On 18.03.2020 19:59, Frederick Gotham wrote:
> Yesterday I started writing my own encryption program. With all this talk of so-called 'quantum' computing and the possibility that our best algorithms might become brute-forceable, I've decided to start writing something new.
Just curious, what makes you think you can beat the professional
cryptographers who have already worked on this exact problem for at
least a decade (and have already produced some results like elliptic
curves)?
> Having worked developing a Linux embedded device with a 32-Bit ARM processor, very limited hard disk space and very limited RAM, I have seen the true convenience and power of programs that are fully-functional when reading from stdin. 'tar' and 'openssl' are good examples as they don't seek on their input even when doing complex tasks.
>
> On one of the devices I'm developing, tar is used to exract a file to stdout, where openssl then decrypts it to stdout, where tar then extracts another inner file. Because of very limited hard disk space and RAM, this wouldn't be possible without the piping capabilities of tar and openssl.
Do you indeed believe that the additional constraint on the algorithm to
support piping will somehow make the algorithm harder to crack for a $$$
quantum computer?
> My encryption program will encrypt blocks of 16 bytes at a time, and the scheme will be similar to CBC, however I'll be doing something new which I haven't seen done before (at least not publicly).
If I understand correctly, CBC is a symmetric cipher; these are
considered quite safe against quantum computers, one just needs to
increase the key sizes. It is the public key algorithms which are under
the threat.
IOW, you are trying to solve a non-problem while having no
qualifications for doing that. Seems a good match to me!