April 2014
S M T W T F S
« Oct    
 12345
6789101112
13141516171819
20212223242526
27282930  

Recent Posts

XDiceLock 8.0.0.1 for Apple Mac OS X, XTS_Mode class (XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher operation mode algorithm) verified with Advanced Encryption Standard AES 128, IEEE P1619, with 1 key and 256 bit plaintext, CryptoRandomStream data unit test vector set and DefaultCryptoRandomStream class (default virtual memory management)

XDiceLock 8.0.0.1 for Apple Mac OS X is the cryptographic architecture that ensures that ciphertext it’s not just encrypted but also randomized.

DiceLock cipher architecture presents two main configurations:
Dicelock Digested, and
Dicelock Indexed.

DiceLock encryption architecture improves symmetric ciphers like block cipher as Advanced Encryption Standard (AES 128, AES 192 and AES 256) with different block cipher operation modes (like CBC, CFB, OFB and XTS-AES) and stream ciphers as HC 128 and HC 256 and others.

DiceLock (both configurations) makes use of the following random number tests: Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test and Discrete Fourier Transform Test.

Additionally DiceLock Digested configuration makes use currently of following hash digest algorithms: Sha 1, Sha 224, Sha 256, Sha 384, Sha 512, Ripemd 128, Ripemd 160, Ripemd 256 and Ripemd 320.

New version XDiceLock 8.0.0.1 for Apple Mac OS X incorporates XTS-AES ((XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher operation mode algorithm)) for Advanced Encryption Algorithm (AES) for 128 and 256 bit symmetric keys.
As the new version XDiceLock 8.0.0.1 for Apple Mac OS X is developed, all individual components must be tested and verified, and in this article we verify XEX-based tweaked-codebook mode with ciphertext stealing XTS class (computing XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher algorithm).

At the bottom of the post you can find C++ source code being used to perform this test.


Verified XDiceLock 8.0.0.1 for Apple Mac OS X

Verification components:

– Block cipher operation mode encryption algorithm: XTS_Mode class
– Block cipher encryption algorithm: AES128 class
– Test set : IEEE P1619, with 1 key and 256 bit plaintext, CryptoRandomStream data unit
– Bit stream memory management: DefaultCryptoRandomStream class (default virtual memory management)

Memory characteristic used in this test:

DefaultCryptoRandomStream class makes use of default virtual memory where the system can move pages of physical memory to and from a paging file on disk (manipulation of physical memory by the system is completely transparent to applications).

 

Once computed we’ve got the following results:

P1619, test# 10

Input plaintext: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Data unit (hex): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Symmetric Key: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Expected ciphertext: 91 7c f6 9e bd 68 b2 ec 9b 9f e9 a3 ea dd a6 92 cd 43 d2 f5 95 98 ed 85 8c 02 c2 65 2f bf 92 2e
Computed ciphertext: 91 7c f6 9e bd 68 b2 ec 9b 9f e9 a3 ea dd a6 92 cd 43 d2 f5 95 98 ed 85 8c 02 c2 65 2f bf 92 2e OK
DECIPHERING Deciphered text: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 OK

 

P1619, test# 11

Input plaintext: 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44
Data unit (hex): 33 33 33 33 33 00 00 00 00 00 00 00 00 00 00 00
Symmetric Key: 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22
Expected ciphertext: c4 54 18 5e 6a 16 93 6e 39 33 40 38 ac ef 83 8b fb 18 6f ff 74 80 ad c4 28 93 82 ec d6 d3 94 f0
Computed ciphertext: c4 54 18 5e 6a 16 93 6e 39 33 40 38 ac ef 83 8b fb 18 6f ff 74 80 ad c4 28 93 82 ec d6 d3 94 f0 OK
DECIPHERING Deciphered text: 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 OK

 

P1619, test# 12

Input plaintext: 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44
Data unit (hex): 33 33 33 33 33 00 00 00 00 00 00 00 00 00 00 00
Symmetric Key: ff fe fd fc fb fa f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22
Expected ciphertext: af 85 33 6b 59 7a fc 1a 90 0b 2e b2 1e c9 49 d2 92 df 4c 04 7e 0b 21 53 21 86 a5 97 1a 22 7a 89
Computed ciphertext: af 85 33 6b 59 7a fc 1a 90 0b 2e b2 1e c9 49 d2 92 df 4c 04 7e 0b 21 53 21 86 a5 97 1a 22 7a 89 OK
DECIPHERING Deciphered text: 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 OK

 

XDiceLock 8.0.0.1 for Apple Mac OS X C++ source code used in this test:

XDiceLock 8.0.0.1 for Apple Mac OS X

XDiceLockCipher.h
baseCryptoRandomStream.h
baseCryptoRandomStream.cpp
defaultCryptoRandomStream.h
defaultCryptoRandomStream.cpp
baseSymmetricCipher.h
baseSymmetricCipher.cpp
XTS_Mode.h
XTS_Mode.cpp
blockCiphers.h
baseBlockCipher.h
baseBlockCipher.cpp
baseAES.h
baseAES.cpp
AES128.h
AES128.cpp



So, DiceLock cipher test and analysis can go on …

DiceLock is a trademark or registered trademark of his owner where applies. DiceLock research is the research to implement Self-corrector randomisation-encryption and method, european patent EP1182777 granted 08/21/2003 and US patent US7508945 granted 03/24/2009.

Leave a Reply