OK- 0xfe – 0xb8 – 0xdb – 497136 – 1 0xfe – 0xb8 – 0xdb – 497136 – 1 -OK- -OK-
0×34 – 0×95 – 0×56 – 497312 – 2 0×34 – 0×95 – 0×56 – 497312 – 2 -OK- 0×34 – 0×95 – 0×56 – 497312 – 1 0×34 – 0×95 – 0×56 – 497312 – 1 -OK- -OK-
0xff – 0x0e – 0x2d – 497336 – 3 0xff – 0x0e – 0x2d – 497336 – 3 -OK- 0xff – 0x0e – 0x2d – 497336 – 2 0xff – 0x0e – 0x2d – 497336 – 2 -OK- -OK-
0×01 – 0×81 – 0×70 – 497608 – 1 0×01 – 0×81 – 0×70 – 497608 – 1 -OK- 0×01 – 0×81 – 0×70 – 497608 – 2 0×01 – 0×81 – 0×70 – 497608 – 2 -OK- -OK-
0xff – 0xbc – 0xfb – 498112 – 3 0xff – 0xbc – 0xfb – 498112 – 3 -OK- 0xff – 0xbc – 0xfb – 498112 – 2 0xff – 0xbc – 0xfb – 498112 – 2 -OK- -OK-
0xff – 0xcc – 0×69 – 498208 – 3 0xff – 0xcc – 0×69 – 498208 – 3 -OK- 0xff – 0xcc – 0×69 – 498208 – 2 0xff – 0xcc – 0×69 – 498208 – 2 -OK- -OK-
0×01 – 0×14 – 0xc7 – 498264 – 1 0×01 – 0×14 – 0xc7 – 498264 – 1 -OK- 0×01 – 0×14 – 0xc7 – 498264 – 2 0×01 – 0×14 – 0xc7 – 498264 – 2 -OK- -OK-
0xfe – 0x4a – 0x2d – 498488 – 2 0xfe – 0x4a – 0x2d – 498488 – 2 -OK- 0xfe – 0x4a – 0x2d – 498488 – 1 0xfe – 0x4a – 0x2d – 498488 – 1 -OK- -OK-
0xfe – 0×15 – 0×29 – 498696 – 2 0xfe – 0×15 – 0×29 – 498696 – 2 -OK- 0xfe – 0×15 – 0×29 – 498696 – 1 0xfe – 0×15 – 0×29 – 498696 – 1 -OK- -OK-
0×00 – 0×05 – 0xce – 499304 – 2 0×00 – 0×05 – 0xce – 499304 – 2 -OK- 0×00 – 0×05 – 0xce – 499304 – 3 0×00 – 0×05 – 0xce – 499304 – 3 -OK- -OK-
0xff – 0xf3 – 0xbd – 499968 – 3 0xff – 0xf3 – 0xbd – 499968 – 3 -OK- 0xff – 0xf3 – 0xbd – 499968 – 2 0xff – 0xf3 – 0xbd – 499968 – 2 -OK- -OK-

Execution test list of posts:
[1], [2], [3], [4], [5]

EXECUTION SUMMARY LOG FILES

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVDigested-OFB-Mode-TDEA-Sha-512-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Default-memory.log

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVDigested-OFB-Mode-TDEA-Sha-512-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Physical-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVDigested-OFB-Mode-TDEA-Sha-512-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Default-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVDigested-OFB-Mode-TDEA-Sha-512-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Physical-memory.log

From logs file we can see that all randomized-encrypted text sequences have been correctly deciphered.

Leave a Reply