July 2014
S M T W T F S
« Jun    
 12345
6789101112
13141516171819
20212223242526
2728293031  

Recent Posts

DiceLock-x 8.0.0.1 for Linux – Comparing output DiceLockIVIndexed cipher architecture selecting OFB Output Feedback operation mode with TDEA block cipher and Random Test Suite with Frequency, Block Frequency, Cumulative Sum Forward, Longest Run Of Ones and Runs random number tests, using IncreaseBase0IndexModifier_6_0_0_1 by index key modifier or DecreaseBase0IndexModifier_6_0_0_1 by index key modifier and DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream (5 of 5)

Last DiceLockIVIndexedOMCheck (Linux C++ program) recipher output verification.
This is the last post where we verify DiceLockIndexed class configuration shown in this serie first post regardless of using IncreaseBase0IndexModifier_6_0_0_1 by index key modifier or DecreaseBase0IndexModifier_6_0_0_1 by index key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

Post where you can find DiceLockIVIndexedOMCheck C++ Source Code program, program that has been executed where you can see how DiceLockIVIndexed class can work with all different options.


List of Linux C++ source code file links upon which DiceLockIVIndexed class with these selections relies on:

DiceLock-x 8.0.0.1 for Linux

DiceLockCipher.h
cryptoRandomStreams.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
physicalCryptoRandomStream.h
physicalCryptoRandomStream.cpp
diceLocks.h
DiceLock.h
DiceLock.cpp
DiceLockIV.h
DiceLockIV.cpp
DiceLockIVIndexed.h
DiceLockIVIndexed.cpp
symmetricCiphers.h
baseSymmetricCipher.h
baseSymmetricCipher.cpp
symmetricStreamers.h
symmetricStreamerSpecialTypes.h
baseSymmetricStreamer.h
baseSymmetricStreamer.cpp
blockCipherOperationModes.h
baseBlockCipherOperationMode_with_IV.h
baseBlockCipherOperationMode_with_IV.cpp
OFB_Mode.h
OFB_Mode.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
DEA.h
DEA.cpp
TDEA.h
TDEA.cpp
baseIndexModifier.h
baseIndexModifier.cpp
arithmeticFunctions.h
arithmeticFunctions.cpp
increaseBase0IndexModifier_6_0_0_1.h
increaseBase0IndexModifier_6_0_0_1.cpp
decreaseBase0IndexModifier_6_0_0_1.h
decreaseBase0IndexModifier_6_0_0_1.cpp
randomTests.h
randomTestErrors.h
baseRandomTest.h
baseRandomTest.cpp
mathematicalErrors.h
mathematicalFunctions.h
mathematicalFunctions.cpp
frequencyTest.h
frequencyTest.cpp
blockFrequencyTest.h
blockFrequencyTest.cpp
cumulativeSumForwardTest.h
cumulativeSumForwardTest.cpp
longestRunOfOnesTest.h
longestRunOfOnesTest.cpp
runsTest.h
runsTest.cpp
randomTestSuite.h
randomTestSuite.cpp

LOG DETAILS

Detailled output of DiceLockIVIndexed making use of IncreaseBase0IndexModifier_6_0_0_1 by index key modifier or DecreaseBase0IndexModifier_6_0_0_1 by index key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

In this post we show reciphers from 1201 to 1210 of 1210 total reciphers.

IncreaseBase0IndexModifier_6_0_0_1 by index key modifier
DecreaseBase0IndexModifier_6_0_0_1 by index key modifier
DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE Compare Inputs
0×34 – 0×95 – 0×56 – 497312 – 2 0×34 – 0×95 – 0×56 – 497312 – 2 -OK- 0×34 – 0×95 – 0×56 – 497312 – 2 0×34 – 0×95 – 0×56 – 497312 – 2 -OK- -OK-
0xff – 0x0e – 0x2d – 497336 – 2 0xff – 0x0e – 0x2d – 497336 – 2 -OK- 0xff – 0x0e – 0x2d – 497336 – 3 0xff – 0x0e – 0x2d – 497336 – 3 -OK- -OK-
0×01 – 0×81 – 0×70 – 497608 – 1 0×01 – 0×81 – 0×70 – 497608 – 1 -OK- 0×01 – 0×81 – 0×70 – 497608 – 3 0×01 – 0×81 – 0×70 – 497608 – 3 -OK- -OK-
0xff – 0xbc – 0xfb – 498112 – 2 0xff – 0xbc – 0xfb – 498112 – 2 -OK- 0xff – 0xbc – 0xfb – 498112 – 3 0xff – 0xbc – 0xfb – 498112 – 3 -OK- -OK-
0xff – 0xcc – 0×69 – 498208 – 2 0xff – 0xcc – 0×69 – 498208 – 2 -OK- 0xff – 0xcc – 0×69 – 498208 – 3 0xff – 0xcc – 0×69 – 498208 – 3 -OK- -OK-
0×01 – 0×14 – 0xc7 – 498264 – 1 0×01 – 0×14 – 0xc7 – 498264 – 1 -OK- 0×01 – 0×14 – 0xc7 – 498264 – 3 0×01 – 0×14 – 0xc7 – 498264 – 3 -OK- -OK-
0xfe – 0x4a – 0x2d – 498488 – 2 0xfe – 0x4a – 0x2d – 498488 – 2 -OK- 0xfe – 0x4a – 0x2d – 498488 – 2 0xfe – 0x4a – 0x2d – 498488 – 2 -OK- -OK-
0xfe – 0×15 – 0×29 – 498696 – 2 0xfe – 0×15 – 0×29 – 498696 – 2 -OK- 0xfe – 0×15 – 0×29 – 498696 – 2 0xfe – 0×15 – 0×29 – 498696 – 2 -OK- -OK-
0×00 – 0×05 – 0xce – 499304 – 2 0×00 – 0×05 – 0xce – 499304 – 2 -OK- 0×00 – 0×05 – 0xce – 499304 – 3 0×00 – 0×05 – 0xce – 499304 – 3 -OK- -OK-
0xff – 0xf3 – 0xbd – 499968 – 2 0xff – 0xf3 – 0xbd – 499968 – 2 -OK- 0xff – 0xf3 – 0xbd – 499968 – 3 0xff – 0xf3 – 0xbd – 499968 – 3 -OK- -OK-

Execution test list of posts:
[1], [2], [3], [4], [5]

EXECUTION SUMMARY LOG FILES

- Making use of IncreaseBase0IndexModifier_6_0_0_1 by index key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVIndexed-OFB-Mode-TDEA-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Base0-Index-Default-memory.log

- Making use of IncreaseBase0IndexModifier_6_0_0_1 by index key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVIndexed-OFB-Mode-TDEA-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Base0-Index-Physical-memory.log

- Making use of DecreaseBase0IndexModifier_6_0_0_1 by index key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVIndexed-OFB-Mode-TDEA-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Base0-Index-Default-memory.log

- Making use of DecreaseBase0IndexModifier_6_0_0_1 by index key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockIVIndexed-OFB-Mode-TDEA-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Base0-Index-Physical-memory.log

From logs file we can see that all randomized-encrypted text sequences have been correctly deciphered.

Leave a Reply