Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
source.zip | 2015-09-16 | 21.1 kB | |
readme.txt | 2015-09-16 | 3.1 kB | |
Totals: 2 Items | 24.2 kB | 0 |
//*************************************************************\\ || || || D - crypt || || || || Modular Tweakable 256bit symmetrical block cipher || || || \\*************************************************************// |===\ ===== ===== === |\ /| ===== | | | | | | \ | \ / | | |===/ ===== |___| | | | \ | ===== | \ | | | | / | | | | \ ===== | | === | | ===== (sorry for the bad ASCII art) Table of Contents: 1 - Introduction; 2 - Disclaimer; 3 - Overview: 3.1 - KeySchedule; 3.2 - Encryption; 3.2.1 - F0; 3.2.2 - F1; 3.2.3 - F2; 3.2.4 - F3; 3.2.5 - F4; 3.2.6 - F5; 3.2.7 - F6; 3.2.8 - F7; 3.2.9 - F8; 3.2.10 - F9; 3.2.11 - F10; 3.2.12 - F11; ================ 1 - Introduction ================ I'm glad you spend your time downloading this program. It's the first attempt of a self-taught cryptographer to develop an block cipher. This project was born when I was studying AES. A question rushed through my head: "What if one could make a cipher where not only the key but the cipher itself could changed? Would that be more secure?" So I went to google. I could not found any cipher that implemented what d-crypt does, so I started to develop it myself. As I was mildly familiar with AES, this cipher is very influenced by it. They share a similar key expansion algorithm, the same sboxes, similar Permutation steps and a similar network. Just as a warning: I have never took any cryptography or programming lesson so there probably will be some stupid errors and irregularities. I just ask you to report them at the project page at sourceforge (https://sourceforge.net/projects/d-crypt/) so that I can learn something from them. As such this cipher should be strong enough to survive a brute force attack, but I would ONLY USE IT in non-sensible information. ============== 2 - Disclaimer ============== This is a proof of concept. The cipher probably has a lot of coding vulnerabilities as well as cryptographical ones. In THEORY this cipher should witstand a brute force attack as it provides around 320bit strength total: 256bit for the key and 64 for the tweak. This cipher was made by a self-taught. This cipher has never been subject to any kind of cryptoanalysis, so it may vulnerable to timing, linear, and other more sophisticated attacks. As such I would not use this cipher for anything but non-sensible information. I HEREBY STATE THAT I AM NOT RESPONSIBLE FOR ANY DAMAGE THE MISUSE OF THIS CIPHER CAUSES SUCH AS INFORMATION LEAKAGE OR LOSS. IF WHILE USING THIS CIPHER YOU LOSE OR MAKE SENSIBLE OR CONFIDENTIAL INFO PUBLIC, ONLY THE USER IS ACCOUNTABLE FOR SUCH INCIDENT. IF YOU DO NOT ACCEPT THIS RESPONSABLITY, PLEASE DO NOT USE THIS CIPHER AND UNINSTALL IT. BY USING THE ENCRYPTION PROGRAM YOU ACCEPT THAT THIS CIPHER MAY HAVE SERIOUS VULNERABILITIES AND TAKE ALL RESPONSABILITY FOR WHAT MAY HAPPEN TO YOUR INFORMATION.