Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. Algorithms
  4. How much is my encryption algorithm worth?

How much is my encryption algorithm worth?

Scheduled Pinned Locked Moved Algorithms
algorithmssecurityquestion
25 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    I would believe anything, but what does that have to do with producing an efficient and valid encryption algorithm?

    D Offline
    D Offline
    Daniel Mullarkey
    wrote on last edited by
    #21

    What makes my encryption algorithm unique is that unlike other encryption algorithms, the set of all unencrypted values, encrypted values, and key values, are electronically indistinguishable from one another, while the each unencrypted value and encrypted value are still uniquely different from one another.

    1 Reply Last reply
    0
    • D Daniel Mullarkey

      Nothing, in and of itself. What makes my encryption algorithm unique is that unlike other encryption algorithms, the set of all unencrypted values, encrypted values, and key values, are electronically indistinguishable from one another, while the each unencrypted value its corresponding encrypted value are still uniquely different from one another.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #22

      So you keep telling us, but that proves nothing. Your algorithm needs to be tested to destruction by experts in the field, before anyone is going to pay you any money for it.

      D 1 Reply Last reply
      0
      • L Lost User

        So you keep telling us, but that proves nothing. Your algorithm needs to be tested to destruction by experts in the field, before anyone is going to pay you any money for it.

        D Offline
        D Offline
        Daniel Mullarkey
        wrote on last edited by
        #23

        That point I will concede. Nonetheless, I was planning on licensing it out, rather than selling the patent wholesale.

        L 1 Reply Last reply
        0
        • D Daniel Mullarkey

          That point I will concede. Nonetheless, I was planning on licensing it out, rather than selling the patent wholesale.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #24

          Daniel Mullarkey wrote:

          I was planning on licensing it out

          Well you still have the same problem. Who do you think is going to want to licence an encryption system without any evidence of its efficacy?

          1 Reply Last reply
          0
          • D Daniel Mullarkey

            Well, I can say that the core methods involve 10 lines of code, one with a conditional (if...then) recursion that at best only occurs once per original use and the rest involves conditional (if...then) mathematics at three levels, thereby making it very quick and very fast. Besides, ever heard of lossless compression? Well, I might as well have created perpetual lossless, key-based, encryption. Keep in mind that the encryption algorithm is symmetrical, so the very idea of having public keys would be a bad idea. The core of my encryption algorithm is essentially a block cipher in which the unencrypted value does not grow or shrink in size when encrypted. Also, keep in mind that it can not only encrypt bulk data, but it can also use bulk keys. And one day I will show that I can deliver on the goods. I just have to find a way to afford to pay LegalZoom $1,000 to patent it. "In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data." --Quoted from Wikipedia from Block cipher

            M Offline
            M Offline
            Matty22
            wrote on last edited by
            #25

            All encryption is lossless? You have to be able to undo it back to the original :P

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups