Skip to main content

OTG cryptography is architectured by Tahsin Ahmed.

Project description

OTG Cryptography

The expansion of OTG cryptography is One Time Gamble. It is a hybrid and lightweight cryptographic system. that transforms a plaintext into a ciphertext so that secret communication is to be ensured.

images/OneTimeGamble.png

Preface

In the OTG system, the original password is hidden under several fake passwords in a vault. Also, these passwords are hashed by bcrypt hash function which is a one-way encryption and cannot be reversed. Moreover, the secret message will be deleted by itself if a user gives the wrong password only at once. As a result, it will be so much more difficult for a hacker to guess, retrieve and use the password correctly among fake passwords. Furthermore, the key is 128 bits long. So, a hacker needs to go for 2128 = 3.402e+38 possible ways in terms of finding the correct key to decrypt the ciphertext. It is by far impossible for a regular user device to solve the math. It will need a supercomputer to do the computation. However, a low computational powered device (e.g. IOT device) can easily handle it because of its symmetric and stream cipher architecture. Thus, it makes the algorithm lightweight. Also, OTG is a software and hardware-independent cryptography. In conclusion, this new innovation can make a fruitful impact on the current security epidemic.

Program Utilization

  • A user inputed password.

  • A user inputed secret message.

  • The secret messages is stored in a vault with ChaCha20poly1305 method.

  • A dictionary is containing manipulated (fake) passwords in addition to the real password.

  • A dictionary containing seeds (Seed generator). Seeds are simply pointers that point to the secret message.

  • The encryption algorithm: cipher = password XOR key.

  • The decrpytion algorithm: key = password XOR cipher.

  • A try/except block to search for actual password that do exist in the password dictionary.

  • The message will be deleted if a user give wrong password.

Ideal Applications To Use

  • Government Secret Message

  • Sensitive Business Communication

  • Low Computational Powered Device

Caution

  • OTG is a very typo sensitive system.

  • It should be used only for very sensitive work.

  • This cryptography ensures OTC (One Time Chance) method.

  • Message will be deleted if a user gives wrong password only at once.

Do You Want To Know Me?

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

otgCrypto-0.0.15.tar.gz (15.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

otgCrypto-0.0.15-py3-none-any.whl (14.9 kB view details)

Uploaded Python 3

File details

Details for the file otgCrypto-0.0.15.tar.gz.

File metadata

  • Download URL: otgCrypto-0.0.15.tar.gz
  • Upload date:
  • Size: 15.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.9

File hashes

Hashes for otgCrypto-0.0.15.tar.gz
Algorithm Hash digest
SHA256 557d348dc46b909fba1f2034bfe2f72353ed76da0ad28314ddd43d9315b5b48b
MD5 94f40ff88719ea78f5340b6e8a6f64db
BLAKE2b-256 083cae8addba32b05227440dc575a66030d45ab7651248c42670b5691ea2b218

See more details on using hashes here.

File details

Details for the file otgCrypto-0.0.15-py3-none-any.whl.

File metadata

  • Download URL: otgCrypto-0.0.15-py3-none-any.whl
  • Upload date:
  • Size: 14.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.9

File hashes

Hashes for otgCrypto-0.0.15-py3-none-any.whl
Algorithm Hash digest
SHA256 3f806a0be009ceb6b7675ee94af334c69fff91c8ad97ab005eadf20d1a18310f
MD5 0db011ffef9dfcfb0e4a5d2aeaaa7241
BLAKE2b-256 09cb6acf997302a98615fcd0ffa098813291fff57587ca6020ae67cd944e8be5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page