About

This algorithm is a solution to a problem: how to hide information with a password. Furthermore, to solve the problem efficiently, the encrypter was design to solve three of the most important challenges in cryptography:


1 - Common password:
The algorithm by not using the password directly, but using a virtual key that is made by three parameths (password, salt and complexity), makes the decrypt by guessing/using the most common passwords very difficult to be done (or impossible in some cases).


2 - Capacity to an ordinary person solve the code:
To decrypt a code is needed four things: the code, the virtual keys parameths, the knowledge about how to encrypt is done and capacity to decrypt. Making the code not containing the key to solution itself, makes if a malicious person get the code, in the most cases, won't be able to solve it. But even if an ordinary person knows the code and the logic to decrypt he/she won't be able to decrypt "by hand", because a simple code can need more than one million equations to be done.


3 - Brute force attack:
The algorithm has the capacity to increase the time to decrypt a single code by rising the "complexity" number - the complexity is the exponent in a power equation (we use 10^complexity) what result in the number of times a hash (we use hash512) is done to make a virtual key. So, a virtual key is made by the hash of a hash in 10^complexity numbers of time. That makes the user capable to high the time to encrypt/decrypt based on how many operations a computer can solve by second. Thus, a brute force attack is impracticable by the time to done that.

Learn more:

FAQ

What are the terms of use?

The code and the website can be freely used, but this website isn't responsible for any improper use or lost.

Can I recover a message that was encrypted if I lost the password or the code?

No. If you lost the password or the code, we haven't efficient ways to decrypt the code.

This website save any information that was submitted?

No. No information that is submitted to be encrypted is saved or used in any other process.

How the encrypter code works?

You can learn how this algorithm works in the About section.

How safe is this code?

The safety of this code is based on password, salt and complexity number. Longer and not common passwords, the use of salt and complexity numbers above 5 makes this code more safe to use.

Isn't know any efficient method to decrypt the code without knowing the password, the complexity number and the salt. A long message that was encrypted using a six size password, salt and a complexity number of 5 have an expectation to need more than 10 billion years to be cracked up by brute force in a 2010s computer.

What is salt?

Salt is a random string that works side by side with the password. It makes the code more difficult to be broke by brute force.

You can learn more about salt here.

What is complexity?

The complexity is a number that makes a hash of the password in exponential number of times. This make the time to decrypt bigger in exponential time. In consequence, try to solve a code by brute force get slowed in exponential time by the complexity number. Bigger the complexity, bigger the time to solve the code.

Contact

Github Linkedin

Contact form: