TFC 0.5.5 is now out I found another vulnerability in the constant transmission feature; between each long message only one command would be sent at most. This issue has now been fixed. After a request, I added further message authentication for CEV: In addition to GMAC it now does encrypt-then-MAC style authentication using HMAC-SHA2-512 (512-bit key) and SHA3-512 MAC (1144-bit key) before GCM authenticates and decrypts the ciphertext. I upgraded all keys to 512-bit ones so cyclic hashing of keys won't reduce security over long period of time (there is no key negotiation in TFC). I also upgraded hashes from Keccak-256 to Keccak-512 and at the same time the Keccak-CTR key size was upgraded to 512-bits. So 1280-bits of symmetric key security in total. As for key generation, CEV now has constant 2kHz sampling speed (1.5M samples are loaded in total), three vN whitening passes and between each of those, Keccak-512 compression with 2:1 ratio (1024 bits in, 512 out). User can now input different entropy from keyboard for each of the eight 512-bit keys generated. Also fixed lots of bugs and typos, and as usual, updated whitepaper and manual where necessary. UI was tweaked slightly: I added cleaner completion messages and some startup animation for the lulz (disable option available in settings). Full update log: https://github.com/maqp/tfc-cev/blob/master/0.5.5%20update%20log.txt