Entropy in cryptography is the capacity for randomness in the distribution of information. The higher the entropy, the more effective the encryption, preventing the attacker from being able, through frequency analysis of the letters, to identify patterns that allow the original data to be discovered.
Entropy can be measured using mathematical formulas, Shannon's being the best known - but considered only the bare minimum. We utilized in our tests other algorithms besides Shannon (both for bits and bytes), like Bi-Entropy and Tres-Bi-Entropy.
Below are the entropy results obtained by both OBAKE, AES-CBC, and XSalsa20 on several different files, demonstrating the absolute quality of the OBAKE-512 algorithm to a worldwide accepted denominator.
If you want details about the program and the files used as well as the methodology employed, please visit this page.
The pictures below demonstrate the quality of OBAKE, in comparison with the most in-compliance algorithm (AES).
All sequences show:
C.E. Shannon, "A Mathematical Theory of Communication", The Bell System Technical Journal Vol 27 Issue 3, 1948, https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
A. Biryukov, Encyclopedia of Cryptography and Security, H. C. v. Tilborg, Ed., SpringerScience+Business Media LLC, 2011.
A. Vassilev, T.A. Hall et al., "The Importance of Entropy to Information Security", IEEE - Computer Vol 47 Issue 2, 2014, https://doi.org/10.1109/MC.2014.47
B. Zolfaghari, K. Bibak, T. Koshiba, "The Odyssey of Entropy: Cryptography", https://doi.org/10.3390/e24020266
C. Ellison, C. Hall, R. Milbert, B. Schneier, "Protecting Secret Keys with Personal Entropy", FGCS Vol 16 issue 4, Elsevier, 2000
S.R.Davies, R.Macfarlane et al., "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification", Napier University, https://doi.org/10.3390/e24101503.
V.Kumar, V.Pathak et al., "Complex Entropy-based Encryption and Decryption Technique for Securing Medical Images", Springer Nature, https://doi.org/10.1007/s11042-022-13546-z
Y.Dodis, A.Smith, "Entropy Security and the Encryption of High Entropy Messages", Cryptology ePrint Archive, https://eprint.iacr.org/2004/219
Entropy in Computing, https://en.wikipedia.org/wiki/Entropy_(computing)