Hi everyone,
I'm a first-year CS and Applied Mathematics student at Trinity College, and I'm working on something I'd genuinely love feedback on from people who actually know this field.
Quick background: I have no formal cryptography training. I've been self-studying, reading NIST documentation, and building independently. I'm sharing this here because I want to know if the direction is worth pursuing or if I'm missing something fundamental before I go further.
Most PQC solutions address Harvest Now Decrypt Later by making encryption harder to break. My question was: what happens if the encryption gets broken anyway, ten or twenty years from now? The data is still sitting there, decryptable.
I started thinking about whether I could add a layer that makes data structurally "useless": unrecoverable even after decryption. Not just harder to read, but impossible to reconstruct without a specific key that was never stored anywhere.
That's what I've been building. I call it SCRMBL.
How it works at a high level:
Data gets semantically split at meaningful contextual boundaries by a lightweight ML model rather than arbitrarily. Each fragment gets encrypted with a unique AES-256 key derived from a context key. Fragments are distributed across separate storage locations. Storage locations are also derived from the context key. Ideally, if a hacker were to steal the entire database, they'd be left with no map, no index, no metadata to connect the fragments to each other in storage.
The context key is a sequence of 12 words drawn from a library of approximately 300,000 English words. The same sequence always produces the same fragmentation map and the same per-fragment encryption keys. Different sequence or different order — completely different everything.
Per-fragment key derivation works like this:
The permutation space of 300,000^12 makes brute force infeasible, even accounting for Grover's algorithm, reducing the effective search space.
What I've actually built so far
I want to be clear, I'm at an early stage. What exists as working code right now is the key management infrastructure:
The fragmentation engine, per-fragment encryption, and distributed storage pipeline are in active development.
The questions I'm stuck on
I have a meeting coming up with Trinity's CS Department Chair — a cryptography researcher with NSF funding —, and I want to walk in with as honest a picture of the gaps as possible.
I'm not here to pitch anything. I'm here because I want to know what I'm missing.
Thank you, Aiden Tejada