Home
Name Modified Size InfoDownloads / Week
source 2015-09-16
readme.txt 2015-09-16 3.1 kB
d-crypt.jar 2015-09-16 75.3 kB
Totals: 3 Items   78.4 kB 0
//*************************************************************\\
||							       ||
||			D - crypt			       ||
||							       ||
||	Modular Tweakable 256bit symmetrical block cipher      ||
||							       ||
\\*************************************************************//


|===\  ===== ===== ===   |\   /| =====
|    | |     |   | |  \  | \ / | |
|===/  ===== |___| |   | |  \  | =====
|   \  |     |   | |  /  |     | |
|    \ ===== |   | ===   |     | =====  (sorry for the bad ASCII art)

Table of Contents:

	1 - Introduction;
	2 - Disclaimer;
	3 - Overview:
		3.1 - KeySchedule;
		3.2 - Encryption;
			3.2.1 - F0;
			3.2.2 - F1;
			3.2.3 - F2;
			3.2.4 - F3;
			3.2.5 - F4;
			3.2.6 - F5;
			3.2.7 - F6;
			3.2.8 - F7;
			3.2.9 - F8;
			3.2.10 - F9;
			3.2.11 - F10;
			3.2.12 - F11;


================
1 - Introduction
================

	I'm glad you spend your time downloading this program. 
It's the first attempt of a self-taught cryptographer to develop 
an block cipher.
	
	This project was born when I was studying AES. A question
rushed through my head:
	"What if one could make a cipher where not only the key
	but the cipher itself could changed? Would that be more
	secure?"
	So I went to google. I could not found any cipher that 
implemented what d-crypt does, so I started to develop it myself.

	As I was mildly familiar with AES, this cipher is very influenced
by it. They share a similar key expansion algorithm, the same sboxes, 
similar Permutation steps and a similar network.

	Just as a warning: I have never took any cryptography or 
programming lesson so there probably will be some stupid errors and
irregularities. I just ask you to report them at the project page at 
sourceforge (https://sourceforge.net/projects/d-crypt/) so that I can
learn something from them. As such this cipher should be strong 
enough to survive a brute force attack, but I would ONLY USE IT in
non-sensible information.

==============
2 - Disclaimer
==============

	This is a proof of concept. The cipher probably has a lot of
coding vulnerabilities as well as cryptographical ones.

	In THEORY this cipher should witstand a brute force attack as it
provides around 320bit strength total:
	
	256bit for the key and 64 for the tweak.

	This cipher was made by a self-taught.

	This cipher has never been subject to any kind of cryptoanalysis,
so it may vulnerable to timing, linear, and other more sophisticated 
attacks.

	As such I would not use this cipher for anything but non-sensible
information.

	I HEREBY STATE THAT I AM NOT RESPONSIBLE FOR ANY DAMAGE THE MISUSE
OF THIS CIPHER CAUSES SUCH AS INFORMATION LEAKAGE OR LOSS. IF WHILE USING
THIS CIPHER YOU LOSE OR MAKE SENSIBLE OR CONFIDENTIAL INFO PUBLIC, ONLY THE
USER IS ACCOUNTABLE FOR SUCH INCIDENT. IF YOU DO NOT ACCEPT THIS RESPONSABLITY,
PLEASE DO NOT USE THIS CIPHER AND UNINSTALL IT. BY USING THE ENCRYPTION PROGRAM
YOU ACCEPT THAT THIS CIPHER MAY HAVE SERIOUS VULNERABILITIES AND TAKE ALL
RESPONSABILITY FOR WHAT MAY HAPPEN TO YOUR INFORMATION.
Source: readme.txt, updated 2015-09-16