Android Encryption
Android APP - Czech_Entropy_PRNG.docx - Android JAVA
The source data expansion module is now hardware and software dependent on the phone model and version (build) of the Android operating system. Generating the same array of numbers is ensured only on completely identical smartphones. If they differ, it is not guaranteed (but may coincide).
Currently, an alternative source data expansion module is under development, independent of the smartphone model and Android version. The module can also work with source text in any language and with special characters. After readiness and testing, such an extension module will be added to the application and it will be possible to select one or another module before generating “random” numbers.
The second module - special processing of extended data, provides an alternative probability distribution of numbers in a huge array from which the sample is made. In some ways it is similar to PGP
The sampling module is now very simple. The “randomness” of numbers significantly depends on this module. To assess the quality of the generated numbers, a 2D graphical indicator has been added to the application. In versions of the Czech Entropy PRNG application created under individual contracts, the number selection module will be different, more complex. Numbers from the sample module can be put into the result or sent to the post-processing module.
The post-processing module allows you to significantly change the distribution of the generated numbers. At the same time, the number of pseudorandom numbers increases. This module uses the single layer square method. In the future, it is planned to create a module of multilayer squares. The post-processing module significantly changes the distribution of numbers in the array and complicates cryptanalysis. However, it is not a perfect tool. In the future, it is planned to create a post-processing module (or even several modules) with fundamentally different mathematical mechanisms that allow evolution.
Such modules will make it possible to bring the quality of generated “random” numbers as close as possible to physical white noise generators.
For the safe use of such a generator in XOR calculations, several conditions are provided:
- a short array (60-120) of “random” numbers, which complicates data processing
- use of new data (text or numbers) as initial data to generate an array of “random” numbers (key for XOR transformation) and only one-time use of each key
- use of an application manufactured under an individual contract to exclude direct analysis of operating algorithms
- (in the future) use of an application with an evolving module for post-processing of the generation result. In this case, the model of distribution of numbers in the array will correspond to different algorithms each time, and the short length of the array (key) will make cryptanalysis extremely difficult (or make it impossible). There is a problem here with significant labor costs to create such a module. Now (Dec. 2023) this is at the initial stage.
Czech Entropy PRNG - Install APK >>
|