P300
LOADING...
#How To Create An Online Account Using Digital Chip Card Locker
#See how signing up with DCCL works - step by step, in detail
1 The client enters the desired username.
2 A pair of RSA keys is generated locally on the user's device: one is the private key, and the other is the public key. The private key must be kept secret and must never be shared with others or its contents revealed, while the public key is publicly available and can be shared with other parties.
3 The client is required to save the generated private key on their device. The public key is automatically uploaded to the registration server, which triggers the sending of a registration request.
4 The server generates a temporary code for end-to-end encrypted communication with the client. The temporary code consists of 500 randomly generated digits arranged in 10 series of 50 digits, each series being divided into 9 chunks. The temporary code formed is called a DCCL key. DCCL technology includes logarithmic functions and exponential functions as mutual inverse functions, with different bases, exponents and arguments derived from the corresponding parts of the DCCL key.
5 A DCCL key can be composed of a large number of randomly generated digits (up to 1500 or even more) arranged in as many series as needed (it can be a series of 1, 2, 5, 10 or even 50), while the number of chunks varies from 9 to 17. It all depends on how strong the encryption is supposed to be. The more digits, the more series and chunks, the stronger the protection. On the other hand, the response time increases, which greatly affects the time required to perform encryption and decryption. In some cases, such as online payments, it is unacceptable to wait too long for the transaction to be completed and a compromise solution must be found.
The combination 500/10/50/9 has proven to be very successful. This is what it looks like when spoken in the language of mathematics.
A string consisting of 50 randomly selected digits is generated and included in the formulas for data encryption and decryption, respectively:
y[i] = Math.log(Math.pow(s[6], Math.log(Math.log(Math.pow(s[2], Math.log(Math.log(x[i]) / Math.log(base) + s[0]) / Math.log(s[1])) + s[4]) / Math.log(s[3])) / Math.log(s[5]))) / Math.log(s[7]);
x[i] = Math.round(Math.pow(base[n], Math.pow(s[1], Math.log(Math.pow(s[3], Math.pow(s[5], Math.log(Math.pow(s[7], y[i])) / Math.log(s[6]))) - s[4]) / Math.log(s[2])) - s[0]));
where X is the input signal,
Y is the output signal,
0 <= N < 9,
0 <= I < the length of the input signal,
BASE is a substring of the input signal consisting of digits from 0 to 3,
S[0] is a substring of the input signal consisting of digits from 3 to 8,
S[1] is a substring of the input signal consisting of digits from 8 to 15,
S[2] is a substring of the input signal consisting of digits from 15 to 22,
S[3] is a substring of the input signal consisting of digits from 22 to 27,
S[4] is a substring of the input signal consisting of digits from 27 to 32,
S[5] is a substring of the input signal consisting of digits from 32 to 37,
S[6] is a substring of the input signal consisting of digits from 37 to 43,
and finally, S[7] is a substring of the input signal consisting of digits from 43 to 50.
The input signal can be an array of letters and numbers, a file, or a message.
The sum of the substrings is the total number of chunks that the string consisting of randomly selected digits is divided into, which in this case is 9 (i.e. S[0]...S[7] + BASE).
Each new row of bytes that make up the input signal is encrypted with a new sequence consisting of 50 randomly selected digits, for a total of 500 digits arranged in 10 series. When the sequence counter reaches the value 10, the process is repeated.
The output signal is an array of logarithmic values representing the encrypted bytes from the input signal. The total length of the output signal is equal to the number of bytes of the input signal increased by a certain number of artificially generated "fake" logarithmic values, which further enhances the degree of protection of encrypted data.
For more details, please refer to https://soundsofsoftware.com/js/login.js.
6 Each of the 10 strings that make up the DCCL key is encrypted with the client's public key on the server side, notifying the client that the file containing the DCCL key is ready to be downloaded. The DCCL key is temporarily stored in the memory of the application that manages the registration process until the registration is complete and is not stored or logged anywhere else.
7 The client loads the encrypted DCCL key and decrypts it using the corresponding private key located on the client's device. The decrypted set of DCCL keys is temporarily stored in the browser's memory (and is not stored or logged anywhere else) and will be used to encrypt data that the client sends to the server.
8 The entered username is encrypted with the loaded DCCL key. The algorithm involves end-to-end encryption springing from a combination of multiple logarithmic functions, each containing a base and exponent derived from the corresponding part of the DCCL key.
9 A composite file containing the encrypted username, the hash code calculated from the original username, a timestamp, and DCCL-encoded variables associated with artificially generated "fake" logarithmic values is created on the client's device. This is called a data file.
10 A hash code is calculated for the given data file. The generated hash code represents a digital signature attached to the file and verifies the integrity of the file and the authenticity of the client who initiated the registration.
11 The digital signature is encrypted using the loaded DCCL key and inserted into the data file, which is then uploaded in its entirety to the server.
12 The server accepts the digitally signed data file and decrypts the digital signature and DCCL-encrypted variables using the inverse DCCL algorithm and the very same DCCL key that was used for encryption on the client side.
13 The digital signature is validated by recalculating the hash codes and checking whether they match. The availability of the requested username is also confirmed (or not confirmed), and the client is notified of the result.
14 If the digital signature is valid and the username is available, the registration is complete.
15 The application that manages the registration process creates a log file named after the hash code and writes the client's public key and the client's username to the file. Although this is public data, there is no reason not to store the file in a secure location, which would make it inaccessible to cyberattacks. This is called a registration file.
16 If the digital signature is not valid or the username is not available, the registration process must be repeated.
17 Finally, the application that manages the registration process will be closed and the temporary DCCL key will be deleted from the server.
#Share on social media
#End-to-end encryption in the truest sense of the word: ChatLiner, at your service
ChatLiner is a messaging platform that provides authentic end-to-end encryption of transferred files and messages and prevents their modification, loss, damage or misuse. There is no compromise, interception or collection of users' personal data or sensitive data from users' devices.
#ChatLiner is a messaging platform that provides authentic end-to-end encryption of transferred files and messages and prevents their modification, loss, damage or misuse. There is no compromise, interception or collection of users' personal data or sensitive data from users' devices.