Changes To Experiment: mmmv_microbot_crypto_t1: Implementation Ideas
Not logged in

Changes to "Experiment: mmmv_microbot_crypto_t1: Implementation Ideas" between 2016-12-29 23:00:31 and 2016-12-29 23:19:49

     8      8   compensate for the slowness of the hardware based bitstream generator. The
     9      9   hardware based bitstream generator might use light, sound, electrical noise <i>(even
    10     10   regular electrical noise, like the 50Hz or some engine noise)</i> for an input
    11     11   to some fast cryptographically relatively strong hash function <i>(not
    12     12   unrollable, has collisions)</i>. The hash function output would be the random
    13     13   bitstream.&nbsp;</p>
    14     14   
           15  +<p><br>
           16  +</p>
           17  +
           18  +<h1>Cipher</h1>
           19  +
           20  +<p>The cipher will probably be based on the
           21  +<a href="http://longterm.softf1.com/specifications/txor/">TXOR</a> and the same
           22  +quad-block idea that is being used at the
           23  +<a href="https://github.com/martinvahi/mmmv_devel_tools/tree/master/src/mmmv_devel_tools/mmmv_crypt_t1">mmmv_crypt_t1</a>,
           24  +except that may be in stead of 4 blocks there will be a variable number of
           25  +blocks and in stead of the 3 choices that the mmmv_crypt_t1 uses, the choices
           26  +are:</p>
           27  +
           28  +<p>
           29  +<ul>
           30  +<li>The next block is a choice description block.</li>
           31  +<li>The next block is noise and the block after the next block is data.</li>
           32  +<li>The next block is noise and the block after the next block is a choice
           33  +description block.</li>
           34  +</ul></p>
           35  +
           36  +<p>To limit the maximum ciphertext size per unit of cleartext data volume, the
           37  +maximum number of non-data blocks between data blocks must be limited. The
           38  +limit is an encryption algorithm parameter. To hide the location of the data
           39  +blocks the transmission must hide the ciphertext creation rates. That is to
           40  +say, it is essential that the ciphertext is transmitted in a constant rate,
           41  +through a FIFO.</p>
           42  +
    15     43   <p><br>
    16     44   </p>
    17     45   
    18     46   <h1>Hash Function</h1>
    19     47   
    20     48   <p>Probably one needs to write that from scratch, because 8bit MCUs are usually
    21     49   not used for executing cryptographically strong hash functions. The