October 2014
S M T W T F S
« Sep    
 1234
567891011
12131415161718
19202122232425
262728293031  

Recent Posts

DiceLock-x 8.0.0.1 for Linux – Comparing output DiceLockXTSDigested storage sector base cipher architecture selecting Serpent 192 block cipher, Sha 224 hash digest algorithm and Random Test Suite with Frequency, Block Frequency, Cumulative Sum Forward, Longest Run Of Ones and Runs random number tests, using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream (22 of 22)

Last DiceLockXTSDigestedSectorBasedCheck (Linux C++ program) recipher output verification.
This is the last post where we verify DiceLockXTSDigested class configuration shown in this serie first post regardless of using IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

Post where you can find DiceLockXTSDigestedSectorBasedCheck C++ Source Code program, program that has been executed where you can see how DiceLockXTSDigested class can work with all different options.


List of Linux C++ source code file links upon which DiceLockXTSDigested class with these selections relies on:

DiceLock-x 8.0.0.1 for Linux

DiceLockCipher.h
cryptoRandomStreams.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
physicalCryptoRandomStream.h
physicalCryptoRandomStream.cpp
diceLockXTSs.h
DiceLockXTS.h
DiceLockXTS.cpp
DiceLockXTSDigested.h
DiceLockXTSDigested.cpp
symmetricCiphers.h
baseSymmetricCipher.h
baseSymmetricCipher.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
baseSerpent.h
baseSerpent.cpp
serpent192.h
serpent192.cpp
hashes.h
baseHash.h
baseHash.cpp
baseSha32.h
baseSha32.cpp
sha256.h
sha256.cpp
sha224.h
sha224.cpp
baseKeyModifier.h
baseKeyModifier.cpp
increaseKeyModifier_6_0_0_1.h
increaseKeyModifier_6_0_0_1.cpp
decreaseKeyModifier_6_0_0_1.h
decreaseKeyModifier_6_0_0_1.cpp
randomTests.h
randomTestErrors.h
baseRandomTest.h
baseRandomTest.cpp
mathematicalErrors.h
mathematicalFunctions.h
mathematicalFunctions.cpp
frequencyTest.h
frequencyTest.cpp
blockFrequencyTest.h
blockFrequencyTest.cpp
cumulativeSumForwardTest.h
cumulativeSumForwardTest.cpp
longestRunOfOnesTest.h
longestRunOfOnesTest.cpp
runsTest.h
runsTest.cpp
randomTestSuite.h
randomTestSuite.cpp

LOG DETAILS

Detailled output of DiceLockXTSDigested (on storage sector length basis) making use of IncreaseKeyModifier_6_0_0_1 key modifier or DecreaseKeyModifier_6_0_0_1 key modifier with DefaultCryptoRandomStream bit data stream or PhysicalCryptoRandomStream bit data stream.

In this post we show reciphers from 5251 to 5280 of 5280 total reciphers.

IncreaseKeyModifier_6_0_0_1 key modifier
DecreaseKeyModifier_6_0_0_1 key modifier
DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE DefaultCryptoRandomStream bit data stream PhysicalCryptoRandomStream bit data stream COMPARE Compare Inputs
0xf8 – 0x0f – 498512 – 1024 – 77410668 – 7 – 2 0xf8 – 0x0f – 498512 – 1024 – 77410668 – 7 – 2 -OK- 0xf8 – 0x0f – 498512 – 1024 – 77410668 – 7 – 2 0xf8 – 0x0f – 498512 – 1024 – 77410668 – 7 – 2 -OK- -OK-
0×99 – 0×02 – 498576 – 1024 – 1863672558 – 44 – 3 0×99 – 0×02 – 498576 – 1024 – 1863672558 – 44 – 3 -OK- 0×99 – 0×02 – 498576 – 1024 – 1863672558 – 44 – 3 0×99 – 0×02 – 498576 – 1024 – 1863672558 – 44 – 3 -OK- -OK-
0xd7 – 0×35 – 498624 – 2048 – 2079583644 – 116 – 1 0xd7 – 0×35 – 498624 – 2048 – 2079583644 – 116 – 1 -OK- 0xd7 – 0×35 – 498624 – 2048 – 2079583644 – 116 – 1 0xd7 – 0×35 – 498624 – 2048 – 2079583644 – 116 – 1 -OK- -OK-
0×26 – 0x2b – 498664 – 1024 – 1801602120 – 163 – 2 0×26 – 0x2b – 498664 – 1024 – 1801602120 – 163 – 2 -OK- 0×26 – 0x2b – 498664 – 1024 – 1801602120 – 163 – 2 0×26 – 0x2b – 498664 – 1024 – 1801602120 – 163 – 2 -OK- -OK-
0x9e – 0xa9 – 498672 – 1024 – 1069719761 – 200 – 1 0x9e – 0xa9 – 498672 – 1024 – 1069719761 – 200 – 1 -OK- 0x9e – 0xa9 – 498672 – 1024 – 1069719761 – 200 – 1 0x9e – 0xa9 – 498672 – 1024 – 1069719761 – 200 – 1 -OK- -OK-
0xff – 0×64 – 498728 – 1024 – 1399724851 – 149 – 1 0xff – 0×64 – 498728 – 1024 – 1399724851 – 149 – 1 -OK- 0xff – 0×64 – 498728 – 1024 – 1399724851 – 149 – 1 0xff – 0×64 – 498728 – 1024 – 1399724851 – 149 – 1 -OK- -OK-
0×60 – 0×68 – 498752 – 1536 – 1513244361 – 54 – 1 0×60 – 0×68 – 498752 – 1536 – 1513244361 – 54 – 1 -OK- 0×60 – 0×68 – 498752 – 1536 – 1513244361 – 54 – 1 0×60 – 0×68 – 498752 – 1536 – 1513244361 – 54 – 1 -OK- -OK-
0×30 – 0×04 – 498792 – 512 – 1860757425 – 104 – 1 0×30 – 0×04 – 498792 – 512 – 1860757425 – 104 – 1 -OK- 0×30 – 0×04 – 498792 – 512 – 1860757425 – 104 – 1 0×30 – 0×04 – 498792 – 512 – 1860757425 – 104 – 1 -OK- -OK-
0×56 – 0×15 – 498840 – 3584 – 883761637 – 130 – 1 0×56 – 0×15 – 498840 – 3584 – 883761637 – 130 – 1 -OK- 0×56 – 0×15 – 498840 – 3584 – 883761637 – 130 – 1 0×56 – 0×15 – 498840 – 3584 – 883761637 – 130 – 1 -OK- -OK-
0x6d – 0xad – 498912 – 512 – 999414363 – 250 – 1 0x6d – 0xad – 498912 – 512 – 999414363 – 250 – 1 -OK- 0x6d – 0xad – 498912 – 512 – 999414363 – 250 – 1 0x6d – 0xad – 498912 – 512 – 999414363 – 250 – 1 -OK- -OK-
0×69 – 0×29 – 498944 – 512 – 325155180 – 187 – 1 0×69 – 0×29 – 498944 – 512 – 325155180 – 187 – 1 -OK- 0×69 – 0×29 – 498944 – 512 – 325155180 – 187 – 1 0×69 – 0×29 – 498944 – 512 – 325155180 – 187 – 1 -OK- -OK-
0xdb – 0xe2 – 498968 – 2560 – 1248688154 – 202 – 1 0xdb – 0xe2 – 498968 – 2560 – 1248688154 – 202 – 1 -OK- 0xdb – 0xe2 – 498968 – 2560 – 1248688154 – 202 – 1 0xdb – 0xe2 – 498968 – 2560 – 1248688154 – 202 – 1 -OK- -OK-
0×34 – 0×92 – 499032 – 1536 – 1658212347 – 47 – 1 0×34 – 0×92 – 499032 – 1536 – 1658212347 – 47 – 1 -OK- 0×34 – 0×92 – 499032 – 1536 – 1658212347 – 47 – 1 0×34 – 0×92 – 499032 – 1536 – 1658212347 – 47 – 1 -OK- -OK-
0xf3 – 0×80 – 499064 – 4096 – 1578942124 – 50 – 1 0xf3 – 0×80 – 499064 – 4096 – 1578942124 – 50 – 1 -OK- 0xf3 – 0×80 – 499064 – 4096 – 1578942124 – 50 – 1 0xf3 – 0×80 – 499064 – 4096 – 1578942124 – 50 – 1 -OK- -OK-
0x1e – 0×86 – 499080 – 3584 – 125458258 – 241 – 1 0x1e – 0×86 – 499080 – 3584 – 125458258 – 241 – 1 -OK- 0x1e – 0×86 – 499080 – 3584 – 125458258 – 241 – 1 0x1e – 0×86 – 499080 – 3584 – 125458258 – 241 – 1 -OK- -OK-
0xfd – 0xad – 499112 – 2048 – 1054822074 – 130 – 1 0xfd – 0xad – 499112 – 2048 – 1054822074 – 130 – 1 -OK- 0xfd – 0xad – 499112 – 2048 – 1054822074 – 130 – 1 0xfd – 0xad – 499112 – 2048 – 1054822074 – 130 – 1 -OK- -OK-
0×01 – 0xc0 – 499200 – 2048 – 861613272 – 125 – 1 0×01 – 0xc0 – 499200 – 2048 – 861613272 – 125 – 1 -OK- 0×01 – 0xc0 – 499200 – 2048 – 861613272 – 125 – 1 0×01 – 0xc0 – 499200 – 2048 – 861613272 – 125 – 1 -OK- -OK-
0×65 – 0x7e – 499280 – 2560 – 1876708412 – 192 – 1 0×65 – 0x7e – 499280 – 2560 – 1876708412 – 192 – 1 -OK- 0×65 – 0x7e – 499280 – 2560 – 1876708412 – 192 – 1 0×65 – 0x7e – 499280 – 2560 – 1876708412 – 192 – 1 -OK- -OK-
0x2c – 0×85 – 499520 – 1536 – 1246709149 – 6 – 1 0x2c – 0×85 – 499520 – 1536 – 1246709149 – 6 – 1 -OK- 0x2c – 0×85 – 499520 – 1536 – 1246709149 – 6 – 1 0x2c – 0×85 – 499520 – 1536 – 1246709149 – 6 – 1 -OK- -OK-
0x3e – 0x4b – 499568 – 512 – 1109097503 – 16 – 1 0x3e – 0x4b – 499568 – 512 – 1109097503 – 16 – 1 -OK- 0x3e – 0x4b – 499568 – 512 – 1109097503 – 16 – 1 0x3e – 0x4b – 499568 – 512 – 1109097503 – 16 – 1 -OK- -OK-
0xd2 – 0xc0 – 499576 – 3072 – 259411407 – 160 – 1 0xd2 – 0xc0 – 499576 – 3072 – 259411407 – 160 – 1 -OK- 0xd2 – 0xc0 – 499576 – 3072 – 259411407 – 160 – 1 0xd2 – 0xc0 – 499576 – 3072 – 259411407 – 160 – 1 -OK- -OK-
0xec – 0×57 – 499672 – 3072 – 921762116 – 237 – 1 0xec – 0×57 – 499672 – 3072 – 921762116 – 237 – 1 -OK- 0xec – 0×57 – 499672 – 3072 – 921762116 – 237 – 1 0xec – 0×57 – 499672 – 3072 – 921762116 – 237 – 1 -OK- -OK-
0xa2 – 0xa4 – 499680 – 1024 – 1838329123 – 80 – 1 0xa2 – 0xa4 – 499680 – 1024 – 1838329123 – 80 – 1 -OK- 0xa2 – 0xa4 – 499680 – 1024 – 1838329123 – 80 – 1 0xa2 – 0xa4 – 499680 – 1024 – 1838329123 – 80 – 1 -OK- -OK-
0×78 – 0x6a – 499784 – 1536 – 1728159305 – 221 – 1 0×78 – 0x6a – 499784 – 1536 – 1728159305 – 221 – 1 -OK- 0×78 – 0x6a – 499784 – 1536 – 1728159305 – 221 – 1 0×78 – 0x6a – 499784 – 1536 – 1728159305 – 221 – 1 -OK- -OK-
0×62 – 0xc3 – 499824 – 512 – 34827641 – 63 – 2 0×62 – 0xc3 – 499824 – 512 – 34827641 – 63 – 2 -OK- 0×62 – 0xc3 – 499824 – 512 – 34827641 – 63 – 2 0×62 – 0xc3 – 499824 – 512 – 34827641 – 63 – 2 -OK- -OK-
0×86 – 0xc6 – 499856 – 512 – 203068341 – 228 – 1 0×86 – 0xc6 – 499856 – 512 – 203068341 – 228 – 1 -OK- 0×86 – 0xc6 – 499856 – 512 – 203068341 – 228 – 1 0×86 – 0xc6 – 499856 – 512 – 203068341 – 228 – 1 -OK- -OK-
0x2b – 0xaa – 499880 – 4096 – 385852632 – 228 – 1 0x2b – 0xaa – 499880 – 4096 – 385852632 – 228 – 1 -OK- 0x2b – 0xaa – 499880 – 4096 – 385852632 – 228 – 1 0x2b – 0xaa – 499880 – 4096 – 385852632 – 228 – 1 -OK- -OK-
0×43 – 0×45 – 499928 – 4096 – 471675929 – 126 – 1 0×43 – 0×45 – 499928 – 4096 – 471675929 – 126 – 1 -OK- 0×43 – 0×45 – 499928 – 4096 – 471675929 – 126 – 1 0×43 – 0×45 – 499928 – 4096 – 471675929 – 126 – 1 -OK- -OK-
0xf0 – 0x0c – 499952 – 1024 – 1966556320 – 146 – 1 0xf0 – 0x0c – 499952 – 1024 – 1966556320 – 146 – 1 -OK- 0xf0 – 0x0c – 499952 – 1024 – 1966556320 – 146 – 1 0xf0 – 0x0c – 499952 – 1024 – 1966556320 – 146 – 1 -OK- -OK-
0xb4 – 0xc2 – 499960 – 4096 – 394287014 – 137 – 1 0xb4 – 0xc2 – 499960 – 4096 – 394287014 – 137 – 1 -OK- 0xb4 – 0xc2 – 499960 – 4096 – 394287014 – 137 – 1 0xb4 – 0xc2 – 499960 – 4096 – 394287014 – 137 – 1 -OK- -OK-

Execution test list of posts:
[1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22]

EXECUTION SUMMARY LOG FILES

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockXTSDigested-Sector-Serpent-192-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Default-memory.log

- Making use of IncreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockXTSDigested-Sector-Serpent-192-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Incr-Key-Physical-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and DefaultCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockXTSDigested-Sector-Serpent-192-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Default-memory.log

- Making use of DecreaseKeyModifier_6_0_0_1 key modifier and PhysicalCryptoRandomStream bit data stream:

DiceLock-x-8-0-0-1-DiceLockXTSDigested-Sector-Serpent-192-Sha-224-Frequency-Block-Frequency-CuSum-Forward-Longest-Run-Of-Ones-Runs-Decr-Key-Physical-memory.log

From logs file we can see that all randomized-encrypted text sequences have been correctly deciphered.

Leave a Reply