July 2014
S M T W T F S
« Jun    
 12345
6789101112
13141516171819
20212223242526
2728293031  

Recent Posts

DiceLock-x 8.0.0.1 for Linux, CFB_Mode class (Cipher feedback CFB block cipher operation mode algorithm), 8-bit CFB mode, verified with TDEA, PermutationOperation test set and DefaultCryptoRandomStream class (default virtual memory management)

DiceLock-x 8.0.0.1 for Linux is the cryptographic architecture that ensures that ciphertext it’s not just encrypted but also randomized.

DiceLock cipher architecture presents two main configurations:
Dicelock Digested, and
Dicelock Indexed.

DiceLock encryption architecture improves symmetric ciphers like block cipher as Advanced Encryption Standard, Camellia, Serpent, Twofish (128, 192 and 256 bit key lengths) with different block cipher operation modes (like CBC, CFB, OFB and XTS) and stream ciphers as HC 128, HC 256, Rabbit, Salsa 20/20, Sosemanuk and others.

DiceLock (both configurations) makes use of the following random number tests: Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test and Discrete Fourier Transform Test.

Additionally DiceLock Digested configuration makes use currently of following hash digest algorithms: Sha 1, Sha 224, Sha 256, Sha 384, Sha 512, Ripemd 128, Ripemd 160, Ripemd 256, Ripemd 320, Md2, Md4 and Md5.

Previous version DiceLock-x 7.0.0.1 for Linux incorporated XTS-AES (XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher operation mode algorithm) for Advanced Encryption Algorithm (AES) for 128 and 256 bit symmetric keys.

New version DiceLock-x 8.0.0.1 for Linux has made significant improvements:
- added block encryption ciphers like Camellia, Serpent and Twofish with all accepted key lengths of 128, 192 and 256 bits,
- added stream ciphers like Rabbit, Salsa 20/20 with 128 and 256 bit key lengths, and general Sosemanuk, as well as Sosemanuk with 128 and 256 bit key lengths,
- added old hash algorithms like Message Digest 2, Message Digest 4 and Message Digest 5,
- modified DiceLockIndexed and DiceLockDigested classes to be used with encryption ciphers that does not make use of initialization vector (IV),
- created DiceLockIVDigested and DiceLockIVIndexed classes to be used with encryption ciphers that makes use of initialization vector (IV),
- extended DiceLockXTSDigested and DiceLockXTSIndexed classes to be use with newly added Camellia, Serpent and Twofish block ciphers and all three key lengths (128, 192 and 256 bit key lengths),
- added old encryption ciphers like DEA (Data Encryption Algorithm), TDEA (Triple Data Encryption Algorithm), and ARC4 (alleged RC4) for compatibillity reasons.

As the new version DiceLock-x 8.0.0.1 for Linux is developed, all individual components must be tested and verified, and in this article we verify Cipher feedback CFB class (computing Cipher feedback CFB block cipher algorithm).

At the bottom of the post you can find C++ source code being used to perform this test.


Verified DiceLock-x 8.0.0.1 for Linux

Verification components:

– Block cipher operation mode encryption algorithm: CFB_Mode class
– Block cipher encryption algorithm: TDEA class
– Test set : PermutationOperation
– Bit stream memory management: DefaultCryptoRandomStream class (default virtual memory management)

Memory characteristic used in this test:

DefaultCryptoRandomStream class makes use of default virtual memory where the system can move pages of physical memory to and from a paging file on disk (manipulation of physical memory by the system is completely transparent to applications).

 

CFB_Mode class block cipher operation mode is executed as 8-bit CFB mode, that is, each plaintext segment and ciphertext segment consists of 8 bits.

Once computed we’ve got the following results:

Permutation operation, # 1

Input plaintext: 00
Key: 104691348998013110469134899801311046913489980131
IV: 0000000000000000
Expected ciphertext: 88
Computed ciphertext: 88 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 2

Input plaintext: 00
Key: 100710348998802010071034899880201007103489988020
IV: 0000000000000000
Expected ciphertext: 0c
Computed ciphertext: 0c OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 3

Input plaintext: 00
Key: 10071034c898012010071034c898012010071034c8980120
IV: 0000000000000000
Expected ciphertext: 83
Computed ciphertext: 83 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 4

Input plaintext: 00
Key: 104610348998802010461034899880201046103489988020
IV: 0000000000000000
Expected ciphertext: df
Computed ciphertext: df OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 5

Input plaintext: 00
Key: 108691151919010110869115191901011086911519190101
IV: 0000000000000000
Expected ciphertext: e6
Computed ciphertext: e6 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 6

Input plaintext: 00
Key: 108691151958010110869115195801011086911519580101
IV: 0000000000000000
Expected ciphertext: af
Computed ciphertext: af OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 7

Input plaintext: 00
Key: 5107b015195801015107b015195801015107b01519580101
IV: 0000000000000000
Expected ciphertext: 0f
Computed ciphertext: 0f OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 8

Input plaintext: 00
Key: 1007b015191901011007b015191901011007b01519190101
IV: 0000000000000000
Expected ciphertext: c9
Computed ciphertext: c9 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 9

Input plaintext: 00
Key: 310791549808010131079154980801013107915498080101
IV: 0000000000000000
Expected ciphertext: 7c
Computed ciphertext: 7c OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 10

Input plaintext: 00
Key: 310791949808010131079194980801013107919498080101
IV: 0000000000000000
Expected ciphertext: cb
Computed ciphertext: cb OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 11

Input plaintext: 00
Key: 10079115b908014010079115b908014010079115b9080140
IV: 0000000000000000
Expected ciphertext: 00
Computed ciphertext: 00 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 12

Input plaintext: 00
Key: 310791159808014031079115980801403107911598080140
IV: 0000000000000000
Expected ciphertext: 40
Computed ciphertext: 40 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 13

Input plaintext: 00
Key: 1007d015899801011007d015899801011007d01589980101
IV: 0000000000000000
Expected ciphertext: 6c
Computed ciphertext: 6c OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 14

Input plaintext: 00
Key: 910791158998010191079115899801019107911589980101
IV: 0000000000000000
Expected ciphertext: 67
Computed ciphertext: 67 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 15

Input plaintext: 00
Key: 9107d015891901019107d015891901019107d01589190101
IV: 0000000000000000
Expected ciphertext: 95
Computed ciphertext: 95 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 16

Input plaintext: 00
Key: 1007d015989801201007d015989801201007d01598980120
IV: 0000000000000000
Expected ciphertext: a6
Computed ciphertext: a6 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 17

Input plaintext: 00
Key: 100794049819010110079404981901011007940498190101
IV: 0000000000000000
Expected ciphertext: 4d
Computed ciphertext: 4d OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 18

Input plaintext: 00
Key: 010791049119040101079104911904010107910491190401
IV: 0000000000000000
Expected ciphertext: 2d
Computed ciphertext: 2d OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 19

Input plaintext: 00
Key: 010791049119010101079104911901010107910491190101
IV: 0000000000000000
Expected ciphertext: b4
Computed ciphertext: b4 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 20

Input plaintext: 00
Key: 010794049119040101079404911904010107940491190401
IV: 0000000000000000
Expected ciphertext: 6e
Computed ciphertext: 6e OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 21

Input plaintext: 00
Key: 19079210981a010119079210981a010119079210981a0101
IV: 0000000000000000
Expected ciphertext: aa
Computed ciphertext: aa OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 22

Input plaintext: 00
Key: 100791199819080110079119981908011007911998190801
IV: 0000000000000000
Expected ciphertext: 2e
Computed ciphertext: 2e OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 23

Input plaintext: 00
Key: 10079119981a080110079119981a080110079119981a0801
IV: 0000000000000000
Expected ciphertext: 23
Computed ciphertext: 23 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 24

Input plaintext: 00
Key: 100792109819010110079210981901011007921098190101
IV: 0000000000000000
Expected ciphertext: d8
Computed ciphertext: d8 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 25

Input plaintext: 00
Key: 100791159819010b100791159819010b100791159819010b
IV: 0000000000000000
Expected ciphertext: 05
Computed ciphertext: 05 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 26

Input plaintext: 00
Key: 100480159819010110048015981901011004801598190101
IV: 0000000000000000
Expected ciphertext: ab
Computed ciphertext: ab OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 27

Input plaintext: 00
Key: 100480159819010210048015981901021004801598190102
IV: 0000000000000000
Expected ciphertext: 53
Computed ciphertext: 53 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 28

Input plaintext: 00
Key: 100480159819010810048015981901081004801598190108
IV: 0000000000000000
Expected ciphertext: ae
Computed ciphertext: ae OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 29

Input plaintext: 00
Key: 100291159810010410029115981001041002911598100104
IV: 0000000000000000
Expected ciphertext: b3
Computed ciphertext: b3 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 30

Input plaintext: 00
Key: 100291159819010410029115981901041002911598190104
IV: 0000000000000000
Expected ciphertext: 61
Computed ciphertext: 61 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 31

Input plaintext: 00
Key: 100291159810020110029115981002011002911598100201
IV: 0000000000000000
Expected ciphertext: e2
Computed ciphertext: e2 OK
DECIPHERING Deciphered text: 00 OK

 

Permutation operation, # 32

Input plaintext: 00
Key: 100291169810010110029116981001011002911698100101
IV: 0000000000000000
Expected ciphertext: 1a
Computed ciphertext: 1a OK
DECIPHERING Deciphered text: 00 OK

 

DiceLock-x 8.0.0.1 for Linux C++ source code used in this test:

DiceLock-x 8.0.0.1 for Linux

DiceLockCipher.h
cryptoRandomStreams.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
baseSymmetricCipher.h
baseSymmetricCipher.cpp
baseSymmetricStreamer.h
baseSymmetricStreamer.cpp
blockCipherOperationModes.h
baseBlockCipherOperationMode_with_IV.h
baseBlockCipherOperationMode_with_IV.cpp
CFB_Mode.h
CFB_Mode.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
DEA.h
DEA.cpp
internalBuffer.h
internalBuffer.cpp
TDEA.h
TDEA.cpp



So, DiceLock cipher test and analysis can go on …

DiceLock is a trademark or registered trademark of his owner where applies. DiceLock research is the research to implement Self-corrector randomisation-encryption and method, european patent EP1182777 granted 08/21/2003 and US patent US7508945 granted 03/24/2009.

Leave a Reply