Is My Homemade Encryption Method Secure Enough for Real-World Use?

  • Context: Undergrad 
  • Thread starter Thread starter LizardKing23
  • Start date Start date
Click For Summary

Discussion Overview

The discussion revolves around the security of a homemade encryption method created by a participant, with a focus on its potential effectiveness in real-world applications. Participants explore various aspects of cryptography, including methods of encryption, the challenges of deciphering codes, and the importance of context and information in breaking ciphers.

Discussion Character

  • Exploratory
  • Debate/contested
  • Technical explanation

Main Points Raised

  • One participant describes their homemade encryption method, noting that it has not been cracked by peers in their dorm.
  • Another participant suggests that without knowing the encryption method, it is impossible to determine the security of the code, proposing that it could be a substitution cipher or a one-time pad.
  • A participant expresses that even with the hint that the message is a quote from Plato, there is still insufficient information to decode the message meaningfully.
  • One contributor argues that the lack of information makes it futile for cryptographers to attempt to crack the code, emphasizing that many encryption methods can produce multiple valid outputs for a given input.
  • A question is raised about the conditions under which a code becomes decipherable, highlighting the infinite solutions possible with limited ciphertext.
  • Another participant explains that knowing the encoding method and having contextual clues can significantly aid in breaking codes, citing examples like cryptograms in newspapers.
  • It is noted that the security of encryption depends on the method used and the frequency of its application, with repeated use potentially leading to vulnerabilities.
  • A participant mentions that established cryptographic algorithms undergo extensive public scrutiny and testing, implying that the homemade method may lack such validation.

Areas of Agreement / Disagreement

Participants express a range of views on the security of the encryption method, with no consensus reached on its effectiveness or the conditions necessary for decipherability. The discussion remains unresolved regarding the adequacy of the provided information for evaluating the encryption's security.

Contextual Notes

Limitations include the absence of detailed information about the encryption method itself, the potential for multiple interpretations of the ciphertext, and the reliance on contextual knowledge for deciphering the message.

LizardKing23
Messages
13
Reaction score
0
I made up this encryption method on an airplane, and so far no one in my dorm has gotten it. Since I live in a college dorm, it may or may not be a good testing area, so I figured I'd try it out here.

PRMDC JKIHF
LQHEH UHMRZ
JKIQG WIYHA
 
Physics news on Phys.org
Having no idea what kind of method you used to encrypt that, it's impossible to crack. We could make a guess at the method, like a substitution cipher, and possibly decode it to be something meaningful but we'd have no way of knowing if you didn't just use a one-time pad and our "meaningful" message wasn't just a random chance.
 
thats true, i know i didnt supply nearly enough information
i just wanted to see if anyone here is hardcore into cryptography and would try to crack it
would it help if i said that it's a plato quote?
 
Anyone into cryptography should know it was futile and wouldn't bother.

Even knowing it's a plato quote, we still don't have enough. As it is, I could come up with an encryption method that would decode what you've got into any plato quote you like. eg. Here's two encoded messages using a scheme I've just come up with that are both plato quotes:

ASED

and

GHUT

I'll even tell you one means "Courage is a kind of salvation" and the other "Courage is knowing what not to fear" but you have absolutely no way of knowing which is which.
 
When does a code become decipherable?

Surely, given a finate number of data points (i.e. cipertext) there is an infinite number of solutions to it? What information needs to be known for it to be breakable?
 
Last edited:
Knowing what was used to encode it can go a long way, and having some idea of what it says won't hurt. Newspapers often have "Cryptograms" that are made from a simple substitution cipher. It will have many characters so it's unlikely that the wrong substitutions will make a coherent message and they'll sometimes make the encoded message the answer to a riddle so the message is meaningful. These are meant to be broken of course, but are examples of how not to use a substitution cipher if you want security.

Just knowing the method can do the trick as well. Any RSA encryption can be broken given enough time, though done properly it's an extremely long time (ideally long after the data is no longer sensitive).

Using the same code over and over can do you in. Say a baseball coach has 5 different signals to mean "steal second". Over the course of one game, he can use these without trouble. If he used the same set of signals to mean "steal second" for an entire season, people will catch on (if they're paying attention).

It really depends on the method used, and also how it's used as to just how secure your encryption is, as well as the resources and ability of your attackers.
 
Normally, good 2-way crypto algorithms are given lots of public exposure, testing, verification. What you did depends on method only, very likely.

Have a quick read about why crypto is harder than it seems -
http://www.schneier.com/essay-037.html
 

Similar threads

Replies
7
Views
3K
  • · Replies 23 ·
Replies
23
Views
3K
  • · Replies 16 ·
Replies
16
Views
3K
Replies
2
Views
1K
  • · Replies 13 ·
Replies
13
Views
887
Replies
20
Views
4K
  • · Replies 2 ·
Replies
2
Views
1K
  • · Replies 20 ·
Replies
20
Views
10K
Replies
3
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K