Is My Homemade Encryption Method Secure Enough for Real-World Use?

  • Context: Undergrad 
  • Thread starter Thread starter LizardKing23
  • Start date Start date
Click For Summary
SUMMARY

The discussion centers on the security of a homemade encryption method created by a college student, which has not been cracked by peers. Participants highlight the challenges of deciphering the method without sufficient information, emphasizing that even a simple substitution cipher can yield multiple potential solutions. The conversation underscores the importance of using established cryptographic techniques, such as RSA encryption, and the risks associated with reusing codes. Ultimately, the security of any encryption method is contingent on its design, implementation, and the capabilities of potential attackers.

PREREQUISITES
  • Understanding of basic cryptographic principles, including substitution ciphers.
  • Familiarity with established encryption methods like RSA encryption.
  • Knowledge of the importance of key management and avoiding code reuse.
  • Awareness of the challenges in cryptanalysis and the concept of ciphertext.
NEXT STEPS
  • Research the principles of cryptanalysis and methods for breaking substitution ciphers.
  • Study the RSA encryption algorithm and its vulnerabilities.
  • Explore best practices for secure key management in cryptographic systems.
  • Read Bruce Schneier's essay on the complexities of cryptography for deeper insights.
USEFUL FOR

This discussion is beneficial for cryptography enthusiasts, aspiring security professionals, and anyone interested in understanding the nuances of encryption methods and their practical applications in real-world scenarios.

LizardKing23
Messages
13
Reaction score
0
I made up this encryption method on an airplane, and so far no one in my dorm has gotten it. Since I live in a college dorm, it may or may not be a good testing area, so I figured I'd try it out here.

PRMDC JKIHF
LQHEH UHMRZ
JKIQG WIYHA
 
Physics news on Phys.org
Having no idea what kind of method you used to encrypt that, it's impossible to crack. We could make a guess at the method, like a substitution cipher, and possibly decode it to be something meaningful but we'd have no way of knowing if you didn't just use a one-time pad and our "meaningful" message wasn't just a random chance.
 
thats true, i know i didnt supply nearly enough information
i just wanted to see if anyone here is hardcore into cryptography and would try to crack it
would it help if i said that it's a plato quote?
 
Anyone into cryptography should know it was futile and wouldn't bother.

Even knowing it's a plato quote, we still don't have enough. As it is, I could come up with an encryption method that would decode what you've got into any plato quote you like. eg. Here's two encoded messages using a scheme I've just come up with that are both plato quotes:

ASED

and

GHUT

I'll even tell you one means "Courage is a kind of salvation" and the other "Courage is knowing what not to fear" but you have absolutely no way of knowing which is which.
 
When does a code become decipherable?

Surely, given a finate number of data points (i.e. cipertext) there is an infinite number of solutions to it? What information needs to be known for it to be breakable?
 
Last edited:
Knowing what was used to encode it can go a long way, and having some idea of what it says won't hurt. Newspapers often have "Cryptograms" that are made from a simple substitution cipher. It will have many characters so it's unlikely that the wrong substitutions will make a coherent message and they'll sometimes make the encoded message the answer to a riddle so the message is meaningful. These are meant to be broken of course, but are examples of how not to use a substitution cipher if you want security.

Just knowing the method can do the trick as well. Any RSA encryption can be broken given enough time, though done properly it's an extremely long time (ideally long after the data is no longer sensitive).

Using the same code over and over can do you in. Say a baseball coach has 5 different signals to mean "steal second". Over the course of one game, he can use these without trouble. If he used the same set of signals to mean "steal second" for an entire season, people will catch on (if they're paying attention).

It really depends on the method used, and also how it's used as to just how secure your encryption is, as well as the resources and ability of your attackers.
 
Normally, good 2-way crypto algorithms are given lots of public exposure, testing, verification. What you did depends on method only, very likely.

Have a quick read about why crypto is harder than it seems -
http://www.schneier.com/essay-037.html
 

Similar threads

Replies
7
Views
2K
  • · Replies 23 ·
Replies
23
Views
2K
  • · Replies 16 ·
Replies
16
Views
2K
Replies
2
Views
1K
Replies
20
Views
3K
  • · Replies 2 ·
Replies
2
Views
1K
  • · Replies 20 ·
Replies
20
Views
8K
Replies
3
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 5 ·
Replies
5
Views
2K