Posts

Showing posts from July, 2023

Vernam entropy

  Android Java We use splitting of the digital stream for stream encryption with the Vernam code. How to make it harder or impossible to hack a stream. Engineering solutions. Let's write sample applications for Android Java. Speech technology in encryption is not speech encryption. Well and then it is possible to consider enciphering on the basis of "other thinking". For example, based on huge programming objects. This encryption is likely to be stable even during quantum computers.       Then we'll come up with something else Vernam Entropy

Vernam entropy

  Android Java The application layout extracts the encryption key from the Internet radio bitstream using an algorithm that can be repeated and give the same result in another instance of the application. XOR encrypts text, sends SMS to itself, receives SMS and decodes text. Contains all modules for a real application that encrypts text of any length with a Vernam code (restrictions on SMS). Independently receives the same keys (cipher pads) without a synchronization channel. https://github.com/vallshmeleff/radiorandgentwo Vernam Entropy

Vernam entropy

  Android Java      Many algorithms can be devised to generate random numbers from an internet radio digital stream. But these will be "pseudo-random" numbers. You can improve their quality if you use the "splitting" of digital streams. Splitting can be linear (periodic) and non-linear. Periodic splitting - when you divide the original stream of numbers, for example, into 10 streams, sending every tenth number to your own stream. Nonlinear splitting - when numbers are selected from the source stream according to some given algorithm. Something like: first, fifth, seventh, nineteenth, etc. And already in the new streams, the given sequence of bytes is taken and a random number is selected and the cipherbook page is formed. Note Vernam Encryption

Vernam entropy

  Vernam Code in Java To use the Vernam cipher, one of the problems is getting the cipher pad pages on both sides. From the sender and recipient. It is ideal to receive these encryption pages identical, synchronously in time, in unlimited quantity, of any required length and without a synchronization channel between the sender and the recipient. Let's write an Android Java application that will demonstrate such capabilities. As a source for generating encryption pages, we use a digital stream from Internet television or Internet radio. Such a digital stream is not random and we use special processing algorithms that will be sufficient for a commercial level of encryption with XOR transformation. Then we will show the technology for the strongest encryption using digital streams. XOR encryption