Stream entropy for the Vernam cipher. Android Studio JAVA
Vernam cipher Android JAVA

New solution


      
Stream entropy
      
      Part 2
      
      Hidden noise streams.
      
      If a hardware source of a random number stream is placed on the satellite (for example, based on the thermal noise of a semiconductor diode or transistor), then this stream can be used to encrypt data using the Vernam code.
      The advantages of such encryption are the speed of encryption and decoding, absolute cryptographic strength, simultaneous receipt of cipher pads (keys) from any number of clients, the possibility of obtaining keys of any length.
      Disadvantages - the digital noise stream dropped from the satellite is a fact in itself that attracts attention. In some cases, this is not convenient. I
      nstead of a separate satellite noise channel, one can use the encapsulation of noise data into information flows - a television image, broadcasting, etc.
      In this case, the digital entropy flow will be significantly less, but it will be hidden.
      If you view the audio level of a noise-encapsulated digital radio (converted to analog) on an oscilloscope, the encapsulation will appear as single bursts that fall out of the overall curve. But since Since these dropouts have a minimum duration (1 byte per large number of information bytes), they will not affect the sound quality.
      
      If there is encapsulation in a digital stream (for example, a radio channel), how can a client detect it in order to start using it as entropy?
      To do this, a given digital sequence or several sequences are encapsulated for some time. A simple example is for a few seconds every 1000th byte of the encapsulated stream is replaced by 0. Then, (for example) the number 75349105 is also placed (for example, 5 times in a row). These are labels. Analyzing the data buffer, one can determine the presence and frequency of noise encapsulation.
      Even if a third-party client detects the presence of encapsulation, it will not be able to know which bytes from the noise stream are used as the encryption key.
      The selection of a specific encryption key (cipher pad) can be done after Terabytes after the start of work with noise stream labels.
      
      Coding errors and coding errors.
      
      One option for protecting data is to encrypt a critical piece of data. If in the phrase "Send me 250 light bulbs" to replace only part of the text with the cipher: "Send me %G&h light bulbs", then the commercial value of such a text is lost. But the amount of encoded information is drastically reduced.
      Here, out of 23 bytes of text, only 3 bytes are encoded. Those. if an asymmetric encryption algorithm (for example, RSA or ECC) is used to encrypt the entire phrase, and a Vernam cipher is used to encrypt the critical part, then the need for cipher pads will decrease dramatically. This is one way to use the Vernam cipher in streaming data encryption.
      There is another way to protect the data stream using the Vernam cipher with a small consumption of cipher pages. In this case, the entire data stream is protected, but the consumption of encryption pages is also small.
      
      It is possible to significantly increase the strength of data encoding if combined encryption is used. For example, use asymmetric encryption (RSA or ECC), then make corrections (errors) in the encoded message, which are protected using the Vernam cipher.
      This significantly reduces the required number of encryption pads and allows you to protect large amounts of information, close to streaming quantities.
      
      
Download GitHUB Project >>
      
      JAVA Application Prototypes  
RadioRANDGen >>
      
      Neural networks for searching data encoding formulas
      
        
Next PAGE >>  Photobanks >>
      

Vernam entropy

Vernam cipher project
Android STUDIO JAVA
Stream generation of cipher-notebooks  
Vernam Code

    

    

    

    

Free Web Hosting