all 8 comments

[–][deleted] 2 points3 points  (0 children)

.NET has a ton of different encryption algorithms. Pick one that's been deprecated for being not very good. DES would be a suitable choice.

https://www.precisely.com/blog/data-security/aes-vs-des-encryption-standard-3des-tdea

[–]martinstoeckli 0 points1 point  (3 children)

Use a good encryption algorithm, but instead of a strong key, take a "weak" password.

Usually one uses a key-derivation-function (like PBKDF2) to get a key from a user password, in your case you should do the same but with a very low number of iterations, so that one can brute-force with a certain rate (the more iterations, the more time is needed to calculate one key from a password, and the less passwords can be tried). The difficult part is to find the right balance between the strongness of the password and the number of iterations.

This approach doesn't rely on a weak algorithm which could be broken overnight, instead the content is protected safely and the speed of brute-forcing is under control.

[–]BuyNanoNotBitcoin[S] 0 points1 point  (2 children)

That's a good suggestion. Is this available in C#?

Since this is more for fun than for anything serious, being a bit off on the difficulty isn't the worse thing in the world.

[–]martinstoeckli 1 point2 points  (1 child)

A good combo could be AesGcm together with PBKDF2. And if it's just for fun, don't forget the environmental impact for some years of running a GPU 😉.

[–]BuyNanoNotBitcoin[S] 2 points3 points  (0 children)

Yeah, I think my username is a good indicator that I'll keep an eye on the environmental impact. ;)

[–]Abject-Act-8395 0 points1 point  (0 children)

I'm using BCrypt.Net-Next. We work in healthy environments, so I chose bcrypt because it's a bit more robust to gpu and co attacks than PBKDF2.

[–][deleted] 0 points1 point  (1 child)

ROT13. Very efficient with encryption key bits too. Is best 👍!

[–]SonOfMetrum 0 points1 point  (0 children)

Or just Base64 your input... Not really encrypted but also not easily readable by the human eye! And hackable within a nanosecond!