Joomla! Joomla!

In this section you can find developed Test Vector Response Files used to verify the implementations of DiceLock for Windows and Linux.

DiceLock cipher architecure presents multiple possible configurations, for this reason DiceLock implementation verification has been splitted into different sets.

This set selection is based on DiceLock main class options, DiceLockIndexed, DiceLockDigested, DiceLockIVIndexed, DiceLockIVDigested, DiceLockXTSIndexed and DiceLockXTSDigested for Windows and for Linux all of them.

Test Vectors posted in this section address the use of DiceLockXTSIndexed class, which makes use of XTS_Mode, XEX-based tweaked-codebook mode with ciphertext stealing XTS block cipher operation mode algorithm.

DiceLockXTSIndexed class can be used currently with all of the following block ciphers: AES 128, AES 192, AES 256, Camellia 128, Camellia 192, Camellia 256, Serpent 128, Serpent 192, Serpent 256, Twofish 128, Twofish 192 or Twofish 256.

Besides the use of one or another base block cipher, DiceLockXTSIndexed can be used in two totally different shapes:

  Application Disclosure  
  full text randomness evaluation and reciphering is performed over full ciphertext (ciphered by index key modifier plus ciphered plaintext form a single unit that is evaluated).  
  sector size based randomness evaluation and reciphering is individually performed over storage sector based splitted ciphertext (plaintext is splitted in parts in such a way that ciphered by index key modifier plus ciphered splitted plaintext fits storage sector size, there are as many single evaluations as number of parts).  

Due to the previous different applications of DiceLockXTSIndexed class, verification has been splitted in two parts:

  Test driver programs Response test vectors for test drivers  
CheckDiceLockXTSIndexedFull for Windows
CheckDiceLockXTSIndexedFull-x for Llinux
DiceLockXTSIndexed over full text  
CheckDiceLockXTSIndexedSector for Windows
CheckDiceLockXTSIndexedSector-x for Llinux
DiceLockXTSIndexed sector based