1 - Common password:
The algorithm by not using the password directly, but using a virtual key that
is made by three parameths (password, salt and complexity), makes the decrypt
by guessing/using the most common passwords very difficult to be done (or
impossible in some cases).
2 - Capacity to an ordinary person solve the code:
To decrypt a code is needed four things: the code, the virtual keys parameths,
the knowledge about how to encrypt is done and capacity to decrypt. Making the
code not containing the key to solution itself, makes if a malicious person get
the code, in the most cases, won't be able to solve it. But even if an ordinary person
knows the code and the logic to decrypt he/she won't be able to decrypt "by hand",
because a simple code can need more than one million equations to be done.
3 - Brute force attack:
The algorithm has the capacity to increase the time to decrypt a single code by
rising the "complexity" number - the complexity is the exponent in a power equation
(we use 10^complexity) what result in the number of times a hash (we use hash512) is
done to make a virtual key. So, a virtual key is made by the hash of a hash in 10^complexity
numbers of time. That makes the user capable to high the time to encrypt/decrypt
based on how many operations a computer can solve by second. Thus, a brute force
attack is impracticable by the time to done that.
The code and the website can be freely used, but this website isn't responsible for any improper use or lost.
No. If you lost the password or the code, we haven't efficient ways to decrypt the code.
No. No information that is submitted to be encrypted is saved or used in any other process.
You can learn how this algorithm works in the About section.
The safety of this code is based on password, salt and complexity number. Longer and not common passwords, the use of salt and complexity numbers above 5 makes this code more safe to use.
Isn't know any efficient method to decrypt the code without knowing the password, the complexity number and the salt. A long message that was encrypted using a six size password, salt and a complexity number of 5 have an expectation to need more than 10 billion years to be cracked up by brute force in a 2010s computer.
Salt is a random string that works side by side with the password. It makes the code more difficult to be broke by brute force.
You can learn more about salt here.
The complexity is a number that makes a hash of the password in exponential number of times. This make the time to decrypt bigger in exponential time. In consequence, try to solve a code by brute force get slowed in exponential time by the complexity number. Bigger the complexity, bigger the time to solve the code.