Joomla! Joomla!
DiceLock for Windows

DiceLock 9.0.0.1 dll DiceLock cipher architecture implementation dynamic-link library allows to work with memory that is kept in RAM, memory pages are locked in RAM and they are not swapped to hard disk.

DiceLock provides this feature through the use of PhysicalCryptoRandomStream class. PhysicalCryptoRandomStream objects can be employed to keep any kind of data like encryption symmetric keys, plaintexts, ciphertexts, hash digests, streams to be checked for randomness, etc.

C++ driver programs CheckDiceLockBaseAlgorithms, CheckDiceLockKeyModifiers, CheckDiceLockIndexed, CheckDiceLockDigested, CheckDiceLockIVIndexed-CBC, CheckDiceLockIVIndexed-CFB, CheckDiceLockIVIndexed-OFB, CheckDiceLockIVIndexed-noOM, CheckDiceLockIVDigested-CBC, CheckDiceLockIVDigested-CFB, CheckDiceLockIVDigested-OFB, CheckDiceLockIVDigested-noOM, CheckDiceLockXTSIndexedFull, CheckDiceLockXTSIndexedSector, CheckDiceLockXTSDigestedFull or CheckDiceLockXTSDigestedSector operate with both types of memory handlers (memory swapped to hard disk and memory pages locked). It's an option that allows to perform the same kind of tests with both memory types.

Unlike the use of DefaultCryptoRandomStream objects (which handle default memory management, memory pages can be swapped to hard disk) that can be used with any version of Windows, Home, Professional, Enterprise, Datacenter, etc since Windows XP and above, the use PhysicalCryptoRandomStream objects is limited to some versions of the operating systems.

PhysicalCryptoRandomStream objects can only be instantiated in those operating systems that work with "Local Security Policy" and "Lock pages in memory" can be set within "User rights assignment".

PhysicalCryptoRandomStream objects can be created with Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 8.1 in versions Professional, Enterprise and other editions. To do so, some configuration must be done and execution steps must be performed.

Windows XP Professional edition and above

Being logged in with an administrator account, from Windows desktop, access to:

  • Start
  • Control Panel
  • Administrative tools
  • Local Security Policy

within Local Security Policy dialog, select in order:

  • Left pane:
    • Security Settings
    • Local Policies
    • User Rights Assignment
  • Right pane:
    • Lock pages in memory (double click)
    • Add user or group - Select users and/or groups that will be able to lock pages, and Accept them
    • Reboot system

Any driver program execution once previous steps have been performed and logged in user has Lock pages in memory rights:

  • from Visual Studio 2008: execute as normal, no need to perform any specific action.
  • from desktop explorer: contextual menu of program and select Open option.
  • from command line: go to program folder and execute program.

Windows 7, 8 or 8.1 Professional edition and above

Being logged in with an administrator account, from Windows desktop, access to:

  • Start
  • Control Panel
  • Administrative tools
  • Local Security Policy

within Local Security Policy dialog, select in order:

  • Left pane:
    • Security Settings
    • Local Policies
    • User Rights Assignment
  • Right pane:
    • Lock pages in memory (double click)
    • Add user or group - Select users and/or groups that will be able to lock pages, and Accept them
    • Reboot system

Any driver program execution once previous steps have been performed and logged in user has Lock pages in memory rights:

  • from Visual Studio 2013: once selected Visual Studio 2013, open context menu with mouse right button, select "Run as administrator", and operate as normal.
  • from desktop explorer: select program and from contextual menu of program, select "Run as administrator" option.
  • from command line: select "Command line" and from contextual menu of "Command line", select "Run as administrator", go to program folder and execute program.