Answer the question
In order to leave comments, you need to log in
Is it legal to publish a secure communication channel algorithm that is personally developed and does not violate rights?
Hello.
The string of hashes encodes the login and password from my account on the toaster, from which I am writing, I boldly post it, because I am absolutely sure that it will never be hacked. I can turn this string back into an email/password pair with just an algorithm. Where I didn’t just wool, I didn’t find similar services anywhere, md5 doesn’t parse something back into text with the algorithm, no one yet.
This is not a direct analysis, but an indirect one. That is, in order to parse the hash back, you need to perform certain manipulations when assembling it. Then it will be possible to return. So all your tokens are safe, they are not in danger.
Can I publish a method on the network as a service that provides a secure communication channel or can I get it by header? What are the general options for the development of the algorithm? I just want everything to be legal, I prefer to sit at home at the computer to write code)
c82788429d6de69bb5648b6293a83835 eb5756d56bdfe436530926ed558942da d510123ad5778d1d00ae31bdff882387 35244044fd0989ddd251bec0bd1a3ed1 0b361ef80ffa27f08a1b94e3326925fc 17b5bee658d8edd7b982b4f684b632d3 74200a14666f1995f740655fd828cc58 e8157a2d092a942b2c5dd14aed50cce1 cff6e5810317e11d56b3cc0219ac2d0b 5e73692db0e0f09fe24d96393abd382a 9222d890bc6a59a9a5d82197895fcddd e832f564ee114ea0e837948916efdc1f 3dac6081abdfdd93ae5ba191e2c54052 6d1e83357e2ca01877dc1b907f9ecd1a 15a961ae558b765e467b72105c6284e6 8434b504b1012b1f16fb7fb4d48c744a a51d3efa2be8751b26b0ef28e32ead92 418bface319b2d4a3a867f8ce5398158 2857385f2df0e39a635755a5d5d8b2cf d29c5d3cfae57fb2b0118777bebb7505 ad6bfb00b08e4966798550d6ee3148ab 18a32e07a7827e300b8cd9cd22b13af5 c9aa7c44284c884785a8709fadd339d1 cce619ef32c515161c3175ad18a135a5 9ac2ffc0c1c487884c5639ade51ce934 28a3266c57b09040b464dd6f76ca6ec75e6172904f37b5ff200358b82a9d8e14 8cd439223f9c0abf50d90db54ad894a5 e9cb1809cbf901593bfe0cb02d4ee5ad 8b70e6c3171b670969375be55f1493ac 260bf65ee9bfa156e2dbde7df8045e12 b125cf84399d20c29456efcdb26439d0 ec8352b6eecffdd3a808b52a9da46ca2
I want to open a service for storing passwords and other important crap, which will be turned into such lines as above. Assembled and disassembled with keys. If you don't know the key, the information is lost. I think it will be a useful service, is it possible to run this, that's the question. The results of hashing before dehashing can be stored anywhere, for example, at home on a computer, it is not necessary to write to the service database.
The problem is that you can encode a message with two YouTube video identifiers and send a couple of videos to someone in a personal message. It will not arouse any suspicion, but there has been a covert transmission of information at a distance that is incredibly difficult, if not impossible, to obtain. This is the point that worries me the most. I don't want accusations of complicity, but I can't let the algorithm die either.
I don’t want to patent anything and I won’t in any case, if there is at least one option not to do this.
Can I publish this algorithm on Habré tomorrow?
Answer the question
In order to leave comments, you need to log in
You have symmetric encryption with a key, and the hash function does not imply a reverse process. Second, until you mathematically prove the security of the cipher, you can hang the algorithm in a frame on the wall and hang beautiful noodles for blondes. And third, encryption is indeed licensed by the FSB.
The FSB license for cryptography is a document of the established form that provides a legal entity with a documentary opportunity to develop, produce, distribute encryption (cryptographic) means, information systems and telecommunication systems.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question