Blog

Stealth: Uncrackable Encryption

Stealth: Uncrackable Encryption

Abstract

Stealth is a cryptographic system utilizing the mathematically unbreakable One-Time Pad, or OTP.

It combines a new OTP-XOF hashing function, a bit-reordering exchange cipher, and ephemeral keys generated from mouse and time coordinates and a master secret.

This system makes decryption impossible without the right key, achieving Perfect Secrecy and Forward Secrecy.

Body

1. Introduction
Stealth offers a practical implementation of uncrackable encryption by utilizing:

  1. Encryption: To scramble with a key.
  2. Decryption: To undo encryption with the same key used for encrypting.
  3. Ciphers: Each cipher is a series of steps for doing encryption and/or decryption.
  4. Bits: The most basic form of computer information, short for Binary digits; only 0 or 1.
  5. Bit-Reordering Exchange Cipher: Encrypts the message by rearranging its bits based of the key, making decryption without the key mathematically impossible.
  6. Perfect Secrecy: Without knowing the key used to encrypt, its mathematically impossible to gain any information from the encrypted message.
  7. Forward Secrecy: Without knowing the key used to encrypt, even if you know the decryption of one message, its mathematically impossible to gain any information from other encrypted messages.
  8. An OTP: OTP means One-Time Pad, and OTPs are unbreakable ciphers, because they have Perfect Secrecy.
  9. Characters: The smallest units of text; numbers, letters and symbols.
  10. Hashes: A hash is the output of a mathematical function, called a hash function, that takes an input, or “message”, and produces a string of characters. The output, known as a hash value or digest, is unique to the input in the sense that even a small change to the input will produce a vastly different hash value.
  11. An XOF: An XOF, or Extendable-Output Function, is a hashing function that makes hashes of any chosen length.
  12. OTP-XOF Hashing: OTP-XOF hashing combines OTP and XOF features into one hashing function, of which the key size equals the chosen output length.
  13. Ephemeral Keys: Unique, temporary keys made using the OTP-XOF, from mouse and time coordinates and a user-provided master secret, that are for and only exist once for each encryption and/or decryption.

Bibliography

  1. Aleksander Essex. “Encryption Basics and Classical Ciphers,” September 20, 2020. https://www.youtube.com/watch?v=4-wlwrX-u7w.
  2. ScienceWorld. “One-Time Pad Cipher (Perfect Security),” May 4, 2021. https://www.youtube.com/watch?v=F5Yrk6LHM2w.
  3. Spanning Tree. “How to Send a Secret Message,” June 11, 2020. https://www.youtube.com/watch?v=I6Unxb-PFhs.

Leave a comment