A
A
Archakov Dennis2015-04-23 12:47:43
PHP
Archakov Dennis, 2015-04-23 12:47:43

What encryption algorithm to choose to protect information?

In general, the idea arose that each Internet user could store his information in a safe place and be 90% sure that his information would not be decrypted.
Why not 100%? - the fact is that any protection sooner or later (hacked / hacked). So these 10% and there is a possibility of cracking a very good protection.
I want to make my project independent of anyone, where people can store their data and other information, knowing that their information is very well encrypted.
And going one step further, to make such protection that, if the FSB, for example, decides to get access to this data, they worked very hard on decryption.
Yes, perhaps the idea is paranoid. But now is a time where your personal information can be held by third parties while you sleep. So I decided to make such a project for myself and others.
I thought about how the defense and the project would work. What will be the authorization. Design and more. I had my own site on hacker topics and programming, I saw quite a few examples of how defenses are hacked and what they use, so analyzing all this and thinking about my defense. I want to make 2-3 stage authorization, etc. protection before entering the office. I can do all this, the problem is that I can’t decide whether to use ready-made algorithms or, which is very pointless, come up with my own, for which I have no knowledge :)
PS:I ask you in advance! Write comments without banter and similar comments, because I need a competent expert opinion.

Answer the question

In order to leave comments, you need to log in

5 answer(s)
K
kiparis_sp, 2015-04-30
@archakov06

Tell me, when you see a safe, what associations do you have? Most likely you will not think that there can be a sandwich with sausage, or, for example, a "lucky" ticket. Here. Most likely, there is definitely something valuable there ... some important documents that can serve as material for blackmail, and so on. etc. It's exactly the same with encrypted files, data channels, hard drives.
- Do you want to hide? Put it in the most prominent place ...
I would direct you along this channel. See steganography. This is not cryptography, although it can be applied within the framework of steganography.

K
Kirill Olenev, 2015-04-23
@agent10

The problem is that you, you are the weak link. The FSB will not decrypt the data, you will do it for them.
Or tell me who you are and what kind of connections you have "above"? If there are strong connections, then the idea will burn out ..
And another question .. why should I, as a user, choose your project? Do you guarantee safety and confidentiality? Do you guarantee your condition and property?
PS I am not writing for banter, but for you to think about whether it is worth taking on this ..

M
Max, 2015-04-23
@AloneCoder

bcrypt
codahale.com/how-to-safely-store-a-password

D
Disen, 2015-04-23
@Disen

You are dangerously incompetent in cryptography
, so there is only one option - "use ready-made algorithms", for example AES, Blowfish or our GOST28147-89. :)
And to be honest and without banter, then most likely the "weak link" will not be the encryption algorithm, but the implementation of the crypto scheme in your project (key distribution algorithms, authentication mechanisms, etc.). It's easy to shoot yourself in the foot (and you're sure to shoot it), both when designing an architecture and when implementing it in code. Pitfalls - a lot. It is impossible to create a reliable system of this level alone and without experience, therefore, in practical terms, your project is absolutely useless and hardly anyone will dare to use it to hide secrets from the state security agencies...
However, as a self-education, you can and should try. For example, try to implement the same GOST 28147-89. And then you can already try to hide the photo of your naked girlfriend. Or a friend :)

I
Ivan Arxont, 2015-04-24
@arxont

You have C# tags, so use the standard tool - System.Security.Cryptography
a bunch of ready-made algorithms (I recommend AES-Rijndael )

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question