======================
**OTG Cryptography**
======================
The expansion of OTG cryptography is One Time Gamble. It is a hybrid and lightweight cryptographic system. that transforms a plaintext into a ciphertext so that secret communication is to be ensured.
--------------------
**Preface**
--------------------
In the OTG system, the original password is hidden under several fake passwords in a vault. Also, these passwords are hashed by bcrypt hash function which is a one-way encryption and cannot be reversed. Moreover, the secret message will be deleted by itself if a user gives the wrong password only at once. As a result, it will be so much more difficult for a hacker to guess, retrieve and use the password correctly among fake passwords. Furthermore, the key is 128 bits long. So, a hacker needs to go for 2128 = 3.402e+38 possible ways in terms of finding the correct key to decrypt the ciphertext. It is by far impossible for a regular user device to solve the math. It will need a supercomputer to do the computation. However, a low computational powered device (e.g. IOT device) can easily handle it because of its symmetric and stream cipher architecture. Thus, it makes the algorithm lightweight. Also, OTG is a software and hardware-independent cryptography. In conclusion, this new innovation can make a fruitful impact on the current security epidemic.
----------------------------
**Program Utilization**
----------------------------
* A user inputed password.
* A user inputed secret message.
* The secret messages is stored in a vault with ChaCha20poly1305 method.
* A dictionary is containing manipulated (fake) passwords in addition to the real password.
* A dictionary containing seeds (Seed generator). Seeds are simply pointers that point to the secret message.
* The encryption algorithm: **cipher = password XOR key**.
* The decrpytion algorithm: **key = password XOR cipher**.
* A try/except block to search for actual password that do exist in the password dictionary.
* The message will be deleted if a user give wrong password.
--------------------------------
**Ideal Applications To Use**
--------------------------------
* Government Secret Message
* Sensitive Business Communication
* Low Computational Powered Device
--------------------------------
**Caution**
--------------------------------
* OTG is a very typo sensitive system.
* It should be used only for very sensitive work.
* This cryptography ensures OTC (One Time Chance) method.
* Message will be deleted if a user gives wrong password only at once.
--------------------------------
**Do You Want To Know Me?**
--------------------------------
* **Call**: +8801818832925
* **Email**: tahsin.ahmed@g.bracu.ac.bd
* **Facebook**: https://www.facebook.com/ahmedinsider
Raw data
{
"_id": null,
"home_page": "",
"name": "otgCrypto",
"maintainer": "",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "cryptography,encryption,decryption,otg,otg cryptography,one time gamble,one time gamble cryptography",
"author": "Tahsin Ahmed",
"author_email": "",
"download_url": "https://files.pythonhosted.org/packages/68/7f/ba856ec48b8453b92c96cdaae2736390f8479f7054b5f236cba1dcb792c4/otgCrypto-0.0.21.tar.gz",
"platform": null,
"description": "======================\r\n**OTG Cryptography**\r\n======================\r\nThe expansion of OTG cryptography is One Time Gamble. It is a hybrid and lightweight cryptographic system. that transforms a plaintext into a ciphertext so that secret communication is to be ensured.\r\n\r\n--------------------\r\n**Preface**\r\n--------------------\r\nIn the OTG system, the original password is hidden under several fake passwords in a vault. Also, these passwords are hashed by bcrypt hash function which is a one-way encryption and cannot be reversed. Moreover, the secret message will be deleted by itself if a user gives the wrong password only at once. As a result, it will be so much more difficult for a hacker to guess, retrieve and use the password correctly among fake passwords. Furthermore, the key is 128 bits long. So, a hacker needs to go for 2128 = 3.402e+38 possible ways in terms of finding the correct key to decrypt the ciphertext. It is by far impossible for a regular user device to solve the math. It will need a supercomputer to do the computation. However, a low computational powered device (e.g. IOT device) can easily handle it because of its symmetric and stream cipher architecture. Thus, it makes the algorithm lightweight. Also, OTG is a software and hardware-independent cryptography. In conclusion, this new innovation can make a fruitful impact on the current security epidemic.\r\n\r\n----------------------------\r\n**Program Utilization**\r\n----------------------------\r\n* A user inputed password.\r\n* A user inputed secret message.\r\n* The secret messages is stored in a vault with ChaCha20poly1305 method.\r\n* A dictionary is containing manipulated (fake) passwords in addition to the real password.\r\n* A dictionary containing seeds (Seed generator). Seeds are simply pointers that point to the secret message.\r\n* The encryption algorithm: **cipher = password XOR key**.\r\n* The decrpytion algorithm: **key = password XOR cipher**.\r\n* A try/except block to search for actual password that do exist in the password dictionary.\r\n* The message will be deleted if a user give wrong password.\r\n\r\n--------------------------------\r\n**Ideal Applications To Use**\r\n--------------------------------\r\n* Government Secret Message\r\n* Sensitive Business Communication\r\n* Low Computational Powered Device\r\n\r\n--------------------------------\r\n**Caution**\r\n--------------------------------\r\n* OTG is a very typo sensitive system.\r\n* It should be used only for very sensitive work.\r\n* This cryptography ensures OTC (One Time Chance) method.\r\n* Message will be deleted if a user gives wrong password only at once.\r\n\r\n--------------------------------\r\n**Do You Want To Know Me?**\r\n--------------------------------\r\n* **Call**: +8801818832925\r\n* **Email**: tahsin.ahmed@g.bracu.ac.bd\r\n* **Facebook**: https://www.facebook.com/ahmedinsider\r\n",
"bugtrack_url": null,
"license": "",
"summary": "OTG cryptography is architectured by Tahsin Ahmed.",
"version": "0.0.21",
"project_urls": null,
"split_keywords": [
"cryptography",
"encryption",
"decryption",
"otg",
"otg cryptography",
"one time gamble",
"one time gamble cryptography"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "88973c7b631e9ad6e5cae268de63adf92b8466da7393b8319a2882cb9b41ac1b",
"md5": "4e7c13605ed8aa8b0464e854362bd1de",
"sha256": "605ea5e245bf18800fbc4e4bdc17840bc0beeb3c980eb76cb6855f14dc97c5a5"
},
"downloads": -1,
"filename": "otgCrypto-0.0.21-py3-none-any.whl",
"has_sig": false,
"md5_digest": "4e7c13605ed8aa8b0464e854362bd1de",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 14897,
"upload_time": "2023-07-31T21:41:00",
"upload_time_iso_8601": "2023-07-31T21:41:00.370822Z",
"url": "https://files.pythonhosted.org/packages/88/97/3c7b631e9ad6e5cae268de63adf92b8466da7393b8319a2882cb9b41ac1b/otgCrypto-0.0.21-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "687fba856ec48b8453b92c96cdaae2736390f8479f7054b5f236cba1dcb792c4",
"md5": "5d719d17aa08adf298e20c17a143701d",
"sha256": "096a11f28da0f46424d936f90bc22a480d4feccff16e69b966d8b70ca4d4ca0b"
},
"downloads": -1,
"filename": "otgCrypto-0.0.21.tar.gz",
"has_sig": false,
"md5_digest": "5d719d17aa08adf298e20c17a143701d",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 14941,
"upload_time": "2023-07-31T21:41:02",
"upload_time_iso_8601": "2023-07-31T21:41:02.121931Z",
"url": "https://files.pythonhosted.org/packages/68/7f/ba856ec48b8453b92c96cdaae2736390f8479f7054b5f236cba1dcb792c4/otgCrypto-0.0.21.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-07-31 21:41:02",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "otgcrypto"
}