I have proposed a fast [but hopefully secure] random number generator/stream cipher.Fibonacci Generators running: F1a, F1b, F1c, F1d, … . At the same time when W1 is changed, F1 is randomly switched. For example if F1d has been running F1b will start running.
We start with a very fast random number generator such as the Lagged Fibonacci Pseudorandom Generator F1. We XOR the output with a 32/64 bit random word W1. After a random number of steps of F1 the word W1 is changed. In addition there are several
The random word W1 as well as the random interval and the random switch index are generated by a similar Fibonacci Generator F2. The random word W2, the random interval and switch index for F2 are generated by F3. F2 runs about an order of magnitudemore slowly than F1, and F3 about an order of magnitude more slowly than F2.
The random word W3, the random intervals and switch indexes for F3 are generated by a slow but very secure pseudo-random generators. It could be a provably secure generator such as Quadratic Residue Generator.description of the cipher.
Can you break this?
Source code can be downloaded from http://cascaderesearch.tripod.com/monetary-reward.html [Please click Download Evaluation Kit.] White Paper can be downloaded from http://cascaderesearch.tripod.com/home.html [White Paper.] It contains more detailed
You have already posed this and have received responses and criticism.
But instead of responding to those you simply repost again.
You have definitely enetered the kook category.
On 2017-02-10, Cascade Research <quadcascares@gmail.com> wrote:Fibonacci Generators running: F1a, F1b, F1c, F1d, … . At the same time when W1 is changed, F1 is randomly switched. For example if F1d has been running F1b will start running.
I have proposed a fast [but hopefully secure] random number generator/stream cipher.
We start with a very fast random number generator such as the Lagged Fibonacci Pseudorandom Generator F1. We XOR the output with a 32/64 bit random word W1. After a random number of steps of F1 the word W1 is changed. In addition there are several
more slowly than F1, and F3 about an order of magnitude more slowly than F2.The random word W1 as well as the random interval and the random switch index are generated by a similar Fibonacci Generator F2. The random word W2, the random interval and switch index for F2 are generated by F3. F2 runs about an order of magnitude
description of the cipher.The random word W3, the random intervals and switch indexes for F3 are generated by a slow but very secure pseudo-random generators. It could be a provably secure generator such as Quadratic Residue Generator.
Can you break this?
Source code can be downloaded from http://cascaderesearch.tripod.com/monetary-reward.html [Please click Download Evaluation Kit.] White Paper can be downloaded from http://cascaderesearch.tripod.com/home.html [White Paper.] It contains more detailed
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 112 |
Nodes: | 8 (1 / 7) |
Uptime: | 09:16:34 |
Calls: | 2,468 |
Files: | 8,620 |
Messages: | 1,889,471 |