Re: [go-nuts] Is this algorithm viable? its faster than AES256 upto 50KB

2022-08-03 Thread Uli Kunitz
The algorithm would only be viable if you you would use a different secret for every password. If the secret is reused, it can be broken with a single known-plaintext attack. The recommendation is always don't do your own crypto. Use PBKDF2, SHA256-CRYPT or Argon2 for password verification. On W

Re: [go-nuts] Is this algorithm viable? its faster than AES256 upto 50KB

2022-08-02 Thread Nathan Fisher
When looking at hashing algorithms there's a whole lot of factors to consider. A few of the common considerations are: 1. performance. 2. cryptographic or not. 3. collision rate including avalanche effect and bit-size. There are a bunch of other considerations but those are some high-level conce

[go-nuts] Is this algorithm viable? its faster than AES256 upto 50KB

2022-08-02 Thread Alex Breadman
package mod import ( "testing" ) func TestEncrypt(t *testing.T) { password := []byte("*RTFUGIHOD&TUGGIYKl") data := []byte("This encryption algorithm is faster than aes256 up to 40kb but how secure is it?") for x, _ := range data { p := (password[x%len(password)]) data[x] = data[x] + byte(p) } p