Disclaimer: Lumage is not a security expert and their only reported codebreaking experience is in talking to miwa. The opinions expressed here should be considered questionable at best.
If your encryption algorithm relies on no one having access to the algorithm, it's a pretty worthless algorithm. See https://en.wikipedia.org/wiki/Security_through_obscurity
The other thread, if a little eager, at least demonstrated some knowledge about basic cryptography. I'm not sure what this one demonstrates, especially considering we already seem to have programs that can accomplish the stated intent.
The |ciphertext| here is probably unbreakable, if only on part of being too short for analysis.
Edit: This was written before the offer to transform a known plaintext
Encryption Thread
ShellyCreated:
Okay, so due to the fact I'm redoing it I guess there's no disadvantage to revealing how I did it. Basically, for the demonstration this was all done by hand: 1. Converting each character of the message into a 1 byte value (ASCII) 2. Converting the one byte values into two 4-bit words. 3. Swapping the order of the two portions of each character. 4. Combining the 2 4-bit integers into one 8-byte value. 5. Recombining the 1 byte integers into a continuous length of numbers, preserving the order of the original message. Yes, it was very stupid. An improved version is being worked on.This isn't encryption. This is a cipher. Encryption requires a password or some other key in order to recover the original data (plaintext) from the encrypted data (ciphertext). With a cipher, the encoding/decoding is the same every time, like in this case. EDIT: If anyone's interested in the plaintext of the message above, it's:
SmileBasic Rules!
This isn't encryption. This is a cipher. Encryption requires a password or some other key in order to recover the original data (plaintext) from the encrypted data (ciphertext). With a cipher, the encoding/decoding is the same every time, like in this case.You just contradicted yourself lol. >This isn't encryption. This is a cipher. >encrypted data (ciphertext). Additionally:
In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can only be read if decrypted.
UNCIPHER THIS:---- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- ----- .---- .---- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- .---- / ----- ----- .---- .---- ----- .---- .---- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- .---- ----- / ----- ----- .---- .---- ----- .---- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- ----- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- .---- ----- / ----- ----- .---- .---- ----- ----- .---- ----- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- .---- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- ----- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- ----- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- .---- ----- / ----- ----- .---- .---- ----- ----- .---- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- .---- / ----- ----- .---- .---- ----- .---- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- .---- ----- / ----- ----- .---- .---- ----- ----- .---- ----- / ----- ----- .---- ----- ----- ----- ----- ----- / ----- ----- .---- .---- ----- ----- ----- .---- / ----- ----- .---- .---- ----- .---- .---- ----- / ----- ----- .---- .---- ----- .---- ----- ----- / ----- ----- .---- ----- ----- ----- ----- -----