Privacy Policy
1. Overview
Our service uses Telegram information for login and registration. This ensures the security
of your information and
manages it according to Telegram's rules.
2. Protection of Personal Information
Your personal information is strictly protected, and you can use our service with
confidence. We are committed to
safeguarding your personal information.
3. Collected Personal Information Items and Methods
When you register, you need to provide your name (alias or nickname) and phone number. This
information is securely
stored and managed using the GNUBOARD encryption method.
4. Retention and Use Period of Personal Information
Your information will be retained for 3 years after you withdraw your membership. This is
to prevent duplicate
registrations and re-registration of abnormal players.
5. Destruction of Personal Information
Personal information that has expired is destroyed immediately. However, if certain
information needs to be retained
according to laws and regulations, it will be safely stored for the required period.
6. Measures to Ensure the Safety of Personal Information
We implement administrative, technical, and physical measures to ensure the safety of
personal information.
7. Personal Information Protection Officer and Contact Information
If you have any inquiries regarding personal information protection, please contact us at
the following contact
information.
AES-256-CBC Algorithm
The AES-256-CBC algorithm is a highly secure data encryption standard widely used for data protection. Below is a
detailed explanation of AES-256-CBC.
AES (Advanced Encryption Standard)
AES is a symmetric key encryption algorithm published by the National Institute of Standards and Technology (NIST).
AES uses the same key for both encryption and decryption, which is why it is called a symmetric key encryption. AES
supports three key lengths (128, 192, and 256 bits), with AES-256 using the longest key length, providing the
highest level of security.
AES-256
AES-256 refers to the version of the AES algorithm that uses a 256-bit key. Using a 256-bit key for encryption and
decryption provides a very high level of security. AES-256 is widely used for protecting sensitive data in
government, financial institutions, and other critical areas.
CBC (Cipher Block Chaining)
CBC is one of the block cipher modes, where each plaintext block is XORed with the previous ciphertext block before
being encrypted. This enhances security by ensuring that identical plaintext blocks result in different ciphertext
blocks.
How AES-256-CBC Works
-
Key and IV (Initialization Vector):
- The AES-256-CBC algorithm uses a 256-bit key and a 128-bit initialization vector (IV).
- The IV is a random value used at the start of the encryption process to ensure that identical plaintexts
do not produce identical ciphertexts.
-
Encryption Process:
- The plaintext block is first XORed with the IV and then encrypted using the AES-256 algorithm.
- The next plaintext block is XORed with the previous ciphertext block before being encrypted.
- This process is repeated for all plaintext blocks to produce the final ciphertext.
-
Decryption Process:
- The ciphertext block is decrypted using the AES-256 algorithm and then XORed with the previous
ciphertext block to produce the plaintext block.
- The first ciphertext block is XORed with the IV to produce the first plaintext block.
Advantages
- High Security: AES-256 provides very strong security with its 256-bit key.
- Speed: Hardware acceleration support allows for fast encryption and decryption.
- Standardization: AES is an internationally accepted standard, widely used and trusted.
Disadvantages
- Key Management: Symmetric key encryption requires careful key management. If the key is
exposed, the security of the encrypted data is compromised.
- Performance: Software implementations can be somewhat slow, but hardware acceleration can
improve performance.
Conclusion
The AES-256-CBC algorithm provides highly secure data encryption and is widely used to protect sensitive data. By
combining a 256-bit key with CBC mode, it maintains high security while performing efficient encryption and
decryption. This has made it a fundamental component of data security.