July 20th, 2013, 01:42 AM

New Encryption Algorithm/Protocol
Hey everyone. I'm totally new to this site and, for all intents and purposes, totally new to the world of cryptography. I have always wanted to develop an encryption algorithm and corresponding application. So a few months ago I started. After four distinct "builds," I believe I have something that is worth something. But maybe not.
At any rate, I call it the "PLE Algorithm" (Padlock Encryption Algorithm).
I'd like it to be scrutinized, both to see if it is secure and to get feedback as to how to improve it for openmarket use. Keep in mind that I foresee this being used primarily to encrypt and send small messages (current cap is 20,000 typed characters) from one party to another. It may have other uses, but for now, this is the extent of my plan.
At present, I have both a fullyfunctional algorithm and program. AKA, I can encrypt and decrypt messages using the algorithm with a 100% success rate. As such, in describing the algorithm and protocol, I will use actual data.
Please forgive me if I use cryptographic terms incorrectly or clumsily. As I mentioned, I've only been at this a few months. And, unfortunately, as I have zero significant knowledge or experience in any lowlevel programming languages, or even in common webprogramming languages, I have built my program using something with which I am familiar—a database and custom software solution development program owned by Apple, called "Filemaker Pro." Some of you may have heard of it. Some of you may laugh. Well, it's the best I can do for now, so please bear with me.
As I expect that my description may exceed the character limit for a given post, I will likely post it over one, two, or even three posts. Any and all feedback is welcome. Also, please don't steal my ideas (provided they are shown to, in fact, be unique and, most importantly, worth any degree of a hill of beans).
July 20th, 2013, 02:27 AM

PLE Algorithm  Part I
This is a cypher I just generated using PLE:
>>>>>(™p5íy¾¶±JÞ+€X^oßˆÖ›YÕÀ%Ö>4™‡À(YLa.}_‡%4ö]H”wÄ‘ÂGœ˜ŽY+<±!ÇÏÕNPãT¬ÊT‚Vä@w%åÅô>3¶Z„±¨Iº{ÔFe:*Rtój%“ùd](ÇíÍF&;‹©¾Wiœ#“YíÏúý\öW”Ö“t{{ŒüZåOî?q°Y¦8e,‰ÃýPÑÍ*Ìžä! ŠO&¤,°K×6ç»æþË`S>…bLŽdbôÿWPDß¡Î»ššB¹lÏ‡0iœn¢¥9ñkŒQ!êÂÎžÈ{ùrná§×ýÅŠžq(~=F÷§ëàÅ!*F0ï™*æ1º³C¾ç›N;ð9ÑÊwõ ÷ñÛkõG—Qx’ÉgUkãðÐ’·5Œ>ôÑU]°ÉMüÖø€ÂñÍÌ(<<<<<
Original Message: This cypher better be secure, because I have spent many, many hours developing the algorithm that generated it. If I find that it is weak or useless, I'm going to be very put out!
Key: aaaaaaaa1!
Cypher Components
Each PLE cypher consists of five components:
 Start/End Tags
 An encrypted, hashed, convertedalphanumericKEYshifted random number
 An encrypted, hashed, randomnumbershifted, converted alphanumeric KEY
 An encrypted, hashed, random shiftstart value
 The encrypted message
Before I get into the encryption protocol, let me describe the cypher's components.
1. Start/End Tags
These are straightforward and are easily visible in the cypher. ">>>>>" marks the first character in the cypher, while "<<<<<" marks the final character in the cypher. NOTE: These markers are not part of the cypher, and the program will decrypt the cypher with or without them.
2. An encrypted, hashed, convertedalphanumericKEYshifted random number
Each time PLE is run, a random number is generated to shift the KEY's numeric value. This random number is always identical in length as the KEY's numeric value:
KEY: aaaaaaaa1!
KEY's numeric value: 1606804262247430615645404203345124323379345405920321000 (how this is generated will be described later)
Random Number: 5882901007068545037514398365259184767758609001213860726
Hashed Random Number: 2YpR1yK2F?URe*IoQlRw0$%hk4XR$z*se@RtR!SPZ1iwf5lGG6XY+<
Encrypted Random Number Hash: (™p5íy¾¶±JÞ+€X^oßˆÖ›YÕÀ%Ö>4™‡À(YLa.}_‡%4ö]H”wÄ‘ÂGœ˜ŽY+<
3. An encrypted, hashed, randomnumbershifted, converted alphanumeric KEY
The random number is used to shift the KEY's numeric value, thus concealing the original KEY.
KEY: aaaaaaaa1!
KEY's numeric value: 1606804262247430615645404203345124323379345405920321000 (how this is generated will be described later)
Random Number: 5882901007068545037514398365259184767758609001213860726
Shifted KEY: 6488705269205975642159792568594208080027944406133181726
Hashed Shifted Key: F=GjBNH8rpCTroX2KF5O+Q#3JsF>ugJxF4e9*RTbyF<AdJ2$HKeu5*<
Encrypted Shifted Key Hash: ±!ÇÏÕNPãT¬ÊT‚Vä@w%åÅô>3¶Z„±¨Iº{ÔFe:*Rtój%“ùd](ÇíÍF&;‹©
4. An encrypted, hashed, random shiftstart value
Each time PLE is run, a random number is generated to determine the starting value from which all characters will be cyclically shifted during the encryption process.
I actually did not take note of the randomly generated shift value in this particular encryption, nor did I note the hashed version of it, but this is the encrypted, shiftvalue hash: ¾Wiœ#
5. The encrypted message
This is straightforward. The encrypted message is equal in length with its source text, character for character.
Message: This cypher better be secure, because I have spent many, many hours developing the algorithm that generated it. If I find that it is weak or useless, I'm going to be very put out! (180 characters)
Encrypted Message: “YíÏúý\öW”Ö“t{{ŒüZåOî?q°Y¦8e,‰ÃýPÑÍ*Ìžä! ŠO&¤,°K×6ç»æþË`S>…bLŽdbôÿWPDß¡Î»ššB¹lÏ‡0iœn¢¥9ñkŒQ!êÂÎžÈ{ùrná§×ýÅŠžq(~=F÷§ëàÅ!*F0ï™*æ1º³C¾ç›N;ð9ÑÊwõ ÷ñÛkõG—Qx’ÉgUkãðÐ’·5Œ>ôÑU]°ÉMüÖø€ÂñÍÌ( (180 characters)
That is the segmentation of the PLE cypher. Now the whole thing, color coded:
>>>>>(™p5íy¾¶±JÞ+€X^oßˆÖ›YÕÀ%Ö>4™‡À(YLa.}_‡%4ö]H”wÄ‘ÂGœ˜ŽY+<±!ÇÏÕNPãT¬ÊT‚Vä@w%åÅô>3¶Z„±¨Iº{ÔFe:*Rtój%“ùd](ÇíÍF&;‹©¾Wiœ#“YíÏúý\öW”Ö“t{{ŒüZåOî?q°Y¦8e,‰ÃýPÑÍ*Ìžä! ŠO&¤,°K×6ç»æþË`S>…bLŽdbôÿWPDß¡Î»ššB¹lÏ‡0iœn¢¥9ñkŒQ!êÂÎžÈ{ùrná§×ýÅŠžq(~=F÷§ëàÅ!*F0ï™*æ1º³C¾ç›N;ð9ÑÊwõ ÷ñÛkõG—Qx’ÉgUkãðÐ’·5Œ>ôÑU]°ÉMüÖø€ÂñÍÌ(<<<<<
Now I'll describe the algorithm and protocol in greater detail.
July 20th, 2013, 03:26 AM

PLE Algorithm  Part II
The PLE encryption protocol has 24 main steps that together perform five major functions in the development of the PLE Cypher:
I. KEY GENERATION & CONCEALMENT (A > C)
1. Convert alphanumeric/symbol KEY (A) to an expanded NUMERIC KEY (B)
2. Generate a RANDOM NUMBER (N) equal in length to the NUMERIC KEY (B)
3. Shift each digit in the NUMERIC KEY (B) by wrapadding to it the digit in the corresponding location in the RANDOM NUMBER (N)—result: SHIFTED NUMERIC KEY (C)
II. RANDOM NUMBER CONCEALMENT (N > R)
4. Hash the RANDOM NUMBER (N) using a 100,001record, 5characterperhash lookup table—result: HASHED RANDOM NUMBER (M)
5. Convert each character in the HASHED RANDOM NUMBER (M) to a number using a characterlookup table—result: CODED RANDOM NUMBER DIGITS(O)
6. Shift each specific CODED RANDOM NUMBER DIGIT (O) by wrapadding to it the digit in the corresponding location in the SHIFTED NUMERIC KEY (C)—result: SHIFTED RANDOM NUMBER DIGITS (P)
7. Convert each SHIFTED RANDOM NUMBER DIGIT (P) to a character using a characterlookup table—result: ENCRYPTED RANDOM NUMBER CHARACTERS(Q)
8. Combine all ENCRYPTED RANDOM NUMBER CHARACTERS (Q) into the ENCRYPTED RANDOM NUMBER (R)
III. SHIFTED NUMERIC KEY CONCEALMENT (C > H)
9. Hash the SHIFTED NUMERIC KEY (C) using a separate 100,001record, 5characterperhash lookup table—result: HASHED NUMERIC KEY (D)
10. Convert each character in the HASHED NUMERIC KEY (D) to a number using a characterlookup table—result: CODED NUMERIC KEY DIGITS (E)
11. Shift each specific CODED NUMERIC KEY DIGIT (E) by wrapadding to it the digit in the corresponding location in the RANDOM NUMBER (N)—result: SHIFTED NUMERIC KEY DIGITS (F)
12. Convert each SHIFTED NUMERIC KEY DIGIT (F) to a character using a characterlookup table—result: ENCRYPTED NUMERIC KEY CHARACTERS (G)
13. Combine all ENCRYPTED NUMERIC KEY CHARACTERS (G) into the ENCRYPTED NUMERIC KEY (H)
IV. SHIFT VALUE GENERATION AND CONCEALMENT (I >> S)
14. Generate a RANDOM SHIFTSTART VALUE (I) which gives the encryption algorithm the value of the first characterencryption shift
15. Hash the RANDOM SHIFTSTART VALUE (I) using a 100,001record, 5characterperhash lookup table—result: HASHED START VALUE (J)
16. Convert each character in the HASHED START VALUE (J) to a number using a characterlookup table—result: CODED START VALUE DIGITS (K)
17. Shift each specific CODED START VALUE DIGIT (K) by wrapadding to it the digit in the corresponding location in the SHIFTED NUMERIC KEY (C)—result: SHIFTED START VALUE DIGITS (L)
18. Convert each SHIFTED START VALUE DIGIT (L) to a character using a characterlookup table—result: ENCRYPTED START VALUE CHARACTERS (M)
19. Combine all ENCRYPTED START VALUE CHARACTERS (M) into the ENCRYPTED START VALUE (S)
V. MESSAGE ENCRYPTION (T > X)
20. Convert each character in the MESSAGE (T) to a number using a characterlookup table—result: CODED MESSAGE DIGITS (U)
21. Shift each specific CODED MESSAGE DIGIT (U) by wrapadding to it the digit in the corresponding location in the SHIFTED NUMERIC KEY (C) plus the RANDOM SHIFTSTART VALUE (I)—result: SHIFTED MESSAGE DIGITS (V)
21NOTE. Starting from its initial value, the RANDOM SHIFTSTART VALUE (I) is increased by 3 for each character, wrapping around to begin again at zero as it exceeds the number of characters in the PLE cypher's character set.
22. Convert each SHIFTED MESSAGE DIGIT (V) to a character using a characterlookup table—result: ENCRYPTED MESSAGE CHARACTERS (W)
23. Combine the ENCRTYPTED RANDOM NUMBER (R), the ENCRYPTED NUMERIC KEY (H), the ENCRYPTED START VALUE (S) and all ENCRYPTED MESSAGE CHARACTERS (W) into the FINAL CYPHER (X)
24. Add START/END MARKERS to indicate where the FINAL CYPHER (X) begins and ends.
That's the rundown, folks. Time to pick it apart (your job).
July 20th, 2013, 03:32 AM

Additional Information
Just for kickers, I'll generate a cypher which should exhibit the algorithm's inherent patternelimination properties. I will use the following to create 5 distinct cyphers:
Message: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Key: aaaaaaaa1!aaaaaaaa1!aaaaaaaa1!
(I would use all "a"s, but the program requires at least one number and one symbol in the key, in addition to requiring a minimum of 10 total characters)
Cypher 1:
>>>>>ÜBóJZ8ñXd‰n*êÕVsá²ìFYÖíFÊí)t¤Hœhßtº$KGå0gta‡jSoacWtÔ
Úm~óïÚeØø(Uk™ÆHÑ5ó‘±—þ™äÎób{žÐ:..”N%ía>9#I^9ý&~u¸xAÚŒ<Ioã1ƒ9ãÖ0Ð;WÏew¬»GIWªùIÆöŽMâÔ€äºçý*çï €EåÔÒ¥L½f\I2ÙOxM(Wa÷í6åjx%¤WXCfùM4A_ìµï˜²Wëß<œ2M/¨R‡Ö‡5å‘nñ?]qx«ÆîÆU¼¼Ù°°·_eFF£¤ÅzÌ2A•.\&Š^^^Í~‹*Yš1[H[ÊW÷ÚÁð
»——QQÏ>Ïk$$ƒ–´¢ôÖ‘)ññJª]Zqlèv‰„Þ°²ÙTe_e*!%Ü±zd,@ïç&çì^^KÓÓ~X››ÊCí÷PéÁð¡õ9ÛQQQÏ“òG©À´h+hÖpêi”J?¸üü vsv‰ãã°²‚·ý_%¤±±³(d2,g•uøÃIÓ6KYXX™šcWH÷…ÿÝ»y9y—QQ’ßß“ƒ¨¢¢Ö‡Dêô‘”JnŒq] vÉÈ¼„ž‚á=á_€F#£³zÑ<<<<<
Cypher 2:
>>>>>çlH¥/ ùavWo=2dŒ~ò)ûYå‚?€;CI@x+ÍGLÇÃ×Ê#òÅx¼§eÍ¾¯`CÊ€–ÇÅ>ËÅ?± ê7Z*oEîÙkÌQéþíªJ}EÖ@Ñ8AÀG]ì?ZaEKÄ°8ŽÛô;‹C¡2¡4}E{£ªNÀ_pAÙŒD¯ßÌåIçîê;01!ºŠçº<p{¼;Ìe5–ôîHuþªñ!â6÷U
{ÍföIFØàSÈåýoò±‹³CJg±¨/Ã;›Õv~öÌ¬Ä¯âÎÎ©–Çƒ‡+Dp5êVf¸ZZŒÔüèÂsÞ8°„¥··e€!FF%ÑOÜ¶(¦çuçø&óÃó44*›æÊíWWÁÕ
ðõð——9ú<<“““ƒ¨h}RDÖåên¸VZª† «lˆLL„²r°e=a€*F3ÌÑ22Aù.•ŠbIóÓÃw~~Xäš››cöBWàM
yÐy`9â:âÎœÎGƒ¢RÖDpp”;?JŒJüüqèUUÉÉÉ°ÙátTa_!FÜÑ32(¦mïg\ººÃ6¾ÓXŽNä™›0PöééÁ¹¡ðÛ½jâß:/““¨¿À¢¢}o5pñ)?ªxªÔqˆÆˆL8L¼°·T_a€<<<<<
Cypher 3:
>>>>>*o<Ô_ÉÛczýGt\“š!¬Òüï{ôëK„ºÉ×Ûbì2”Ü0çZ¹{ú©ŠìLÇIÜ€5È0JÇúC,L#Õg€_fx&ø8`¶ïœ6¬Êí2µÙiF(Éo.îÅ€d?u@4C n=l´÷>àj*Hçî×XØ„°b÷Wë#q9@˜c;!Lw^_ŒÐÇ!‹€2ª¯sàvÍLA=üX;Ç¤BWcÝC^Á„öauLÝ€Ù–eâ÷Í˜æSQÙE®+íx÷f¤ÑXZ<UAW=ø&‘c/›æ÷Õ÷Õ¡ÿ¡®7û½jµâß/¨ƒŸ$À¿Öåô”o”?ªÄ]q †l‰UÉÈ²§žeT!=€×OOÅ(AAù,\çìb^ºw¾‹™šäí0öÕW…MÝ¹y®Ð:ÏQß/<ÎÇÇÀ¢Rê;ê;nVnZÄ{†«ËˆîÞÙ°¥ãž§_!ý£ë£z(þd,m¦gøìØS64˜XYšŽäæBBíMÁÁ¹ÿõy—½Qú/<òœ–ƒÀ¿Dåo;p¬)fªZxÆv îÞULrrž·TF×F×Ü3Ü2þ¶¦ïE\&IKÓwÍ˜4šÒÊ1Ê÷MÚ…ÿ®
û`—µ¯kÎ>¨©À$¿R55D)””fVŒªü<<<<<
Cypher 4:
>>>>>/#ÞZ_9c784Ê¦öëý¬4b ¨!s•ýP¸Ô¬7Hª°9p‡Å™÷HØz’m
lù–U*›ŠÅå0÷ÿgÒªá24Pq6&¿ØŒ…kÌDYý`JõÉÃÏP¸•Ï8üQg1J;Qëø2ÐªÖu±øD&mJJäõópÍjÆÁd4÷Á<ë!¼ÏöJèwR:Õ]>Ôa%~kuÎ%à%ZÖ¦²Ó£Pu4k‘î”á…mp•aäþMV‹gö/xi
cêÌöÀÆý˜±oå/—Z!÷R*6‹NÒC1HíÚWÝà
ðÛû½jÏµ/©<œò´h+R}D)ñinJnÄ« ÔÂvÂ„sÈÙãt_a!F×#OÑþ2,ù,çuŠØøó^Ó~XNXŽæ›PCÚàÕÁÿûÛ®`ú—µ¯GkòÇœŸ‡´+Dipñ?J]{†«vËÞ„U8È‚á=Tta¤±#Ü³ÜþïmùŠuŠÃbSKÍNš›æ[BöÚéÿ¹ÿyÐÛµ`âQß“¨Ç¨$R¢ô‡iñ;”V{]ZÔèüËl¼‰Èr8¥e‚=a#€Å±z³d¶¦ïuEIÃìóS*‹ŽYNCH[WÕWÚ»®¹ÛÐÛ:½¯’ÏœƒÇÀ¢Rh5oi‘<<<<<
Cypher 5:
>>>>>ôIIÔüñØ0O)R{FÐSåBÎJk0GÖ€Ë¸\¤ŽtëU*(íE×*Y6JºdeQ+pEGÄ[a—ÇÅ)}P¬ªÛBKe2Ž¾<qÄýQBí§áµýC%î‘b¦µWŽögU&79Ôšt5åýYÕÄ?qM›`Š¸©ÕÎ)ü¾oIÅò>€í”î]s[ÚCÜqb©”¶ —ï!åÙBØ[{iìfhËOã×Äl;db“ØJÒå00÷IX¤Õ×æöPJ(Ž›ØçH%¸e³÷fEÊcP÷ÚéÕ¹…
®y—µ:µß<©¨œ$Rh‡ôÖ;p¬¸JxªËÆ ÆUv„°²§žeTeF€±Ü3z(d¦@ççøìºÍ¾ó˜~YNšcæ[0ÕÕé¡
¹õ9Û½—ú</</©ƒÀ¿}ôêi‘;f¬?ZªüËÆËîU„Ù8ãTáeý_×€ÅOÑ³@(EçmçìuÃÓ64˜XYX›äHW0÷M…
Ýyy`—úÏ<â>“©ÇÀ}Rhå;;‘n?fŒq]†üèUÞUÞ„°ž§týF#%×ÌOz2(.EçE&ìÃKóÍY‹XÒæäíBöÕÝM7y®y—Ð:ßkÎ>¨©¨¢¿+påê)¬?ªªÔü<<<<<
As you can see, while there are occasional repeated characters in the cypher, they neither repeat at the same intervals within a cypher, or in the same locations across cyphers. Nor does any cypher give any indication that the encrypted message is, in fact, a repetition of the same character.
July 20th, 2013, 08:57 PM

Analyzing a cryptographic algorithm is a very complex & involved problem so you may not get much response here.
Also, your post algorithm is very difficult to understand from your post. It would be a good idea to:
 Use hex instead of characters when showing binary data (e.g. "4142" instead of "AB")
 Describe your algorithm in precise mathematical terms and/or show a source code of an implementation.
 Use standard terminology (e.g. "addition modulo 10" instead of "wrapadding")
sub{*{$::{$_}}{CODE}==$_[0]&& print for(%:: )}>(\&Meh);
July 20th, 2013, 09:04 PM

Originally Posted by OmegaZero
Analyzing a cryptographic algorithm is a very complex & involved problem so you may not get much response here.
Oh. I must have misunderstood. I thought that such requests were part of the purpose of this subforum.
Originally Posted by OmegaZero
Also, your post algorithm is very difficult to understand from your post. It would be a good idea to:
 Use hex instead of characters when showing binary data (e.g. "4142" instead of "AB")
 Describe your algorithm in precise mathematical terms and/or show a source code of an implementation.
 Use standard terminology (e.g. "addition modulo 10" instead of "wrapadding")
I understand your points. Unfortunately, due to my own inexperience and/or ignorance, I am unable to produce what you request. So, while I am willing to learn, my guess is that it will take someone with abiding patience and/or interest to walk the path with me until I am able to walk it on my own.
October 17th, 2013, 11:04 PM

skcjju256
Originally Posted by PLECypher
Oh. I must have misunderstood. I thought that such requests were part of the purpose of this subforum.
I understand your points. Unfortunately, due to my own inexperience and/or ignorance, I am unable to produce what you request. So, while I am willing to learn, my guess is that it will take someone with abiding patience and/or interest to walk the path with me until I am able to walk it on my own.
Welcome to my world. Maybe you should it the way I did it.
www. I kind made sure that I have all of it posted on a site.
skcjju256. That way I know that someone patient probably sent by God will com.
You want to be a cryptographer pls look at the note closely and to that site. We can help each other.
October 17th, 2013, 11:35 PM

skcjju256
Originally Posted by PLECypher
Just for kickers, I'll generate a cypher which should exhibit the algorithm's inherent patternelimination properties. I will use the following to create 5 distinct cyphers:
Message: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Key: aaaaaaaa1!aaaaaaaa1!aaaaaaaa1!
(I would use all "a"s, but the program requires at least one number and one symbol in the key, in addition to requiring a minimum of 10 total characters)
Cypher 1:
>>>>>ÜBóJZ8ñXd‰n*êÕVsá²ìFYÖíFÊí)t¤Hœhßtº$KGå0gta‡jSoacWtÔ
Úm~óïÚeØø(Uk™ÆHÑ5ó‘±—þ™äÎób{žÐ:..”N%ía>9#I^9ý&~u¸xAÚŒ<Ioã1ƒ9ãÖ0Ð;WÏew¬»GIWªùIÆöŽMâÔ€äºçý*çï €EåÔÒ¥L½f\I2ÙOxM(Wa÷í6åjx%¤WXCfùM4A_ìµï˜²Wëß<œ2M/¨R‡Ö‡5å‘nñ?]qx«ÆîÆU¼¼Ù°°·_eFF£¤ÅzÌ2A•.\&Š^^^Í~‹*Yš1[H[ÊW÷ÚÁð
»——QQÏ>Ïk$$ƒ–´¢ôÖ‘)ññJª]Zqlèv‰„Þ°²ÙTe_e*!%Ü±zd,@ïç&çì^^KÓÓ~X››ÊCí÷PéÁð¡õ9ÛQQQÏ“òG©À´h+hÖpêi”J?¸üü vsv‰ãã°²‚·ý_%¤±±³(d2,g•uøÃIÓ6KYXX™šcWH÷…ÿÝ»y9y—QQ’ßß“ƒ¨¢¢Ö‡Dêô‘”JnŒq] vÉÈ¼„ž‚á=á_€F#£³zÑ<<<<<
Cypher 2:
>>>>>çlH¥/ ùavWo=2dŒ~ò)ûYå‚?€;CI@x+ÍGLÇÃ×Ê#òÅx¼§eÍ¾¯`CÊ€–ÇÅ>ËÅ?± ê7Z*oEîÙkÌQéþíªJ}EÖ@Ñ8AÀG]ì?ZaEKÄ°8ŽÛô;‹C¡2¡4}E{£ªNÀ_pAÙŒD¯ßÌåIçîê;01!ºŠçº<p{¼;Ìe5–ôîHuþªñ!â6÷U
{ÍföIFØàSÈåýoò±‹³CJg±¨/Ã;›Õv~öÌ¬Ä¯âÎÎ©–Çƒ‡+Dp5êVf¸ZZŒÔüèÂsÞ8°„¥··e€!FF%ÑOÜ¶(¦çuçø&óÃó44*›æÊíWWÁÕ
ðõð——9ú<<“““ƒ¨h}RDÖåên¸VZª† «lˆLL„²r°e=a€*F3ÌÑ22Aù.•ŠbIóÓÃw~~Xäš››cöBWàM
yÐy`9â:âÎœÎGƒ¢RÖDpp”;?JŒJüüqèUUÉÉÉ°ÙátTa_!FÜÑ32(¦mïg\ººÃ6¾ÓXŽNä™›0PöééÁ¹¡ðÛ½jâß:/““¨¿À¢¢}o5pñ)?ªxªÔqˆÆˆL8L¼°·T_a€<<<<<
Cypher 3:
>>>>>*o<Ô_ÉÛczýGt\“š!¬Òüï{ôëK„ºÉ×Ûbì2”Ü0çZ¹{ú©ŠìLÇIÜ€5È0JÇúC,L#Õg€_fx&ø8`¶ïœ6¬Êí2µÙiF(Éo.îÅ€d?u@4C n=l´÷>àj*Hçî×XØ„°b÷Wë#q9@˜c;!Lw^_ŒÐÇ!‹€2ª¯sàvÍLA=üX;Ç¤BWcÝC^Á„öauLÝ€Ù–eâ÷Í˜æSQÙE®+íx÷f¤ÑXZ<UAW=ø&‘c/›æ÷Õ÷Õ¡ÿ¡®7û½jµâß/¨ƒŸ$À¿Öåô”o”?ªÄ]q †l‰UÉÈ²§žeT!=€×OOÅ(AAù,\çìb^ºw¾‹™šäí0öÕW…MÝ¹y®Ð:ÏQß/<ÎÇÇÀ¢Rê;ê;nVnZÄ{†«ËˆîÞÙ°¥ãž§_!ý£ë£z(þd,m¦gøìØS64˜XYšŽäæBBíMÁÁ¹ÿõy—½Qú/<òœ–ƒÀ¿Dåo;p¬)fªZxÆv îÞULrrž·TF×F×Ü3Ü2þ¶¦ïE\&IKÓwÍ˜4šÒÊ1Ê÷MÚ…ÿ®
û`—µ¯kÎ>¨©À$¿R55D)””fVŒªü<<<<<
Cypher 4:
>>>>>/#ÞZ_9c784Ê¦öëý¬4b ¨!s•ýP¸Ô¬7Hª°9p‡Å™÷HØz’m
lù–U*›ŠÅå0÷ÿgÒªá24Pq6&¿ØŒ…kÌDYý`JõÉÃÏP¸•Ï8üQg1J;Qëø2ÐªÖu±øD&mJJäõópÍjÆÁd4÷Á<ë!¼ÏöJèwR:Õ]>Ôa%~kuÎ%à%ZÖ¦²Ó£Pu4k‘î”á…mp•aäþMV‹gö/xi
cêÌöÀÆý˜±oå/—Z!÷R*6‹NÒC1HíÚWÝà
ðÛû½jÏµ/©<œò´h+R}D)ñinJnÄ« ÔÂvÂ„sÈÙãt_a!F×#OÑþ2,ù,çuŠØøó^Ó~XNXŽæ›PCÚàÕÁÿûÛ®`ú—µ¯GkòÇœŸ‡´+Dipñ?J]{†«vËÞ„U8È‚á=Tta¤±#Ü³ÜþïmùŠuŠÃbSKÍNš›æ[BöÚéÿ¹ÿyÐÛµ`âQß“¨Ç¨$R¢ô‡iñ;”V{]ZÔèüËl¼‰Èr8¥e‚=a#€Å±z³d¶¦ïuEIÃìóS*‹ŽYNCH[WÕWÚ»®¹ÛÐÛ:½¯’ÏœƒÇÀ¢Rh5oi‘<<<<<
Cypher 5:
>>>>>ôIIÔüñØ0O)R{FÐSåBÎJk0GÖ€Ë¸\¤ŽtëU*(íE×*Y6JºdeQ+pEGÄ[a—ÇÅ)}P¬ªÛBKe2Ž¾<qÄýQBí§áµýC%î‘b¦µWŽögU&79Ôšt5åýYÕÄ?qM›`Š¸©ÕÎ)ü¾oIÅò>€í”î]s[ÚCÜqb©”¶ —ï!åÙBØ[{iìfhËOã×Äl;db“ØJÒå00÷IX¤Õ×æöPJ(Ž›ØçH%¸e³÷fEÊcP÷ÚéÕ¹…
®y—µ:µß<©¨œ$Rh‡ôÖ;p¬¸JxªËÆ ÆUv„°²§žeTeF€±Ü3z(d¦@ççøìºÍ¾ó˜~YNšcæ[0ÕÕé¡
¹õ9Û½—ú</</©ƒÀ¿}ôêi‘;f¬?ZªüËÆËîU„Ù8ãTáeý_×€ÅOÑ³@(EçmçìuÃÓ64˜XYX›äHW0÷M…
Ýyy`—úÏ<â>“©ÇÀ}Rhå;;‘n?fŒq]†üèUÞUÞ„°ž§týF#%×ÌOz2(.EçE&ìÃKóÍY‹XÒæäíBöÕÝM7y®y—Ð:ßkÎ>¨©¨¢¿+påê)¬?ªªÔü<<<<<
As you can see, while there are occasional repeated characters in the cypher, they neither repeat at the same intervals within a cypher, or in the same locations across cyphers. Nor does any cypher give any indication that the encrypted message is, in fact, a repetition of the same character.
If you use too many random numbers that is a very weak sign.
I am going to help you with some pointers. I don't know much but I have done some tinkering around.
1.Frequency analysis of your PLE (use cyptography tools version 1.21
If you do this and find out that an attacker knows your language. You should know right away you are not up to per (they check how often certain words appears e.g a, e, o, i, u. This mean your cryptosystem is weak.
2. Use this tool Cryptool Beta 1.4.1 3b. This will even tell you the entropy and clearly show you what you have wrong. If this tool can identify all the 26 chars you are not even close to a good system. To have a good system you must not conform to the crypto analysis tools start with analyzing you work.
3. Go to this site http://www.richkni.co.uk/php/crypta/freq.php and run your cipher text. Use cryto tools developed by people like Bruce Schneier. Don't worry about the stuff people say if you PLE can sneak under the crypto analysis tools you have beat all for now. Until they figure out what you did. Don't get intimidated if you fail try again until you beat them.
4. In the system present today make sure you entropy is not high if it is you are weak again.
November 14th, 2013, 01:37 PM

Your system has you beaten before you started. Fixed text, that we know exists at the start/end of any encrypted string will assist with analysis of the rest of the encrypted text.
It's very doubtful you will create anything secure, unless you get very, very lucky.
Stick to one of the known ciphers (RSA, AES are good choices) and implement them properly (note that programming errors in implementation can leak information about the keys and weaken the encryption if you are not careful).
Best regards,
AstroTux.
August 21st, 2014, 01:57 AM

Originally Posted by SKCJJU256
If you use too many random numbers that is a very weak sign.
I started from scratch. My new algorithm does not rely heavily on random numbers. In fact, it does not rely on them at all, unless you count the obfuscation generated by the algorithm itself.
Originally Posted by SKCJJU256
I am going to help you with some pointers. I don't know much but I have done some tinkering around.
1.Frequency analysis of your PLE (use cyptography tools version 1.21
If you do this and find out that an attacker knows your language. You should know right away you are not up to per (they check how often certain words appears e.g a, e, o, i, u. This mean your cryptosystem is weak.
I ran the frequency analysis test on a ciphertext generated with the new algorithm (ciphertexts are encoded in base 64). The plaintext consisted of 418 lowercase "a"s. The keys used to encrypt the plaintext (the new algorithm uses two userseeded keys) were also all "a"s (one key was 27 "a"s and the other was 30 "a"s). Here is the image from the "single" mode:
Pairs (interlaced):
Pairs(noninterlaced):
So, what's the verdict on the frequency analysis?
August 22nd, 2014, 01:14 AM

Originally Posted by SKCJJU256
If you use too many random numbers that is a very weak sign.
I have changed the algorithm and it no longer depends on random numbers.
Originally Posted by SKCJJU256
1.Frequency analysis of your PLE (use cyptography tools version 1.21
If you do this and find out that an attacker knows your language. You should know right away you are not up to per (they check how often certain words appears e.g a, e, o, i, u. This mean your cryptosystem is weak.
I generated a ciphertext with my new algorithm and used this tool with it. All letters and pairs appear to have common frequencies in the ciphertext.
Originally Posted by SKCJJU256
2. Use this tool Cryptool Beta 1.4.1 3b. This will even tell you the entropy and clearly show you what you have wrong. If this tool can identify all the 26 chars you are not even close to a good system. To have a good system you must not conform to the crypto analysis tools start with analyzing you work.
I could not find this tool, but the ciphertext I used appears to perform well in terms of entropy.
Originally Posted by SKCJJU256
3. Go to this site and run your cipher text. Use cryto tools developed by people like Bruce Schneier. Don't worry about the stuff people say if you PLE can sneak under the crypto analysis tools you have beat all for now. Until they figure out what you did. Don't get intimidated if you fail try again until you beat them.
I ran all the scripts on that site on the ciphertext. It appears to have survived. Here is the ciphertext:
8q2TaFqqKg87nLJGo+WSxhrl6wbti1j8FAWnVcWO7V+ZQvzvicF4a/QME8MLgdQn3TLgoS0UV0r4wxpevorissEp/nu3dz+cPQTOpwvxHk+Yv3kDzk2DNCepgf/EfVDPcbgo7SwuXrHgw/cylg7xkcNmp+iFJhF6LWk+3Sgtjhr6ntcD3LQv0I4ZA7nQD2UgFR0/1gjUX5LnnHNennUpZ/4jz9oFVlmphJfG61nptmf7lYdCTwzNdWywyM0Tz6nZrhJgN+rTEWWFsYabKDLwupPyidlsnzPKs2gYoJxh79bHLLPd62cyx7nH6/n/eNi92WlOmLdaByQSTqVJqCYcIeLLG79WliGwUJfRuEQwfQoFFEKnJzVWIfM2D0NyeWUvV4CahJDvO+8VO7mTr1EQp5B8L2fpJWM1 0CS/eeQAdGQfXsLjDD9ib0xuXt9MdsOljiSYtovo4skOKrNBdEQu/ByRHoyivIZdUsvOpETio8n3eXUI4d49xlMmCfQoOqpsyjVOesjwMxEzBKe6+HFVdDUPxTRXFkz0zsiLZUZtsfatZWVnLiSdJKfPO Bq0mPvnLEbXCQNfkfQV5FvYgCxu3rM=
Originally Posted by SKCJJU256
4. In the system present today make sure you entropy is not high if it is you are weak again.
Again, entropy does not appear to be a problem.