Popular Content

Showing content with the highest reputation since 05/29/2019 in all areas

  1. 1 point
    Decided to post this and explain my new cipher. Interested in hearing your opinioin. I can not figure out how to launch an attack.
  2. 1 point
    I have been working on this encryption alg. on and off for over six years. I call it the Chameleon cipher. Normally you create an account, the hashed salted password is stored and then the attackers build a database to try to guess your hash. Yes, I know there are many steps to last sentence. Here is an encryption I did on an md5 hash. Here is the way to use this. client enters their password - a hash is created. The hash is encrypted with a cipher text that changes randomly every time the user logs in. All this is done in the back ground even though they enter the same password. Once received the algorithm deciphers the cipher text into the md5 stored and gives permission for access. I know you are cringing at this point about "random" . This is a completely new cipher. Here is an encrypted md5 hash. The hash was not conditioned it was a 32 char hex. At first glance because of the high decimal numbers and the groupings of numbers is obviously less than 32, it is easy to think it is like a fairplay cipher. Sometime yes and sometimes no. The difficulty in decryption comes when you realize that 112 can mean any number or any letter, or combination of letters no matter how many times it is used or where it is located, AND this changes randomly. 112 58 61 220 207 188 25 53 110 176 221 58 234 195 19 17 63 78 232 62 242 136 The above is a common password taken from an md5 hash.
  3. 1 point
    Thank you, Decided to post this as a competition. I know it will never be succesfully attacked. I will be posting the details soon. In the mean time here is a fun encryption puzzle I made years ago using excell. You can find it here. It is free. scroll down to the bottom of the page: http://hishouseinc.com/inventions.php