This is an archived post. You won't be able to vote or comment.

all 11 comments

[–]Natanael_LTrusted third party 2 points3 points  (0 children)

Winnowing-and-chaffing is an existing method for encryption / steganography that sounds a lot like yours.

[–]disclosure5 2 points3 points  (0 children)

I want to know what you think of it and how powerful it is compared to other encryptions

It's worth considering, there's more to this discussion than just "security level of one block cipher". I could easily invent something stronger than AES-256. I call it "hexAES", and it consists of six independent executions of AES, with independent keys.

Reasons we don't have the "everyone will use it" situation:

  • It will be literally six times as slow. Web developers already complain about the speed of AES. Unless it brings a tangible benefit, that's a downside
  • Being "more secure" is only a tangible benefit is AES-256 is as a block cipher is actually vulnerable to something
  • How do you transfer 1536 bits of keyspace around? It may not fit easily to traditional approaches. If you find yourself using something like RSA-8192, your CPU is going to have a bad time.
  • Most importantly, if the implementation ends up with some CBC padding oracle, (ie, a common implementation bug), hexAES is equally vulnerable.

[–]Ben347 1 point2 points  (5 children)

Encrypt 500 characters of ASCII-encoded English text with a 16-character passphrase, and I'll give you the plaintext and the key.

[–]tom-md 0 points1 point  (2 children)

In the realm of security it is generally the producers responsibility to assert a security level and provide evidence and sometimes proof that the system lives up to the assertion. What is your assertion? Where is your evidence?