> I am interested to know what you think before throwing my inventions
> in the public domain for now.
>
> very serious - adacrypt
>
> - adacrypt
Dear adacrypt,
The hardware CPU can include any software cryptographic algorithms in
its hardware logic. It is important to minimize that logic, so please
re-write your algorithm as several discrete functions like this :
$$$$$$$$$$$$$encryption$$$$$$$$$$$$$$$$$$$$$$$$$
input plaintext function
key input function from Alice
key schedule function to expand key to affect all plaintext bits
/* Each bit of the key must affect each bit of the plaintext! */
plaintext bits mixing function with all key bits
key output function so a small key can be sent to Bob
output ciphertext function
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
/* Explain the maximum file size that a plaintext can */
/* be for each key bit to affect each plaintext bit. */
/* In other words, if any one bit of the key changes, about */
/* 50% of the ciphertext bits will change. This is standard quality
control */
$$$$$$$$$$$$$decryption$$$$$$$$$$$$
Functions are subroutines that are called from a main() program. this
modular style helps people understand your stuff.
.
.
......