Posts

Showing posts from October, 2023

Czech entropy android

  Java PRNG The Czech Entropy application has bugs fixed, conversion improved, and a second level of number generation added. The application version is currently in preparation for publication. Next, a module will be added to estimate and improve the entropy of the generated numbers. Improvement up to perfect distribution. https://drive.google.com/file/d/1in6sX45yDGty7NyDGCskZhJYJ4wo8V_T/view?usp=sharing Czech Entropy Android http://czechentropy.freetzi.com/

Czech Entropy

  Expansion of the original data   The existing version of the Czech Entropy application uses TTS to expand the source data (at each level). This makes the application sensitive to the Android version and hardware. But! A fundamental solution has been found for creating an effective module for expanding data with any coefficient. And the algorithm also depends on the Android build and the type of smartphone.  Czech Entropy  

Czech Entropy

Image
  PRNG Quality You can graphically represent the generated array of "random" numbers.   Everything seems to be fine. But if we take two adjacent numbers together as coordinates, it might look like this   It is clear that the numbers are not random at all. Patterns. This can be in 3-dimensional space and in N-dimensional space. But we can come up with a means to compensate for the lack of a generator. We will generate few random numbers (discard a lot) and after generating each array we will change the generation algorithm (to get a different distribution). Green points. Czech Entropy PRNG Android Application        

Czech Entropy

  PRNG   The addition of neural networks can achieve advanced performance PRNG applications. And change them as many times as you like, maintaining synchronicity of work. public Double Prediction (Integer DataInput1, Integer DataInput2){     return neurons.get(5).compute(            neurons.get(4).compute(            neurons.get(2).compute(DataInput1, DataInput2),            neurons.get(1).compute(DataInput1, DataInput2)            ),            neurons.get(3).compute(            neurons.get(1).compute(DataInput1, DataInput2),            neurons.get(0).compute(DataInput1, DataInput2)      ...

Czech Entropy

  PRNG Czech Entropy "random" number generator is now fully functional. Although the quality of entropy is not high, it can be significantly improved. In addition, it is very easy to generate numbers in a different dimension. At least 64 digit numbers. Variable length numbers can be easily generated. You can configure the generation of numbers with gaps in the generation range and even with floating gaps (spaces). Moreover, all this is synchronous. Such generators must be programmed individually. The reliability of encryption greatly depends on this.   If you use a synchronous generator for encryption, there is a lot to do. There should be no more than two instances of the application. So that the application itself cannot be decoded, it is impossible to generate a large array of values and calculate the features of the program (this can be counteracted). The generator must use a neural network and train both instances of the application in the same way. The neur...

PRNG

  Czech Entropy Synchronous random number generators PRNG Let's look at several ways to create software random number generators using external digital streams and without them. Let's write source code for Android Java - prototypes of applications showing the reality of using algorithms. Generator of "random" numbers using expansion of source information, sampling and correction of source data. (Czech Entropy Application) We will use TTS technology in this generator - converting the entered text into speech. This option is available in the Android operating system. TTS allows you to significantly increase the volume of data (30-100 thousand times), use different settings to obtain different digital results, ensure repeatability of the results (which makes it possible to build a PRNG ), the transformation is “formulaless”. The disadvantages of the algorithm are obvious: the result is easily repeated (if you know the source text), large but not infinite expansion of the...

Czech Encryption

  PRNG   Software random number generators (especially synchronous generators) are a very interesting topic to develop. Even if we take the Mersen twister, it repeats itself after some time. But if you randomly select numbers from this stream, the likelihood of repetition will decrease. We use the second software random number generator. If you then enter permutations of the resulting numbers, the likelihood of repetitions will further decrease. This can be done many times and use dozens of generators of dozens of types. In this case, if the procedure is the same on the transmitting and receiving sides, the same results will be obtained. Those. Synchronous generation is ensured without using an interaction channel. For such systems, you can create a specialized programming language or a set of classes and methods. Of course, Android, iOS or Windows are not the operating systems on which cryptography systems are built. But they are convenient for creating and testing ...

Czech Flow

Image
  Android Encryption Differentiated encryption systems Czech Entropy and Czech Flow. Both applications allow you to use work results as input. Those. organize feedback that directly changes the result (random numbers). You can combine the mutual operation of these applications repeatedly and in different orders. If two (or more) users perform the same actions with applications (5, 10, 100 times) and use the same data, the same arrays of random numbers will be obtained. Czech Encryption

Czech Encryption

  And a very accurate watch The software generator of “random” numbers repeats itself sooner or later. By using values from another generator (of a different type) as input parameters to one generator, a longer retry period can be achieved. If you use several different types of generators... Then, in another application, listen to several streams of Internet radio or TV and select bytes in accordance with the numbers generated in the first stage, some of which are used as input data for the first stage (with software entropy generators )... It is convenient to create separate applications and combine them in sequence “as you want”. Run them for months and accumulate data Synchronous software entropy sources with positive feedback Czech Entropy, Czech Flow, Czech Encryption Encryption

Czech Entropy

 Android APP Let's finalize the https://github.com/vallshmeleff/speech2soundcryptokeysgen project so that it can use the results of the Czech Entropy application as input data and at the same time guarantee synchronicity. And we examine the quality of entropy. Czech Flow

Czech Entropy

  Mersenne   The  Mersenne Twister does not produce a set of numbers suitable for cryptography. But if threads choose a small number of numbers from this and choose from random positions, then the numbers will be random . Czech Encryption  

Czech Entropy

  Synchronous random number generator   The easiest way to build software random number generators is according to the following scheme: data expander and selection module. First, the data is expanded, for example, a million times and re-sorted. Then the required number of numbers is selected. For the next block of random numbers, the expanded array is re-sorted, several blocks are taken from it and expanded again, after which a selection is made from the bottom. You can come up with quite a few ways to expand data. This application Czech Entropy uses an algorithm that is sensitive to the operating system version. In some next version we will make an application that does not depend on the type of smartphone and operating system build. Then we will add training and self-learning modes to the application to improve entropy. Czech Entropy        

Czech Entropy

  Android Java Encryption Updated version of the synchronous random number generator. Fixed bug. Slightly improved entropy. https://drive.google.com/file/d/1in6sX45yDGty7NyDGCskZhJYJ4wo8V_T/view?usp=sharing   Czech Encryption