DiceLock Security
Wednesday, 16 April 2014
  DiceLock improves symmetric ciphers like AES (Advanced Encryption Standard) and others.
  Providing maximum information security privacy with little time.
DiceLock Security
DiceLock cryptgraphic architecture

DiceLock is an Open Source cryptographic architecture to generate encrypted data sequences ensuring that they have randomness properties.

It improves well known symmetric cryptographic algorithms block ciphers like AES (with 128, 192 or 256 bit keys) with different operation modes (CBC, CFB, OFB and XTS) and stream ciphers like HC 128 and HC 256. DiceLock does not modify such algorithms, just make use of them to get randomized-encrypted text sequences.

DiceLock cipher
Random Tests
Security based on signs
Users can check randomness
Cloud storage concerns
Online randomness verification
DiceLock research
Intellectual property

As for version we have performed a thorough DiceLock cipher architecture restructuring to be able to work with more different different kinds of encryption cipher algorithms: stream ciphers with no initialization vector, added new stream ciphers with initialization vector and added new block ciphers to work with all corresponding DiceLock architectures.

New version incorporates new added cipher algorithms:

  • block ciphers as: Camellia, Serpent, Twofish (all of them with 128, 192 or 256 bit keys), TDEA(1) (with 192 bits),
  • stream ciphers with IV as: Rabbit, Salsa 20/20, Sosemanulk, and
  • stream ciphers with no IV as: RC4(1)

Note (1): these algorithms have been added in order to provide backward compatibility, architecture verification and laboratory evaluation.

While performing quality assurance on new version, old version DiceLock version is still available online at following links:

DiceLock checks encrypted sequences to verify if they are at random (there are no patterns in the encrypted sequence), if the sequence is at random it is provided as a secure sequence, it it is not at random DiceLock modifies the input (like the key) in order to generate a new encrypted sequence to be checked for randomness.

DiceLock makes use of standard random number tests like those described in FIPS 800-22 rev1a of NIST (National Institute of Standards and Technology, U.S. Departament of Commerce) as Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test and Discrete Fourier Transform Test.


Since Internet was born secure communications are an important point in mind. Secure communications are basic for current electronic society and e-commerce.

Untill now users must rely on expert analyses that encrypted information is secure and can not be accessed by third parties. Users must rely on icons (like a lock) or other image to get confidence that their communications are secure.

DiceLock cipher was born with the idea to get users closer to encryption, to give them the ability to check by themselves that there is no hidden pattern, that the encrypted information is at random.

DiceLock can be incorporated into well known cryptographic protocols like SSL, TLS and alike like any other symmetric cipher. It allows users to check for randomness properties if they wish.

One of the next computer paradigms is Cloud storage, where the user information is going to be hosted in third party companies. It allows the user to access and share the information on any computer through web service application programming interfaces or through a Web-based user interfaces..

It has advantages as you only pay for the storage used, there is no need to install physical storage devices in own datacenter or offices (reducing IT and hosting costs) and storage maintenance tasks, such as backup, data replication, and purchasing additional storage devices are offloaded to the responsibility of a service provider, allowing to focus on core business.

But Cloud storage offers potential security concerns regarding stored data and data in transit when storing sensitive data at a cloud storage provider.

DiceLock provides means to get user confidence that sensitive data stored in third party companies can not be accessed. The user itself is able to check that randomized-encrypted information is at random, he can apply random number tests to verify that there are no hidden patterns that can be analyzed.

DiceLock cryptographical architecture implies to apply random number tests to the encrypted sequence. Thus, as random number tests are always applied, there is an important issue to analyze, the increment of resources that the process needs.

Two main aspects of DiceLock research are performed:

- the feasibility of block ciphers (making use of operation modes) and stream ciphers to generate randomized encrypted sequences when they are tested with random number NIST tests, and

- the time analysis of all algorithms (encryption algorithms, random number tests and hash functions) to check the feasibility to use some or all of them to achive randomized-encrypted text sequences.

First approach to DiceLock was performed in 1.998 making use of IDEA (International Data Encryption Algorithm) working with CBC operation mode, and random number tests shown in FIPS PUB 140-1, "Security Requirements For Cryptographic Modules".

IDEA is a patented technology that was traded by ASCOM, AG. As a patented technology was used to implement DiceLock, intellectual property path was followed by DiceLock Security team. This approach led us to get "Randomization-Encryption System" patent.


As the evolution was conceived and first tests performed, the evolution had been applied for patent application. DiceLock Security team was granted with european patent EP1182777 and US patent US7508945, titled "Self-corrector randomisation-encryption and method". This patent document implements the current architecture of DiceLock, where the algorithm changes automatically the key (for example) to get randomized-encrypted text sequences.
DiceLock Security is a software developer company providing Information Security software based on DiceLock cipher.
Download FREE software NOW !!!
Get C++ Source Code NOW !!!

DiceLock Security has developed DiceLockSecurity namespace, where all DiceLock Security C++ classes are implemented. Check our Knowledge website, where you can  get the classes and interfaces.

Dicecheker DLL

Download FREE DiceChecker !!!.

DiceChecker is a Dynamic Link Library for Microsoft Windows environments implemented in pure, non managed, C++ language.

DiceChecker implements the random number tests published in NIST (National Institute of Standards and Technology) FIPS Special Publication 800-22 rev.1a that are can be used in DiceLock project. The random number tests that can be used with a minimum stream length less than 1.000.000 bits.

Click here to get it FREE !!!.

Do you want DiceChecker Source Code ?, click here !!!.

NEW !!!: released version, you can get the new version from the previous download links.
Click here if you want to see change log.

DiceChecker implements the following random number tests: Frequency Test, Block Frequency Test, Cumulative Sum Forward Test, Cumulative Sum Reverse Test, Runs Test, Longest Run Of Ones Test, Rank Test, Universal Test, Approximate Entropy Test, Serial Test, Discrete Fourier Transform Test.

HashDigester DLL

Download FREE HashDigester !!!.

HashDigester is a Dynamic Link Library for Microsoft Windows environments implemented in pure, non managed, C++ language.

Click here to get it FREE !!!.

NEW !!!: released version, you can get the new version from the previous download link.

HashDigester implements the following hash algorithms:

SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256 and RIPEMD 320.

Dicecheck GUI
Download FREE DiceCheck !!!.

Click here to get it !!!.

Do you want DiceChecker & DiceCheck Source Code ?, click here !!!.

With DiceCheck you can verify all random tests implemented in DiceChecker. It contains an implementation of DiceChecker.

DigesterCheck GUI
Download FREE DigesterCheck !!!.

Click here to get it !!!.

With DigesterCheck you can verify all hash algorithms implemented in HashDigester. It contains an implementation of HashDigester.


Newsletter Subscription

Subscribe to our Newsletter. If you want to know the purpose of our Newsletter, click here !!!

 How to remove Rvzr-a.akamaihd.net popup virus . How to remove Qone8