DiceLock-x 8.0.0.1 for Linux is the cryptographic architecture that ensures that ciphertext it’s not just encrypted but also randomized.
DiceLock cipher architecture presents two main configurations:
– Dicelock Digested, and
– Dicelock Indexed.
DiceLock encryption architecture improves symmetric ciphers like block cipher as Advanced Encryption Standard, Camellia, Serpent, Twofish (128, 192 and 256 bit key lengths) with different block cipher operation modes (like CBC, CFB, OFB and XTS) and stream ciphers as HC 128, HC 256, Rabbit, Salsa 20/20, Sosemanuk and others.
DiceLock (both configurations) makes use of the following random number tests: Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test and Discrete Fourier Transform Test.
Additionally DiceLock Digested configuration makes use currently of following hash digest algorithms: Sha 1, Sha 224, Sha 256, Sha 384, Sha 512, Ripemd 128, Ripemd 160, Ripemd 256, Ripemd 320, Md2, Md4 and Md5.
Previous version DiceLock-x 7.0.0.1 for Linux incorporated XTS-AES (XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher operation mode algorithm) for Advanced Encryption Algorithm (AES) for 128 and 256 bit symmetric keys.
New version DiceLock-x 8.0.0.1 for Linux has made significant improvements:
- added block encryption ciphers like Camellia, Serpent and Twofish with all accepted key lengths of 128, 192 and 256 bits,
- added stream ciphers like Rabbit, Salsa 20/20 with 128 and 256 bit key lengths, and general Sosemanuk, as well as Sosemanuk with 128 and 256 bit key lengths,
- added old hash algorithms like Message Digest 2, Message Digest 4 and Message Digest 5,
- modified DiceLockIndexed and DiceLockDigested classes to be used with encryption ciphers that does not make use of initialization vector (IV),
- created DiceLockIVDigested and DiceLockIVIndexed classes to be used with encryption ciphers that makes use of initialization vector (IV),
- extended DiceLockXTSDigested and DiceLockXTSIndexed classes to be use with newly added Camellia, Serpent and Twofish block ciphers and all three key lengths (128, 192 and 256 bit key lengths),
- added old encryption ciphers like DEA (Data Encryption Algorithm), TDEA (Triple Data Encryption Algorithm), and ARC4 (alleged RC4) for compatibillity reasons.
As the new version DiceLock-x 8.0.0.1 for Linux is developed, all individual components must be tested and verified, and in this article we verify XEX-based tweaked-codebook mode with ciphertext stealing XTS class (computing XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher algorithm).
At the bottom of the post you can find C++ source code being used to perform this test.
Verified DiceLock-x 8.0.0.1 for Linux
Verification components:
– Block cipher operation mode encryption algorithm: XTS_Mode class
– Block cipher encryption algorithm: AES128 class
– Test set : IEEE P1619, with 1 key and 256 bit plaintext, CryptoRandomStream data unit
– Bit stream memory management: DefaultCryptoRandomStream class (default virtual memory management)
Memory characteristic used in this test:
DefaultCryptoRandomStream class makes use of default virtual memory where the system can move pages of physical memory to and from a paging file on disk (manipulation of physical memory by the system is completely transparent to applications).
Once computed we’ve got the following results:
P1619, test# 10
Input plaintext: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ||
Data unit (hex): | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ||
Symmetric Key: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ||
Expected ciphertext: | 91 7c f6 9e bd 68 b2 ec 9b 9f e9 a3 ea dd a6 92 cd 43 d2 f5 95 98 ed 85 8c 02 c2 65 2f bf 92 2e | ||
Computed ciphertext: | 91 7c f6 9e bd 68 b2 ec 9b 9f e9 a3 ea dd a6 92 cd 43 d2 f5 95 98 ed 85 8c 02 c2 65 2f bf 92 2e | OK | |
DECIPHERING | Deciphered text: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | OK |
P1619, test# 11
Input plaintext: | 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 | ||
Data unit (hex): | 33 33 33 33 33 00 00 00 00 00 00 00 00 00 00 00 | ||
Symmetric Key: | 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 | ||
Expected ciphertext: | c4 54 18 5e 6a 16 93 6e 39 33 40 38 ac ef 83 8b fb 18 6f ff 74 80 ad c4 28 93 82 ec d6 d3 94 f0 | ||
Computed ciphertext: | c4 54 18 5e 6a 16 93 6e 39 33 40 38 ac ef 83 8b fb 18 6f ff 74 80 ad c4 28 93 82 ec d6 d3 94 f0 | OK | |
DECIPHERING | Deciphered text: | 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 | OK |
P1619, test# 12
Input plaintext: | 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 | ||
Data unit (hex): | 33 33 33 33 33 00 00 00 00 00 00 00 00 00 00 00 | ||
Symmetric Key: | ff fe fd fc fb fa f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 | ||
Expected ciphertext: | af 85 33 6b 59 7a fc 1a 90 0b 2e b2 1e c9 49 d2 92 df 4c 04 7e 0b 21 53 21 86 a5 97 1a 22 7a 89 | ||
Computed ciphertext: | af 85 33 6b 59 7a fc 1a 90 0b 2e b2 1e c9 49 d2 92 df 4c 04 7e 0b 21 53 21 86 a5 97 1a 22 7a 89 | OK | |
DECIPHERING | Deciphered text: | 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 | OK |
DiceLock-x 8.0.0.1 for Linux C++ source code used in this test:
– DiceLock-x 8.0.0.1 for Linux
– DiceLockCipher.h
– cryptoRandomStreams.h
– baseCryptoRandomStream.h
– baseCryptoRandomStream.cpp
– defaultCryptoRandomStream.h
– defaultCryptoRandomStream.cpp
– baseSymmetricCipher.h
– baseSymmetricCipher.cpp
– XTS_Mode.h
– XTS_Mode.cpp
– blockCiphers.h
– baseBlockCipher.h
– baseBlockCipher.cpp
– baseAES.h
– baseAES.cpp
– AES128.h
– AES128.cpp
So, DiceLock cipher test and analysis can go on …
DiceLock is a trademark or registered trademark of his owner where applies. DiceLock research is the research to implement Self-corrector randomisation-encryption and method, european patent EP1182777 granted 08/21/2003 and US patent US7508945 granted 03/24/2009.
Leave a Reply
You must be logged in to post a comment.