Sister sites 
 Browsing 

What is encoding kit?

It deals with two corner stones in modern day data encoding: encryption and compression, featuring our newly devised ciphers for symmetric encryption (dubbed RSC for convenience), asymmetric encryption (dubbed HAC), digital signature(dubbed HDS), one way hash (dubbed RSH) and a lossless bit compressor (dubbed SFC). A (hopefully) comprehensive general description is in documentation about this.

Due to various legal ramifications, the matrix algorithms are patent protected (Application # US 61/687,351) and might be somewhat restrictive. The others are unpatented and license-free, and are available free for all uses.

Why doing this?

As is well known, cryptography played a notable role in shaping our world's military, political and business history. For more information on the subject, there are excellent articles, for example, An Overview of Cryptography. It suffices to say that this field had come a long way over the years, indeed over the centuries. A good number of ciphers had been time proven with known break-ins few and far between. Similarly remarkable progresses can be said of the compressors too.

Nevertheless, what we do here is to propose some possible alternatives and make them easily accessible. You may simply download the source codes (click a button on the left) and try it out. What it comes down to is that it takes talented people, such as yourself, to shed lights on whether they actually work as intended or not that close. Also in the spirit of open source, any feedback/contribution from the user community will be welcome, encouraged and appreciated.

Click ? on the left for more miscellaneous information. For example, click Benchmarks for the summary of comparison of these algorithms with some common ones.

Noteworthy notes

The secret key and hash sizes are variable.

Public key encryption (HAC) is about 100 times slower than secret key encryption (RSC) and expands quite significantly in size. Therefore it should typically run in hybrid mode (encrypt a secret key which in turn enctypts the actual data).

One version of HAC is partially homomorphic, meaning some computations can be done on encrypted data without decrypting it first.

The key pair in HAC/HDS can be generated straight from a user specification, such as password. When combined with Microsoft Silverlight technology, this may facilitate rather simple public key management and remove the necessity to physically store the private key.

One version of the hash (RSH) can be error correcting code.

The bit compressor (SFC) may not yield gains over Huffman coding in compression or performance, but makes for easier implementations.